From null at suse.de Mon Jun 2 08:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:04 -0000 Subject: SUSE-SU-2025:01792-1: important: Security update for dnsdist Message-ID: <174885300466.30168.11714914947012465481@smelt2.prg2.suse.org> # Security update for dnsdist Announcement ID: SUSE-SU-2025:01792-1 Release Date: 2025-06-02T07:38:54Z Rating: important References: * bsc#1243378 Cross-References: * CVE-2025-30193 CVSS scores: * CVE-2025-30193 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-30193 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-30193 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS An update that solves one vulnerability can now be installed. ## Description: This update for dnsdist fixes the following issues: * CVE-2025-30193: stack exhaustion when processing too many queries on incoming TCP connections leads to a denial-of-service (bsc#1243378). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1792=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1792=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * dnsdist-1.8.0-150100.3.8.1 * dnsdist-debugsource-1.8.0-150100.3.8.1 * dnsdist-debuginfo-1.8.0-150100.3.8.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * dnsdist-1.8.0-150100.3.8.1 * dnsdist-debugsource-1.8.0-150100.3.8.1 * dnsdist-debuginfo-1.8.0-150100.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30193.html * https://bugzilla.suse.com/show_bug.cgi?id=1243378 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:07 -0000 Subject: SUSE-RU-2025:01791-1: important: Recommended update for oracleasm Message-ID: <174885300726.30168.9735889232063811830@smelt2.prg2.suse.org> # Recommended update for oracleasm Announcement ID: SUSE-RU-2025:01791-1 Release Date: 2025-06-02T07:26:07Z Rating: important References: * bsc#1235682 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for oracleasm fixes the following issues: * Fix oracleasm memory reclaimation not working (bsc#1235682) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1791=1 openSUSE-SLE-15.6-2025-1791=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1791=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * oracleasm-debugsource-2.0.8-150600.16.10.1 * oracleasm-kmp-default-2.0.8_k6.4.0_150600.23.50-150600.16.10.1 * oracleasm-kmp-default-debuginfo-2.0.8_k6.4.0_150600.23.50-150600.16.10.1 * openSUSE Leap 15.6 (x86_64) * oracleasm-kmp-rt-2.0.8_k6.4.0_150600.6-150600.16.10.1 * oracleasm-kmp-rt-debuginfo-2.0.8_k6.4.0_150600.6-150600.16.10.1 * openSUSE Leap 15.6 (aarch64) * oracleasm-kmp-64kb-2.0.8_k6.4.0_150600.23.50-150600.16.10.1 * oracleasm-kmp-64kb-debuginfo-2.0.8_k6.4.0_150600.23.50-150600.16.10.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * oracleasm-kmp-default-2.0.8_k6.4.0_150600.23.50-150600.16.10.1 * oracleasm-kmp-default-debuginfo-2.0.8_k6.4.0_150600.23.50-150600.16.10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:10 -0000 Subject: SUSE-RU-2025:01790-1: important: Recommended update for powerpc-utils Message-ID: <174885301007.30168.16111401177586200275@smelt2.prg2.suse.org> # Recommended update for powerpc-utils Announcement ID: SUSE-RU-2025:01790-1 Release Date: 2025-06-02T06:15:32Z Rating: important References: * bsc#1238322 * jsc#PED-3946 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature and has one fix can now be installed. ## Description: This update for powerpc-utils fixes the following issues: * Support installation over HNV devices (jsc#PED-3946) * Fix the issue with lparstat Displays Negative Values for %idle in "Actual" Section when workload is running (bsc#1238322) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1790=1 ## Package List: * Basesystem Module 15-SP7 (ppc64le) * powerpc-utils-debuginfo-1.3.13-150700.6.3.1 * powerpc-utils-debugsource-1.3.13-150700.6.3.1 * powerpc-utils-1.3.13-150700.6.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1238322 * https://jira.suse.com/browse/PED-3946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:11 -0000 Subject: SUSE-RU-2025:01789-1: moderate: Recommended update for rust, rust1.87 Message-ID: <174885301178.30168.14553056281228598795@smelt2.prg2.suse.org> # Recommended update for rust, rust1.87 Announcement ID: SUSE-RU-2025:01789-1 Release Date: 2025-06-01T20:50:49Z Rating: moderate References: Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for rust, rust1.87 fixes the following issues: # Version 1.87.0 (2025-05-15) ## Language * Stabilize asm_goto feature * Allow parsing open beginning ranges (..EXPR) after unary operators !, -, and *. * Don't require method impls for methods with Self: Sized bounds in impls for unsized types * Stabilize feature(precise_capturing_in_traits) allowing use<...> bounds on return position impl Trait in traits ## Compiler * x86: make SSE2 required for i686 targets and use it to pass SIMD types ## Libraries * Stabilize the anonymous pipe API * Add support for unbounded left/right shift operations * Print pointer metadata in Debug impl of raw pointers * Vec::with_capacity guarantees it allocates with the amount requested, even if Vec::capacity returns a different number. * Most std::arch intrinsics which don't take pointer arguments can now be called from safe code if the caller has the appropriate target features already enabled * Undeprecate env::home_dir * Denote ControlFlow as #[must_use] * Macros such as assert_eq! and vec! now support const {...} expressions Stabilized APIs * Vec::extract_if https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.extract_if * vec::ExtractIf https://doc.rust- lang.org/stable/std/vec/struct.ExtractIf.html) * LinkedList::extract_if https://doc.rust- lang.org/stable/std/collections/struct.LinkedList.html#method.extract_if * linked_list::ExtractIf https://doc.rust- lang.org/stable/std/collections/linked_list/struct.ExtractIf.html * <[T]>::split_off https://doc.rust- lang.org/stable/std/primitive.slice.html#method.split_off * <[T]>::split_off_mut https://doc.rust- lang.org/stable/std/primitive.slice.html#method.split_off_mut * <[T]>::split_off_first https://doc.rust- lang.org/stable/std/primitive.slice.html#method.split_off_first * <[T]>::split_off_first_mut https://doc.rust- lang.org/stable/std/primitive.slice.html#method.split_off_first_mut * <[T]>::split_off_last https://doc.rust- lang.org/stable/std/primitive.slice.html#method.split_off_last * <[T]>::split_off_last_mut https://doc.rust- lang.org/stable/std/primitive.slice.html#method.split_off_last_mut * String::extend_from_within https://doc.rust- lang.org/stable/alloc/string/struct.String.html#method.extend_from_within * os_str::Display https://doc.rust- lang.org/stable/std/ffi/os_str/struct.Display.html * OsString::display https://doc.rust- lang.org/stable/std/ffi/struct.OsString.html#method.display * OsStr::display https://doc.rust- lang.org/stable/std/ffi/struct.OsStr.html#method.display * io::pipe https://doc.rust-lang.org/stable/std/io/fn.pipe.html * io::PipeReader https://doc.rust- lang.org/stable/std/io/struct.PipeReader.html * io::PipeWriter https://doc.rust- lang.org/stable/std/io/struct.PipeWriter.html * impl From for OwnedHandle https://doc.rust- lang.org/stable/std/os/windows/io/struct.OwnedHandle.html#impl- From%3CPipeReader%3E-for-OwnedHandle * impl From for OwnedHandle https://doc.rust- lang.org/stable/std/os/windows/io/struct.OwnedHandle.html#impl- From%3CPipeWriter%3E-for-OwnedHandle * impl From for Stdio https://doc.rust- lang.org/stable/std/process/struct.Stdio.html * impl From for Stdio https://doc.rust- lang.org/stable/std/process/struct.Stdio.html#impl-From%3CPipeWriter%3E-for- Stdio * impl From for OwnedFd https://doc.rust- lang.org/stable/std/os/fd/struct.OwnedFd.html#impl-From%3CPipeReader%3E-for- OwnedFd * impl From for OwnedFd https://doc.rust- lang.org/stable/std/os/fd/struct.OwnedFd.html#impl-From%3CPipeWriter%3E-for- OwnedFd * Box>::write https://doc.rust- lang.org/stable/std/boxed/struct.Box.html#method.write * impl TryFrom> for String https://doc.rust- lang.org/stable/std/string/struct.String.html#impl- TryFrom%3CVec%3Cu8%3E%3E-for-String * <*const T>::offset_from_unsigned https://doc.rust- lang.org/stable/std/primitive.pointer.html#method.offset_from_unsigned * <*const T>::byte_offset_from_unsigned https://doc.rust- lang.org/stable/std/primitive.pointer.html#method.byte_offset_from_unsigned * <*mut T>::offset_from_unsigned https://doc.rust- lang.org/stable/std/primitive.pointer.html#method.offset_from_unsigned-1 * <*mut T>::byte_offset_from_unsigned https://doc.rust- lang.org/stable/std/primitive.pointer.html#method.byte_offset_from_unsigned-1 * NonNull::offset_from_unsigned https://doc.rust- lang.org/stable/std/ptr/struct.NonNull.html#method.offset_from_unsigned * NonNull::byte_offset_from_unsigned https://doc.rust- lang.org/stable/std/ptr/struct.NonNull.html#method.byte_offset_from_unsigned * ::cast_signed https://doc.rust- lang.org/stable/std/primitive.usize.html#method.cast_signed * NonZero::::cast_signed https://doc.rust- lang.org/stable/std/num/struct.NonZero.html#method.cast_signed-5). * ::cast_unsigned https://doc.rust- lang.org/stable/std/primitive.isize.html#method.cast_unsigned). * NonZero::::cast_unsigned https://doc.rust- lang.org/stable/std/num/struct.NonZero.html#method.cast_unsigned-5). * ::is_multiple_of https://doc.rust- lang.org/stable/std/primitive.usize.html#method.is_multiple_of * ::unbounded_shl https://doc.rust- lang.org/stable/std/primitive.usize.html#method.unbounded_shl * ::unbounded_shr https://doc.rust- lang.org/stable/std/primitive.usize.html#method.unbounded_shr * ::unbounded_shl https://doc.rust- lang.org/stable/std/primitive.isize.html#method.unbounded_shl * ::unbounded_shr https://doc.rust- lang.org/stable/std/primitive.isize.html#method.unbounded_shr * ::midpoint https://doc.rust- lang.org/stable/std/primitive.isize.html#method.midpoint * ::from_utf8 https://doc.rust- lang.org/stable/std/primitive.str.html#method.from_utf8 * ::from_utf8_mut https://doc.rust- lang.org/stable/std/primitive.str.html#method.from_utf8_mut * ::from_utf8_unchecked https://doc.rust- lang.org/stable/std/primitive.str.html#method.from_utf8_unchecked * ::from_utf8_unchecked_mut https://doc.rust- lang.org/stable/std/primitive.str.html#method.from_utf8_unchecked_mut These previously stable APIs are now stable in const contexts: * core::str::from_utf8_mut https://doc.rust- lang.org/stable/std/str/fn.from_utf8_mut.html * <[T]>::copy_from_slice https://doc.rust- lang.org/stable/std/primitive.slice.html#method.copy_from_slice * SocketAddr::set_ip https://doc.rust- lang.org/stable/std/net/enum.SocketAddr.html#method.set_ip * SocketAddr::set_port https://doc.rust- lang.org/stable/std/net/enum.SocketAddr.html#method.set_port * SocketAddrV4::set_ip https://doc.rust- lang.org/stable/std/net/struct.SocketAddrV4.html#method.set_ip * SocketAddrV4::set_port https://doc.rust- lang.org/stable/std/net/struct.SocketAddrV4.html#method.set_port * SocketAddrV6::set_ip https://doc.rust- lang.org/stable/std/net/struct.SocketAddrV6.html#method.set_ip * SocketAddrV6::set_port https://doc.rust- lang.org/stable/std/net/struct.SocketAddrV6.html#method.set_port * SocketAddrV6::set_flowinfo https://doc.rust- lang.org/stable/std/net/struct.SocketAddrV6.html#method.set_flowinfo * SocketAddrV6::set_scope_id https://doc.rust- lang.org/stable/std/net/struct.SocketAddrV6.html#method.set_scope_id * char::is_digit https://doc.rust- lang.org/stable/std/primitive.char.html#method.is_digit * char::is_whitespace https://doc.rust- lang.org/stable/std/primitive.char.html#method.is_whitespace) * <[[T; N]]>::as_flattened https://doc.rust- lang.org/stable/std/primitive.slice.html#method.as_flattened * <[[T; N]]>::as_flattened_mut https://doc.rust- lang.org/stable/std/primitive.slice.html#method.as_flattened_mut * String::into_bytes https://doc.rust- lang.org/stable/std/string/struct.String.html#method.into_bytes * String::as_str https://doc.rust- lang.org/stable/std/string/struct.String.html#method.as_str * String::capacity https://doc.rust- lang.org/stable/std/string/struct.String.html#method.capacity * String::as_bytes https://doc.rust- lang.org/stable/std/string/struct.String.html#method.as_bytes * String::len https://doc.rust- lang.org/stable/std/string/struct.String.html#method.len * String::is_empty https://doc.rust- lang.org/stable/std/string/struct.String.html#method.is_empty * String::as_mut_str https://doc.rust- lang.org/stable/std/string/struct.String.html#method.as_mut_str * String::as_mut_vec https://doc.rust- lang.org/stable/std/string/struct.String.html#method.as_mut_vec * Vec::as_ptr https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.as_ptr * Vec::as_slice https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.as_slice * Vec::capacity https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.capacity * Vec::len https://doc.rust-lang.org/stable/std/vec/struct.Vec.html#method.len * Vec::is_empty https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.is_empty * Vec::as_mut_slice https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.as_mut_slice * Vec::as_mut_ptr https://doc.rust- lang.org/stable/std/vec/struct.Vec.html#method.as_mut_ptr ## Cargo * Add terminal integration via ANSI OSC 9;4 sequences * chore: bump openssl to v3 * feat(package): add --exclude-lockfile flag Compatibility Notes * Rust now raises an error for macro invocations inside the #![crate_name] attribute * Unstable fields are now always considered to be inhabited * Macro arguments of unary operators followed by open beginning ranges may now be matched differently * Make Debug impl of raw pointers print metadata if present * Warn against function pointers using unsupported ABI strings in dependencies * Associated types on dyn types are no longer deduplicated * Forbid attributes on .. inside of struct patterns (let Struct { #[attribute] .. }) = * Make ptr_cast_add_auto_to_object lint into hard error * Many std::arch intrinsics are now safe to call in some contexts, there may now be new unused_unsafe warnings in existing codebases. * Limit width and precision formatting options to 16 bits on all targets * Turn order dependent trait objects future incompat warning into a hard error * Denote ControlFlow as #[must_use * Windows: The standard library no longer links advapi32, except on win7. Code such as C libraries that were relying on this assumption may need to explicitly link advapi32. * Proc macros can no longer observe expanded cfg(true) attributes. * Start changing the internal representation of pasted tokens. Certain invalid declarative macros that were previously accepted in obscure circumstances are now correctly rejected by the compiler. Use of a tt fragment specifier can often fix these macros. * Don't allow flattened format_args in const. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1789=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1789=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1789=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1789=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1789=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1789=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1789=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1789=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1789=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1789=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1789=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1789=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1789=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1789=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1789=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1789=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1789=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1789=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150400.24.46.1 * cargo-1.87.0-150400.24.46.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150400.24.46.1 * cargo-1.87.0-150400.24.46.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * cargo1.87-1.87.0-150300.7.3.1 * cargo-1.87.0-150300.21.56.1 * rust-1.87.0-150300.21.56.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150400.24.46.1 * cargo-1.87.0-150400.24.46.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * cargo1.87-1.87.0-150300.7.3.1 * cargo-1.87.0-150300.21.56.1 * rust-1.87.0-150300.21.56.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150400.24.46.1 * cargo-1.87.0-150400.24.46.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * cargo1.87-1.87.0-150300.7.3.1 * cargo-1.87.0-150300.21.56.1 * rust-1.87.0-150300.21.56.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Enterprise Storage 7.1 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * cargo1.87-1.87.0-150300.7.3.1 * cargo-1.87.0-150300.21.56.1 * rust-1.87.0-150300.21.56.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586 nosrc) * rust1.87-1.87.0-150300.7.3.1 * openSUSE Leap 15.3 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * openSUSE Leap 15.3 (nosrc) * rust1.87-test-1.87.0-150300.7.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cargo-1.87.0-150400.24.46.1 * rust-1.87.0-150400.24.46.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * cargo-1.87.0-150500.27.40.1 * rust-1.87.0-150500.27.40.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * rust1.87-1.87.0-150300.7.3.1 * openSUSE Leap 15.6 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * rust1.87-1.87.0-150300.7.3.1 * Development Tools Module 15-SP6 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo-1.87.0-150500.27.40.1 * cargo1.87-1.87.0-150300.7.3.1 * rust-1.87.0-150500.27.40.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64 nosrc) * rust1.87-1.87.0-150300.7.3.1 * Development Tools Module 15-SP7 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * cargo1.87-1.87.0-150300.7.3.1 * cargo-1.87.0-150300.21.56.1 * rust-1.87.0-150300.21.56.1 * rust1.87-debuginfo-1.87.0-150300.7.3.1 * cargo1.87-debuginfo-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * rust1.87-1.87.0-150300.7.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * rust1.87-src-1.87.0-150300.7.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:16 -0000 Subject: SUSE-RU-2025:01557-1: moderate: Recommended update for python-docopt, python-msgpack, python-redis Message-ID: <174885301667.30168.1848009034069094378@smelt2.prg2.suse.org> # Recommended update for python-docopt, python-msgpack, python-redis Announcement ID: SUSE-RU-2025:01557-1 Release Date: 2025-06-01T14:04:03Z Rating: moderate References: * bsc#1240064 Affected Products: * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update ships python311-docopt and python311-redis to the Public Cloud Module, and the python311-msgpack to the Python3 module. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-1557=1 ## Package List: * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-msgpack-debuginfo-1.0.7-150600.3.2.1 * python311-msgpack-1.0.7-150600.3.2.1 * python-msgpack-debugsource-1.0.7-150600.3.2.1 * Python 3 Module 15-SP7 (noarch) * python311-sqlparse-0.4.4-150600.3.2.1 * python311-passlib-1.7.4-150600.12.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:24 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:24 -0000 Subject: SUSE-SU-2025:01788-1: important: Security update for java-1_8_0-ibm Message-ID: <174885302442.30168.9304569142167624639@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2025:01788-1 Release Date: 2025-05-31T10:34:59Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 * bsc#1242208 * bsc#1243429 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 * CVE-2025-4447 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-4447 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4447 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4447 ( NVD ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: Update to Java 8.0 Service Refresh 8 Fix Pack 45. Security issues fixed: * Oracle April 15 2025 CPU (bsc#1242208) * CVE-2025-21587: unauthorized access, deletion and modification of critical data via the JSSE component (bsc#1241274). * CVE-2025-30691: unauthorized access to data via the Compiler component (bsc#1241275). * CVE-2025-30698: unauthorized access to data and ability to cause a partial DoS via the 2D component (bsc#1241276). * IBM Security Update May 2025 * CVE-2025-4447: stack based buffer overflow in Eclipse OpenJ9 through modification of file that is read when the JVM starts (bsc#1243429). Other changes and issues fixed: * Security: * Avoid memory leak during aes cipher initialization operations for IBMJCEPlus and IBMJCEPlusProviders provider. * Changing the default of the com.ibm.security.spnego.msinterop property from true to false. * Deserializing a com.ibm.crypto.provider.rsaprivatecrtkey object causes a java.io.invalidobjectexception to be thrown. * Failed to read private key from a JKS keystore, specified as JCEKS keystore. * HTTPS channel binding support. * Keytool listing PKCS12 keystore issue. * On Linux systems, use gcc11.2 to compile IBM PKCS11 library. * Support has been added to the IBM Java XMLDSigRI security provider for the EdDSA (Edwards-curve Digital Signature Algorithm). * Updates to XDH Key Agreement, AESGCM Algorithms in IBMJCEPlus and IBMJCEPlusFIPS providers. * Class Libraries: * Update timezone information to the latest tzdata2025a. * Java Virtual Machine: * A SIGSEGV/GPF event received while processing verifyerror. * Crash while resolving MethodHandleNatives. * NoSuchMethodException or NoClassDefFoundError when loading classes. * JIT Compiler: * Assert in the JIT Compiler, badILOp. * Reduced MD5 performance. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1788=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-1788=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1788=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1788=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1788=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1788=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1788=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1788=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1788=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1788=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1788=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1788=1 ## Package List: * openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * openSUSE Leap 15.6 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-devel-32bit-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-32bit-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * java-1_8_0-ibm-src-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-demo-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * Legacy Module 15-SP6 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * Legacy Module 15-SP6 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * SUSE Enterprise Storage 7.1 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.45-150000.3.101.1 * SUSE Enterprise Storage 7.1 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.45-150000.3.101.1 * java-1_8_0-ibm-devel-1.8.0_sr8.45-150000.3.101.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://www.suse.com/security/cve/CVE-2025-4447.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 * https://bugzilla.suse.com/show_bug.cgi?id=1242208 * https://bugzilla.suse.com/show_bug.cgi?id=1243429 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:28 -0000 Subject: SUSE-SU-2025:01456-1: moderate: Security update for sqlite3 Message-ID: <174885302842.30168.7794059162495992813@smelt2.prg2.suse.org> # Security update for sqlite3 Announcement ID: SUSE-SU-2025:01456-1 Release Date: 2025-05-31T00:59:25Z Rating: moderate References: * bsc#1241020 * bsc#1241078 * bsc#1241189 * jsc#SLE-16032 Cross-References: * CVE-2025-29087 * CVE-2025-29088 * CVE-2025-3277 CVSS scores: * CVE-2025-29087 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-29087 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2025-29087 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-29087 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-29087 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-29088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-29088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-29088 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-29088 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-3277 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-3277 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-3277 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities and contains one feature can now be installed. ## Description: This update for sqlite3 fixes the following issues: * CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020) * CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078) Other fixes: * Updated to version 3.49.1 from Factory (jsc#SLE-16032) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1456=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * sqlite3-debuginfo-3.49.1-150000.3.27.1 * sqlite3-3.49.1-150000.3.27.1 * sqlite3-tcl-debuginfo-3.49.1-150000.3.27.1 * sqlite3-devel-3.49.1-150000.3.27.1 * sqlite3-debugsource-3.49.1-150000.3.27.1 * sqlite3-tcl-3.49.1-150000.3.27.1 * libsqlite3-0-debuginfo-3.49.1-150000.3.27.1 * libsqlite3-0-3.49.1-150000.3.27.1 * Basesystem Module 15-SP7 (x86_64) * libsqlite3-0-32bit-debuginfo-3.49.1-150000.3.27.1 * libsqlite3-0-32bit-3.49.1-150000.3.27.1 ## References: * https://www.suse.com/security/cve/CVE-2025-29087.html * https://www.suse.com/security/cve/CVE-2025-29088.html * https://www.suse.com/security/cve/CVE-2025-3277.html * https://bugzilla.suse.com/show_bug.cgi?id=1241020 * https://bugzilla.suse.com/show_bug.cgi?id=1241078 * https://bugzilla.suse.com/show_bug.cgi?id=1241189 * https://jira.suse.com/browse/SLE-16032 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 08:30:32 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 08:30:32 -0000 Subject: SUSE-SU-2025:01487-1: important: Security update for java-11-openjdk Message-ID: <174885303264.30168.6336350042218401165@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2025:01487-1 Release Date: 2025-05-30T20:49:37Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Upgrade to upstream tag jdk-11.0.27+6 (April 2025 CPU) CVEs: * CVE-2025-21587: Fixed JSSE unauthorized access, deletion or modification of critical data (bsc#1241274) * CVE-2025-30691: Fixed Oracle Java SE Compiler Unauthorized Data Access (bsc#1241275) * CVE-2025-30698: Fixed Oracle Java 2D unauthorized data access and DoS (bsc#1241276) Changes: + JDK-8195675: Call to insertText with single character from custom Input Method ignored + JDK-8202926: Test java/awt/Focus/ /WindowUpdateFocusabilityTest/ /WindowUpdateFocusabilityTest.html fails + JDK-8216539: tools/jar/modularJar/Basic.java timed out + JDK-8268364: jmethod clearing should be done during unloading + JDK-8273914: Indy string concat changes order of operations + JDK-8294316: SA core file support is broken on macosx-x64 starting with macOS 12.x + JDK-8306408: Fix the format of several tables in building.md + JDK-8309841: Jarsigner should print a warning if an entry is removed + JDK-8312049: runtime/logging/ClassLoadUnloadTest can be improved + JDK-8320916: jdk/jfr/event/gc/stacktrace/ /TestParallelMarkSweepAllocationPendingStackTrace.java failed with "OutOfMemoryError: GC overhead limit exceeded" + JDK-8327650: Test java/nio/channels/DatagramChannel/ /StressNativeSignal.java timed out + JDK-8328242: Add a log area to the PassFailJFrame + JDK-8331863: DUIterator_Fast used before it is constructed + JDK-8336012: Fix usages of jtreg-reserved properties + JDK-8337494: Clarify JarInputStream behavior + JDK-8337692: Better TLS connection support + JDK-8338430: Improve compiler transformations + JDK-8339560: Unaddressed comments during code review of JDK-8337664 + JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract + JDK-8339931: Update problem list for WindowUpdateFocusabilityTest.java + JDK-8340387: Update OS detection code to recognize Windows Server 2025 + JDK-8341424: GHA: Collect hs_errs from build time failures + JDK-8342562: Enhance Deflater operations + JDK-8342704: GHA: Report truncation is broken after JDK-8341424 + JDK-8343007: Enhance Buffered Image handling + JDK-8343474: [updates] Customize README.md to specifics of update project + JDK-8343599: Kmem limit and max values swapped when printing container information + JDK-8343786: [11u] GHA: Bump macOS and Xcode versions to macos-13 and XCode 14.3.1 + JDK-8344589: Update IANA Language Subtag Registry to Version 2024-11-19 + JDK-8345509: Bump update version of OpenJDK: 11.0.27 + JDK-8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs + JDK-8347427: JTabbedPane/8134116/Bug8134116.java has no license header + JDK-8347847: Enhance jar file support + JDK-8347965: (tz) Update Timezone Data to 2025a + JDK-8349603: [21u, 17u, 11u] Update GHA JDKs after Jan/25 updates + JDK-8352097: (tz) zone.tab update missed in 2025a backport + JDK-8354087: [11u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.27 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1487=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1487=1 ## Package List: * Legacy Module 15-SP7 (aarch64 ppc64le s390x) * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-debuginfo-11.0.27.0-150000.3.125.1 * SUSE Package Hub 15 15-SP7 (noarch) * java-11-openjdk-javadoc-11.0.27.0-150000.3.125.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:05 -0000 Subject: SUSE-RU-2025:01797-1: important: Recommended update for azure-cli Message-ID: <174886740554.30194.2433636660843055351@smelt2.prg2.suse.org> # Recommended update for azure-cli Announcement ID: SUSE-RU-2025:01797-1 Release Date: 2025-06-02T11:45:10Z Rating: important References: * bsc#1224326 Affected Products: * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for azure-cli fixes the following issues: * Add Obsoletes for deprecated azure-cli-taskhelp package to fix dependency issues (bsc#1224326) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1797=1 ## Package List: * Public Cloud Module 15-SP6 (noarch) * azure-cli-2.58.0-150400.14.9.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * azure-cli-test-2.58.0-150400.14.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224326 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:11 -0000 Subject: SUSE-RU-2025:01796-1: important: Recommended update for rmt-server Message-ID: <174886741188.30194.8908293573330913310@smelt2.prg2.suse.org> # Recommended update for rmt-server Announcement ID: SUSE-RU-2025:01796-1 Release Date: 2025-06-02T11:30:06Z Rating: important References: * bsc#1236600 * bsc#1236816 * bsc#1236836 * bsc#1237373 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has four fixes can now be installed. ## Description: This update for rmt-server contains the following fixes: * Version 2.22 * rmt-server-pubcloud: * Add pubcloud_reg_code column to systems table * Add cache directories and their expiration times to the scrubber * Add cache checking to reduce queries to SCC when activating a product * Add cache checking to reduce queries to SCC when upgrading a product * Refactor and move verify_instance from ZypperAuth to InstanceVerification * Add system_token to regsharing to find the system (bsc#1236600) * Add system_token to system without one * Add data_export engine for DataWarehouse telemetry (jsc#PCT-476) * Fix 500 error * Fix routing error * Fix SUMA ARM64 (bsc#1236836) * Fix Migration from Micro 5.5 to Micro 6.X (bsc#1236816) * Add registry optional (bsc#1237373) * Update Puma webserver * rmt-cli: * Disable delta RPM mirroring by default * Add option during 'rmt-cli mirror' to re-validate repodata and packages only when repodata was updated * rmt-server: Add `activejob` and `resque` gems to vendored gemfile, to enable background job support in RMT and all engines. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1796=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1796=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1796=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1796=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1796=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1796=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1796=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1796=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1796=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-pubcloud-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-pubcloud-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-pubcloud-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-pubcloud-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * rmt-server-debuginfo-2.22-150500.3.31.1 * rmt-server-2.22-150500.3.31.1 * rmt-server-debugsource-2.22-150500.3.31.1 * rmt-server-config-2.22-150500.3.31.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236600 * https://bugzilla.suse.com/show_bug.cgi?id=1236816 * https://bugzilla.suse.com/show_bug.cgi?id=1236836 * https://bugzilla.suse.com/show_bug.cgi?id=1237373 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:19 -0000 Subject: SUSE-SU-2025:01794-1: important: Security update for libsoup Message-ID: <174886741900.30194.4577816908398781982@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:01794-1 Release Date: 2025-06-02T09:04:19Z Rating: important References: * bsc#1241162 * bsc#1241214 * bsc#1241226 * bsc#1241238 * bsc#1241252 * bsc#1241263 * bsc#1243332 * bsc#1243423 Cross-References: * CVE-2025-32906 * CVE-2025-32909 * CVE-2025-32910 * CVE-2025-32911 * CVE-2025-32912 * CVE-2025-32913 * CVE-2025-4948 * CVE-2025-4969 CVSS scores: * CVE-2025-32906 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-32906 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32909 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-32909 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32909 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32910 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32910 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32910 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32911 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32911 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-32912 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-4948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4969 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4969 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-4969 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) * CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) * CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) * CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) * CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) * CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via "params". (bsc#1241238) * CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) * CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1794=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1794=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libsoup-2_4-1-32bit-2.62.2-5.15.1 * libsoup-2_4-1-debuginfo-2.62.2-5.15.1 * libsoup-debugsource-2.62.2-5.15.1 * typelib-1_0-Soup-2_4-2.62.2-5.15.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.15.1 * libsoup-2_4-1-2.62.2-5.15.1 * libsoup-devel-2.62.2-5.15.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libsoup-lang-2.62.2-5.15.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.62.2-5.15.1 * libsoup-debugsource-2.62.2-5.15.1 * typelib-1_0-Soup-2_4-2.62.2-5.15.1 * libsoup-2_4-1-2.62.2-5.15.1 * libsoup-devel-2.62.2-5.15.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libsoup-lang-2.62.2-5.15.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.15.1 * libsoup-2_4-1-32bit-2.62.2-5.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32906.html * https://www.suse.com/security/cve/CVE-2025-32909.html * https://www.suse.com/security/cve/CVE-2025-32910.html * https://www.suse.com/security/cve/CVE-2025-32911.html * https://www.suse.com/security/cve/CVE-2025-32912.html * https://www.suse.com/security/cve/CVE-2025-32913.html * https://www.suse.com/security/cve/CVE-2025-4948.html * https://www.suse.com/security/cve/CVE-2025-4969.html * https://bugzilla.suse.com/show_bug.cgi?id=1241162 * https://bugzilla.suse.com/show_bug.cgi?id=1241214 * https://bugzilla.suse.com/show_bug.cgi?id=1241226 * https://bugzilla.suse.com/show_bug.cgi?id=1241238 * https://bugzilla.suse.com/show_bug.cgi?id=1241252 * https://bugzilla.suse.com/show_bug.cgi?id=1241263 * https://bugzilla.suse.com/show_bug.cgi?id=1243332 * https://bugzilla.suse.com/show_bug.cgi?id=1243423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:20 -0000 Subject: SUSE-OU-2025:01793-1: low: Optional update for java modules Message-ID: <174886742066.30194.693637670875062044@smelt2.prg2.suse.org> # Optional update for java modules Announcement ID: SUSE-OU-2025:01793-1 Release Date: 2025-06-02T08:02:46Z Rating: low References: Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module * SUSE Package Hub 15 15-SP6 An update that can now be installed. ## Description: This update for java modules and related fixes the following issue: * Rebuild for consistency across products, no source changes: * Packages being rebuilt: apiguardian assertj-core byte-buddy dom4j hamcrest jaxen jdom jopt-simple junit junit5 objectweb-asm open-test-reporting saxpath xom fasterxml-oss-parent ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1793=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1793=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1793=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1793=1 * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1793=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1793=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1793=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1793=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1793=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1793=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1793=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1793=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1793=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1793=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1793=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1793=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1793=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1793=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1793=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1793=1 ## Package List: * openSUSE Leap 15.6 (noarch) * objectweb-asm-javadoc-9.7-150200.3.17.1 * open-test-reporting-events-0.1.0~M2-150200.5.9.1 * apiguardian-1.1.2-150200.3.12.1 * apiguardian-javadoc-1.1.2-150200.3.12.1 * junit5-bom-5.10.2-150200.3.12.1 * dom4j-2.1.4-150200.12.12.1 * dom4j-demo-2.1.4-150200.12.12.1 * jaxen-2.0.0-150200.5.5.1 * hamcrest-3.0-150200.12.22.1 * junit5-5.10.2-150200.3.12.1 * junit5-minimal-5.10.2-150200.3.12.1 * jopt-simple-5.0.4-150200.3.6.1 * saxpath-1.0-150200.5.5.1 * junit-4.13.2-150200.3.17.1 * xom-1.3.9-150200.5.5.1 * junit-javadoc-4.13.2-150200.3.17.1 * byte-buddy-1.14.16-150200.5.9.1 * assertj-core-3.25.3-150200.5.6.1 * fasterxml-oss-parent-38-150200.3.4.1 * hamcrest-javadoc-3.0-150200.12.22.1 * dom4j-javadoc-2.1.4-150200.12.12.1 * junit5-guide-5.10.2-150200.3.12.1 * objectweb-asm-9.7-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * junit-manual-4.13.2-150200.3.17.1 * jopt-simple-javadoc-5.0.4-150200.3.6.1 * open-test-reporting-schema-0.1.0~M2-150200.5.9.1 * junit5-javadoc-5.10.2-150200.3.12.1 * Basesystem Module 15-SP6 (noarch) * objectweb-asm-9.7-150200.3.17.1 * Development Tools Module 15-SP6 (noarch) * hamcrest-3.0-150200.12.22.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Package Hub 15 15-SP6 (noarch) * byte-buddy-1.14.16-150200.5.9.1 * open-test-reporting-events-0.1.0~M2-150200.5.9.1 * assertj-core-3.25.3-150200.5.6.1 * apiguardian-1.1.2-150200.3.12.1 * hamcrest-3.0-150200.12.22.1 * junit5-5.10.2-150200.3.12.1 * junit5-minimal-5.10.2-150200.3.12.1 * jopt-simple-5.0.4-150200.3.6.1 * open-test-reporting-schema-0.1.0~M2-150200.5.9.1 * SUSE Manager Server 4.3 Module (noarch) * fasterxml-oss-parent-38-150200.3.4.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 * SUSE Manager Proxy 4.3 (noarch) * objectweb-asm-9.7-150200.3.17.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * objectweb-asm-9.7-150200.3.17.1 * SUSE Manager Server 4.3 (noarch) * objectweb-asm-9.7-150200.3.17.1 * SUSE Enterprise Storage 7.1 (noarch) * hamcrest-3.0-150200.12.22.1 * objectweb-asm-9.7-150200.3.17.1 * dom4j-2.1.4-150200.12.12.1 * junit-4.13.2-150200.3.17.1 * jdom-1.1.3-150200.12.10.1 * jaxen-2.0.0-150200.5.5.1 * xom-1.3.9-150200.5.5.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:24 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:24 -0000 Subject: SUSE-SU-2025:20370-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <174886742405.30194.1094272304626178769@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20370-1 Release Date: 2025-05-22T13:03:44Z Rating: moderate References: * bsc#1235916 Cross-References: * CVE-2024-57882 CVSS scores: * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235916) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-27=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-2-1.1 * kernel-livepatch-6_4_0-25-rt-2-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1235916 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:30 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:30 -0000 Subject: SUSE-SU-2025:20369-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <174886743081.30194.7586604443462813963@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20369-1 Release Date: 2025-05-22T13:03:44Z Rating: moderate References: * bsc#1235008 * bsc#1235218 * bsc#1235431 * bsc#1235916 Cross-References: * CVE-2024-53237 * CVE-2024-56600 * CVE-2024-56650 * CVE-2024-57882 CVSS scores: * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2024-53237: Bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (CVE-2024-56600) * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235916) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-26=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-22-rt-debuginfo-2-1.1 * kernel-livepatch-6_4_0-22-rt-2-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:34 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:34 -0000 Subject: SUSE-SU-2025:20368-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174886743496.30194.1130048844098719142@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20368-1 Release Date: 2025-05-22T13:03:44Z Rating: moderate References: * bsc#1233019 * bsc#1233678 * bsc#1234847 Cross-References: * CVE-2024-50115 * CVE-2024-53042 * CVE-2024-53156 CVSS scores: * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233678) * CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234847) * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1233019) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-24=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-10-rt-debuginfo-5-1.1 * kernel-livepatch-6_4_0-10-rt-5-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://bugzilla.suse.com/show_bug.cgi?id=1233019 * https://bugzilla.suse.com/show_bug.cgi?id=1233678 * https://bugzilla.suse.com/show_bug.cgi?id=1234847 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:39 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:39 -0000 Subject: SUSE-SU-2025:20367-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174886743959.30194.9090966924511992465@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20367-1 Release Date: 2025-05-28T10:02:19Z Rating: moderate References: * bsc#1233019 * bsc#1233678 * bsc#1234847 Cross-References: * CVE-2024-50115 * CVE-2024-53042 * CVE-2024-53156 CVSS scores: * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233678) * CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234847) * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1233019) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-28=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-debuginfo-5-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-5-1.1 * kernel-livepatch-6_4_0-19-default-5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://bugzilla.suse.com/show_bug.cgi?id=1233019 * https://bugzilla.suse.com/show_bug.cgi?id=1233678 * https://bugzilla.suse.com/show_bug.cgi?id=1234847 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:46 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:46 -0000 Subject: SUSE-SU-2025:20366-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <174886744673.30194.4427635627604028661@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20366-1 Release Date: 2025-05-28T09:53:11Z Rating: moderate References: * bsc#1235916 Cross-References: * CVE-2024-57882 CVSS scores: * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235916) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-30=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-2-1.2 * kernel-livepatch-6_4_0-25-default-2-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-2-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1235916 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:50 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:50 -0000 Subject: SUSE-SU-2025:20365-1: moderate: Security update for s390-tools Message-ID: <174886745090.30194.11908402788363247890@smelt2.prg2.suse.org> # Security update for s390-tools Announcement ID: SUSE-SU-2025:20365-1 Release Date: 2025-05-23T07:59:47Z Rating: moderate References: * bsc#1242622 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for s390-tools fixes the following issues: * Revendored vendor.tar.zst (CVE-2025-3416: Fixed use-after-free in Md::fetch and Cipher::fetch in rust-openssl crate (bsc#1242622) * Added the new IBM z17 (9175) processor type The package is built with the new 4096bit RSA secure boot signing key. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-116=1 ## Package List: * SUSE Linux Micro 6.1 (s390x) * libekmfweb1-debuginfo-2.31.0-slfo.1.1_2.1 * libkmipclient1-debuginfo-2.31.0-slfo.1.1_2.1 * libkmipclient1-2.31.0-slfo.1.1_2.1 * s390-tools-2.31.0-slfo.1.1_2.1 * s390-tools-debugsource-2.31.0-slfo.1.1_2.1 * s390-tools-debuginfo-2.31.0-slfo.1.1_2.1 * libekmfweb1-2.31.0-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (noarch) * s390-tools-genprotimg-data-2.31.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242622 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:54 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:54 -0000 Subject: SUSE-SU-2025:20364-1: moderate: Security update for libxml2 Message-ID: <174886745409.30194.9142912803503774813@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20364-1 Release Date: 2025-05-28T09:00:31Z Rating: moderate References: * bsc#1241453 * bsc#1241551 Cross-References: * CVE-2025-32414 * CVE-2025-32415 CVSS scores: * CVE-2025-32414 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-32414 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-32414 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32414 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-32415 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32415 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32415 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2025-32414: Fixed out-of-bounds read when parsing text via the Python API (bsc#1241551). * CVE-2025-32415: Fixed heap-based buffer under-read via crafted XML documents (bsc#1241453). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-126=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxml2-2-debuginfo-2.11.6-slfo.1.1_3.1 * libxml2-2-2.11.6-slfo.1.1_3.1 * libxml2-debugsource-2.11.6-slfo.1.1_3.1 * libxml2-tools-debuginfo-2.11.6-slfo.1.1_3.1 * libxml2-tools-2.11.6-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32414.html * https://www.suse.com/security/cve/CVE-2025-32415.html * https://bugzilla.suse.com/show_bug.cgi?id=1241453 * https://bugzilla.suse.com/show_bug.cgi?id=1241551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:30:57 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:30:57 -0000 Subject: SUSE-SU-2025:20363-1: important: Security update for skopeo Message-ID: <174886745765.30194.17563854794438678094@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20363-1 Release Date: 2025-05-28T08:56:39Z Rating: important References: * bsc#1227056 * bsc#1236483 * bsc#1237613 Cross-References: * CVE-2023-45288 * CVE-2024-6104 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for skopeo fixes the following issues: * CVE-2024-6104: url might write sensitive information to log file (bsc#1227056). * CVE-2023-45288: close connections when receiving too many headers (bsc#1236483). * CVE-2025-27144: Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237613). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-125=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * skopeo-1.15.1-slfo.1.1_2.1 * skopeo-debuginfo-1.15.1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227056 * https://bugzilla.suse.com/show_bug.cgi?id=1236483 * https://bugzilla.suse.com/show_bug.cgi?id=1237613 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:02 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:02 -0000 Subject: SUSE-RU-2025:20362-1: moderate: Recommended update for git Message-ID: <174886746278.30194.1635944294073215794@smelt2.prg2.suse.org> # Recommended update for git Announcement ID: SUSE-RU-2025:20362-1 Release Date: 2025-05-28T07:24:11Z Rating: moderate References: * bsc#1235600 * bsc#1235601 Cross-References: * CVE-2024-50349 * CVE-2024-52006 CVSS scores: * CVE-2024-50349 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-50349 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-52006 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-52006 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for git fixes the following issues: * CVE-2024-50349: passwords for trusted sites could be sent to untrusted sites (bsc#1235600) * CVE-2024-52006: Carriage Returns via the credential protocol to credential helpers (bsc#1235601) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-124=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * git-core-debuginfo-2.46.0-slfo.1.1_2.1 * git-core-2.46.0-slfo.1.1_2.1 * perl-Git-2.46.0-slfo.1.1_2.1 * git-debugsource-2.46.0-slfo.1.1_2.1 * git-2.46.0-slfo.1.1_2.1 * git-debuginfo-2.46.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50349.html * https://www.suse.com/security/cve/CVE-2024-52006.html * https://bugzilla.suse.com/show_bug.cgi?id=1235600 * https://bugzilla.suse.com/show_bug.cgi?id=1235601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:09 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:09 -0000 Subject: SUSE-SU-2025:20361-1: critical: Security update for glibc Message-ID: <174886746946.30194.18285884180243435622@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20361-1 Release Date: 2025-05-27T09:28:57Z Rating: critical References: * bsc#1234128 * bsc#1234665 * bsc#1239883 * bsc#1243317 Cross-References: * CVE-2025-4802 CVSS scores: * CVE-2025-4802 ( SUSE ): 9.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-4802 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4802 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2025-4802: elf: Ignore LD_LIBRARY_PATH and debug env var for setuid for static (bsc#1243317) * pthreads NPTL: lost wakeup fix 2 (bsc#1234128, BZ #25847) * Mark functions in libc_nonshared.a as hidden (bsc#1239883) * Linux: Switch back to assembly syscall wrapper for prctl (bsc#1234665, BZ #29770) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-122=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.38-slfo.1.1_4.1 * glibc-debuginfo-2.38-slfo.1.1_4.1 * glibc-devel-2.38-slfo.1.1_4.1 * glibc-locale-base-2.38-slfo.1.1_4.1 * glibc-locale-2.38-slfo.1.1_4.1 * glibc-locale-base-debuginfo-2.38-slfo.1.1_4.1 * glibc-devel-debuginfo-2.38-slfo.1.1_4.1 * glibc-2.38-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4802.html * https://bugzilla.suse.com/show_bug.cgi?id=1234128 * https://bugzilla.suse.com/show_bug.cgi?id=1234665 * https://bugzilla.suse.com/show_bug.cgi?id=1239883 * https://bugzilla.suse.com/show_bug.cgi?id=1243317 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:15 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:15 -0000 Subject: SUSE-SU-2025:20360-1: important: Security update for docker Message-ID: <174886747577.30194.14861042410931841695@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20360-1 Release Date: 2025-05-27T08:58:34Z Rating: important References: * bsc#1237367 * bsc#1239185 * bsc#1239322 * bsc#1239765 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2025-0495 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2025-0495 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-0495 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N * CVE-2025-0495 ( NVD ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities, contains two features and has one fix can now be installed. ## Description: This update for docker fixes the following issues: Update to docker-buildx v0.22.0: * CVE-2025-0495: buildx: credential leakage to telemetry endpoints when credentials allowed to be set as attribute values in cache-to/cache-from configuration (bsc#1239765). * CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185). * CVE-2025-22869: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322). Bug fixes: * Fix unconditional container-selinux pull (bsc#1237367). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-121=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-27.5.1_ce-slfo.1.1_2.1 * docker-27.5.1_ce-slfo.1.1_2.1 * docker-buildx-0.22.0-slfo.1.1_2.1 * docker-buildx-debuginfo-0.22.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0495.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1237367 * https://bugzilla.suse.com/show_bug.cgi?id=1239185 * https://bugzilla.suse.com/show_bug.cgi?id=1239322 * https://bugzilla.suse.com/show_bug.cgi?id=1239765 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:17 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:17 -0000 Subject: SUSE-SU-2025:20359-1: moderate: Security update for unbound Message-ID: <174886747792.30194.11461531006479298979@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2025:20359-1 Release Date: 2025-05-27T08:56:36Z Rating: moderate References: * bsc#1231284 Cross-References: * CVE-2024-8508 CVSS scores: * CVE-2024-8508 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-8508 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for unbound fixes the following issues: Update to 1.22.0: * CVE-2024-8508: Fixed unbounded name compression that could have led to a denial of service (bsc#1231284). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-123=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * unbound-anchor-1.22.0-slfo.1.1_1.1 * libunbound8-1.22.0-slfo.1.1_1.1 * libunbound8-debuginfo-1.22.0-slfo.1.1_1.1 * unbound-anchor-debuginfo-1.22.0-slfo.1.1_1.1 * unbound-debugsource-1.22.0-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8508.html * https://bugzilla.suse.com/show_bug.cgi?id=1231284 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:23 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:23 -0000 Subject: SUSE-RU-2025:20358-1: moderate: Recommended update for lsof Message-ID: <174886748341.30194.9431456136015125676@smelt2.prg2.suse.org> # Recommended update for lsof Announcement ID: SUSE-RU-2025:20358-1 Release Date: 2025-05-27T07:48:45Z Rating: moderate References: * bsc#1224285 * bsc#1232425 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for lsof fixes the following issues: * Update to version 4.99.4: * In lsof manpage: mention /etc/services for -P option * Fix typos in docs * Linux 6.9 changed the pidfs appearence in procfs. Try to maintain original output in lsof (bsc#1224285) * closefrom_shim: Add optimized fallback for platforms without closefrom or close_range * fix build against -std=c23 (`void (*)()`) changed the meaning) * Fix embedding build host kernel version (bsc#1232425) * lsof 4.99.3: * Fix compilation error when HASIPv6 is not defined * Add configure option --disable-liblsof to disable installation of liblsof * Skip tests that are difficult to emulate by qemu * lsof 4.99.0: * Do not hard-code fd numbers in epoll test * \--with-selinux configure option. * Improve performance by using closefrom() * Introduce liblsof for programmatic access over spawning lsof in a subprocess * build with libtirpc * switch to upstream tarball again as it dropped proprietary code ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-120=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * lsof-debuginfo-4.99.4-slfo.1.1_1.1 * lsof-debugsource-4.99.4-slfo.1.1_1.1 * lsof-4.99.4-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224285 * https://bugzilla.suse.com/show_bug.cgi?id=1232425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:26 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:26 -0000 Subject: SUSE-RU-2025:20357-1: important: Recommended update for cloud-regionsrv-client Message-ID: <174886748688.30194.17485958341527670479@smelt2.prg2.suse.org> # Recommended update for cloud-regionsrv-client Announcement ID: SUSE-RU-2025:20357-1 Release Date: 2025-05-27T07:27:00Z Rating: important References: * bsc#1218345 * bsc#1240310 * bsc#1240311 * bsc#1240997 Affected Products: * SUSE Linux Micro 6.1 An update that has four fixes can now be installed. ## Description: This update for cloud-regionsrv-client fixes the following issues: * Update version to 10.4.0 * Remove repositories when the package is being removed We do not want to leave repositories behind refering to the plugin that is being removed when the package gets removed (bsc#1240310, bsc#1240311) * Turn docker into an optional setup (jsc#PCT-560) Change the Requires into a Recommends and adapt the code accordingly * Support flexible licenses in GCE (jsc#PCT-531) * Drop the azure-addon package it is geting replaced by the license-watcher package which has a generic implementation of the same functionality. * Handle cache inconsistencies (bsc#1218345) * Properly handle the zypper root target argument (bsc#1240997) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-119=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_3.1 * cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_3.1 * cloud-regionsrv-client-10.4.0-slfo.1.1_3.1 * python311-toml-0.10.2-slfo.1.1_1.2 * cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_3.1 * cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218345 * https://bugzilla.suse.com/show_bug.cgi?id=1240310 * https://bugzilla.suse.com/show_bug.cgi?id=1240311 * https://bugzilla.suse.com/show_bug.cgi?id=1240997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:31:29 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:31:29 -0000 Subject: SUSE-RU-2025:20356-1: moderate: Recommended update for pcp Message-ID: <174886748974.30194.3663073246477409488@smelt2.prg2.suse.org> # Recommended update for pcp Announcement ID: SUSE-RU-2025:20356-1 Release Date: 2025-05-23T15:35:27Z Rating: moderate References: * bsc#1237260 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for pcp fixes the following issues: * Enable custom pcp-selinux module (bsc#1237260) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-118=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libpcp_import1-6.2.0-slfo.1.1_4.1 * libpcp3-debuginfo-6.2.0-slfo.1.1_4.1 * pcp-debugsource-6.2.0-slfo.1.1_4.1 * libpcp3-6.2.0-slfo.1.1_4.1 * libpcp_import1-debuginfo-6.2.0-slfo.1.1_4.1 * SUSE Linux Micro 6.1 (noarch) * pcp-conf-6.2.0-slfo.1.1_4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237260 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:33:29 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:33:29 -0000 Subject: SUSE-SU-2025:20355-1: important: Security update for the Linux Kernel Message-ID: <174886760999.30194.8795741203277301385@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20355-1 Release Date: 2025-05-23T07:28:27Z Rating: important References: * bsc#1215199 * bsc#1223809 * bsc#1224013 * bsc#1224597 * bsc#1224757 * bsc#1228659 * bsc#1230764 * bsc#1231103 * bsc#1232493 * bsc#1233075 * bsc#1233098 * bsc#1235501 * bsc#1235526 * bsc#1236086 * bsc#1236704 * bsc#1237111 * bsc#1238212 * bsc#1238471 * bsc#1238527 * bsc#1238714 * bsc#1238737 * bsc#1238742 * bsc#1238745 * bsc#1238862 * bsc#1238961 * bsc#1238983 * bsc#1239079 * bsc#1239108 * bsc#1239470 * bsc#1239476 * bsc#1239487 * bsc#1239510 * bsc#1239997 * bsc#1240181 * bsc#1240557 * bsc#1240576 * bsc#1240655 * bsc#1240709 * bsc#1240712 * bsc#1240713 * bsc#1240717 * bsc#1240740 * bsc#1240785 * bsc#1240802 * bsc#1240809 * bsc#1240811 * bsc#1240835 * bsc#1240934 * bsc#1240936 * bsc#1240944 * bsc#1241010 * bsc#1241038 * bsc#1241051 * bsc#1241123 * bsc#1241151 * bsc#1241167 * bsc#1241175 * bsc#1241204 * bsc#1241250 * bsc#1241265 * bsc#1241266 * bsc#1241280 * bsc#1241332 * bsc#1241333 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241371 * bsc#1241373 * bsc#1241378 * bsc#1241394 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241416 * bsc#1241424 * bsc#1241426 * bsc#1241433 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241451 * bsc#1241452 * bsc#1241456 * bsc#1241458 * bsc#1241459 * bsc#1241526 * bsc#1241528 * bsc#1241537 * bsc#1241541 * bsc#1241545 * bsc#1241547 * bsc#1241548 * bsc#1241550 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241578 * bsc#1241590 * bsc#1241593 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241626 * bsc#1241640 * bsc#1241648 * bsc#1242006 * bsc#1242044 * bsc#1242172 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242526 * bsc#1242528 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242596 * bsc#1242710 * bsc#1242778 * bsc#1242831 * bsc#1242985 Cross-References: * CVE-2023-53034 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35840 * CVE-2024-46763 * CVE-2024-46865 * CVE-2024-50083 * CVE-2024-50162 * CVE-2024-50163 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-57924 * CVE-2024-57998 * CVE-2024-58001 * CVE-2024-58068 * CVE-2024-58070 * CVE-2024-58088 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2025-21683 * CVE-2025-21696 * CVE-2025-21707 * CVE-2025-21758 * CVE-2025-21768 * CVE-2025-21792 * CVE-2025-21808 * CVE-2025-21812 * CVE-2025-21833 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21854 * CVE-2025-21867 * CVE-2025-21904 * CVE-2025-21925 * CVE-2025-21926 * CVE-2025-21931 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-21980 * CVE-2025-21985 * CVE-2025-21999 * CVE-2025-22004 * CVE-2025-22015 * CVE-2025-22016 * CVE-2025-22017 * CVE-2025-22018 * CVE-2025-22020 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22029 * CVE-2025-22033 * CVE-2025-22036 * CVE-2025-22044 * CVE-2025-22045 * CVE-2025-22050 * CVE-2025-22053 * CVE-2025-22055 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22062 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22075 * CVE-2025-22080 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22090 * CVE-2025-22093 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22104 * CVE-2025-22105 * CVE-2025-22106 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22115 * CVE-2025-22116 * CVE-2025-22121 * CVE-2025-22128 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23133 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23145 * CVE-2025-37785 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37860 * CVE-2025-39728 CVSS scores: * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50162 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50163 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22029 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22029 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22115 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22115 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 96 vulnerabilities and has 55 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597). * CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP (bsc#1233075). * CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not overlap (bsc#1233098). * CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086). * CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961). * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983). * CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510). * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704). * CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111). * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862). * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737). * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714). * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745). * CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108). * CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470). * CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181). * CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576). * CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713). * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712). * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709). * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655). * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717). * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740). * CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809). * CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835). * CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944). * CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934). * CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936). * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266). * CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378). * CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426). * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433). * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373). * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371). * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413). * CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416). * CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537). * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456). * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550). * CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548). * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575). * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573). * CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578). * CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593). * CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414). * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283). * CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626). The following non-security bugs were fixed: * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes). * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes). * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes). * ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes). * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git- fixes). * ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes). * ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes). * ALSA: ump: Fix buffer overflow at UMP SysEx message conversion (bsc#1242044). * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable- fixes). * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable- fixes). * ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes). * ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes). * ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable- fixes). * ASoC: Use of_property_read_bool() (stable-fixes). * ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes). * ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes). * ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes). * ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes). * ASoC: fsl_audmix: register card device depends on 'dais' property (stable- fixes). * ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes). * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes). * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes). * Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes). * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git- fixes). * Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address (git-fixes). * Bluetooth: hci_uart: Fix another race during initialization (git-fixes). * Bluetooth: hci_uart: fix race during initialization (stable-fixes). * Bluetooth: l2cap: Check encryption key size on incoming connection (git- fixes). * Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes). * Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes). * Correct the upsteram version numbers in the previous patches * Drop PCI patch that caused a regression (bsc#1241123) * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes). * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes). * Input: xpad - fix two controller table values (git-fixes). * Move upstreamed smb patch into sorted section Also move other out-of-tree patches into the proper section * Move upstreamed sound patch into sorted section * OPP: add index check to assert to avoid buffer overflow in _read_freq() (bsc#1238961) * PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git- fixes). * PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes). * RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes) * RDMA/core: Silence oversized kvmalloc() warning (git-fixes) * RDMA/hns: Fix wrong maximum DMA segment size (git-fixes) * RDMA/mana_ib: Ensure variable err is initialized (git-fixes). * RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes) * Revert "drivers: core: synchronize really_probe() and dev_uevent()" (stable- fixes). * Revert "drm/meson: vclk: fix calculation of 59.94 fractional rates" (git- fixes). * Revert "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes). * USB: VLI disk crashes if LPM is used (stable-fixes). * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes). * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes). * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable- fixes). * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes). * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes). * USB: wdm: add annotation (git-fixes). * USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes). * USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes). * USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes). * ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes). * asus-laptop: Fix an uninitialized variable (git-fixes). * ata: libata-sata: Save all fields from sense data descriptor (git-fixes). * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git- fixes). * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes). * ata: libata-scsi: Improve CDL control (git-fixes). * ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() (git-fixes). * ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes). * auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes). * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes). * badblocks: Fix error shitf ops (git-fixes). * badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes). * badblocks: fix missing bad blocks on retry in _badblocks_check() (git- fixes). * badblocks: fix the using of MAX_BADBLOCKS (git-fixes). * badblocks: return error directly when setting badblocks exceeds 512 (git- fixes). * badblocks: return error if any badblock set fails (git-fixes). * blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes). * block: change blk_mq_add_to_batch() third argument type to bool (git-fixes). * block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes). * block: fix conversion of GPT partition name to 7-bit (git-fixes). * block: fix resource leak in blk_register_queue() error path (git-fixes). * block: integrity: Do not call set_page_dirty_lock() (git-fixes). * block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (git-fixes). * bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes). * bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes). * bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes). * bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes). * bpf: add find_containing_subprog() utility function (bsc#1241590). * bpf: check changes_pkt_data property for extension programs (bsc#1241590). * bpf: consider that tail calls invalidate packet pointers (bsc#1241590). * bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590). * bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590). * bpf: track changes_pkt_data property for global functions (bsc#1241590). * btrfs: add and use helper to verify the calling task has locked the inode (bsc#1241204). * btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710). * btrfs: fix hole expansion when writing at an offset beyond EOF (bsc#1241151). * btrfs: fix missing snapshot drew unlock when root is dead during swap activation (bsc#1241204). * btrfs: fix race with memory mapped writes when activating swap file (bsc#1241204). * btrfs: fix swap file activation failure due to extents that used to be shared (bsc#1241204). * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes). * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git- fixes). * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes). * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git- fixes). * cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes). * char: misc: register chrdev region with all possible minors (git-fixes). * cifs: Fix integer overflow while processing actimeo mount option (git- fixes). * crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes). * crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes). * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes). * cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git- fixes). * dm-bufio: do not schedule in atomic context (git-fixes). * dm-ebs: fix prefetch-vs-suspend race (git-fixes). * dm-integrity: set ti->error on memory allocation failure (git-fixes). * dm-verity: fix prefetch-vs-suspend race (git-fixes). * dm: add missing unlock on in dm_keyslot_evict() (git-fixes). * dm: always update the array size in realloc_argv on success (git-fixes). * dm: fix copying after src array boundaries (git-fixes). * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable- fixes). * drivers: base: devres: Allow to release group on device release (stable- fixes). * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes). * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes). * drm/amd/display: Fix gpu reset in multidisplay config (git-fixes). * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes). * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes). * drm/amd/display: Force full update in gpu reset (stable-fixes). * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes). * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd: Handle being compiled without SI or CIK support better (stable- fixes). * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() (stable-fixes). * drm/amdkfd: Fix mode1 reset crash issue (stable-fixes). * drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes). * drm/amdkfd: clamp queue size to minimum (stable-fixes). * drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes). * drm/bridge: panel: forbid initializing a panel with unknown connector type (stable-fixes). * drm/fdinfo: Protect against driver unbind (git-fixes). * drm/i915/dg2: wait for HuC load completion before running selftests (stable- fixes). * drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes). * drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes). * drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes). * drm/i915: Disable RPG during live selftest (git-fixes). * drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable- fixes). * drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable- fixes). * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes). * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes). * drm/tests: Add helper to create mock crtc (stable-fixes). * drm/tests: Add helper to create mock plane (stable-fixes). * drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git- fixes). * drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes). * drm/tests: helpers: Add atomic helpers (stable-fixes). * drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable- fixes). * drm/tests: helpers: Create kunit helper to destroy a drm_display_mode (stable-fixes). * drm/tests: helpers: Fix compiler warning (git-fixes). * drm/tests: modes: Fix drm_display_mode memory leak (git-fixes). * drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes). * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes). * drm: allow encoder mode_set even when connectors change for crtc (stable- fixes). * drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel) (stable-fixes). * drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB (stable-fixes). * drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes). * e1000e: change k1 configuration on MTP and later platforms (git-fixes). * eth: bnxt: fix missing ring index trim on error path (git-fixes). * ethtool: Fix context creation with no parameters (git-fixes). * ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes). * ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git- fixes). * ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes). * ethtool: fix setting key and resetting indir at once (git-fixes). * ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes). * ethtool: netlink: do not return SQI value if link is down (git-fixes). * ethtool: plca: fix plca enable data type while parsing the value (git- fixes). * ethtool: rss: echo the context number back (git-fixes). * exfat: do not fallback to buffered write (git-fixes). * exfat: drop ->i_size_ondisk (git-fixes). * exfat: fix soft lockup in exfat_clear_bitmap (git-fixes). * exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes). * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342). * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540). * ext4: do not over-report free space or inodes in statvfs (bsc#1242345). * ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347). * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557). * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556). * ext4: make block validity check resistent to sb bh corruption (bsc#1242348). * ext4: partial zero eof block on unaligned inode size extension (bsc#1242336). * ext4: protect ext4_release_dquot against freezing (bsc#1242335). * ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536). * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539). * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538). * fbdev: omapfb: Add 'plane' value check (stable-fixes). * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git- fixes). * firmware: arm_scmi: Balance device refcount when destroying devices (git- fixes). * fs/jfs: Prevent integer overflow in AG size calculation (git-fixes). * fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes). * fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250). * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528). * fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535). * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526). * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes). * gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes). * gve: handle overflow when reporting TX consumed descriptors (git-fixes). * gve: set xdp redirect target only when it is available (git-fixes). * hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes). * i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes). * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes). * ice: Add check for devm_kzalloc() (git-fixes). * ice: fix reservation of resources for RDMA when disabled (git-fixes). * ice: stop truncating queue ids when checking (git-fixes). * idpf: check error for register_netdev() on init (git-fixes). * idpf: fix adapter NULL pointer dereference on reboot (git-fixes). * igb: reject invalid external timestamp requests for 82580-based HW (git- fixes). * igc: add lock preventing multiple simultaneous PTM transactions (git-fixes). * igc: cleanup PTP module if probe fails (git-fixes). * igc: fix PTM cycle trigger logic (git-fixes). * igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes). * igc: increase wait time before retrying PTM (git-fixes). * igc: move ktime snapshot into PTM retry loop (git-fixes). * iio: accel: adxl367: fix setting odr for activity time update (git-fixes). * iio: adc: ad7606: fix serial register access (git-fixes). * iio: adc: ad7768-1: Fix conversion result sign (git-fixes). * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes). * iio: adis16201: Correct inclinometer channel resolution (git-fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git- fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes). * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git- fixes). * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes). * ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git- fixes). * irqchip/davinci: Remove leftover header (git-fixes). * irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes). * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git- fixes). * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307). * jbd2: add a missing data flush during file and fs synchronization (bsc#1242346). * jbd2: fix off-by-one while erasing journal (bsc#1242344). * jbd2: flush filesystem device before updating tail sequence (bsc#1242333). * jbd2: increase IO priority for writing revoke records (bsc#1242332). * jbd2: increase the journal IO's priority (bsc#1242537). * jbd2: remove wrong sb->s_sequence check (bsc#1242343). * jfs: Fix uninit-value access of imap allocated in the diMount() function (git-fixes). * jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes). * jfs: add sanity check for agwidth in dbMount (git-fixes). * kABI fix for sctp: detect and prevent references to a freed transport in sendmsg (git-fixes). * kABI workaround for powercap update (bsc#1241010). * ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes). * kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes). * loop: LOOP_SET_FD: send uevents for partitions (git-fixes). * loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes). * loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes). * md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb (bsc#1238212) * media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes). * mei: me: add panther lake H DID (stable-fixes). * misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration (git-fixes). * misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack (git-fixes). * mm/readahead: fix large folio support in async readahead (bsc#1242321). * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326). * mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327). * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546). * mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable- fixes). * mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes). * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes). * mptcp: refine opt_mp_capable determination (git-fixes). * mptcp: relax check on MPC passive fallback (git-fixes). * mptcp: strict validation before using mp_opt->hmac (git-fixes). * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes). * net/mlx5: Fill out devlink dev info only for PFs (git-fixes). * net/mlx5: IRQ, Fix null string in debug print (git-fixes). * net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git- fixes). * net/mlx5: Start health poll after enable hca (git-fixes). * net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes). * net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices (git-fixes). * net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes). * net/tcp: refactor tcp_inet6_sk() (git-fixes). * net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes). * net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes). * net: blackhole_dev: fix build warning for ethh set but not used (git-fixes). * net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes). * net: ethtool: Fix RSS setting (git-fixes). * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes). * net: mana: Switch to page pool for jumbo frames (git-fixes). * net: mark racy access on sk->sk_rcvbuf (git-fixes). * net: phy: leds: fix memory leak (git-fixes). * net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes). * net: sctp: fix skb leak in sctp_inq_free() (git-fixes). * net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes). * net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes). * net_sched: drr: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: ets: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes). * net_sched: qfq: Fix double list add in class with netem as child qdisc (git- fixes). * netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes). * nfs: add missing selections of CONFIG_CRC32 (git-fixes). * nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes). * ntb: reduce stack usage in idt_scan_mws (stable-fixes). * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes). * nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes). * nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes). * nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes). * nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes). * nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes). * nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git- fixes). * nvmet-fcloop: swap list_add_tail arguments (git-fixes). * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172) * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172) * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172) * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172) * phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git- fixes). * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable- fixes). * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes). * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes). * platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug (git-fixes). * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010). * powerpc/boot: Check for ld-option support (bsc#1215199). * powerpc/boot: Fix dash warning (bsc#1215199). * powerpc: Do not use --- in kernel logs (git-fixes). * pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes). * pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes). * pwm: rcar: Improve register calculation (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038). * rpm/package-descriptions: Add rt and rt_debug descriptions * rtc: pcf85063: do a SW reset if POR failed (stable-fixes). * scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes). * scsi: hisi_sas: Enable force phy when SATA disk directly connected (git- fixes). * scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes). * scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes). * scsi: mpi3mr: Fix locking in an error path (git-fixes). * scsi: mpt3sas: Fix a locking bug in an error path (git-fixes). * scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO (git-fixes). * scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes). * sctp: Fix undefined behavior in left shift operation (git-fixes). * sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes). * sctp: detect and prevent references to a freed transport in sendmsg (git- fixes). * sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start (git-fixes). * sctp: fix association labeling in the duplicate COOKIE-ECHO case (git- fixes). * sctp: fix busy polling (git-fixes). * sctp: prefer struct_size over open coded arithmetic (git-fixes). * sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes). * selftests/bpf: Add a few tests to cover (git-fixes). * selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590). * selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590). * selftests/bpf: test for changing packet data from global functions (bsc#1241590). * selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590). * selftests/futex: futex_waitv wouldblock test should fail (git-fixes). * selftests/mm: generate a temporary mountpoint for cgroup filesystem (git- fixes). * serial: msm: Configure correct working mode before starting earlycon (git- fixes). * serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes). * smb: client: fix folio leaks and perf improvements (bsc#1239997, bsc1241265). * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes). * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes). * spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes). * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes). * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328). * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes). * staging: axis-fifo: Remove hardware resets for user errors (git-fixes). * staging: iio: adc: ad7816: Correct conditional logic for store mode (git- fixes). * string: Add load_unaligned_zeropad() code path to sized_strscpy() (git- fixes). * tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes). * thunderbolt: Scan retimers after device router has been enumerated (stable- fixes). * tools/hv: update route parsing in kvp daemon (git-fixes). * tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175). * tools/power turbostat: report CoreThr per measurement interval (git-fixes). * tty: n_tty: use uint for space returned by tty_write_room() (git-fixes). * ublk: set_params: properly check if parameters can be applied (git-fixes). * udf: Fix inode_getblk() return value (bsc#1242313). * udf: Skip parent dir link count update if corrupted (bsc#1242315). * udf: Verify inode link counts before performing rename (bsc#1242314). * usb: cdns3: Fix deadlock when using NCM gadget (git-fixes). * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git- fixes). * usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git- fixes). * usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git- fixes). * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes). * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes). * usb: dwc3: gadget: check that event count does not exceed event buffer length (git-fixes). * usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes). * usb: gadget: Use get_status callback to set remote wakeup capability (git- fixes). * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable- fixes). * usb: gadget: f_ecm: Add get_status callback (git-fixes). * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes). * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes). * usb: host: tegra: Prevent host controller crash when OTG port is used (git- fixes). * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes). * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable- fixes). * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable- fixes). * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes). * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes). * usb: uhci-platform: Make the clock really optional (git-fixes). * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes). * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes). * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes). * vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes). * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534). * virtchnl: make proto and filter action count unsigned (git-fixes). * vmxnet3: Fix tx queue race condition with XDP (bsc#1241394). * vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394). * wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes). * wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (stable-fixes). * wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable- fixes). * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes). * wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes). * wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes). * wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() (git-fixes). * wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable- fixes). * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes). * wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). * x86/bugs: Add RSB mitigation document (git-fixes). * x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes). * x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes). * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git- fixes). * x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes). * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes). * x86/dumpstack: Fix inaccurate unwinding from exception stacks due to misplaced assignment (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes). * x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (git-fixes). * x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes). * x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes). * x86/microcode/AMD: Split load_microcode_amd() (git-fixes). * x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (git-fixes). * x86/microcode/intel: Set new revision only after a successful update (git- fixes). * x86/microcode: Remove the driver announcement and version (git-fixes). * x86/microcode: Rework early revisions reporting (git-fixes). * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes). * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git- fixes). * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes). * x86/uaccess: Improve performance by aligning writes to 8 bytes in copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes). * xfs: flush inodegc before swapon (git-fixes). * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes). * zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING (bsc#1241167). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-23=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-31.1 * kernel-source-rt-6.4.0-31.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-31.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-debugsource-6.4.0-31.1 * kernel-rt-devel-6.4.0-31.1 * kernel-rt-debuginfo-6.4.0-31.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-31-rt-debuginfo-1-1.2 * kernel-livepatch-6_4_0-31-rt-1-1.2 * kernel-rt-devel-debuginfo-6.4.0-31.1 * kernel-rt-livepatch-6.4.0-31.1 * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-1-1.2 ## References: * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50162.html * https://www.suse.com/security/cve/CVE-2024-50163.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-57924.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58068.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58088.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21696.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21808.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21833.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21854.html * https://www.suse.com/security/cve/CVE-2025-21867.html * https://www.suse.com/security/cve/CVE-2025-21904.html * https://www.suse.com/security/cve/CVE-2025-21925.html * https://www.suse.com/security/cve/CVE-2025-21926.html * https://www.suse.com/security/cve/CVE-2025-21931.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-21980.html * https://www.suse.com/security/cve/CVE-2025-21985.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22004.html * https://www.suse.com/security/cve/CVE-2025-22015.html * https://www.suse.com/security/cve/CVE-2025-22016.html * https://www.suse.com/security/cve/CVE-2025-22017.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22029.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22036.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22053.html * https://www.suse.com/security/cve/CVE-2025-22055.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22080.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22090.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22105.html * https://www.suse.com/security/cve/CVE-2025-22106.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22115.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23133.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37860.html * https://www.suse.com/security/cve/CVE-2025-39728.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1233075 * https://bugzilla.suse.com/show_bug.cgi?id=1233098 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1236086 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1237111 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238742 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239108 * https://bugzilla.suse.com/show_bug.cgi?id=1239470 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239510 * https://bugzilla.suse.com/show_bug.cgi?id=1239997 * https://bugzilla.suse.com/show_bug.cgi?id=1240181 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240576 * https://bugzilla.suse.com/show_bug.cgi?id=1240655 * https://bugzilla.suse.com/show_bug.cgi?id=1240709 * https://bugzilla.suse.com/show_bug.cgi?id=1240712 * https://bugzilla.suse.com/show_bug.cgi?id=1240713 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1240809 * https://bugzilla.suse.com/show_bug.cgi?id=1240811 * https://bugzilla.suse.com/show_bug.cgi?id=1240835 * https://bugzilla.suse.com/show_bug.cgi?id=1240934 * https://bugzilla.suse.com/show_bug.cgi?id=1240936 * https://bugzilla.suse.com/show_bug.cgi?id=1240944 * https://bugzilla.suse.com/show_bug.cgi?id=1241010 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241051 * https://bugzilla.suse.com/show_bug.cgi?id=1241123 * https://bugzilla.suse.com/show_bug.cgi?id=1241151 * https://bugzilla.suse.com/show_bug.cgi?id=1241167 * https://bugzilla.suse.com/show_bug.cgi?id=1241175 * https://bugzilla.suse.com/show_bug.cgi?id=1241204 * https://bugzilla.suse.com/show_bug.cgi?id=1241250 * https://bugzilla.suse.com/show_bug.cgi?id=1241265 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241371 * https://bugzilla.suse.com/show_bug.cgi?id=1241373 * https://bugzilla.suse.com/show_bug.cgi?id=1241378 * https://bugzilla.suse.com/show_bug.cgi?id=1241394 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241416 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241426 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241451 * https://bugzilla.suse.com/show_bug.cgi?id=1241452 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241537 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241547 * https://bugzilla.suse.com/show_bug.cgi?id=1241548 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241578 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241626 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242985 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:35:21 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:35:21 -0000 Subject: SUSE-SU-2025:20354-1: important: Security update for the Linux Kernel Message-ID: <174886772181.30194.13198258134541305@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20354-1 Release Date: 2025-05-23T07:19:59Z Rating: important References: * bsc#1215199 * bsc#1223809 * bsc#1224013 * bsc#1224597 * bsc#1224757 * bsc#1228659 * bsc#1230764 * bsc#1231103 * bsc#1232493 * bsc#1233075 * bsc#1233098 * bsc#1235501 * bsc#1235526 * bsc#1236086 * bsc#1236704 * bsc#1237111 * bsc#1238212 * bsc#1238471 * bsc#1238527 * bsc#1238714 * bsc#1238737 * bsc#1238742 * bsc#1238745 * bsc#1238862 * bsc#1238961 * bsc#1238983 * bsc#1239079 * bsc#1239108 * bsc#1239470 * bsc#1239476 * bsc#1239487 * bsc#1239510 * bsc#1239997 * bsc#1240181 * bsc#1240557 * bsc#1240576 * bsc#1240655 * bsc#1240709 * bsc#1240712 * bsc#1240713 * bsc#1240717 * bsc#1240740 * bsc#1240785 * bsc#1240802 * bsc#1240809 * bsc#1240811 * bsc#1240835 * bsc#1240934 * bsc#1240936 * bsc#1240944 * bsc#1241010 * bsc#1241038 * bsc#1241051 * bsc#1241123 * bsc#1241151 * bsc#1241167 * bsc#1241175 * bsc#1241204 * bsc#1241250 * bsc#1241265 * bsc#1241266 * bsc#1241280 * bsc#1241332 * bsc#1241333 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241371 * bsc#1241373 * bsc#1241378 * bsc#1241394 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241416 * bsc#1241424 * bsc#1241426 * bsc#1241433 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241451 * bsc#1241452 * bsc#1241456 * bsc#1241458 * bsc#1241459 * bsc#1241526 * bsc#1241528 * bsc#1241537 * bsc#1241541 * bsc#1241545 * bsc#1241547 * bsc#1241548 * bsc#1241550 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241578 * bsc#1241590 * bsc#1241593 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241626 * bsc#1241640 * bsc#1241648 * bsc#1242006 * bsc#1242044 * bsc#1242172 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242526 * bsc#1242528 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242596 * bsc#1242710 * bsc#1242778 * bsc#1242831 * bsc#1242985 Cross-References: * CVE-2023-53034 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35840 * CVE-2024-46763 * CVE-2024-46865 * CVE-2024-50083 * CVE-2024-50162 * CVE-2024-50163 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-57924 * CVE-2024-57998 * CVE-2024-58001 * CVE-2024-58068 * CVE-2024-58070 * CVE-2024-58088 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2025-21683 * CVE-2025-21696 * CVE-2025-21707 * CVE-2025-21758 * CVE-2025-21768 * CVE-2025-21792 * CVE-2025-21808 * CVE-2025-21812 * CVE-2025-21833 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21854 * CVE-2025-21867 * CVE-2025-21904 * CVE-2025-21925 * CVE-2025-21926 * CVE-2025-21931 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-21980 * CVE-2025-21985 * CVE-2025-21999 * CVE-2025-22004 * CVE-2025-22015 * CVE-2025-22016 * CVE-2025-22017 * CVE-2025-22018 * CVE-2025-22020 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22029 * CVE-2025-22033 * CVE-2025-22036 * CVE-2025-22044 * CVE-2025-22045 * CVE-2025-22050 * CVE-2025-22053 * CVE-2025-22055 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22062 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22075 * CVE-2025-22080 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22090 * CVE-2025-22093 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22104 * CVE-2025-22105 * CVE-2025-22106 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22115 * CVE-2025-22116 * CVE-2025-22121 * CVE-2025-22128 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23133 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23145 * CVE-2025-37785 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37860 * CVE-2025-39728 CVSS scores: * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50162 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50163 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22029 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22029 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22115 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22115 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 96 vulnerabilities and has 55 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597). * CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP (bsc#1233075). * CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not overlap (bsc#1233098). * CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086). * CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961). * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983). * CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510). * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704). * CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111). * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862). * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737). * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714). * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745). * CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108). * CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470). * CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181). * CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576). * CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713). * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712). * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709). * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655). * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717). * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740). * CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809). * CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835). * CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944). * CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934). * CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936). * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266). * CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378). * CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426). * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433). * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373). * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371). * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413). * CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416). * CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537). * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456). * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550). * CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548). * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575). * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573). * CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578). * CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593). * CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414). * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283). * CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626). The following non-security bugs were fixed: * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes). * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes). * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes). * ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes). * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git- fixes). * ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes). * ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes). * ALSA: ump: Fix buffer overflow at UMP SysEx message conversion (bsc#1242044). * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable- fixes). * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable- fixes). * ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes). * ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes). * ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable- fixes). * ASoC: Use of_property_read_bool() (stable-fixes). * ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes). * ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes). * ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes). * ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes). * ASoC: fsl_audmix: register card device depends on 'dais' property (stable- fixes). * ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes). * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes). * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes). * Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes). * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git- fixes). * Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address (git-fixes). * Bluetooth: hci_uart: Fix another race during initialization (git-fixes). * Bluetooth: hci_uart: fix race during initialization (stable-fixes). * Bluetooth: l2cap: Check encryption key size on incoming connection (git- fixes). * Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes). * Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes). * Drop PCI patch that caused a regression (bsc#1241123) * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes). * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes). * Input: xpad - fix two controller table values (git-fixes). * OPP: add index check to assert to avoid buffer overflow in _read_freq() (bsc#1238961) * PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git- fixes). * PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes). * RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes) * RDMA/core: Silence oversized kvmalloc() warning (git-fixes) * RDMA/hns: Fix wrong maximum DMA segment size (git-fixes) * RDMA/mana_ib: Ensure variable err is initialized (git-fixes). * RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes) * Revert "drivers: core: synchronize really_probe() and dev_uevent()" (stable- fixes). * Revert "drm/meson: vclk: fix calculation of 59.94 fractional rates" (git- fixes). * Revert "tcp: Fix bind() regression for v6-only wildcard and" * Revert "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes). * USB: VLI disk crashes if LPM is used (stable-fixes). * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes). * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes). * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable- fixes). * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes). * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes). * USB: wdm: add annotation (git-fixes). * USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes). * USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes). * USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes). * ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes). * asus-laptop: Fix an uninitialized variable (git-fixes). * ata: libata-sata: Save all fields from sense data descriptor (git-fixes). * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git- fixes). * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes). * ata: libata-scsi: Improve CDL control (git-fixes). * ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() (git-fixes). * ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes). * auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes). * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes). * badblocks: Fix error shitf ops (git-fixes). * badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes). * badblocks: fix missing bad blocks on retry in _badblocks_check() (git- fixes). * badblocks: fix the using of MAX_BADBLOCKS (git-fixes). * badblocks: return error directly when setting badblocks exceeds 512 (git- fixes). * badblocks: return error if any badblock set fails (git-fixes). * blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes). * block: change blk_mq_add_to_batch() third argument type to bool (git-fixes). * block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes). * block: fix conversion of GPT partition name to 7-bit (git-fixes). * block: fix resource leak in blk_register_queue() error path (git-fixes). * block: integrity: Do not call set_page_dirty_lock() (git-fixes). * block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (git-fixes). * bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes). * bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes). * bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes). * bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes). * bpf: add find_containing_subprog() utility function (bsc#1241590). * bpf: check changes_pkt_data property for extension programs (bsc#1241590). * bpf: consider that tail calls invalidate packet pointers (bsc#1241590). * bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590). * bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590). * bpf: track changes_pkt_data property for global functions (bsc#1241590). * btrfs: add and use helper to verify the calling task has locked the inode (bsc#1241204). * btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710). * btrfs: fix hole expansion when writing at an offset beyond EOF (bsc#1241151). * btrfs: fix missing snapshot drew unlock when root is dead during swap activation (bsc#1241204). * btrfs: fix race with memory mapped writes when activating swap file (bsc#1241204). * btrfs: fix swap file activation failure due to extents that used to be shared (bsc#1241204). * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes). * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git- fixes). * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes). * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git- fixes). * cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes). * char: misc: register chrdev region with all possible minors (git-fixes). * cifs: Fix integer overflow while processing actimeo mount option (git- fixes). * crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes). * crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes). * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes). * cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git- fixes). * dm-bufio: do not schedule in atomic context (git-fixes). * dm-ebs: fix prefetch-vs-suspend race (git-fixes). * dm-integrity: set ti->error on memory allocation failure (git-fixes). * dm-verity: fix prefetch-vs-suspend race (git-fixes). * dm: add missing unlock on in dm_keyslot_evict() (git-fixes). * dm: always update the array size in realloc_argv on success (git-fixes). * dm: fix copying after src array boundaries (git-fixes). * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable- fixes). * drivers: base: devres: Allow to release group on device release (stable- fixes). * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes). * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes). * drm/amd/display: Fix gpu reset in multidisplay config (git-fixes). * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes). * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes). * drm/amd/display: Force full update in gpu reset (stable-fixes). * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes). * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd: Handle being compiled without SI or CIK support better (stable- fixes). * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() (stable-fixes). * drm/amdkfd: Fix mode1 reset crash issue (stable-fixes). * drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes). * drm/amdkfd: clamp queue size to minimum (stable-fixes). * drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes). * drm/bridge: panel: forbid initializing a panel with unknown connector type (stable-fixes). * drm/fdinfo: Protect against driver unbind (git-fixes). * drm/i915/dg2: wait for HuC load completion before running selftests (stable- fixes). * drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes). * drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes). * drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes). * drm/i915: Disable RPG during live selftest (git-fixes). * drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable- fixes). * drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable- fixes). * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes). * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes). * drm/tests: Add helper to create mock crtc (stable-fixes). * drm/tests: Add helper to create mock plane (stable-fixes). * drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git- fixes). * drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes). * drm/tests: helpers: Add atomic helpers (stable-fixes). * drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable- fixes). * drm/tests: helpers: Create kunit helper to destroy a drm_display_mode (stable-fixes). * drm/tests: helpers: Fix compiler warning (git-fixes). * drm/tests: modes: Fix drm_display_mode memory leak (git-fixes). * drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes). * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes). * drm: allow encoder mode_set even when connectors change for crtc (stable- fixes). * drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel) (stable-fixes). * drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB (stable-fixes). * drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes). * e1000e: change k1 configuration on MTP and later platforms (git-fixes). * eth: bnxt: fix missing ring index trim on error path (git-fixes). * ethtool: Fix context creation with no parameters (git-fixes). * ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes). * ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git- fixes). * ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes). * ethtool: fix setting key and resetting indir at once (git-fixes). * ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes). * ethtool: netlink: do not return SQI value if link is down (git-fixes). * ethtool: plca: fix plca enable data type while parsing the value (git- fixes). * ethtool: rss: echo the context number back (git-fixes). * exfat: do not fallback to buffered write (git-fixes). * exfat: drop ->i_size_ondisk (git-fixes). * exfat: fix soft lockup in exfat_clear_bitmap (git-fixes). * exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes). * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342). * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540). * ext4: do not over-report free space or inodes in statvfs (bsc#1242345). * ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347). * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557). * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556). * ext4: make block validity check resistent to sb bh corruption (bsc#1242348). * ext4: partial zero eof block on unaligned inode size extension (bsc#1242336). * ext4: protect ext4_release_dquot against freezing (bsc#1242335). * ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536). * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539). * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538). * fbdev: omapfb: Add 'plane' value check (stable-fixes). * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git- fixes). * firmware: arm_scmi: Balance device refcount when destroying devices (git- fixes). * fs/jfs: Prevent integer overflow in AG size calculation (git-fixes). * fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes). * fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250). * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528). * fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535). * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526). * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes). * gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes). * gve: handle overflow when reporting TX consumed descriptors (git-fixes). * gve: set xdp redirect target only when it is available (git-fixes). * hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes). * i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes). * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes). * ice: Add check for devm_kzalloc() (git-fixes). * ice: fix reservation of resources for RDMA when disabled (git-fixes). * ice: stop truncating queue ids when checking (git-fixes). * idpf: check error for register_netdev() on init (git-fixes). * idpf: fix adapter NULL pointer dereference on reboot (git-fixes). * igb: reject invalid external timestamp requests for 82580-based HW (git- fixes). * igc: add lock preventing multiple simultaneous PTM transactions (git-fixes). * igc: cleanup PTP module if probe fails (git-fixes). * igc: fix PTM cycle trigger logic (git-fixes). * igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes). * igc: increase wait time before retrying PTM (git-fixes). * igc: move ktime snapshot into PTM retry loop (git-fixes). * iio: accel: adxl367: fix setting odr for activity time update (git-fixes). * iio: adc: ad7606: fix serial register access (git-fixes). * iio: adc: ad7768-1: Fix conversion result sign (git-fixes). * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes). * iio: adis16201: Correct inclinometer channel resolution (git-fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git- fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes). * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git- fixes). * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes). * ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git- fixes). * irqchip/davinci: Remove leftover header (git-fixes). * irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes). * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git- fixes). * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307). * jbd2: add a missing data flush during file and fs synchronization (bsc#1242346). * jbd2: fix off-by-one while erasing journal (bsc#1242344). * jbd2: flush filesystem device before updating tail sequence (bsc#1242333). * jbd2: increase IO priority for writing revoke records (bsc#1242332). * jbd2: increase the journal IO's priority (bsc#1242537). * jbd2: remove wrong sb->s_sequence check (bsc#1242343). * jfs: Fix uninit-value access of imap allocated in the diMount() function (git-fixes). * jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes). * jfs: add sanity check for agwidth in dbMount (git-fixes). * kABI fix for sctp: detect and prevent references to a freed transport in sendmsg (git-fixes). * kABI workaround for powercap update (bsc#1241010). * ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes). * kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes). * loop: LOOP_SET_FD: send uevents for partitions (git-fixes). * loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes). * loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes). * md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb (bsc#1238212) * media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes). * mei: me: add panther lake H DID (stable-fixes). * misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration (git-fixes). * misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack (git-fixes). * mm/readahead: fix large folio support in async readahead (bsc#1242321). * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326). * mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327). * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546). * mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable- fixes). * mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes). * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes). * mptcp: refine opt_mp_capable determination (git-fixes). * mptcp: relax check on MPC passive fallback (git-fixes). * mptcp: strict validation before using mp_opt->hmac (git-fixes). * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes). * net/mlx5: Fill out devlink dev info only for PFs (git-fixes). * net/mlx5: IRQ, Fix null string in debug print (git-fixes). * net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git- fixes). * net/mlx5: Start health poll after enable hca (git-fixes). * net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes). * net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices (git-fixes). * net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes). * net/tcp: refactor tcp_inet6_sk() (git-fixes). * net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes). * net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes). * net: blackhole_dev: fix build warning for ethh set but not used (git-fixes). * net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes). * net: ethtool: Fix RSS setting (git-fixes). * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes). * net: mana: Switch to page pool for jumbo frames (git-fixes). * net: mark racy access on sk->sk_rcvbuf (git-fixes). * net: phy: leds: fix memory leak (git-fixes). * net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes). * net: sctp: fix skb leak in sctp_inq_free() (git-fixes). * net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes). * net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes). * net_sched: drr: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: ets: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes). * net_sched: qfq: Fix double list add in class with netem as child qdisc (git- fixes). * netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes). * nfs: add missing selections of CONFIG_CRC32 (git-fixes). * nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes). * ntb: reduce stack usage in idt_scan_mws (stable-fixes). * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes). * nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes). * nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes). * nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes). * nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes). * nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes). * nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git- fixes). * nvmet-fcloop: swap list_add_tail arguments (git-fixes). * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172) * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172) * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172) * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172) * phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git- fixes). * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable- fixes). * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes). * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes). * platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug (git-fixes). * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010). * powerpc/boot: Check for ld-option support (bsc#1215199). * powerpc/boot: Fix dash warning (bsc#1215199). * powerpc: Do not use --- in kernel logs (git-fixes). * pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes). * pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes). * pwm: rcar: Improve register calculation (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038). * rpm/package-descriptions: Add rt and rt_debug descriptions * rtc: pcf85063: do a SW reset if POR failed (stable-fixes). * scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes). * scsi: hisi_sas: Enable force phy when SATA disk directly connected (git- fixes). * scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes). * scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes). * scsi: mpi3mr: Fix locking in an error path (git-fixes). * scsi: mpt3sas: Fix a locking bug in an error path (git-fixes). * scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO (git-fixes). * scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes). * sctp: Fix undefined behavior in left shift operation (git-fixes). * sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes). * sctp: detect and prevent references to a freed transport in sendmsg (git- fixes). * sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start (git-fixes). * sctp: fix association labeling in the duplicate COOKIE-ECHO case (git- fixes). * sctp: fix busy polling (git-fixes). * sctp: prefer struct_size over open coded arithmetic (git-fixes). * sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes). * selftests/bpf: Add a few tests to cover (git-fixes). * selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590). * selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590). * selftests/bpf: test for changing packet data from global functions (bsc#1241590). * selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590). * selftests/futex: futex_waitv wouldblock test should fail (git-fixes). * selftests/mm: generate a temporary mountpoint for cgroup filesystem (git- fixes). * serial: msm: Configure correct working mode before starting earlycon (git- fixes). * serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes). * smb: client: fix folio leaks and perf improvements (bsc#1239997, bsc1241265). * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes). * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes). * spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes). * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes). * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328). * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes). * staging: axis-fifo: Remove hardware resets for user errors (git-fixes). * staging: iio: adc: ad7816: Correct conditional logic for store mode (git- fixes). * string: Add load_unaligned_zeropad() code path to sized_strscpy() (git- fixes). * tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes). * thunderbolt: Scan retimers after device router has been enumerated (stable- fixes). * tools/hv: update route parsing in kvp daemon (git-fixes). * tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175). * tools/power turbostat: report CoreThr per measurement interval (git-fixes). * tty: n_tty: use uint for space returned by tty_write_room() (git-fixes). * ublk: set_params: properly check if parameters can be applied (git-fixes). * udf: Fix inode_getblk() return value (bsc#1242313). * udf: Skip parent dir link count update if corrupted (bsc#1242315). * udf: Verify inode link counts before performing rename (bsc#1242314). * usb: cdns3: Fix deadlock when using NCM gadget (git-fixes). * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git- fixes). * usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git- fixes). * usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git- fixes). * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes). * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes). * usb: dwc3: gadget: check that event count does not exceed event buffer length (git-fixes). * usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes). * usb: gadget: Use get_status callback to set remote wakeup capability (git- fixes). * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable- fixes). * usb: gadget: f_ecm: Add get_status callback (git-fixes). * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes). * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes). * usb: host: tegra: Prevent host controller crash when OTG port is used (git- fixes). * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes). * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable- fixes). * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable- fixes). * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes). * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes). * usb: uhci-platform: Make the clock really optional (git-fixes). * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes). * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes). * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes). * vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes). * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534). * virtchnl: make proto and filter action count unsigned (git-fixes). * vmxnet3: Fix tx queue race condition with XDP (bsc#1241394). * vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394). * wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes). * wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (stable-fixes). * wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable- fixes). * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes). * wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes). * wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes). * wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() (git-fixes). * wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable- fixes). * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes). * wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). * x86/bugs: Add RSB mitigation document (git-fixes). * x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes). * x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes). * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git- fixes). * x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes). * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes). * x86/dumpstack: Fix inaccurate unwinding from exception stacks due to misplaced assignment (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes). * x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (git-fixes). * x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes). * x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes). * x86/microcode/AMD: Split load_microcode_amd() (git-fixes). * x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (git-fixes). * x86/microcode/intel: Set new revision only after a successful update (git- fixes). * x86/microcode: Remove the driver announcement and version (git-fixes). * x86/microcode: Rework early revisions reporting (git-fixes). * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes). * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git- fixes). * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes). * x86/uaccess: Improve performance by aligning writes to 8 bytes in copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes). * xfs: flush inodegc before swapon (git-fixes). * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes). * zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING (bsc#1241167). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-22=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-macros-6.4.0-29.1 * kernel-source-6.4.0-29.1 * kernel-devel-6.4.0-29.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-29.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.4.0-29.1 * kernel-default-debugsource-6.4.0-29.1 * kernel-default-debuginfo-6.4.0-29.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-29.1.21.7 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-29.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_7-debugsource-1-1.2 * kernel-livepatch-6_4_0-29-default-debuginfo-1-1.2 * kernel-default-livepatch-6.4.0-29.1 * kernel-livepatch-6_4_0-29-default-1-1.2 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-29.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-29.1 * kernel-kvmsmall-debugsource-6.4.0-29.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50162.html * https://www.suse.com/security/cve/CVE-2024-50163.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-57924.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58068.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58088.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21696.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21808.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21833.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21854.html * https://www.suse.com/security/cve/CVE-2025-21867.html * https://www.suse.com/security/cve/CVE-2025-21904.html * https://www.suse.com/security/cve/CVE-2025-21925.html * https://www.suse.com/security/cve/CVE-2025-21926.html * https://www.suse.com/security/cve/CVE-2025-21931.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-21980.html * https://www.suse.com/security/cve/CVE-2025-21985.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22004.html * https://www.suse.com/security/cve/CVE-2025-22015.html * https://www.suse.com/security/cve/CVE-2025-22016.html * https://www.suse.com/security/cve/CVE-2025-22017.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22029.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22036.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22053.html * https://www.suse.com/security/cve/CVE-2025-22055.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22080.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22090.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22105.html * https://www.suse.com/security/cve/CVE-2025-22106.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22115.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23133.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37860.html * https://www.suse.com/security/cve/CVE-2025-39728.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1233075 * https://bugzilla.suse.com/show_bug.cgi?id=1233098 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1236086 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1237111 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238742 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239108 * https://bugzilla.suse.com/show_bug.cgi?id=1239470 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239510 * https://bugzilla.suse.com/show_bug.cgi?id=1239997 * https://bugzilla.suse.com/show_bug.cgi?id=1240181 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240576 * https://bugzilla.suse.com/show_bug.cgi?id=1240655 * https://bugzilla.suse.com/show_bug.cgi?id=1240709 * https://bugzilla.suse.com/show_bug.cgi?id=1240712 * https://bugzilla.suse.com/show_bug.cgi?id=1240713 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1240809 * https://bugzilla.suse.com/show_bug.cgi?id=1240811 * https://bugzilla.suse.com/show_bug.cgi?id=1240835 * https://bugzilla.suse.com/show_bug.cgi?id=1240934 * https://bugzilla.suse.com/show_bug.cgi?id=1240936 * https://bugzilla.suse.com/show_bug.cgi?id=1240944 * https://bugzilla.suse.com/show_bug.cgi?id=1241010 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241051 * https://bugzilla.suse.com/show_bug.cgi?id=1241123 * https://bugzilla.suse.com/show_bug.cgi?id=1241151 * https://bugzilla.suse.com/show_bug.cgi?id=1241167 * https://bugzilla.suse.com/show_bug.cgi?id=1241175 * https://bugzilla.suse.com/show_bug.cgi?id=1241204 * https://bugzilla.suse.com/show_bug.cgi?id=1241250 * https://bugzilla.suse.com/show_bug.cgi?id=1241265 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241371 * https://bugzilla.suse.com/show_bug.cgi?id=1241373 * https://bugzilla.suse.com/show_bug.cgi?id=1241378 * https://bugzilla.suse.com/show_bug.cgi?id=1241394 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241416 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241426 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241451 * https://bugzilla.suse.com/show_bug.cgi?id=1241452 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241537 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241547 * https://bugzilla.suse.com/show_bug.cgi?id=1241548 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241578 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241626 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242985 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 12:35:31 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 12:35:31 -0000 Subject: SUSE-SU-2025:20353-1: moderate: Security update for runc Message-ID: <174886773118.30194.13638407745407816560@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:20353-1 Release Date: 2025-05-21T11:12:02Z Rating: moderate References: * bsc#1214960 * bsc#1230092 Cross-References: * CVE-2024-45310 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.2.6. Upstream changelog is available from . Update to runc v1.2.0~rc3. Upstream changelog is available from . * CVE-2024-45310: Fixed that runc can be tricked into creating empty files/directories on host (bsc#1230092) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-115=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * runc-1.2.6-slfo.1.1_1.1 * runc-debuginfo-1.2.6-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://bugzilla.suse.com/show_bug.cgi?id=1214960 * https://bugzilla.suse.com/show_bug.cgi?id=1230092 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 16:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 16:30:12 -0000 Subject: SUSE-SU-2025:01799-1: important: Security update for postgresql, postgresql16, postgresql17 Message-ID: <174888181275.4319.17362966104062264309@smelt2.prg2.suse.org> # Security update for postgresql, postgresql16, postgresql17 Announcement ID: SUSE-SU-2025:01799-1 Release Date: 2025-06-02T13:28:51Z Rating: important References: * bsc#1219340 * bsc#1230423 * bsc#1233323 * bsc#1233325 * bsc#1233326 * bsc#1233327 * jsc#PED-11514 Cross-References: * CVE-2024-10976 * CVE-2024-10977 * CVE-2024-10978 * CVE-2024-10979 CVSS scores: * CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10976 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10976 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10977 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10977 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10978 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10978 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-10979 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-10979 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: This update for postgresql, postgresql16, postgresql17 fixes the following issues: This update ships postgresql17 , and fixes security issues with postgresql16: * bsc#1230423: Relax the dependency of extensions on the server version from exact major.minor to greater or equal, after Tom Lane confirmed on the PostgreSQL packagers list that ABI stability is being taken care of between minor releases. * bsc#1219340: The last fix was not correct. Improve it by removing the dependency again and call fillup only if it is installed. postgresql16 was updated to 16.6: * Repair ABI break for extensions that work with struct ResultRelInfo. * Restore functionality of ALTER {ROLE|DATABASE} SET role. * Fix cases where a logical replication slot's restart_lsn could go backwards. * Avoid deleting still-needed WAL files during pg_rewind. * Fix race conditions associated with dropping shared statistics entries. * Count index scans in contrib/bloom indexes in the statistics views, such as the pg_stat_user_indexes.idx_scan counter. * Fix crash when checking to see if an index's opclass options have changed. * Avoid assertion failure caused by disconnected NFA sub-graphs in regular expression parsing. * https://www.postgresql.org/docs/release/16.6/ postgresql16 was updated to 16.5: * CVE-2024-10976, bsc#1233323: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference. * CVE-2024-10977, bsc#1233325: Make libpq discard error messages received during SSL or GSS protocol negotiation. * CVE-2024-10978, bsc#1233326: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE * CVE-2024-10979, bsc#1233327: Prevent trusted PL/Perl code from changing environment variables. * https://www.postgresql.org/about/news/p-2955/ * https://www.postgresql.org/docs/release/16.5/ * Don't build the libs and mini flavor anymore to hand over to PostgreSQL 17. * https://www.postgresql.org/about/news/p-2910/ postgresql17 is shipped in version 17.2: * CVE-2024-10976, bsc#1233323: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference. * CVE-2024-10977, bsc#1233325: Make libpq discard error messages received during SSL or GSS protocol negotiation. * CVE-2024-10978, bsc#1233326: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE * CVE-2024-10979, bsc#1233327: Prevent trusted PL/Perl code from changing environment variables. * https://www.postgresql.org/about/news/p-2955/ * https://www.postgresql.org/docs/release/17.1/ * https://www.postgresql.org/docs/release/17.2/ Upgrade to 17.2: * Repair ABI break for extensions that work with struct ResultRelInfo. * Restore functionality of ALTER {ROLE|DATABASE} SET role. * Fix cases where a logical replication slot's restart_lsn could go backwards. * Avoid deleting still-needed WAL files during pg_rewind. * Fix race conditions associated with dropping shared statistics entries. * Count index scans in contrib/bloom indexes in the statistics views, such as the pg_stat_user_indexes.idx_scan counter. * Fix crash when checking to see if an index's opclass options have changed. * Avoid assertion failure caused by disconnected NFA sub-graphs in regular expression parsing. Upgrade to 17.0: * New memory management system for VACUUM, which reduces memory consumption and can improve overall vacuuming performance. * New SQL/JSON capabilities, including constructors, identity functions, and the JSON_TABLE() function, which converts JSON data into a table representation. * Various query performance improvements, including for sequential reads using streaming I/O, write throughput under high concurrency, and searches over multiple values in a btree index. * Logical replication enhancements, including: * Failover control * pg_createsubscriber, a utility that creates logical replicas from physical standbys * pg_upgrade now preserves replication slots on both publishers and subscribers * New client-side connection option, sslnegotiation=direct, that performs a direct TLS handshake to avoid a round-trip negotiation. * pg_basebackup now supports incremental backup. * COPY adds a new option, ON_ERROR ignore, that allows a copy operation to continue in the event of an error. * https://www.postgresql.org/about/news/p-2936/ * https://www.postgresql.org/docs/17/release-17.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1799=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1799=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libecpg6-debuginfo-17.2-3.5.1 * postgresql16-contrib-debuginfo-16.6-3.21.1 * postgresql16-plperl-16.6-3.21.1 * postgresql16-plperl-debuginfo-16.6-3.21.1 * postgresql16-devel-16.6-3.21.1 * libpq5-17.2-3.5.1 * postgresql16-pltcl-debuginfo-16.6-3.21.1 * postgresql16-contrib-16.6-3.21.1 * postgresql16-16.6-3.21.1 * postgresql16-server-devel-debuginfo-16.6-3.21.1 * postgresql16-devel-debuginfo-16.6-3.21.1 * postgresql16-server-debuginfo-16.6-3.21.1 * postgresql16-plpython-16.6-3.21.1 * postgresql16-debuginfo-16.6-3.21.1 * libpq5-debuginfo-17.2-3.5.1 * postgresql16-plpython-debuginfo-16.6-3.21.1 * postgresql16-server-devel-16.6-3.21.1 * postgresql16-server-16.6-3.21.1 * postgresql16-pltcl-16.6-3.21.1 * postgresql16-debugsource-16.6-3.21.1 * libecpg6-17.2-3.5.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * postgresql-docs-17-4.29.1 * postgresql-devel-17-4.29.1 * postgresql-server-17-4.29.1 * postgresql-server-devel-17-4.29.1 * postgresql-pltcl-17-4.29.1 * postgresql-plpython-17-4.29.1 * postgresql16-docs-16.6-3.21.1 * postgresql-17-4.29.1 * postgresql-contrib-17-4.29.1 * postgresql-plperl-17-4.29.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libecpg6-32bit-17.2-3.5.1 * libpq5-32bit-17.2-3.5.1 * libpq5-debuginfo-32bit-17.2-3.5.1 * libecpg6-debuginfo-32bit-17.2-3.5.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libecpg6-debuginfo-17.2-3.5.1 * postgresql16-contrib-debuginfo-16.6-3.21.1 * postgresql16-plperl-16.6-3.21.1 * postgresql16-plperl-debuginfo-16.6-3.21.1 * postgresql16-devel-16.6-3.21.1 * libpq5-17.2-3.5.1 * libecpg6-debuginfo-32bit-17.2-3.5.1 * postgresql16-pltcl-debuginfo-16.6-3.21.1 * postgresql16-contrib-16.6-3.21.1 * postgresql16-16.6-3.21.1 * postgresql16-server-devel-debuginfo-16.6-3.21.1 * postgresql16-devel-debuginfo-16.6-3.21.1 * postgresql16-server-debuginfo-16.6-3.21.1 * postgresql16-plpython-16.6-3.21.1 * postgresql16-debuginfo-16.6-3.21.1 * libpq5-debuginfo-32bit-17.2-3.5.1 * libpq5-debuginfo-17.2-3.5.1 * postgresql16-plpython-debuginfo-16.6-3.21.1 * postgresql16-server-devel-16.6-3.21.1 * postgresql16-server-16.6-3.21.1 * libecpg6-32bit-17.2-3.5.1 * postgresql16-pltcl-16.6-3.21.1 * postgresql16-debugsource-16.6-3.21.1 * libpq5-32bit-17.2-3.5.1 * libecpg6-17.2-3.5.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * postgresql-docs-17-4.29.1 * postgresql-devel-17-4.29.1 * postgresql-server-17-4.29.1 * postgresql-server-devel-17-4.29.1 * postgresql-pltcl-17-4.29.1 * postgresql-plpython-17-4.29.1 * postgresql16-docs-16.6-3.21.1 * postgresql-17-4.29.1 * postgresql-contrib-17-4.29.1 * postgresql-plperl-17-4.29.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10976.html * https://www.suse.com/security/cve/CVE-2024-10977.html * https://www.suse.com/security/cve/CVE-2024-10978.html * https://www.suse.com/security/cve/CVE-2024-10979.html * https://bugzilla.suse.com/show_bug.cgi?id=1219340 * https://bugzilla.suse.com/show_bug.cgi?id=1230423 * https://bugzilla.suse.com/show_bug.cgi?id=1233323 * https://bugzilla.suse.com/show_bug.cgi?id=1233325 * https://bugzilla.suse.com/show_bug.cgi?id=1233326 * https://bugzilla.suse.com/show_bug.cgi?id=1233327 * https://jira.suse.com/browse/PED-11514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 2 16:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Jun 2025 16:30:14 -0000 Subject: SUSE-RU-2025:01798-1: moderate: Recommended update for kubernetes-old Message-ID: <174888181423.4319.9224875857844868847@smelt2.prg2.suse.org> # Recommended update for kubernetes-old Announcement ID: SUSE-RU-2025:01798-1 Release Date: 2025-06-02T12:58:00Z Rating: moderate References: * jsc#PED-11106 Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature can now be installed. ## Description: This update for kubernetes-old fixes the following issues: This ships kubernetes-client version 1.30.12. (jsc#PED-11106) * Find the full changelog: https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.30.md#v13012 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1798=1 openSUSE-SLE-15.6-2025-1798=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1798=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.30-scheduler-1.30.12-150600.13.7.1 * kubernetes1.30-kubelet-1.30.12-150600.13.7.1 * kubernetes1.30-controller-manager-1.30.12-150600.13.7.1 * kubernetes1.30-kubelet-common-1.30.12-150600.13.7.1 * kubernetes1.30-kubeadm-1.30.12-150600.13.7.1 * kubernetes1.30-apiserver-1.30.12-150600.13.7.1 * kubernetes1.30-proxy-1.30.12-150600.13.7.1 * kubernetes1.30-client-common-1.30.12-150600.13.7.1 * kubernetes1.30-client-1.30.12-150600.13.7.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.30-client-bash-completion-1.30.12-150600.13.7.1 * kubernetes1.30-client-fish-completion-1.30.12-150600.13.7.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kubernetes1.30-client-common-1.30.12-150600.13.7.1 * kubernetes1.30-client-1.30.12-150600.13.7.1 * Containers Module 15-SP6 (noarch) * kubernetes1.30-client-bash-completion-1.30.12-150600.13.7.1 ## References: * https://jira.suse.com/browse/PED-11106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From meissner at suse.de Tue Jun 3 11:36:09 2025 From: meissner at suse.de (Marcus Meissner) Date: Tue, 3 Jun 2025 13:36:09 +0200 Subject: Heads up: posting backlogged advisories for SL Micro 6.0 and 6.1 Message-ID: Hi, Due to internal technical restructuring we were only able to start creating SL Micro 6.0 and 6.1 update notices recently. We will publish update notices for the already released updates since the GA of those products now too. This will be around 300 emails in total, but should only happen once. Sorry for this intermittent wave of emails. Ciao, Marcus -- Marcus Meissner (he/him), Distinguished Engineer / Senior Project Manager Security SUSE Software Solutions Germany GmbH, Frankenstrasse 146, 90461 Nuernberg, Germany GF: Ivo Totev, Andrew McDonald, Werner Knoblich, HRB 36809, AG Nuernberg From null at suse.de Wed Jun 4 07:22:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:22:52 -0000 Subject: SUSE-SU-2025:01807-1: moderate: Security update for 389-ds Message-ID: <174902177200.12703.14140809941638584162@smelt2.prg2.suse.org> # Security update for 389-ds Announcement ID: SUSE-SU-2025:01807-1 Release Date: 2025-06-03T13:15:20Z Rating: moderate References: * bsc#1241016 * bsc#1241988 * bsc#1242666 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for 389-ds fixes the following issues: Security fixes: * CVE-2025-3416: Fixed use-After-Free in Md::fetch and Cipher::fetch in rust- openssl crate (bsc#1242666) Other fixes: * Enable memory accounting as SUSE disables it by default (bsc#1241016). * Fix dsidm service get_dn option failing (bsc#1241988) * Version update 2.2.10~git99.aa5d0ecbf Various fixes and solved issues from github repository ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1807=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1807=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1807=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1807=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1807=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * 389-ds-snmp-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * libsvrcore0-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * lib389-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-snmp-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libsvrcore0-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * lib389-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libsvrcore0-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * lib389-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsvrcore0-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * lib389-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libsvrcore0-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * lib389-2.2.10~git99.aa5d0ecbf-150500.3.36.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150500.3.36.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1241016 * https://bugzilla.suse.com/show_bug.cgi?id=1241988 * https://bugzilla.suse.com/show_bug.cgi?id=1242666 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:22:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:22:58 -0000 Subject: SUSE-SU-2025:01806-1: moderate: Security update for 389-ds Message-ID: <174902177813.12703.4518932343936764814@smelt2.prg2.suse.org> # Security update for 389-ds Announcement ID: SUSE-SU-2025:01806-1 Release Date: 2025-06-03T13:14:05Z Rating: moderate References: * bsc#1241016 * bsc#1241988 * bsc#1242666 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for 389-ds fixes the following issues: Security fixes: * CVE-2025-3416: Fixed use-After-Free in Md::fetch and Cipher::fetch in rust- openssl crate (bsc#1242666) Other fixes: * Enable memory accounting as SUSE disables it by default (bsc#1241016). * Fix dsidm service get_dn option failing (bsc#1241988) * Version update 2.2.10~git99.aa5d0ecbf Various fixes and solved issues from github repository ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1806=1 openSUSE-SLE-15.6-2025-1806=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1806=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * lib389-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * libsvrcore0-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-snmp-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-snmp-debuginfo-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * 389-ds-devel-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-debugsource-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-debuginfo-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * lib389-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * libsvrcore0-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * libsvrcore0-debuginfo-2.2.10~git99.aa5d0ecbf-150600.8.20.1 * 389-ds-2.2.10~git99.aa5d0ecbf-150600.8.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1241016 * https://bugzilla.suse.com/show_bug.cgi?id=1241988 * https://bugzilla.suse.com/show_bug.cgi?id=1242666 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:00 -0000 Subject: SUSE-RU-2025:01554-1: moderate: Recommended update for saphana-checks Message-ID: <174902178070.12703.6046454983465141240@smelt2.prg2.suse.org> # Recommended update for saphana-checks Announcement ID: SUSE-RU-2025:01554-1 Release Date: 2025-06-03T12:26:51Z Rating: moderate References: * bsc#1242802 Affected Products: * SAP Applications Module 15-SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for saphana-checks fixes the following issues: * sssd - fix error sapnote is read only, adjust sap notes * GCP - new certified m4 instances as of April 29th * Enhance error detection - set bash pipefail option * SLES15.5 kernels with slowIO * Azure - new certified v3 instances as of April 15th * SAP HostAgent 7.22 PL67 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP7-2025-1554=1 ## Package List: * SAP Applications Module 15-SP7 (noarch) * saphana-checks-2503+1.g069fbad-150600.13.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242802 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:03 -0000 Subject: SUSE-SU-2025:01586-2: important: Security update for rubygem-rack Message-ID: <174902178360.12703.6310595204809260719@smelt2.prg2.suse.org> # Security update for rubygem-rack Announcement ID: SUSE-SU-2025:01586-2 Release Date: 2025-06-03T09:17:07Z Rating: important References: * bsc#1242894 * bsc#1242899 Cross-References: * CVE-2025-32441 * CVE-2025-46727 CVSS scores: * CVE-2025-32441 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-32441 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-32441 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-46727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46727 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for rubygem-rack fixes the following issues: * CVE-2025-46727: possible memory exhaustion due to unbounded parameter parsing in Rack::QueryParser (bsc#1242894). * CVE-2025-32441: deleted sessions can be restored and occupied by unauthenticated users when the Rack::Session::Pool middleware is being used (bsc#1242899). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-1586=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-rack-2.0.8-150000.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32441.html * https://www.suse.com/security/cve/CVE-2025-46727.html * https://bugzilla.suse.com/show_bug.cgi?id=1242894 * https://bugzilla.suse.com/show_bug.cgi?id=1242899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:07 -0000 Subject: SUSE-RU-2025:01544-1: moderate: Recommended update for cloud-regionsrv-client Message-ID: <174902178785.12703.3289335069724839851@smelt2.prg2.suse.org> # Recommended update for cloud-regionsrv-client Announcement ID: SUSE-RU-2025:01544-1 Release Date: 2025-06-02T18:33:29Z Rating: moderate References: * bsc#1218345 * bsc#1240310 * bsc#1240311 * bsc#1240997 Affected Products: * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has four fixes can now be installed. ## Description: This update for cloud-regionsrv-client fixes the following issues: * Version update 10.4.0 * Remove repositories when the package is being removed, Don't want to leave repositories behind refering to the plugin that is being removed when the package gets removed (bsc#1240310, bsc#1240311). * Turn docker into an optional setup, this change requires a Recommends, adapt the code accordingly (jsc#PCT-560). * Support flexible licenses in GCE (jsc#PCT-531). * Drop the azure-addon package it is geting replaced by the license-watcher package which has a generic implementation of the same functionality. * Handle cache inconsistencies (bsc#1218345). * Properly handle the zypper root target argument (bsc#1240997). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1544=1 ## Package List: * Public Cloud Module 15-SP7 (noarch) * cloud-regionsrv-client-generic-config-1.0.0-150300.13.22.2 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.22.2 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.22.2 * cloud-regionsrv-client-10.4.0-150300.13.22.2 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.22.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218345 * https://bugzilla.suse.com/show_bug.cgi?id=1240310 * https://bugzilla.suse.com/show_bug.cgi?id=1240311 * https://bugzilla.suse.com/show_bug.cgi?id=1240997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:11 -0000 Subject: SUSE-RU-2025:20326-1: moderate: Recommended update for sysstat Message-ID: <174902179176.12703.6743271565111399424@smelt2.prg2.suse.org> # Recommended update for sysstat Announcement ID: SUSE-RU-2025:20326-1 Release Date: 2025-05-15T09:48:30Z Rating: moderate References: * bsc#1228246 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for sysstat fixes the following issues: * Updated the diff file to use flock to create the lockfile. Using lockfile would require additional SELinux permissions.(bsc#1228246) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-110=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * sysstat-12.6.2-slfo.1.1_2.1 * sysstat-debuginfo-12.6.2-slfo.1.1_2.1 * sysstat-debugsource-12.6.2-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228246 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:15 -0000 Subject: SUSE-SU-2025:20325-1: moderate: Security update for wget Message-ID: <174902179573.12703.17413716295918525330@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2025:20325-1 Release Date: 2025-05-15T09:36:36Z Rating: moderate References: * bsc#1233773 Cross-References: * CVE-2024-10524 CVSS scores: * CVE-2024-10524 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10524 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N * CVE-2024-10524 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-10524: Drop support for shorthand URLs (bsc#1233773). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-109=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * wget-debuginfo-1.24.5-slfo.1.1_2.1 * wget-debugsource-1.24.5-slfo.1.1_2.1 * wget-1.24.5-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10524.html * https://bugzilla.suse.com/show_bug.cgi?id=1233773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:18 -0000 Subject: SUSE-SU-2025:20318-1: moderate: Security update for glib2 Message-ID: <174902179873.12703.10521782386066666838@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20318-1 Release Date: 2025-05-12T09:45:36Z Rating: moderate References: * bsc#1240897 Cross-References: * CVE-2025-3360 CVSS scores: * CVE-2025-3360 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3360 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3360 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-3360: Fixed integer overflow and buffer underread when parsing a very long and invalid ISO 8601 timestamp with g_date_time_new_from_iso8601() (bsc#1240897). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-314=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libglib-2_0-0-debuginfo-2.76.2-7.1 * libgmodule-2_0-0-2.76.2-7.1 * glib2-tools-debuginfo-2.76.2-7.1 * libglib-2_0-0-2.76.2-7.1 * libgio-2_0-0-2.76.2-7.1 * libgobject-2_0-0-2.76.2-7.1 * libgobject-2_0-0-debuginfo-2.76.2-7.1 * glib2-debugsource-2.76.2-7.1 * libgio-2_0-0-debuginfo-2.76.2-7.1 * glib2-tools-2.76.2-7.1 * libgmodule-2_0-0-debuginfo-2.76.2-7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3360.html * https://bugzilla.suse.com/show_bug.cgi?id=1240897 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:20 -0000 Subject: SUSE-RU-2025:20317-1: important: Recommended update for NetworkManager Message-ID: <174902180089.12703.671573603038134121@smelt2.prg2.suse.org> # Recommended update for NetworkManager Announcement ID: SUSE-RU-2025:20317-1 Release Date: 2025-05-12T09:36:00Z Rating: important References: * bsc#1224868 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for NetworkManager fixes the following issues: * Add config-server subpackage (bsc#1224868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-313=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * NetworkManager-debugsource-1.42.6-6.1 * NetworkManager-cloud-setup-debuginfo-1.42.6-6.1 * NetworkManager-wwan-debuginfo-1.42.6-6.1 * libnm0-debuginfo-1.42.6-6.1 * NetworkManager-wwan-1.42.6-6.1 * NetworkManager-cloud-setup-1.42.6-6.1 * NetworkManager-debuginfo-1.42.6-6.1 * NetworkManager-bluetooth-debuginfo-1.42.6-6.1 * NetworkManager-pppoe-debuginfo-1.42.6-6.1 * libnm0-1.42.6-6.1 * NetworkManager-1.42.6-6.1 * NetworkManager-tui-1.42.6-6.1 * NetworkManager-tui-debuginfo-1.42.6-6.1 * typelib-1_0-NM-1_0-1.42.6-6.1 * NetworkManager-pppoe-1.42.6-6.1 * NetworkManager-bluetooth-1.42.6-6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224868 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:23 -0000 Subject: SUSE-RU-2025:20316-1: important: Recommended update for open-vm-tools Message-ID: <174902180368.12703.9479365232762385854@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:20316-1 Release Date: 2025-04-29T08:28:13Z Rating: important References: * bsc#1237180 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Ensure vmtoolsd.service and vgauthd.service are set to enabled by default. Do this by removing vmblock-fuse.service from the %pre section in the spec file. vmblock-fuse.service still remains in the %pre desktop section (bsc#1237180). * remove unused pcre build dependency * Revert previous change. The proposed solutions was non-standard. * Ensure vmtoolsd.service, vgauthd.service, and vmblock-fuse.service are set to enabled by default (bsc#1237180). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-83=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * libvmtools0-debuginfo-12.5.0-slfo.1.1_2.1 * open-vm-tools-12.5.0-slfo.1.1_2.1 * open-vm-tools-debuginfo-12.5.0-slfo.1.1_2.1 * libvmtools0-12.5.0-slfo.1.1_2.1 * open-vm-tools-debugsource-12.5.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237180 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:30 -0000 Subject: SUSE-SU-2025:20315-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174902181032.12703.11601240460722005305@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20315-1 Release Date: 2025-04-29T11:22:27Z Rating: moderate References: * bsc#1235008 * bsc#1235431 Cross-References: * CVE-2024-53237 * CVE-2024-56650 CVSS scores: * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-20=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-3-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-3-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:36 -0000 Subject: SUSE-SU-2025:20314-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174902181626.12703.5734520937119467232@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20314-1 Release Date: 2025-04-29T11:20:13Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-18=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-4-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-4-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:40 -0000 Subject: SUSE-RU-2025:20313-1: important: Recommended update for ppc64-diag Message-ID: <174902182000.12703.4375001774455767773@smelt2.prg2.suse.org> # Recommended update for ppc64-diag Announcement ID: SUSE-RU-2025:20313-1 Release Date: 2025-05-06T11:56:24Z Rating: important References: * bsc#1234980 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for ppc64-diag fixes the following issues: * Add support for Power11 in diag_nvme (bsc#1234980) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-89=1 ## Package List: * SUSE Linux Micro 6.1 (ppc64le) * ppc64-diag-debugsource-2.7.10-slfo.1.1_2.1 * ppc64-diag-2.7.10-slfo.1.1_2.1 * ppc64-diag-debuginfo-2.7.10-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:41 -0000 Subject: SUSE-RU-2025:20312-1: important: Recommended update for powerpc-utils Message-ID: <174902182183.12703.6326306070651843898@smelt2.prg2.suse.org> # Recommended update for powerpc-utils Announcement ID: SUSE-RU-2025:20312-1 Release Date: 2025-04-29T08:06:11Z Rating: important References: * bsc#1237409 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for powerpc-utils fixes the following issues: * Fix memory mode display on POWER10 (bsc#1237409) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-82=1 ## Package List: * SUSE Linux Micro 6.1 (ppc64le) * powerpc-utils-debugsource-1.3.12-slfo.1.1_3.1 * powerpc-utils-debuginfo-1.3.12-slfo.1.1_3.1 * powerpc-utils-1.3.12-slfo.1.1_3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237409 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:54 -0000 Subject: SUSE-SU-2025:20311-1: important: Security update for expat Message-ID: <174902183443.12703.18431386311396686809@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20311-1 Release Date: 2025-05-13T13:37:50Z Rating: important References: * bsc#1219559 * bsc#1219561 * bsc#1221289 * bsc#1229930 * bsc#1229931 * bsc#1229932 * bsc#1232579 * bsc#1232601 * bsc#1239618 * jsc#SLE-21253 Cross-References: * CVE-2013-0340 * CVE-2019-15903 * CVE-2023-52425 * CVE-2023-52426 * CVE-2024-28757 * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 * CVE-2024-50602 * CVE-2024-8176 CVSS scores: * CVE-2019-15903 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52426 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 10 vulnerabilities and contains one feature can now be installed. ## Description: This update for expat fixes the following issues: Version update to 2.7.1: Bug fixes: #980 #989 Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: - XML_GetCurrentByteCount - XML_GetCurrentByteIndex - XML_GetCurrentColumnNumber - XML_GetCurrentLineNumber - XML_GetInputContext Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self-certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat*.so.1.10.1) to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re-enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives version update to 2.7.0 (CVE-2024-8176 [bsc#1239618]): * Security fixes: #893 #973 CVE-2024-8176 -- Fix crash from chaining a large number of entities caused by stack overflow by resolving use of recursion, for all three uses of entities: \- general entities in character data ("&g1;") \- general entities in attribute values ("") \- parameter entities ("%p1;") Known impact is (reliable and easy) denial of service: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C (Base Score: 7.5, Temporal Score: 7.2) Please note that a layer of compression around XML can significantly reduce the minimum attack payload size. * Other changes: #935 #937 Autotools: Make generated CMake files look for libexpat. at SO_MAJOR@.dylib on macOS #925 Autotools: Sync CMake templates with CMake 3.29 #945 #962 #966 CMake: Drop support for CMake <3.13 #942 CMake: Small fuzzing related improvements #921 docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4 #941 docs: Document need for C++11 compiler for use from C++ #959 tests/benchmark: Fix a (harmless) TOCTTOU #944 Windows: Fix installer target location of file xmlwf.xml for CMake #953 Windows: Address warning -Wunknown-warning-option about -Wno-pedantic-ms-format from LLVM MinGW #971 Address Cppcheck warnings #969 #970 Mass-migrate links from http:// to https:// #947 #958 .. #974 #975 Document changes since the previous release #974 #975 Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do * no source changes, just adding jira reference: jsc#SLE-21253 Version update to 2.6.4 * Security fixes: [bsc#1232601][bsc#1232579] #915 CVE-2024-50602 -- Fix crash within function XML_ResumeParser from a NULL pointer dereference by disallowing function XML_StopParser to (stop or) suspend an unstarted parser. A new error code XML_ERROR_NOT_STARTED was introduced to properly communicate this situation. // CWE-476 CWE-754 * Other changes: #903 CMake: Add alias target "expat::expat" #905 docs: Document use via CMake >=3.18 with FetchContent and SOURCE_SUBDIR and its consequences #902 tests: Reduce use of global parser instance #904 tests: Resolve duplicate handler #317 #918 tests: Improve tests on doctype closing (ex CVE-2019-15903) #914 Fix signedness of format strings #919 #920 Version info bumped from 10:3:9 (libexpat _.so.1.9.3) to 11:0:10 (libexpat_.so.1.10.0); see https://verbump.de/ for what these numbers do Update to 2.6.3: * Security fixes: * CVE-2024-45490, bsc#1229930 -- Calling function XML_ParseBuffer with len < 0 without noticing and then calling XML_GetBuffer will have XML_ParseBuffer fail to recognize the problem and XML_GetBuffer corrupt memory. With the fix, XML_ParseBuffer now complains with error XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse has been doing since Expat 2.2.1, and now documented. Impact is denial of service to potentially artitrary code execution. * CVE-2024-45491, bsc#1229931 -- Internal function dtdCopy can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). Impact is denial of service to potentially artitrary code execution. * CVE-2024-45492, bsc#1229932 -- Internal function nextScaffoldPart can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). Impact is denial of service to potentially artitrary code execution. Update to 2.6.2: * CVE-2024-28757 -- Prevent billion laughs attacks with isolated use of external parsers (bsc#1221289) * Reject direct parameter entity recursion and avoid the related undefined behavior Update to 2.6.1: * Expose billion laughs API with XML_DTD defined and XML_GE undefined, regression from 2.6.0 * Make tests independent of CPU speed, and thus more robust Update to 2.6.0: * Security fixes: * CVE-2023-52425 (bsc#1219559) \-- Fix quadratic runtime issues with big tokens that can cause denial of service, in partial where dealing with compressed XML input. Applications that parsed a document in one go -- a single call to functions XML_Parse or XML_ParseBuffer -- were not affected. The smaller the chunks/buffers you use for parsing previously, the bigger the problem prior to the fix. Backporters should be careful to no omit parts of pull request #789 and to include earlier pull request #771, in order to not break the fix. * CVE-2023-52426 (bsc#1219561) \-- Fix billion laughs attacks for users compiling _without_ XML_DTD defined (which is not common). Users with XML_DTD defined have been protected since Expat >=2.4.0 (and that was CVE-2013-0340 back then). * Bug fixes: * Fix parse-size-dependent "invalid token" error for external entities that start with a byte order mark * Fix NULL pointer dereference in setContext via XML_ExternalEntityParserCreate for compilation with XML_DTD undefined * Protect against closing entities out of order * Other changes: * Improve support for arc4random/arc4random_buf * Improve buffer growth in XML_GetBuffer and XML_Parse * xmlwf: Support --help and --version * xmlwf: Support custom buffer size for XML_GetBuffer and read * xmlwf: Improve language and URL clickability in help output * examples: Add new example "element_declarations.c" * Be stricter about macro XML_CONTEXT_BYTES at build time * Make inclusion to expat_config.h consistent * Autotools: configure.ac: Support --disable-maintainer-mode * Autotools: Sync CMake templates with CMake 3.26 * Autotools: Make installation of shipped man page doc/xmlwf.1 independent of docbook2man availability * Autotools|CMake: Add missing -DXML_STATIC to pkg-config file section "Cflags.private" in order to fix compilation against static libexpat using pkg-config on Windows * Autotools|CMake: Require a C99 compiler (a de-facto requirement already since Expat 2.2.2 of 2017) * Autotools|CMake: Fix PACKAGE_BUGREPORT variable * Autotools|CMake: Make test suite require a C++11 compiler * CMake: Require CMake >=3.5.0 * CMake: Lowercase off_t and size_t to help a bug in Meson * CMake: Sort xmlwf sources alphabetically * CMake|Windows: Fix generation of DLL file version info * CMake: Build tests/benchmark/benchmark.c as well for a build with -DEXPAT_BUILD_TESTS=ON * docs: Document the importance of isFinal + adjust tests accordingly * docs: Improve use of "NULL" and "null" * docs: Be specific about version of XML (XML 1.0r4) and version of C (C99); (XML 1.0r5 will need a sponsor.) * docs: reference.html: Promote function XML_ParseBuffer more * docs: reference.html: Add HTML anchors to XML_* macros * docs: reference.html: Upgrade to OK.css 1.2.0 * docs: Fix typos * docs|CI: Use HTTPS URLs instead of HTTP at various places * Address compiler warnings * Address clang-tidy warnings * Version info bumped from 9:10:8 (libexpat _.so.1.8.10) to 10:0:9 (libexpat_.so.1.9.0); see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-108=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-slfo.1.1_1.1 * libexpat1-debuginfo-2.7.1-slfo.1.1_1.1 * libexpat1-2.7.1-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2013-0340.html * https://www.suse.com/security/cve/CVE-2019-15903.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2023-52426.html * https://www.suse.com/security/cve/CVE-2024-28757.html * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://www.suse.com/security/cve/CVE-2024-50602.html * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1219559 * https://bugzilla.suse.com/show_bug.cgi?id=1219561 * https://bugzilla.suse.com/show_bug.cgi?id=1221289 * https://bugzilla.suse.com/show_bug.cgi?id=1229930 * https://bugzilla.suse.com/show_bug.cgi?id=1229931 * https://bugzilla.suse.com/show_bug.cgi?id=1229932 * https://bugzilla.suse.com/show_bug.cgi?id=1232579 * https://bugzilla.suse.com/show_bug.cgi?id=1232601 * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:55 -0000 Subject: SUSE-SU-2025:20310-1: important: Security update for freetype2 Message-ID: <174902183599.12703.1499344610494784006@smelt2.prg2.suse.org> # Security update for freetype2 Announcement ID: SUSE-SU-2025:20310-1 Release Date: 2025-05-13T13:32:59Z Rating: important References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for freetype2 fixes the following issues: Update to 2.13.2: * Some fields in the `FT_Outline` structure have been changed from signed to unsigned type, which better reflects the actual usage. It is also an additional means to protect against malformed input. * Rare double-free crashes in the cache subsystem have been fixed. * Excessive stack allocation in the autohinter has been fixed. * The B/W rasterizer has received a major upkeep that results in large performance improvements. The rendering speed has increased and even doubled for very complex glyphs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-107=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * freetype2-debugsource-2.13.3-slfo.1.1_1.1 * libfreetype6-2.13.3-slfo.1.1_1.1 * libfreetype6-debuginfo-2.13.3-slfo.1.1_1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:59 -0000 Subject: SUSE-SU-2025:20308-1: moderate: Security update for avahi Message-ID: <174902183922.12703.9182561719111937401@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2025:20308-1 Release Date: 2025-05-12T14:33:40Z Rating: moderate References: * bsc#1233420 * jsc#PED-266 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: Fixed predictable transaction IDs for Wide-Area DNS (bsc#1233420) * Drop rcFOO symlinks (jsc#PED-266). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-100=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * avahi-debuginfo-0.8-slfo.1.1_2.1 * libavahi-core7-0.8-slfo.1.1_2.1 * libavahi-client3-debuginfo-0.8-slfo.1.1_2.1 * avahi-debugsource-0.8-slfo.1.1_2.1 * libavahi-core7-debuginfo-0.8-slfo.1.1_2.1 * avahi-0.8-slfo.1.1_2.1 * libavahi-common3-0.8-slfo.1.1_2.1 * libavahi-common3-debuginfo-0.8-slfo.1.1_2.1 * libavahi-client3-0.8-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1233420 * https://jira.suse.com/browse/PED-266 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:23:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:23:57 -0000 Subject: SUSE-RU-2025:20309-1: moderate: Recommended update for cups Message-ID: <174902183716.12703.4012583140067845991@smelt2.prg2.suse.org> # Recommended update for cups Announcement ID: SUSE-RU-2025:20309-1 Release Date: 2025-05-13T03:17:17Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for cups fixes the following issues: * Version upgrade to 2.4.11: * See https://github.com/openprinting/cups/releases CUPS 2.4.11 brings several bug fixes regarding IPP response validation, processing PPD values, Web UI support (checkbox support, modifying printers) and others fixes. Detailed list available in the CHANGES.md file * Dropped rcFOO symlinks for CODE16 (PED-266) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-101=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libcups2-2.4.11-slfo.1.1_1.1 * cups-debugsource-2.4.11-slfo.1.1_1.1 * libcups2-debuginfo-2.4.11-slfo.1.1_1.1 * cups-config-2.4.11-slfo.1.1_1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:08 -0000 Subject: SUSE-SU-2025:20307-1: moderate: Security update for ca-certificates-mozilla Message-ID: <174902184872.12703.5985519839832061573@smelt2.prg2.suse.org> # Security update for ca-certificates-mozilla Announcement ID: SUSE-SU-2025:20307-1 Release Date: 2025-05-12T09:14:56Z Rating: moderate References: * bsc#1010996 * bsc#1199079 * bsc#1229003 * bsc#1234798 * bsc#1240009 * bsc#1240343 * bsc#441356 Affected Products: * SUSE Linux Micro 6.1 An update that has seven fixes can now be installed. ## Description: This update for ca-certificates-mozilla fixes the following issues: Update to 2.74 state of Mozilla SSL root CAs: Removed: * SwissSign Silver CA - G2 Added: * D-TRUST BR Root CA 2 2023 * D-TRUST EV Root CA 2 2023 Updated to 2.72 state of Mozilla SSL root CAs (bsc#1234798): Removed: * SecureSign RootCA11 * Security Communication RootCA3 Added: * TWCA CYBER Root CA * TWCA Global Root CA G2 * SecureSign Root CA12 * SecureSign Root CA14 * SecureSign Root CA15 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-99=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * ca-certificates-mozilla-2.74-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1010996 * https://bugzilla.suse.com/show_bug.cgi?id=1199079 * https://bugzilla.suse.com/show_bug.cgi?id=1229003 * https://bugzilla.suse.com/show_bug.cgi?id=1234798 * https://bugzilla.suse.com/show_bug.cgi?id=1240009 * https://bugzilla.suse.com/show_bug.cgi?id=1240343 * https://bugzilla.suse.com/show_bug.cgi?id=441356 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:18 -0000 Subject: SUSE-RU-2025:20306-1: critical: Recommended update for dracut Message-ID: <174902185844.12703.14362364111132338630@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2025:20306-1 Release Date: 2025-05-12T09:09:06Z Rating: critical References: * bsc#1217885 * bsc#1228086 * bsc#1231792 * bsc#1232063 * bsc#1236982 * bsc#1237695 * bsc#1239632 * bsc#1240919 Affected Products: * SUSE Linux Micro 6.1 An update that has eight fixes can now be installed. ## Description: This update for dracut fixes the following issues: Update to version 059+suse.631.ga638ed12: * fix(dmsquash-live): do not check ISO md5 if image filesystem (bsc#1240919) * fix(nfs): set correct ownership of rpc.statd state directories (bsc#1217885) * perf(nfs): remove references to old rpcbind state dir * fix(nfs): libnfsidmap plugins not added in some distributions * fix(dracut.spec): move znet to the main package (bsc#1239632) Update to version 059+suse.623.gf9a73df5: * fix(iscsi): make sure services are shut down when switching root (bsc#1237695) * fix(iscsi): don't require network setup for qedi * fix(network-legacy): do not require pgrep when using wicked (bsc#1236982) Update to version 059+suse.617.gb2c1d974: Fixes for booting from iSCSI offload with bnx2i (bsc#1228086): * fix(iscsi): attempt iSCSI login before all interfaces are up * fix(iscsi): don't require network setup for bnx2i Other: * fix(dracut): rework timeout for devices added via --mount and --add-device (bsc#1231792) Update to version 059+suse.610.g850d981a: * fix(dm): remove 59-persistent-storage-dm.rules (bsc#1232063) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-98=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * dracut-fips-059+suse.631.ga638ed12-slfo.1.1_1.1 * dracut-059+suse.631.ga638ed12-slfo.1.1_1.1 * dracut-debugsource-059+suse.631.ga638ed12-slfo.1.1_1.1 * dracut-debuginfo-059+suse.631.ga638ed12-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217885 * https://bugzilla.suse.com/show_bug.cgi?id=1228086 * https://bugzilla.suse.com/show_bug.cgi?id=1231792 * https://bugzilla.suse.com/show_bug.cgi?id=1232063 * https://bugzilla.suse.com/show_bug.cgi?id=1236982 * https://bugzilla.suse.com/show_bug.cgi?id=1237695 * https://bugzilla.suse.com/show_bug.cgi?id=1239632 * https://bugzilla.suse.com/show_bug.cgi?id=1240919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:24 -0000 Subject: SUSE-RU-2025:20305-1: important: Recommended update for systemd Message-ID: <174902186434.12703.2627773948015587606@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20305-1 Release Date: 2025-05-09T06:41:53Z Rating: important References: * bsc#1234015 * bsc#1236886 * jsc#PED-12317 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that contains one feature and has two fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Maintain the network device naming scheme used on SLE15 (jsc#PED-12317) This shouldn't cause problems as predictable naming schemes are disabled on SLMicro-6.1 (net.ifnames=0 is set on the kernel command line by default). Add patch for the description of these schemes in the relevant man page. * udev: allow/denylist for reading sysfs attributes when composing a NIC name (bsc#1234015) * For a complete list of changes, visit: https://github.com/openSUSE/systemd/compare/b4693652f317dbae80e31b978f51e695a23fa3d0...0d0f2dbfc4c901dca09fdd3d5b744b5339e0e991 * journald: * close runtime journals before their parent directory removed * reset runtime seqnum data when flushing to system journal (bsc#1236886) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-97=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-97=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * systemd-journal-remote-254.24-slfo.1.1_1.1 * libudev1-254.24-slfo.1.1_1.1 * systemd-container-254.24-slfo.1.1_1.1 * systemd-debugsource-254.24-slfo.1.1_1.1 * systemd-experimental-debuginfo-254.24-slfo.1.1_1.1 * systemd-portable-254.24-slfo.1.1_1.1 * systemd-coredump-254.24-slfo.1.1_1.1 * udev-254.24-slfo.1.1_1.1 * systemd-debuginfo-254.24-slfo.1.1_1.1 * systemd-journal-remote-debuginfo-254.24-slfo.1.1_1.1 * systemd-portable-debuginfo-254.24-slfo.1.1_1.1 * libsystemd0-254.24-slfo.1.1_1.1 * systemd-254.24-slfo.1.1_1.1 * systemd-coredump-debuginfo-254.24-slfo.1.1_1.1 * systemd-container-debuginfo-254.24-slfo.1.1_1.1 * libsystemd0-debuginfo-254.24-slfo.1.1_1.1 * udev-debuginfo-254.24-slfo.1.1_1.1 * libudev1-debuginfo-254.24-slfo.1.1_1.1 * systemd-experimental-254.24-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (ppc64le) * systemd-sysvcompat-debuginfo-254.24-slfo.1.1_1.1 * systemd-sysvcompat-254.24-slfo.1.1_1.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * systemd-debugsource-254.24-slfo.1.1_1.1 * systemd-devel-254.24-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1236886 * https://jira.suse.com/browse/PED-12317 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:32 -0000 Subject: SUSE-SU-2025:20304-1: important: Security update for util-linux Message-ID: <174902187233.12703.4726607947151070173@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2025:20304-1 Release Date: 2025-05-08T12:25:53Z Rating: important References: * bsc#1159034 * bsc#1194818 * bsc#1218609 * bsc#1220117 * bsc#1221831 * bsc#1223605 * bsc#1224285 * bsc#1225197 * bsc#1225598 * bsc#1229476 Cross-References: * CVE-2024-28085 CVSS scores: * CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N * CVE-2024-28085 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has nine fixes can now be installed. ## Description: This update for util-linux fixes the following issues: * Updated to version 2.40.4: * agetty: Prevent cursor escape (bsc#1194818) * chcpu(8): Document CPU deconfiguring behavior * fdisk: SGI fixes * hardlink: fix memory corruption * hardlink.1 directory|file is mandatory * lib/env: fix env_list_setenv() for strings without '=' * libblkid: (exfat) validate fields used by prober (gpt) use blkid_probe_verify_csum() for partition array checksum add FSLASTBLOCK for swaparea bitlocker fix version on big-endian systems * libfdisk: make sure libblkid uses the same sector size * libmount: extract common error handling function propagate first error of multiple filesystem types * logger: correctly format tv_usec * lscpu: Skip aarch64 decode path for rest of the architectures (bsc#1229476) * lsns: ignore ESRCH errors reported when accessing files under /proc * mkswap: set selinux label also when creating file * more: make sure we have data on stderr * nsenter: support empty environ * umount, losetup: Document loop destroy behavior (bsc#1159034). * uuidd: fix /var/lib/libuuid mode uuidd-tmpfiles.conf fix /var/lib/libuuid mode uuidd-tmpfiles.conf * Refresh util-linux.keyring. Key validity was extended. * Update to version 2.40.2: * cfdisk: fix possible integer overflow * libmount: improving robustness in reading kernel messages, add pidfs to pseudo fs list * lscpu: New Arm Cortex part numbers fix hang of lscpu -e (bsc#1225598) * lsfd: Refactor the pidfd logic, support pidfs * mkswap.8.adoc: update note regarding swapfile creation * setpgid: make -f work * Enable kernel mountfd API, as it should be already stable (PED-9752). * Move autoreconf back to %build. * Add devel dependencies. * Remove util-linux-rpmlintrc. It is no more needed with multibuild. * uncomment "autoreconf --install" to use the new version of automake * disable libmagic in more(1) for binary detection (bsc#1225197) * add support for pidfs in kernel 6.9 (bsc#1224285) * Update to version 2.40.1: * more: clean processes not cleaned up after failed SSH session using up 100% CPU (bsc#1220117) * CVE-2024-28085: Fixed improper neutralization of escape sequences in wall (bsc#1221831) * chcpu: document limitations of -g (bsc#1218609) * lscpu: even more Arm part numbers (bsc#1223605) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-95=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libmount1-debuginfo-2.40.4-slfo.1.1_1.1 * libuuid1-2.40.4-slfo.1.1_1.1 * libblkid1-debuginfo-2.40.4-slfo.1.1_1.1 * libmount1-2.40.4-slfo.1.1_1.1 * util-linux-systemd-debugsource-2.40.4-slfo.1.1_1.1 * lastlog2-2.40.4-slfo.1.1_1.1 * libsmartcols1-2.40.4-slfo.1.1_1.1 * lastlog2-debuginfo-2.40.4-slfo.1.1_1.1 * liblastlog2-2-debuginfo-2.40.4-slfo.1.1_1.1 * util-linux-debuginfo-2.40.4-slfo.1.1_1.1 * libuuid1-debuginfo-2.40.4-slfo.1.1_1.1 * util-linux-2.40.4-slfo.1.1_1.1 * util-linux-systemd-2.40.4-slfo.1.1_1.1 * util-linux-systemd-debuginfo-2.40.4-slfo.1.1_1.1 * libfdisk1-2.40.4-slfo.1.1_1.1 * libsmartcols1-debuginfo-2.40.4-slfo.1.1_1.1 * util-linux-debugsource-2.40.4-slfo.1.1_1.1 * liblastlog2-2-2.40.4-slfo.1.1_1.1 * libblkid1-2.40.4-slfo.1.1_1.1 * libfdisk1-debuginfo-2.40.4-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28085.html * https://bugzilla.suse.com/show_bug.cgi?id=1159034 * https://bugzilla.suse.com/show_bug.cgi?id=1194818 * https://bugzilla.suse.com/show_bug.cgi?id=1218609 * https://bugzilla.suse.com/show_bug.cgi?id=1220117 * https://bugzilla.suse.com/show_bug.cgi?id=1221831 * https://bugzilla.suse.com/show_bug.cgi?id=1223605 * https://bugzilla.suse.com/show_bug.cgi?id=1224285 * https://bugzilla.suse.com/show_bug.cgi?id=1225197 * https://bugzilla.suse.com/show_bug.cgi?id=1225598 * https://bugzilla.suse.com/show_bug.cgi?id=1229476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:35 -0000 Subject: SUSE-SU-2025:20303-1: moderate: Security update for krb5 Message-ID: <174902187598.12703.12461658439211304522@smelt2.prg2.suse.org> # Security update for krb5 Announcement ID: SUSE-SU-2025:20303-1 Release Date: 2025-05-08T12:24:20Z Rating: moderate References: * bsc#1236619 Cross-References: * CVE-2025-24528 CVSS scores: * CVE-2025-24528 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-24528 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2025-24528: Prevent overflow when calculating ulog block size. An authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash; ((bsc#1236619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-94=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * krb5-debugsource-1.21.3-slfo.1.1_2.1 * krb5-debuginfo-1.21.3-slfo.1.1_2.1 * krb5-1.21.3-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24528.html * https://bugzilla.suse.com/show_bug.cgi?id=1236619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:38 -0000 Subject: SUSE-RU-2025:20302-1: moderate: Recommended update for findutils Message-ID: <174902187822.12703.13480746476679371699@smelt2.prg2.suse.org> # Recommended update for findutils Announcement ID: SUSE-RU-2025:20302-1 Release Date: 2025-05-08T06:35:42Z Rating: moderate References: * bsc#1231472 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for findutils fixes the following issues: * do not crash when file system loop was encountered (bsc#1231472) * added patches fix https://git.savannah.gnu.org/cgit/findutils.git/commit/?id=e5d6eb919b9 * modified patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-92=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * findutils-debugsource-4.9.0-slfo.1.1_2.1 * findutils-4.9.0-slfo.1.1_2.1 * findutils-debuginfo-4.9.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:42 -0000 Subject: SUSE-RU-2025:20301-1: moderate: Recommended update for gettext-runtime Message-ID: <174902188221.12703.5587191642183277954@smelt2.prg2.suse.org> # Recommended update for gettext-runtime Announcement ID: SUSE-RU-2025:20301-1 Release Date: 2025-05-07T07:09:03Z Rating: moderate References: * bsc#1227316 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for gettext-runtime fixes the following issues: * Fixed handling of po files with malformed header (bsc#1227316) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-91=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libtextstyle0-0.21.1-slfo.1.1_2.1 * libtextstyle0-debuginfo-0.21.1-slfo.1.1_2.1 * gettext-runtime-debuginfo-0.21.1-slfo.1.1_2.1 * gettext-runtime-debugsource-0.21.1-slfo.1.1_2.1 * gettext-runtime-0.21.1-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:43 -0000 Subject: SUSE-RU-2025:20300-1: moderate: Recommended update for ignition Message-ID: <174902188356.12703.15571592871914625207@smelt2.prg2.suse.org> # Recommended update for ignition Announcement ID: SUSE-RU-2025:20300-1 Release Date: 2025-05-06T12:01:39Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for ignition fixes the following issues: * Drop "go clean" from the upstream build script: since we build in clean environments, we don't have caches. Additionally, the way it is used does not even work and reports: go: clean -cache cannot be used with package arguments The error was masked until GO 1.23, as the test wether go supported caching was checking for go 1.23 formatted output. * Fix order of previous change - _first_ remount rw, _then_ create directory. * Apply (temporary) upstream patch from fedora-coreos-config for compatibility with systemd 256. * Update to version 2.19.0: * Support LUKS encryption using IBM CEX secure keys on s390x * providers: add "akamai" provider * Adding %check section * Build scripts are executable by themselves now, remove explicit Bash call * Update to version 2.18.0: * NEWS: update 2.18.0 * azure: retry HTTP requests on codes 404, 410, and 429 * docs: add missing scaleway link * providers: add scaleway * resource/url: customize local address (port) * stages/files: filter out non-existent paths before relabeling * docs/release-notes: tweak dracut module change * Bump minimum Go version to 1.20 * dracut: Don't include the ignition module by default * ci: cancel previous build on PR update * Sync repo templates; * Update build(deps) * Increased required Go version * module-setup.sh: Use $dracutsysrootdir ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-90=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * ignition-2.19.0-slfo.1.1_1.1 * ignition-debuginfo-2.19.0-slfo.1.1_1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:49 -0000 Subject: SUSE-SU-2025:20299-1: moderate: Security update for libX11 Message-ID: <174902188945.12703.12960666989008979223@smelt2.prg2.suse.org> # Security update for libX11 Announcement ID: SUSE-SU-2025:20299-1 Release Date: 2025-05-06T10:22:05Z Rating: moderate References: * bsc#1237431 Cross-References: * CVE-2025-26597 CVSS scores: * CVE-2025-26597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-26597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for libX11 fixes the following issues: * CVE-2025-26597: Fixed Buffer overflow in XkbChangeTypesOfKey() (bsc#1237431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-88=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libX11-xcb1-1.8.7-slfo.1.1_2.1 * libX11-xcb1-debuginfo-1.8.7-slfo.1.1_2.1 * libX11-debugsource-1.8.7-slfo.1.1_2.1 * libX11-6-debuginfo-1.8.7-slfo.1.1_2.1 * libX11-6-1.8.7-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (noarch) * libX11-data-1.8.7-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26597.html * https://bugzilla.suse.com/show_bug.cgi?id=1237431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:51 -0000 Subject: SUSE-RU-2025:20298-1: moderate: Recommended update for gtk3 Message-ID: <174902189152.12703.14640929320912462498@smelt2.prg2.suse.org> # Recommended update for gtk3 Announcement ID: SUSE-RU-2025:20298-1 Release Date: 2025-04-30T15:24:48Z Rating: moderate References: * bsc#1235791 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for gtk3 fixes the following issues: * Eliminate usage of update-alternatives: GTK2 no longer provides gtk-update- icon-cache, thus eliminating the need for this extra complexity. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-87=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * gtk3-data-3.24.43-slfo.1.1_2.1 * gtk3-schema-3.24.43-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * gtk3-tools-3.24.43-slfo.1.1_2.1 * libgtk-3-0-debuginfo-3.24.43-slfo.1.1_2.1 * libgtk-3-0-3.24.43-slfo.1.1_2.1 * gtk3-tools-debuginfo-3.24.43-slfo.1.1_2.1 * typelib-1_0-Gtk-3_0-3.24.43-slfo.1.1_2.1 * gtk3-debugsource-3.24.43-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235791 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:24:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:24:57 -0000 Subject: SUSE-SU-2025:20297-1: moderate: Security update for gnutls Message-ID: <174902189736.12703.17196705651658461485@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:20297-1 Release Date: 2025-04-29T10:18:53Z Rating: moderate References: * bsc#1236974 Cross-References: * CVE-2024-12243 CVSS scores: * CVE-2024-12243 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-12243 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-12243 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-12243: Fixed inefficient DER Decoding in libtasn1 which could lead to remote DoS (bsc#1236974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-86=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * gnutls-3.8.3-slfo.1.1_2.1 * libgnutls30-debuginfo-3.8.3-slfo.1.1_2.1 * gnutls-debuginfo-3.8.3-slfo.1.1_2.1 * libgnutls30-3.8.3-slfo.1.1_2.1 * gnutls-debugsource-3.8.3-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12243.html * https://bugzilla.suse.com/show_bug.cgi?id=1236974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:25:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:25:06 -0000 Subject: SUSE-RU-2025:20296-1: moderate: Recommended update 5.0.4 for Multi-Linux Manager Client Tools and Salt Bundle Message-ID: <174902190616.12703.7790829201430897908@smelt2.prg2.suse.org> # Recommended update 5.0.4 for Multi-Linux Manager Client Tools and Salt Bundle Announcement ID: SUSE-RU-2025:20296-1 Release Date: 2025-04-14T09:54:53Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1226964 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * bsc#1235658 * bsc#1235861 * jsc#MSQA-934 * jsc#PED-12480 * jsc#PED-12485 Affected Products: * SUSE Manager Client Tools for SUSE Linux Micro 6 An update that contains three features and has 10 fixes can now be installed. ## Description: This update for fixes the following issues: uyuni-tools: * Version 0.1.29-0 * Fixed label of proxy configuration files on SELinux (bsc#1235658) * Reverted use of :z flag on Server volumes (bsc#1235861) venv-salt-minion: * Fixed aptpkg 'NoneType object has no attribute split' error * Detect openEuler as RedHat family OS * Ensure the correct crypt module is loaded * Implement multiple inventory for ansible.targets * Made x509 module compatible with M2Crypto 0.44.0 * Removed deprecated code from x509.certificate_managed test mode * Move logrotate config to /usr/etc/logrotate.d where possible * Added DEB822 apt repository format support * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. * Fixed virt_query outputter and added support for block devices * Made _auth calls visible with master stats * Repaired mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Enhanced batch async and fixed some detected issues * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944) (bsc#1234881) (bsc#1220905) * Adapt to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Fixed issues running on Python 3.12 and 3.13 (bsc#1226964) golang-github-prometheus-node_exporter: * Implementation of `golang-github-prometheus-node_exporter` at version 1.9.0 (jsc#PED-12480, jsc#PED-12485) system-user-prometheus: * Implementation of `system-user-prometheus` at version 1.0.0 (jsc#PED-12480, jsc#PED-12485) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SUSE Linux Micro 6 zypper in -t patch SUSE-Manager-Tools-For-SL-Micro-6-285=1 ## Package List: * SUSE Manager Client Tools for SUSE Linux Micro 6 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-5.1 * golang-github-prometheus-node_exporter-debuginfo-1.9.0-1.1 * golang-github-prometheus-node_exporter-1.9.0-1.1 * mgrctl-0.1.29-1.1 * mgrctl-debuginfo-0.1.29-1.1 * SUSE Manager Client Tools for SUSE Linux Micro 6 (noarch) * mgrctl-bash-completion-0.1.29-1.1 * mgrctl-zsh-completion-0.1.29-1.1 * mgrctl-lang-0.1.29-1.1 * system-user-prometheus-1.0.0-2.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226964 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://bugzilla.suse.com/show_bug.cgi?id=1235658 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://jira.suse.com/browse/MSQA-934 * https://jira.suse.com/browse/PED-12480 * https://jira.suse.com/browse/PED-12485 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:25:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:25:23 -0000 Subject: SUSE-SU-2025:20295-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <174902192336.12703.4052986455582881089@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2025:20295-1 Release Date: 2025-02-13T08:38:11Z Rating: moderate References: * bsc#1228182 * bsc#1228690 * bsc#1229079 * bsc#1229104 * bsc#1231497 * bsc#1231568 * bsc#1231618 * bsc#1231759 * bsc#1232575 * bsc#1232769 * bsc#1232817 * bsc#1233202 * bsc#1233279 * bsc#1233630 * bsc#1233660 * bsc#1233667 * bsc#1234123 * jsc#MSQA-914 Cross-References: * CVE-2024-22037 CVSS scores: * CVE-2024-22037 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L * CVE-2024-22037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-22037 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-22037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for SUSE Linux Micro 6 An update that solves one vulnerability, contains one feature and has 16 fixes can now be installed. ## Description: This update fixes the following issues: salt: * Revert setting SELinux context for minion service (bsc#1233667) * Removed System V init support * Fix the condition of alternatives for Tumbleweed and Leap 16 * Build all python bindings for all flavors * Make minion reconnecting on changing master IP (bsc#1228182) * Handle logger exception when flushing already closed file * Include passlib as a recommended dependency * Make Salt Bundle more tolerant to long running jobs (bsc#1228690) uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0: * Security issues fixed: * CVE-2024-22037: Use podman secret to store the database credentials (bsc#1231497) * Other changes and bugs fixed: * Version 0.1.27-0 * Bump the default image tag to 5.0.3 * IsInstalled function fix * Run systemctl daemon-reload after changing the container image config (bsc#1233279) * Coco-replicas-upgrade * Persist search server indexes (bsc#1231759) * Sync deletes files during migration (bsc#1233660) * Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079) * Add --registry back to mgrpxy (bsc#1233202) * Only add java.hostname on migrated server if not present * Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104) * Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630) * Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123) * Version 0.1.26-0 * Ignore all zypper caches during migration (bsc#1232769) * Use the uyuni network for all podman containers (bsc#1232817) * Version 0.1.25-0 * Don't migrate enabled systemd services, recreate them (bsc#1232575) * Version 0.1.24-0 * Redact JSESSIONID and pxt-session-cookie values from logs and console output (bsc#1231568) venv-salt-minion: * Included D-Bus python module for SUSE distros (bsc#1231618) * Reverted setting SELinux context for minion service (bsc#1233667) * Make minion reconnecting on changing master IP (bsc#1228182) * Fixed post_start_cleanup.sh shebang to work on all systems * Handle logger exception when flushing already closed file * Made Salt Bundle more tolerant to long running jobs (bsc#1228690) * Modified: * include-rpm * filter-requires.sh ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SUSE Linux Micro 6 zypper in -t patch SUSE-Manager-Tools-For-SL-Micro-6-211=1 ## Package List: * SUSE Manager Client Tools for SUSE Linux Micro 6 (aarch64 ppc64le s390x x86_64) * mgrctl-debuginfo-0.1.28-1.1 * venv-salt-minion-3006.0-4.1 * mgrctl-0.1.28-1.1 * SUSE Manager Client Tools for SUSE Linux Micro 6 (noarch) * mgrctl-bash-completion-0.1.28-1.1 * mgrctl-zsh-completion-0.1.28-1.1 * mgrctl-lang-0.1.28-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22037.html * https://bugzilla.suse.com/show_bug.cgi?id=1228182 * https://bugzilla.suse.com/show_bug.cgi?id=1228690 * https://bugzilla.suse.com/show_bug.cgi?id=1229079 * https://bugzilla.suse.com/show_bug.cgi?id=1229104 * https://bugzilla.suse.com/show_bug.cgi?id=1231497 * https://bugzilla.suse.com/show_bug.cgi?id=1231568 * https://bugzilla.suse.com/show_bug.cgi?id=1231618 * https://bugzilla.suse.com/show_bug.cgi?id=1231759 * https://bugzilla.suse.com/show_bug.cgi?id=1232575 * https://bugzilla.suse.com/show_bug.cgi?id=1232769 * https://bugzilla.suse.com/show_bug.cgi?id=1232817 * https://bugzilla.suse.com/show_bug.cgi?id=1233202 * https://bugzilla.suse.com/show_bug.cgi?id=1233279 * https://bugzilla.suse.com/show_bug.cgi?id=1233630 * https://bugzilla.suse.com/show_bug.cgi?id=1233660 * https://bugzilla.suse.com/show_bug.cgi?id=1233667 * https://bugzilla.suse.com/show_bug.cgi?id=1234123 * https://jira.suse.com/browse/MSQA-914 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:25:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:25:44 -0000 Subject: SUSE-SU-2025:20294-1: important: Security update for SUSE Manager Client Tools and Salt Bundle Message-ID: <174902194490.12703.7754114120350663715@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools and Salt Bundle Announcement ID: SUSE-SU-2025:20294-1 Release Date: 2025-02-03T09:00:53Z Rating: important References: * bsc#1219041 * bsc#1220357 * bsc#1222842 * bsc#1226141 * bsc#1226447 * bsc#1226448 * bsc#1226469 * bsc#1227547 * bsc#1228105 * bsc#1228780 * bsc#1229109 * bsc#1229539 * bsc#1229654 * bsc#1229704 * bsc#1229873 * bsc#1229994 * bsc#1229995 * bsc#1229996 * bsc#1230058 * bsc#1230059 * bsc#1230322 * jsc#MSQA-863 Cross-References: * CVE-2024-0397 * CVE-2024-3651 * CVE-2024-37891 * CVE-2024-4032 * CVE-2024-5569 * CVE-2024-6345 * CVE-2024-6923 * CVE-2024-7592 * CVE-2024-8088 CVSS scores: * CVE-2024-0397 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0397 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-3651 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3651 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37891 ( SUSE ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-5569 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6345 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-6923 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Manager Client Tools for SUSE Linux Micro 6 An update that solves nine vulnerabilities, contains one feature and has 12 fixes can now be installed. ## Description: This update for SUSE Manager Client Tools and Salt Bundle the following issues: uyuni-tools: venv-salt-minion: * Security fixes on Python 3.11 interpreter: * CVE-2024-7592: Fixed quadratic complexity in parsing -quoted cookie values with backslashes (bsc#1229873, bsc#1230059) * CVE-2024-8088: Prevent malformed payload to cause infinite loops in zipfile.Path (bsc#1229704, bsc#1230058) * CVE-2024-6923: Prevent email header injection due to unquoted newlines (bsc#1228780) * CVE-2024-4032: Rearranging definition of private global IP addresses (bsc#1226448) * CVE-2024-0397: ssl.SSLContext.cert_store_stats() and ssl.SSLContext.get_ca_certs() now correctly lock access to the certificate store, when the ssl.SSLContext is shared across multiple threads (bsc#1226447) * Security fixes on Python dependencies: * CVE-2024-5569: zipp: Fixed a Denial of Service (DoS) vulnerability in the jaraco/zipp library (bsc#1227547, bsc#1229996) * CVE-2024-6345: setuptools: Sanitize any VCS URL used for download (bsc#1228105, bsc#1229995) * CVE-2024-3651: idna: Fix a potential DoS via resource consumption via specially crafted inputs to idna.encode() (bsc#1222842, bsc#1229994) * CVE-2024-37891: urllib3: Added the `Proxy-Authorization` header to the list of headers to strip from requests when redirecting to a different host (bsc#1226469, bsc#1229654) * Other bugs fixed: * Fixed failing x509 tests with OpenSSL < 1.1 * Avoid explicit reading of /etc/salt/minion (bsc#1220357) * Allow NamedLoaderContexts to be returned from loader * Reverted the change making reactor less blocking (bsc#1230322) * Use --cachedir for extension_modules in salt-call (bsc#1226141) * Prevent using SyncWrapper with no reason * Enable post_start_cleanup.sh to work in a transaction * Fixed the SELinux context for Salt Minion service (bsc#1219041) * Increase warn_until_date date for code we still support * Avoid crash on wrong output of systemctl version (bsc#1229539) * Improved error handling with different OpenSSL versions * Fixed cloud Minion configuration for multiple Masters (bsc#1229109) * Use Pygit2 id instead of deprecated oid in gitfs * Added passlib Python module to the bundle ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SUSE Linux Micro 6 zypper in -t patch SUSE-Manager-Tools-For-SL-Micro-6-69=1 ## Package List: * SUSE Manager Client Tools for SUSE Linux Micro 6 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-3.1 * mgrctl-0.1.23-2.1 * mgrctl-debuginfo-0.1.23-2.1 * SUSE Manager Client Tools for SUSE Linux Micro 6 (noarch) * mgrctl-lang-0.1.23-2.1 * mgrctl-zsh-completion-0.1.23-2.1 * mgrctl-bash-completion-0.1.23-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0397.html * https://www.suse.com/security/cve/CVE-2024-3651.html * https://www.suse.com/security/cve/CVE-2024-37891.html * https://www.suse.com/security/cve/CVE-2024-4032.html * https://www.suse.com/security/cve/CVE-2024-5569.html * https://www.suse.com/security/cve/CVE-2024-6345.html * https://www.suse.com/security/cve/CVE-2024-6923.html * https://www.suse.com/security/cve/CVE-2024-7592.html * https://www.suse.com/security/cve/CVE-2024-8088.html * https://bugzilla.suse.com/show_bug.cgi?id=1219041 * https://bugzilla.suse.com/show_bug.cgi?id=1220357 * https://bugzilla.suse.com/show_bug.cgi?id=1222842 * https://bugzilla.suse.com/show_bug.cgi?id=1226141 * https://bugzilla.suse.com/show_bug.cgi?id=1226447 * https://bugzilla.suse.com/show_bug.cgi?id=1226448 * https://bugzilla.suse.com/show_bug.cgi?id=1226469 * https://bugzilla.suse.com/show_bug.cgi?id=1227547 * https://bugzilla.suse.com/show_bug.cgi?id=1228105 * https://bugzilla.suse.com/show_bug.cgi?id=1228780 * https://bugzilla.suse.com/show_bug.cgi?id=1229109 * https://bugzilla.suse.com/show_bug.cgi?id=1229539 * https://bugzilla.suse.com/show_bug.cgi?id=1229654 * https://bugzilla.suse.com/show_bug.cgi?id=1229704 * https://bugzilla.suse.com/show_bug.cgi?id=1229873 * https://bugzilla.suse.com/show_bug.cgi?id=1229994 * https://bugzilla.suse.com/show_bug.cgi?id=1229995 * https://bugzilla.suse.com/show_bug.cgi?id=1229996 * https://bugzilla.suse.com/show_bug.cgi?id=1230058 * https://bugzilla.suse.com/show_bug.cgi?id=1230059 * https://bugzilla.suse.com/show_bug.cgi?id=1230322 * https://jira.suse.com/browse/MSQA-863 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:07 -0000 Subject: SUSE-RU-2025:20293-1: moderate: Recommended update for uyuni-tools, venv-salt-minion, saltbundlepy-pyopenssl, saltbundlepy-cryptography Message-ID: <174902196761.12703.10950483231927555859@smelt2.prg2.suse.org> # Recommended update for uyuni-tools, venv-salt-minion, saltbundlepy-pyopenssl, saltbundlepy-cryptography Announcement ID: SUSE-RU-2025:20293-1 Release Date: 2025-02-03T08:49:56Z Rating: moderate References: * bsc#1220136 * bsc#1222684 * bsc#1224349 * bsc#1225349 * bsc#1226191 * bsc#1226284 * bsc#1226437 * bsc#1226759 * bsc#1226793 * bsc#1226847 * bsc#1226914 * bsc#1227195 * bsc#1227244 * bsc#1227245 * bsc#1227505 * bsc#1227584 * bsc#1227586 * bsc#1227588 * bsc#1227718 * bsc#1227951 * bsc#1228026 * bsc#1228183 Affected Products: * SUSE Manager Client Tools for SUSE Linux Micro 6 An update that has 22 fixes can now be installed. ## Description: This update for uyuni-tools, venv-salt-minion, saltbundlepy-pyopenssl, saltbundlepy-cryptography fixes the following issues: saltbundlepy-cryptography: \- Apply fips-mode.patch and definitions- ERR_GET.patch on Ubuntu 24.04 and fix the condition in advance for future products saltbundlepy-pyopenssl: \- Make the module compatible with older OpenSSL versions not having `X509_CRL_set1_lastUpdate` and `X509_CRL_set1_nextUpdate` defined by using `X509_CRL_set_lastUpdate` and `X509_CRL_set_nextUpdate` instead. uyuni-tools: \- version 0.1.21-0 * mgrpxy: Fix typo on Systemd template \- version 0.1.20-0 * Update the push tag to 5.0.1 * mgrpxy: expose port on IPv6 network (bsc#1227951) \- version 0.1.19-0 * Skip updating Tomcat remote debug if conf file is not present \- version 0.1.18-0 * Setup Confidential Computing container during migration (bsc#1227588) * Add the /etc/uyuni/uyuni-tools.yaml path to the config help * Split systemd config files to not loose configuration at upgrade (bsc#1227718) * Use the same logic for image computation in mgradm and mgrpxy (bsc#1228026) * Allow building with different Helm and container default registry paths (bsc#1226191) * Fix recursion in mgradm upgrade podman list --help * Setup hub xmlrpc API service in migration to Podman (bsc#1227588) * Setup disabled hub xmlrpc API service in all cases (bsc#1227584) * Clean the inspection code to make it faster * Properly detect IPv6 enabled on Podman network (bsc#1224349) * Fix the log file path generation * Write scripts output to uyuni-tools.log file * Add uyuni-hubxml-rpc to the list of values in mgradm scale --help * Use path in mgradm support sql file input (bsc#1227505) * On Ubuntu build with go1.21 instead of go1.20 * Enforce Cobbler setup (bsc#1226847) * Expose port on IPv6 network (bsc#1227951) * show output of podman image search --list-tags command * Implement mgrpxy support config command * During migration, ignore /etc/sysconfig/tomcat and /etc/tomcat/tomcat.conf (bsc#1228183) * During migration, remove java.annotation,com.sun.xml.bind and UseConcMarkSweepGC settings * Disable node exporter port for Kubernetes * Fix start, stop and restart in Kubernetes * Increase start timeout in Kubernetes * Fix traefik query * Fix password entry usability (bsc#1226437) * Add --prepare option to migrate command * Fix random error during installation of CA certificate (bsc#1227245) * Clarify and fix distro name guessing when not provided (bsc#1226284) * Replace not working Fatal error by plain error return (bsc#1220136) * Allow server installation with preexisting storage volumes * Do not report error when purging mounted volume (bsc#1225349) * Preserve PAGER settings from the host for interactive sql usage (bsc#1226914) * Add mgrpxy command to clear the Squid cache * Use local images for Confidential Computing and Hub containers (bsc#1227586) \- version 0.1.17-0 * Allow GPG files to be loaded from the local file (bsc#1227195) \- version 0.1.16-0 * Prefer local images in all migration steps (bsc#1227244) \- version 0.1.15-0 * Define --registry flag behaviour (bsc#1226793) \- version 0.1.14-0 * Do not rely on hardcoded registry, remove any FQDN \- version 0.1.13-0 * Fix mgradm support config tarball creation (bsc#1226759) \- version 0.1.12-0 * Detection of k8s on Proxy was wrongly influenced by Server setting venv-salt-minion: \- Fix rich rule comparison in firewalld module (bsc#1222684) \- test_vultrpy: adjust test expectation to prevent failure after Debian 10 EOL \- Make auth.pam more robust with Salt Bundle and fix tests \- Fix performance of user.list_groups with many remote groups \- Fix "status.diskusage" function and exclude some tests for Salt Bundle ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SUSE Linux Micro 6 zypper in -t patch SUSE-Manager-Tools-For-SL-Micro-6-41=1 ## Package List: * SUSE Manager Client Tools for SUSE Linux Micro 6 (aarch64 ppc64le s390x x86_64) * mgrctl-0.1.21-1.1 * mgrctl-debuginfo-0.1.21-1.1 * venv-salt-minion-3006.0-2.1 * SUSE Manager Client Tools for SUSE Linux Micro 6 (noarch) * mgrctl-bash-completion-0.1.21-1.1 * mgrctl-lang-0.1.21-1.1 * mgrctl-zsh-completion-0.1.21-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220136 * https://bugzilla.suse.com/show_bug.cgi?id=1222684 * https://bugzilla.suse.com/show_bug.cgi?id=1224349 * https://bugzilla.suse.com/show_bug.cgi?id=1225349 * https://bugzilla.suse.com/show_bug.cgi?id=1226191 * https://bugzilla.suse.com/show_bug.cgi?id=1226284 * https://bugzilla.suse.com/show_bug.cgi?id=1226437 * https://bugzilla.suse.com/show_bug.cgi?id=1226759 * https://bugzilla.suse.com/show_bug.cgi?id=1226793 * https://bugzilla.suse.com/show_bug.cgi?id=1226847 * https://bugzilla.suse.com/show_bug.cgi?id=1226914 * https://bugzilla.suse.com/show_bug.cgi?id=1227195 * https://bugzilla.suse.com/show_bug.cgi?id=1227244 * https://bugzilla.suse.com/show_bug.cgi?id=1227245 * https://bugzilla.suse.com/show_bug.cgi?id=1227505 * https://bugzilla.suse.com/show_bug.cgi?id=1227584 * https://bugzilla.suse.com/show_bug.cgi?id=1227586 * https://bugzilla.suse.com/show_bug.cgi?id=1227588 * https://bugzilla.suse.com/show_bug.cgi?id=1227718 * https://bugzilla.suse.com/show_bug.cgi?id=1227951 * https://bugzilla.suse.com/show_bug.cgi?id=1228026 * https://bugzilla.suse.com/show_bug.cgi?id=1228183 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:10 -0000 Subject: SUSE-RU-2025:20292-1: critical: Recommended update for SUSE Manager Client Tools Message-ID: <174902197060.12703.4160742035873859504@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2025:20292-1 Release Date: 2025-02-03T08:45:47Z Rating: critical References: * bsc#1224081 * bsc#1226436 * jsc#MSQA-812 * jsc#PED-7843 Affected Products: * SUSE Manager Client Tools for SUSE Linux Micro 6 An update that contains two features and has two fixes can now be installed. ## Description: This update for fixes the following issues: uyuni-tools: * Version 0.1.11-0 * Require Netavark network backend for Podman (bsc#1224081) * Fix --registry option (bsc#1226436) * Copy the server CA certificate to the host * Delete /etc/uyuni/proxy folder during mgrpxy uninstall * Check permissions of /etc/uyuni folder to prevent Squid failures * Correctly prepend default namespace for mgrpxy containers * Re-add Podman extra args for install and migrate * Version 0.1.10-0 * Provide mgrctl to SUSE Linux Enterprise 15 client tools (jsc#PED-7843) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SUSE Linux Micro 6 zypper in -t patch SUSE-Manager-Tools-For-SL-Micro-6-6=1 ## Package List: * SUSE Manager Client Tools for SUSE Linux Micro 6 (aarch64 ppc64le s390x x86_64) * mgrctl-0.1.11-1.1 * mgrctl-debuginfo-0.1.11-1.1 * SUSE Manager Client Tools for SUSE Linux Micro 6 (noarch) * mgrctl-zsh-completion-0.1.11-1.1 * mgrctl-lang-0.1.11-1.1 * mgrctl-bash-completion-0.1.11-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224081 * https://bugzilla.suse.com/show_bug.cgi?id=1226436 * https://jira.suse.com/browse/MSQA-812 * https://jira.suse.com/browse/PED-7843 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:14 -0000 Subject: SUSE-RU-2025:20291-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <174902197431.12703.6144058256660333500@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2025:20291-1 Release Date: 2025-02-03T08:45:46Z Rating: moderate References: * bsc#1216063 * jsc#MSQA-808 Affected Products: * SUSE Manager Client Tools for SUSE Linux Micro 6 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Add a timer to delete old env post update for venv-minion * Several fixes for tests to avoid errors and failures in some OSes * Speed up salt.matcher.confirm_top by using **context** * Do not call the async wrapper calls with the separate thread * Prevent OOM with high amount of batch async calls (bsc#1216063) * Add missing contextvars dependency in salt.version * Skip tests for unsupported algorithm on old OpenSSL version * Remove redundant `_file_find` call to the master * Prevent possible exception in tornado.concurrent.Future._set_done * Make reactor engine less blocking the EventPublisher * Make salt-master self recoverable on killing EventPublisher * Improve broken events catching and reporting * Make logging calls lighter * Remove unused import causing delays on starting salt-master * Include libffi and libyaml to the bundle for all of the clients to avoid extra dependencies from the client OS. * Update Python version from 3.10 to 3.11 * Fix updating the venv-salt-minion pkg with itself * Enable build for SLE 11 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SUSE Linux Micro 6 zypper in -t patch SUSE-Manager-Tools-For-SL-Micro-6-5=1 ## Package List: * SUSE Manager Client Tools for SUSE Linux Micro 6 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216063 * https://jira.suse.com/browse/MSQA-808 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:16 -0000 Subject: SUSE-SU-2025:20290-1: moderate: Security update for iperf Message-ID: <174902197688.12703.12959226020095615807@smelt2.prg2.suse.org> # Security update for iperf Announcement ID: SUSE-SU-2025:20290-1 Release Date: 2025-04-22T13:46:21Z Rating: moderate References: * bsc#1234705 Cross-References: * CVE-2024-53580 CVSS scores: * CVE-2024-53580 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53580 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro Extras 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for iperf fixes the following issues: * CVE-2024-53580: Fixed segmentation violation via the iperf_exchange_parameters() function (bsc#1234705). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-78=1 ## Package List: * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * iperf-debuginfo-3.17.1-slfo.1.1_2.1 * iperf-debugsource-3.17.1-slfo.1.1_2.1 * iperf-3.17.1-slfo.1.1_2.1 * libiperf0-debuginfo-3.17.1-slfo.1.1_2.1 * libiperf0-3.17.1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53580.html * https://bugzilla.suse.com/show_bug.cgi?id=1234705 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:19 -0000 Subject: SUSE-SU-2025:20289-1: moderate: Security update for iperf Message-ID: <174902197915.12703.2740858828663333322@smelt2.prg2.suse.org> # Security update for iperf Announcement ID: SUSE-SU-2025:20289-1 Release Date: 2025-04-22T14:08:15Z Rating: moderate References: * bsc#1234705 Cross-References: * CVE-2024-53580 CVSS scores: * CVE-2024-53580 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53580 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for iperf fixes the following issues: Update to 3.18 (bsc#1234705, CVE-2024-53580): * SECURITY NOTE: Thanks to Leonid Krolle Bi.Zone for discovering a JSON type security vulnerability that caused a segmentation fault in the server. (CVE-2024-53580) This has now been fixed. (PR#1810) * UDP packets per second now reports the correct number of packets, by reporting NET_SOFTERROR if there's a EAGAIN/EINTR errno if no data was sent (#1367/PR#1379). * Several segmentation faults related to threading were fixed. One where `pthread_cancel` was called on an improperly initialized thread (#1801), another where threads were being recycled (#1760/PR#1761), and another where threads were improperly handling signals (#1750/PR#1752). * A segmentation fault from calling `freeaddrinfo` with `NULL` was fixed (PR#1755). * Some JSON options were fixed, including checking the size for `json_read` (PR#1709), but the size limit was removed for received server output (PR#1779). * A rcv-timeout error has been fixed. The Nread timeout was hardcoded and timed out before the `--rcv-timeout` option * There is no longer a limit on the omit time period * Fixed an output crash under 32-bit big-endian systems * An issue was fixed where CPU utilization was unexpectedly high during limited baud rate tests. The `--pacing-timer` option was removed, but it is still available in the library * Add SCTP information to `--json` output and fixed compile error when SCTP is not supported (#1731). * `--fq-rate` was changed from a uint to a uint64 to allow pacing above 32G. Not yet tested on big-endian systems * Build with OpenSSL for key based authentication support ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-296=1 ## Package List: * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * iperf-3.18-1.1 * iperf-debugsource-3.18-1.1 * libiperf0-debuginfo-3.18-1.1 * iperf-debuginfo-3.18-1.1 * libiperf0-3.18-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53580.html * https://bugzilla.suse.com/show_bug.cgi?id=1234705 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:23 -0000 Subject: SUSE-SU-2025:20288-1: moderate: Security update for iperf Message-ID: <174902198340.12703.5747285449394179733@smelt2.prg2.suse.org> # Security update for iperf Announcement ID: SUSE-SU-2025:20288-1 Release Date: 2025-02-03T09:04:33Z Rating: moderate References: * bsc#1224262 Cross-References: * CVE-2024-26306 CVSS scores: * CVE-2024-26306 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26306 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for iperf fixes the following issues: * update to 3.17.1 (bsc#1224262, CVE-2024-26306): * BREAKING CHANGE: iperf3's authentication features, when used with OpenSSL prior to 3.2.0, contain a vulnerability to a side-channel timing attack. To address this flaw, a change has been made to the padding applied to encrypted strings. This change is not backwards compatible with older versions of iperf3 (before 3.17). To restore the older (vulnerable) behavior, and hence backwards-compatibility, use the --use-pkcs1-padding flag. The iperf3 team thanks Hubert Kario from RedHat for reporting this issue and providing feedback on the fix. (CVE-2024-26306)(PR#1695) * iperf3 no longer changes its current working directory in --daemon mode. This results in more predictable behavior with relative paths, in particular finding key and credential files for authentication. (PR#1672) * A new --json-stream option has been added to enable a streaming output format, consisting of a series of JSON objects (for the start of the test, each measurement interval, and the end of the test) separated by newlines (#444, #923, #1098). * UDP tests now work correctly between different endian hosts * The --fq-rate parameter now works for --reverse tests * The statistics reporting interval is now available in the --json start test object (#1663). * A negative time test duration is now properly flagged as an error (IS#1662 / PR#1666). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-92=1 ## Package List: * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * libiperf0-debuginfo-3.17.1-1.1 * iperf-3.17.1-1.1 * iperf-debugsource-3.17.1-1.1 * iperf-debuginfo-3.17.1-1.1 * libiperf0-3.17.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26306.html * https://bugzilla.suse.com/show_bug.cgi?id=1224262 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:25 -0000 Subject: SUSE-RU-2025:20287-1: moderate: Recommended update for python-docutils Message-ID: <174902198553.12703.15951770173453608870@smelt2.prg2.suse.org> # Recommended update for python-docutils Announcement ID: SUSE-RU-2025:20287-1 Release Date: 2025-04-22T13:29:22Z Rating: moderate References: * bsc#1235783 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-docutils fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235783). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-59=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-docutils-0.19-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:30 -0000 Subject: SUSE-SU-2025:20286-1: important: Security update for ucode-intel Message-ID: <174902199018.12703.17749799477970784493@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20286-1 Release Date: 2025-03-28T13:56:24Z Rating: important References: * bsc#1233313 * bsc#1237096 Cross-References: * CVE-2024-21820 * CVE-2024-21853 * CVE-2024-23918 * CVE-2024-23984 * CVE-2024-24968 * CVE-2024-31068 * CVE-2024-36293 * CVE-2024-37020 * CVE-2024-39355 CVSS scores: * CVE-2024-21820 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N * CVE-2024-21820 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2024-21820 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-21820 ( NVD ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2024-21853 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21853 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-21853 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23918 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-23918 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-23918 ( NVD ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23918 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-23984 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-23984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-23984 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23984 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-24968 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-24968 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-24968 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-24968 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-31068 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-31068 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-31068 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31068 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36293 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-36293 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-37020 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-37020 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-39355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39355 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-39355 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-39355 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves nine vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20250211 release (bsc#1237096) * Security updates for INTEL-SA-01166 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01166.html * CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware Logic for some Intel Processors may allow privileged user to potentially enable denial of service via local access. * Security updates for INTEL-SA-01213 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01213.html * CVE-2024-36293: A potential security vulnerability in some Intel Software Guard Extensions (Intel SGX) Platforms may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01139 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01139.html * not clear which CVEs are fixed here, and which are in UEFI BIOS updates. * Security updates for INTEL-SA-01228 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01228.html * CVE-2024-39355: A potential security vulnerability in some 13th and 14th Generation Intel Core Processors may allow denial of service. Intel is releasing microcode and UEFI reference code updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01194 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01194.html * CVE-2024-37020: A potential security vulnerability in the Intel Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors may allow denial of service. Intel is releasing software updates to mitigate this potential vulnerability. * Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details. * Refer to 13th/14th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details. * Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details. * Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details. * Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details. * Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details. * Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details. * Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details. * Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details. * Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details. * Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details. * Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details ### New Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products SRF-SP C0 06-af-03/01 03000330 Xeon 6700-Series Processors ### Updated Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000037 00000038 Core Gen12 ADL H0 06-97-05/07 00000037 00000038 Core Gen12 ADL L0 06-9a-03/80 00000435 00000436 Core Gen12 ADL R0 06-9a-04/80 00000435 00000436 Core Gen12 ADL-N N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E AZB A0/R0 06-9a-04/40 00000007 00000009 Intel(R) Atom(R) C1100 CFL-H R0 06-9e-0d/22 00000100 00000102 Core Gen9 Mobile CFL-H/S/E3 U0 06-9e-0a/22 000000f8 000000fa Core Gen8 Desktop, Mobile, Xeon E EMR-SP A0 06-cf-01/87 21000283 21000291 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000283 21000291 Xeon Scalable Gen5 ICL-D B0 06-6c-01/10 010002b0 010002c0 Xeon D-17xx, D-27xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 0d0003f5 Xeon Scalable Gen3 RPL-E/HX/S B0 06-b7-01/32 0000012b 0000012c Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004123 00004124 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000037 00000038 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004123 00004124 Core Gen13 RPL-S H0 06-bf-05/07 00000037 00000038 Core Gen13/Gen14 RKL-S B0 06-a7-01/02 00000062 00000063 Core Gen11 SPR-HBM Bx 06-8f-08/10 2c000390 2c0003e0 Xeon Max SPR-SP E4/S2 06-8f-07/87 2b000603 2b000620 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b000603 2b000620 Xeon Scalable Gen4 TWL N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E ### New Disclosures Updated in Prior Releases Processor Stepping F-M-S/PI Old Ver New Ver Products CFL-H/S P0 06-9e-0c/22 000000f6 000000f8 Core Gen9 * Intel CPU Microcode was updated to the 20241112 release (bsc#1233313) * CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel Xeon Processors may allow an authorized user to potentially enable denial of service via local access. Security updates for INTEL-SA-01101 * CVE-2024-23918: Improper conditions check in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. Security updates for INTEL-SA-01079 * CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. Security updates for INTEL-SA-01079 * CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access. Updated security updates for INTEL- SA-01097 * CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access Updated security updates for INTEL-SA-01103 * Update for functional issues. * Refer to Intel Core Ultra Processor for details. * Refer to 14th/13th Generation Intel Core Processor Specification Update for details. * Refer to 12th Generation Intel Core Processor Family for details. * Refer to 5th Gen Intel Xeon Scalable Processors Specification Update for details. * Refer to 4th Gen Intel Xeon Scalable Processors Specification Update for details. * Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update for details. * Refer to Intel Xeon D-2700 Processor Specification Update for details. * Refer to Intel Xeon D-1700 and D-1800 Processor Family Specification Update for details New Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000036 00000037 Core Gen12 ADL H0 06-97-05/07 00000036 00000037 Core Gen12 ADL L0 06-9a-03/80 00000434 00000435 Core Gen12 ADL R0 06-9a-04/80 00000434 00000435 Core Gen12 EMR-SP A0 06-cf-01/87 21000230 21000283 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000230 21000283 Xeon Scalable Gen5 MTL C0 06-aa-04/e6 0000001f 00000020 Core? Ultra Processor RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004122 00004123 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000036 00000037 Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000036 00000037 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004122 00004123 Core Gen13 SPR-SP E3 06-8f-06/87 2b0005c0 2b000603 Xeon Scalable Gen4 SPR-SP E4/S2 06-8f-07/87 2b0005c0 2b000603 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b0005c0 2b000603 Xeon Scalable Gen4 New Disclosures Updated in Prior Releases: Processor Stepping F-M-S/PI Old Ver New Ver Products ICL-D B0 06-6c-01/10 010002b0 N/A Xeon D-17xx/D-18xx, D-27xx/D-28xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 N/A Xeon Scalable Gen3 * Intel CPU Microcode was updated to the 20241029 release Update for functional issues. Refer to 14th/13th Generation Intel Core Processor Specification Update for details. Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products RPL-E/HX/S B0 06-b7-01/32 00000129 0000012b Core Gen13/Gen14 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-26=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * ucode-intel-20250211-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21820.html * https://www.suse.com/security/cve/CVE-2024-21853.html * https://www.suse.com/security/cve/CVE-2024-23918.html * https://www.suse.com/security/cve/CVE-2024-23984.html * https://www.suse.com/security/cve/CVE-2024-24968.html * https://www.suse.com/security/cve/CVE-2024-31068.html * https://www.suse.com/security/cve/CVE-2024-36293.html * https://www.suse.com/security/cve/CVE-2024-37020.html * https://www.suse.com/security/cve/CVE-2024-39355.html * https://bugzilla.suse.com/show_bug.cgi?id=1233313 * https://bugzilla.suse.com/show_bug.cgi?id=1237096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:37 -0000 Subject: SUSE-SU-2025:20285-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174902199777.12703.15573107950114243892@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20285-1 Release Date: 2025-04-17T10:03:23Z Rating: important References: * bsc#1230998 * bsc#1231196 * bsc#1231204 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-46815 * CVE-2024-46818 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves eight vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-46818: Fixed drm/amd/display: check gpio_id before used as array index (bsc#1231204) * CVE-2024-46815: Fixed drm/amd/display: check num_valid_sets before accessing reader_wm_sets[] (bsc#1231196) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-6=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-3-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-3-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231196 * https://bugzilla.suse.com/show_bug.cgi?id=1231204 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:26:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:26:40 -0000 Subject: SUSE-SU-2025:20284-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174902200042.12703.6961607072664830503@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20284-1 Release Date: 2025-04-17T09:25:12Z Rating: important References: * bsc#1235218 * bsc#1235916 Cross-References: * CVE-2024-56600 * CVE-2024-57882 CVSS scores: * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-56600: net: inet6: Fixed dangling sk pointer in inet6_create() (bsc#1235218). * CVE-2024-57882: mptcp: Fixed TCP options overflow (bsc#1235916). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-13=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-2-1.2 * kernel-livepatch-6_4_0-24-default-2-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-2-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:00 -0000 Subject: SUSE-RU-2025:20282-1: moderate: Recommended update for amazon-dracut-config Message-ID: <174902202022.13583.10924812897003246550@smelt2.prg2.suse.org> # Recommended update for amazon-dracut-config Announcement ID: SUSE-RU-2025:20282-1 Release Date: 2025-04-23T11:37:21Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for amazon-dracut-config contains the following fixes: * Initial release for amazon-dracut config on Micro 6.1: * Update to 0.0.4 * Move dracut config files to usr/lib/ dir * Update to 0.0.3 * Add provides and conflicts on generic name dracut-instance-change-config * Update to 0.0.2 * Rename config for nvme for consistency * Add dracut build requirement * Initial release v0.0.1 (PED-11572) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-81=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * amazon-dracut-config-0.0.4-slfo.1.1_1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:08 -0000 Subject: SUSE-RU-2025:20281-1: important: Recommended update for qemu Message-ID: <174902202893.13583.8437097128200981626@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2025:20281-1 Release Date: 2025-04-22T15:18:13Z Rating: important References: * bsc#1221812 * bsc#1228079 * bsc#1228343 * bsc#1230978 * bsc#1231166 * bsc#1232283 * bsc#1232728 * bsc#1233530 * bsc#1236709 * bsc#1237603 Affected Products: * SUSE Linux Micro 6.1 An update that has 10 fixes can now be installed. ## Description: This update for qemu fixes the following issues: * linux-user: Do not define struct sched_attr if libc headers do (bsc#1237603) * elfload: Fix alignment when unmapping excess reservation (bsc#1236709) * linux-user: Honor elf alignment when placing images (bsc#1236709) * tests/acpi: q35: Update host address width in DMAR (bsc#1228343) * intel_iommu: Set default aw_bits to 48 starting from QEMU 9.2 (bsc#1228343) * tests/acpi: q35: allow DMAR acpi table changes (bsc#1228343) * Update version to 8.2.9 * Full changelog here: https://lore.kernel.org/qemu- devel/568115c5-8908-4931-aae0-a57bf542f68a at tls.msk.ru/ * Some backports: gdbstub/user-target: fix gdbserver int format (%d -> %x) target/s390x: Fix MVC not always invalidating translation blocks physmem: fix qemu_ram_alloc_from_fd size calculation hw/usb/canokey: Fix buffer overflow for OUT packet target/arm: arm_reset_sve_state() should set FPSR, not FPCR hw/cxl: Fix msix_notify: Assertion `vector < dev->msix_entries_nr` tests: acpi: update expected blobs pci: acpi: Windows 'PCI Label Id' bug workaround tests: acpi: whitelist expected blobs pci/msix: Fix msix pba read vector poll end calculation pci: ensure valid link status bits for downstream ports hw/usb/hcd-xhci-pci: Use modulo to select MSI vector as per spec backends/cryptodev-vhost-user: Fix local_error leaks tests/qtest/boot-serial-test: Correct HPPA machine name target/i386/cpu: Fix notes for CPU models docs: Correct release of TCG trace-events removal target/loongarch: Use actual operand size with vbsrl check s390x/s390-virtio-ccw: don't crash on weird RAM sizes vhost-user: fix shared object return values meson.build: Disallow libnfs v6 to fix the broken macOS build hw/intc/arm_gicv3_its: Zero initialize local DTEntry etc structs roms: re-add edk2-basetools target edk2: commit version info edk2: get version + date from git submodule x86/loader: only patch linux kernels * nbd/server: avoid per-NBDRequest nbd_client_get/put() (bsc#1232283) * [openSUSE][RPM] The qemu translation is not being installed (bsc#1231166) * target/i386: Expose IBPB-BRTYPE and SBPB CPUID bits to the guest (bsc#1228079) * [openSUSE] block: Move qcow2 invalidation query-block op_blocker * scsi: megasas: Internal cdbs have 16-byte length (bsc#1233530) * Update version to 8.2.8 * Full changelog here: https://lore.kernel.org/qemu- devel/1b7d3242-abe9-408a-bd77-85162e0d0de4 at tls.msk.ru/ * Some backports: usb-hub: Fix handling port power control messages hw/audio/hda: fix memory leak on audio setup (bsc#1232728) hw/misc/mos6522: Fix bad class definition of the MOS6522 device contrib/plugins: add compat for g_memdup2 target/i386: fix hang when using slow path for ptw_setl tcg: Allow top bit of SIMD_DATA_BITS to be set in simd_desc() linux-user/arm: Select vdso for be8 and be32 modes linux-user/arm: Reduce vdso alignment to 4k linux-user: Tolerate CONFIG_LSM_MMAP_MIN_ADDR accel/tcg: Fix user-only probe_access_internal plugin check target/arm: Drop user-only special case in sve_stN_r linux-user: Fix setreuid and setregid to use direct syscalls target/i386: Fix legacy page table walk 9pfs: fix crash on 'Treaddir' request hw/nvme: fix handling of over-committed queues migration: Ensure vmstate_save() sets errp target/arm: Fix SVE SDOT/UDOT/USDOT (4-way, indexed) target/ppc: Fix mtDPDES targeting SMT siblings target/ppc: Set ctx->opcode for decode_insn32() target/riscv: Fix vcompress with rvv_ta_all_1s target/riscv/kvm: clarify how 'riscv-aia' default works target/riscv/kvm: set 'aia_mode' to default in error path hw/intc/riscv_aplic: Check and update pending when write sourcecfg hw/intc/riscv_aplic: Fix in_clrip[x] read emulation target/riscv: Set vtype.vill on CPU reset ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-79=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * qemu-ksm-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-host-8.2.9-slfo.1.1_1.1 * qemu-ui-opengl-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-headless-8.2.9-slfo.1.1_1.1 * qemu-chardev-spice-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-pci-8.2.9-slfo.1.1_1.1 * qemu-guest-agent-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-audio-spice-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-img-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-guest-agent-8.2.9-slfo.1.1_1.1 * qemu-debugsource-8.2.9-slfo.1.1_1.1 * qemu-block-rbd-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-img-8.2.9-slfo.1.1_1.1 * qemu-ui-spice-core-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-ssh-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-redirect-8.2.9-slfo.1.1_1.1 * qemu-block-ssh-8.2.9-slfo.1.1_1.1 * qemu-ui-spice-core-8.2.9-slfo.1.1_1.1 * qemu-block-rbd-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-host-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-tools-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-curl-8.2.9-slfo.1.1_1.1 * qemu-8.2.9-slfo.1.1_1.1 * qemu-ui-opengl-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-vga-8.2.9-slfo.1.1_1.1 * qemu-pr-helper-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-audio-spice-8.2.9-slfo.1.1_1.1 * qemu-chardev-spice-8.2.9-slfo.1.1_1.1 * qemu-hw-display-qxl-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-iscsi-8.2.9-slfo.1.1_1.1 * qemu-block-nfs-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-redirect-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-pr-helper-8.2.9-slfo.1.1_1.1 * qemu-spice-8.2.9-slfo.1.1_1.1 * qemu-block-curl-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-display-qxl-8.2.9-slfo.1.1_1.1 * qemu-block-iscsi-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-nfs-8.2.9-slfo.1.1_1.1 * qemu-tools-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (aarch64) * qemu-arm-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-arm-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * qemu-SLOF-8.2.9-slfo.1.1_1.1 * qemu-vgabios-8.2.91.16.3_3_ga95067eb-slfo.1.1_1.1 * qemu-lang-8.2.9-slfo.1.1_1.1 * qemu-seabios-8.2.91.16.3_3_ga95067eb-slfo.1.1_1.1 * qemu-ipxe-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (ppc64le) * qemu-ppc-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-ppc-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (s390x) * qemu-s390x-8.2.9-slfo.1.1_1.1 * qemu-s390x-debuginfo-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (x86_64) * qemu-accel-tcg-x86-8.2.9-slfo.1.1_1.1 * qemu-x86-8.2.9-slfo.1.1_1.1 * qemu-x86-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-accel-tcg-x86-debuginfo-8.2.9-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221812 * https://bugzilla.suse.com/show_bug.cgi?id=1228079 * https://bugzilla.suse.com/show_bug.cgi?id=1228343 * https://bugzilla.suse.com/show_bug.cgi?id=1230978 * https://bugzilla.suse.com/show_bug.cgi?id=1231166 * https://bugzilla.suse.com/show_bug.cgi?id=1232283 * https://bugzilla.suse.com/show_bug.cgi?id=1232728 * https://bugzilla.suse.com/show_bug.cgi?id=1233530 * https://bugzilla.suse.com/show_bug.cgi?id=1236709 * https://bugzilla.suse.com/show_bug.cgi?id=1237603 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:13 -0000 Subject: SUSE-RU-2025:20280-1: important: Recommended update for python-kiwi Message-ID: <174902203376.13583.17609924880615479751@smelt2.prg2.suse.org> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2025:20280-1 Release Date: 2025-04-22T14:42:49Z Rating: important References: * bsc#1228741 * bsc#1235448 * bsc#1237772 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that has three fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Bump version: 10.2.11 to 10.2.12 * Fix profile env variable name regression In the effort of adapting to the latest snapper in Issue #2697 we overlooked the after effect of a different variable name in the profile environment with regards to $kiwi_btrfs_root_is_snapshot and $kiwi_btrfs_root_is_snapper_snapshot. Image builds that references the former variable name would be broken by the change. This commit makes sure no regression is introduced by providing both variants (bsc#1237772). * Fix grub mkimage call for the ppc platform The list of modules used to create a grub platform image for ppc was the same list as used for the x86 bios platform. This commit fixes this and also cleans up the inconsistency and misleading names used for creating platform specific output. * Bump version: 10.2.10 to 10.2.11 * Update box plugin documentation Add chapter about new container build feature. The box plugin can now also run the build in containers * The ubuntu 20.04 github runner is closing down Make sure to move to another runner for workloads which still uses ubuntu 20.04 * Bump version: 10.2.9 to 10.2.10 * Poetry build sdist timestamps set to epoch 0 Newer versions of poetry set the timestamp for all source files to epoch 0. Such sources are not accepted by e.g Debian FTP servers and in general I don't like when tools changes their behavior just like that. This commit forces an older version of poetry for the purpose of creating the sdist tarball which then gets published on pypi. The argumentation for reproducible builds by forcing source files to a certain timestamp doesn't fly for me. I'm open for any better solution though. * Bump version: 10.2.8 to 10.2.9 * Classify missing chkstat as debug message chkstat is a distribution specific tool. If it is present we use it, if not we don't but it's not worth a warning. * Allow to run setfiles multi threaded Use option -T0 for newer setfiles version. * Add rd.kiwi.dialog.timeout option Allow to configure the timeout value for dialogs displayed by the kiwi dracut code. By default the timeout is set to 60 seconds. With the special value "off" the dialog will never timeout. * Make sure copy actions does not drop context Use shutil.copy2 to copy files preserving their attributes in the grub BootLoader space. * Improve unit test for archive target_dir Add a test case with absolute path in the target_dir to make sure we never unpack the archive to the host system. * Fixed profiled overlay imports When building an image for profile: SOME and providing an overlay directory named SOME/... kiwi will sync the contents of this overlay directory to the root tree. However it took the toplevel name SOME/ into account which is unwanted because only the sub data structure should be synced into the new root tree. * Bump version: 10.2.7 to 10.2.8 * Use multipath child instead of parent device On multipath systems we need to find underlying child device instead of using parent device. This prevents listing all parent devices for a multipath device * Increase size for agama integration test build Agama needs more space to build now * Fixed agama integration test rubygem-byebug and rubygem-agama-yast seems to no longer exist * Update TW integration tests Package nscd was dropped from TW * Fix documentation regarding URI styles In reference to commit 760a65558f9e2e91d3eaa3a2f9503ff596984b48 the support for iso:// URI types was dropped some time ago. However, the documentation was not properly updated. This commit fixes it * Fix return value of grub helper methods The grub helper methods to find grub tools returns a None value if the tool cannot be found. This None value could be used later in a Command call where it will be used in a join() command to log the resulting commandline. This join() call then fails and raises an unhandled error causing a stack trace in the application. This commit fixes it * Added disk validation for duplicate installs Installing the same image to different storage disks on the same machine creates device conflicts with unexpected side effects. This commit adds a validation based on the PTUUID of the disk image to check if another device on the system has the same ID and if yes, does not allow to install the image again including a message which device takes the same identifier (bsc#1228741). * Fixed documentation for signing key attribute The source locator name for local files was incorrect * Bump version: 10.2.6 to 10.2.7 * Update documentation Added a new troubleshooting chapter as subsection to the Build Host Constraints named Package Manager Behavior. It serves the purpose to describe options for the customer to change the default package manager behavior which we from the kiwi side do not influence intentionally. This is a followup change to (bsc#1235448). * Drop still present tox artifacts There were still some left over tox files and the documentation contribution chapter was also wrong at several places * Add support for reading optional pkgmgr env file If there is a file .kiwi.package_manager.env in the root of the image tree it will be read and put into the caller environment for the selected package and repository manager. There are features in e.g zypper which can only be used via env variables (bsc#1235448). * Auto convert unit test XML data to schema v8.3 * Rename btrfs_root_is_snapshot Rename btrfs_root_is_snapshot to btrfs_root_is_snapper_snapshot. This happens in preparation for the changes suggested where we want to get rid of snapper specific btrfs code which will be available in snapper natively soon. To make sure a btrfs layout specific to snapper(and SUSE), the implicitly used attribute named btrfs_root_is_snapshot now becomes explicit and its new name will indicate that snapper sits behind it. Along with the rename a XSLT stylesheet to automatically convert the old name into the new name for schema v8.3 will be performed. * Bump version: 10.2.5 to 10.2.6 * Fixed donate button target * Added LUKS reencryption support Added rd.kiwi.oem.luks.reencrypt boot option consumed by the kiwi-repart dracut module. For OEM LUKS2 encrypted disk images. If set, reencrypts the disk prior an eventual resize and therefore creates a new key pool and master key. The reencryption is advisable if the image binary is not protected. With access to the image binary it's possible to extract the luks header which then allows to decrypt the data unless it was reencrypted. The reencryption process only runs if the checksum of the luks header still matches the one from the original disk image. Be aware that the reencryption will ask for the passphrase if the image has been built with an initial luks passphrase. * Fixed arm/tumbleweed/test-image-rpi No ruby required for this integration test build * Plain zipl loader needs boot partition If the rootfs is something zipl cannot read, we need an extra boot partition using a supported filesystem * Fixed IBM-Cloud-Standard profile The test-image-MicroOS integration test builds an IBM-Cloud-Standard profile as encrypted variant with a random key that is not protected by an encrypted boot image. This doesn't make sense. Thus the encryption setup for the IBM cloud standard build got removed. Use the IBM-Cloud-Secure-Execution profile to test encrypted secure linux builds * Fixed test-image-qcow-openstack rsh package was dropped from TW * Fix genprotimg for s390 builds A recent change on genprotimg now forbids to use --cert in combination with --no-verify, even though this was allowed before. * Fix documentation for repo, package gpg settings In contrast to the documentation, kiwi sets default values for any gpg setting if not explicitly specified differently. We want to avoid to inherit a behavior from how the distribution packages the package manager. This commit fixes the documentation to be in line with the implementation * Drop insecure and unsupported md5 digest Decommission the Checksum.md5() method and move all places in code to sha256(). The md5 digest is considered insecure and has also been removed from hashlib as a supported digest. * Fix config functions action The action failed on the setup of the runtime because the upgrade of pip failed. * Bump version: 10.2.4 to 10.2.5 * Changed systemfiles provider Instead of providing a static list of filenames, provide a list of package names. It is expected that the pilot of flake-pilot resolves this list against the local package database to build up the filelist for provisioning * Bump version: 10.2.3 to 10.2.4 * Update system files setup for containers The attribute provide_system_files creates a meta file in the root tree named 'systemfiles'. The contents of this file were produced by just a dump of the package database so far. For a more generic use of this data some adaptions were needed. First we allow to skip packages matching a pattern from being part of the system files. Next we do not put ghost and doc files into account. And last we handle library files in a different file named 'systemfiles.libs' where we do not add symlink targets if the target path is also part of the package. The consumer of this information is flake-pilot which syncs that library system files from the host via --copy-links. This allows a more generic use with regards to versioned libraries e.g. libc * Drop /dev/pts from bind mount locations This has created havoc in the Fedora build environments by fully unmounting /dev/pts and breaking the builders for subsquent tasks. This is a partial revert of commit daf1323c5ded7e4e7783205f5e30457b40eb322f. * Don't take ghost files into account When creating the system files information do not take ghost files and artifact files into account * Bump version: 10.2.2 to 10.2.3 * Update STYLEROOT to SUSE 2022 * Fix broken links in the documentation * Fix legacy_bios_mode detection The code in this method does not work correctly if the firmware is set to 'bios'. In bios only mode the method returned a false value which is incorrect as it should return a true value in this case. Without this patch ISO images will fail to boot because no loader gets configured. * Added /dev/pts to bind mount locations During runtime several kernel filesystems are bind mounted into the image root system such that programs expecting it can work. /dev/pts was not needed so far but seems to be a good addition to the list to make tools like sudo to work properly when called e.g. from a config.sh script. * xorriso: respect efiparttable and gpt_hybrid_mbr This should make the xorriso-based ISO build path respect the 'efiparttable' and 'gpt_hybrid_mbr' settings when building a UEFI-compatible image, making it write a GPT disk label by default instead of an MBR (msdos) one. If it's building an image that is not UEFI-compatible it will always write an MBR label, regardless of this setting. If 'gpt_hybrid_mbr' is set, xorriso will write an Ubuntu-style MBR/GPT hybrid partition table, where the MBR partition table includes a partition with type 00 and the bootable flag, as well as the partition with type ee required by the UEFI spec. This mildly violates the UEFI spec but may make the image bootable on native BIOS or CSM firmwares which refuse to boot from a disk with no partition marked 'bootable' in the MBR. If 'gpt_hybrid_mbr' is not set, xorriso will write a strictly UEFI-spec compliant label, with just the 'protective MBR' required by the UEFI spec (no bootable partition) and the correct GPT partition table. Note this is somewhat different from what gpt_hybrid_mbr does for disk images. Also, we now pass -compliance no_emul_toc when building ISOs, as recommended by upstream in https://lists.gnu.org/archive/html/bug- xorriso/2024-11/msg00012.html This tool is generally always going to be building ISOs intended for write-once use, not multi-session use (and which are rarely, these days, written to physical discs at all anyway). * Added provide/require system files for containers Added the attributes provide_system_files and require_system_files to control the provider and requester of system files in container image builds. systemfiles is a metadata file which contains all files from the package database at call time. It is used in flake-pilot to provision the systemfiles data from the host into the container instance. One possible use case for this data is a flake registration which uses a base container that is derived from a runtime container but all data from the runtime should be provisioned from the host. Using this feature tightly couples the flake to the host OS distribution and version. * Bump version: 10.2.1 to 10.2.2 * Fix scope issue Increase livetime of the the compressor instances to the livetime of RootImportOCI. They create temporary files which are referenced later and need to live longer than the block they got created in * Bump version: 10.2.0 to 10.2.1 * Fixed use of fscreateoptions for iso type The information for fscreateoptions was not passed along to the tooling if a custom filesystem attribute was specified. * Allow to derive from multiple containers Add support for multi inheritance to the derived_from attribute In the order of a comma seperated list of docker source URI's a base tree is created. This was possible only with one container so far and Fixes #2680 as well as jira#OBS-354 * Bump version: 10.1.18 to 10.2.0 * Add selinux test build to TW Also update derived docker integration test to latest Leap * kiwi/schema: Fix allowed value type for ISO publisher and application ID According to the spec, this should be constrained to 128 characters but also allow quite a few other special characters (as well as spaces). We didn't allow spaces in application ID, but allowed too much for Publisher. Now we set up both correctly. * Fix setup of kiwi environment variables Some kiwi env vars are initialized with an empty value and not overwritten if another value is provided. For the selected variables an empty value setting is not allowed because the schema also enforces the value to be set at least once. In addition a helpful option named --print-kiwi-env was added to the 'image info' command which allows to print the environment variables and their values. * Add random key support for LUKS encryption Allow to pass luks="random". In random mode use the generated keyfile as the only key to decrypt. This is only secure if the generated initrd also gets protected e.g. through encryption like it is done with the secure linux execution on zSystems * Added development group in pyproject setup generateDS and other tools are needed and were forgotten to be added when we deleted the tox dependency * Added containers integration with OBS When building in the Open Build Service (OBS) there is no way to create outgoing connections from the build workers. To allow the containers section to fetch containers from the SUSE registry we need to apply an OCI URI translation into a local path. The actual OCI container image is expected to be provided by the obs backend on the worker. Along with this commit also an integration test named test- image-disk-containers is provided (jira#OBS-351). * Fix rendering of SUSE docs The SUSE documentation is produced through a conversion of the ReST source into docbook. The name kiwi is reserved in the index and needs to be referenced as kiwi-ng when used as command. * Remove tox dependency tox was used as sort of a make target to run unit tests and more in a python virtualenv. However, since we switched everything to poetry it's no longer needed to let tox create the python virtual environments. This commit moves the tox targets into the Makefile and adapts the github workflow files accordingly. In addition the scripts container based tests were re-activated and fixed such that they succeed again. * Fix make build target Move the actions done by the tox target into the build target and call them there in a clean and easy to spot sequence. There is no need to call tox to prepare for the package submission, instead the checks and poetry runs to prepare for the package target should be called directly as part of the build target. In the future we might get rid of tox completely. * Bump version: 10.1.17 to 10.1.18 * Fixed zipl caller environment zipl gets confused with an active sysfs mount inside the root tree at call time of zipl. This commit umounts the /sys bind mount in the image tree prior calling zipl * Fix s390 test-image-disk build Add missing kernel links used by suse tools * Bump version: 10.1.16 to 10.1.17 * Fix coloring of build_status.sh flags Depending on the place of the status flag the color setup might fail. This commit fixes it * Add pytest-container as optional dependency The pyproject.toml listed pytest-container as dependency but it is used only to run the container based integration tests for the shell helper methods. For building the package this dependency should not be pulled in * Fix networking in erofs integration test The network setup was systemd- networkd based but the provided network config was not for systemd * Bump version: 10.1.15 to 10.1.16 * Fix erofs requires in spec erofs-utils for SUSE only exists in Tumbleweed. The former conditon would also add the requirement for ALP and SLFO which is wrong. This commit fixes it * Add vagrantconfig rule for vagrant format If the format="vagrant" attribute is set, a vagrantconfig section becomes mandatory. This commit enforces this rule on the schema. * Bump version: 10.1.14 to 10.1.15 * Fixed sphinx_rtd_theme setup Delete obsolete display_version attribute * Evaluate eficsm everywhere Fixed _supports_bios_modules() to take an eventually provided eficsm setup into account. The grub config still searches for i386 grub modules even if eficsm="false" is set. * Fixed debian bootstrap script calls Run scripts as commands with their native shebang and not through bash. Not all debian package scripts uses bash, some of them uses sh which can be a link to dash or other interpreters. * Update TW integration tests The package x86info was dropped from TW * Turn DiskFormat into an ordinary class * it does not need to be an abstract base class * use f-strings where applicable instead of format() * change return type of _custom_args_for_format from list to tuple * Add new containers section Allow to specify references to OCI containers in the image description During the kiwi process the containers are fetched into a temporary location and a systemd service is configured to one time load the containers into the local registry at first boot of the system. * Bump version: 10.1.13 to 10.1.14 * Revert "Install usrmerge for Debian integration test" This reverts commit 95ac861741f14c4f35611c16328384c18e53dcfb. Solution needs to be provided in code * Install usrmerge for Debian integration test * Support older apt versions for bootstrap * Run package scripts in apt bootstrap phase The bootstrap procedure based on apt only runs a manual collection of package scripts. This commit refactors the code that unpacks the bootstrap packages to a python implementation and adds a method to run the bootstrap scripts from all packages resolved by apt. * Bump version: 10.1.12 to 10.1.13 * Fix bundle extension for vagrant type When bundling result files that uses a vagrant type, kiwi creates them with the extension .vagrant.virtualbox.box or .vagrant.libvirt.box. The bundler code renames them using only the .box suffix which is too short as it is missing the subformat information. This commit fixes it and keeps this information in the result bundle file name. * Use simple quotas (squota) for volumes * Add quota attribute to volume section Allow to set quota per volume for the btrfs filesystem * Fix globbing with exclude with regex This fixes a collection of bugs when producing erofs images. On one hand, this ensures that an exclude of `/sys` doesn't accidentally match `/lib/libsystemd.so`, only `/sys/whatever`. On the other hand, this ensures that `/dev/*` does match `/dev/vda` and not just `/dev///////////`. This fixes libsystemd.so getting dropped in Kiwi- built FEX images. * Honour custom exclude for filesystem builds All other call sites honour the custom exclude file, it's just this one that needs to be fixed. This unblocks use of Kiwi for generating FEX rootfs. * test: storage: update clone_device tests with new block size * storage: clone_device: increase dd block size Increasing the block size used for dd reduces the time needed to clone a device. * Bump version: 10.1.11 to 10.1.12 * Add missing erofscompression validation In the filesystem builder I forgot to evaluate the erofscompression attribute. * Include PI and comments in XSL stylesheets So far comments and processing instructions (PI) were ignored when applying the XSL stylesheets. This commit updates all stylesheets to take them into account * Bump version: 10.1.10 to 10.1.11 * doc: Add login information test build test images ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-80=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-80=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * dracut-kiwi-lib-10.1.10-slfo.1.1_2.1 * dracut-kiwi-oem-repart-10.1.10-slfo.1.1_2.1 * dracut-kiwi-oem-dump-10.1.10-slfo.1.1_2.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * python3-kiwi-10.1.10-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228741 * https://bugzilla.suse.com/show_bug.cgi?id=1235448 * https://bugzilla.suse.com/show_bug.cgi?id=1237772 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:20 -0000 Subject: SUSE-SU-2025:20279-1: important: Security update for podman Message-ID: <174902204037.13583.13708391996166245577@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20279-1 Release Date: 2025-04-22T13:50:03Z Rating: important References: * bsc#1221677 * bsc#1224112 * bsc#1231208 * bsc#1236270 * bsc#1236507 * bsc#1237641 * bsc#1239330 Cross-References: * CVE-2023-45288 * CVE-2024-11218 * CVE-2024-1753 * CVE-2024-3727 * CVE-2024-9407 * CVE-2025-22869 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-11218 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-11218 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-11218 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-1753 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves seven vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2023-45288: Fixed closing connection when receiving too many headers (bsc#1236507). * CVE-2024-11218: Fixed container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (bsc#1236270). * CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239330). * CVE-2025-27144: Fixed Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237641). * CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208). * CVE-2024-3727: Fixed digest type (bsc#1224112). * CVE-2024-1753: Fixed full container escape at build time (bsc#1221677). Other fixes: \- Updated to version 5.2.5: * RPM: remove dup Provides * Packit: constrain koji and bodhi jobs to fedora package to avoid dupes * Validate the bind-propagation option to `--mount` * Updated Buildah to v1.37.4 * vendor: updated c/common to v0.60.4 * pkg/specgen: allow pasta when running inside userns * libpod: convert owner IDs only with :idmap * allow exposed sctp ports * libpod: setupNetNS() correctly mount netns * vendor: updated c/common to v0.60.3 * [skip-ci] Packit: split out ELN jobs and reuse fedora downstream targets * [skip-ci] Packit: Enable sidetags for bodhi updates * Updated gvisor-tap-vsock to 0.7.5 * CI: podman-machine: do not use cache registry * [CI:DOCS] Add v5.2.2 lib updates to RELEASE_NOTES.md * Update RELEASE_NOTES for v5.2.2 * [v5.2] Bump Buildah to v1.37.2, c/common v0.60.2, c/image v5.32.2 * [v5.2] golangci-lint: make darwin linting happy * [v5.2] golangci-lint: make windows linting happy * [v5.2] test/e2e: remove kernel version check * [v5.2] golangci-lint: remove most skip dirs * [v5.2] set !remote build tags where needed * [v5.2] update golangci- lint to 1.60.1 * Packit: update targets for propose-downstream * Create volume path before state initialization * Update Cirrus DEST_BRANCH * Bump to v5.2.2-dev * Bump to v5.2.1 * Update release notes for v5.2.1 * [v5.2] Add zstd:chunked test fix * [v5.2] Bump Buildah to v1.37.1, c/common v0.60.1, c/image v5.32.1 * libpod: reset state error on init * libpod: do not save expected stop errors in ctr state * libpod: fix broken saveContainerError() * Bump to v5.2.1-dev * Bump to v5.2.0 * Never skip checkout step in release workflow * Bump to v5.2.0-dev * Bump to v5.2.0-rc3 * Update release notes for v5.2.0-rc3 * Tweak versions in register_images.go * fix network cleanup flake in play kube * WIP: Fixes for vendoring Buildah * Add --compat-volumes option to build and farm build * Bump Buildah, c/storage, c/image, c/common * libpod: bind ports before network setup * pkg/api: do not leak config pointers into specgen * build: Update gvisor-tap-vsock to 0.7.4 * test/system: fix borken pasta interface name checks * test/system: fix bridge host.containers.internal test * CI: system tests: instrument to allow failure analysis * Use uploaded .zip for Windows action * RPM: podman-iptables.conf only on Fedora * Bump to v5.2.0-dev * Bump to v5.2.0-rc2 * Update release notes for v5.2.0-rc2 * test/e2e: fix ncat tests * libpod: add hidden env to set sqlite timeout * Add support for StopSignal in quadlet .container files * podman pod stats: fix race when ctr process exits * Update module github.com/vbauerster/mpb/v8 to v8.7.4 * libpod: correctly capture healthcheck output * Bump bundled krunkit to 0.1.2 * podman stats: fix race when ctr process exists * nc -p considered harmful * podman pod stats: fix pod rm race * podman ps: fix racy pod name query * system connection remove: use Args function to validate * pkg/machine/compression: skip decompress bar for empty file * nc -p considered harmful * podman system df: fix fix ErrNoSuchCtr/Volume race * podman auto-update: fix ErrNoSuchCtr race * Fix name for builder in farm connection * 700-play.bats: use unique pod/container/image/volume names * safename: consistent within same test, and, dashes * 700-kube.bats: refactor $PODMAN_TMPDIR/test.yaml * 700-play.bats: eliminate $testYaml * 700-play.bats: refactor clumsy yamlfile creation * 700-play.bats: move _write_test_yaml up near top * chore(deps): update dependency setuptools to v71 * Expand drop-in search paths * top-level (pod.d) * truncated (unit-.container.d) * Remove references and checks for --gpus * Do not crash on invalid filters * fix(deps): update module github.com/rootless- containers/rootlesskit/v2 to v2.2.0 * Bump to v5.2.0-dev * Bump to v5.2.0-rc1 * Keep the volume-driver flag deprecated * Vendor in latest containers(common, storage,image, buildah) * System tests: safe container/image/volume/etc names * Implement disable default mounts via command line * test: drop unmount for overlay * test: gracefully terminate server * libpod: shutdown Stop waits for handlers completion * libpod: cleanup store at shutdown * Add NetworkAlias= support to quadlet * cmd: call shutdown handler stop function * fix race conditions in start/attach logic * swagger: exlude new docker network types * vendor: bump c/storage * update to docker 27 * contrib: use a distinct --pull- option= for each flag * Update warning message when using external compose provider * Update module github.com/cyphar/filepath-securejoin to v0.3.0 * Ignore result of EvalSymlinks on ENOENT * test/upgrade: fix tests when netavark uses nftables * test/system: fix network reload test with nftables * test/e2e: rework some --expose tests * test: remove publish tests from e2e * CI: test nftables driver on fedora * CI: use local registry, part 3 of 3: for developers * CI: use local registry, part 2 of 3: fix tests * CI: use local registry, part 1 of 3: setup * CI: test composefs on rawhide * chore(deps): update module google.golang.org/grpc to v1.64.1 [security] * chore(deps): update dependency setuptools to ~=70.3.0 * Improve container filenname ambiguity. * containers/attach: Note bug around goroutine leak * Drop minikube CI test * add libkrun test docs * fix(deps): update module tags.cncf.io/container-device- interface to v0.8.0 * cirrus: check for header files in source code check * pkg/machine/e2e: run debug command only for macos * create runtime 's worker queue before queuing any job * test/system: fix pasta host.containers.internal test * Visual Studio BuildTools as a MinGW alternative * SetupRootless(): only reexec when needed * pkg/rootless: simplify reexec for container code * cirrus: add missing test/tools to danger files * fix(deps): update module golang.org/x/tools to v0.23.0 * Windows Installer: switch to wix5 * fix(deps): update module golang.org/x/net to v0.27.0 * pkg/machine/e2e: print tests timings at the end * pkg/machine/e2e: run debug commands after init * pkg/machine/e2e: improve timeout handling * libpod: first delete container then cidfile * fix(deps): update module golang.org/x/term to v0.22.0 * System test fixes * cirrus.yml: automatic skips based on source * fix(deps): update module github.com/containers/ocicrypt to v1.2.0 * podman events: fix error race * chore(deps): update dependency setuptools to ~=70.2.0 * fix(deps): update module github.com/gorilla/schema to v1.4.1 [security] * Update CI VM images * pkg/machine/e2e: fix broken cleanup * pkg/machine/e2e: use tmp file for connections * test/system: fix podman --image-volume to allow tmpfs storage * CI: mount tmpfs for container storage * docs: --network remove missing leading sentence * specgen: parse devices even with privileged set * vendor: update c/storage * Remove the unused machine volume-driver * feat(quadlet): log option handling * Error when machine memory exceeds system memory * machine: Always use --log-file with gvproxy * CI: Build-Each-Commit test: run only on PRs * Small fixes for testing libkrun * Podman machine resets all providers * Clearly indicate names w/ URLencoded duplicates * [skip-ci] Packit: split rhel and centos-stream jobs * apple virtiofs: fix racy mount setup * cirrus: fix broken macos artifacts URL * libpod/container_top_linux.c: fix missing header * refactor(build): improve err when file specified by -f does not exist * Minor: Remove unhelpful comment * Update module github.com/openshift/imagebuilder to v1.2.11 * Minor: Rename the OSX Cross task * [skip-ci] Remove conditionals from changelog * podman top: join the container userns * Run linting in parallel with building * Fix missing Makefile target dependency * build API: accept platform comma separated * [skip-ci] RPM: create podman-machine subpackage * ExitWithError() - more upgrades from Exit() * test/e2e: remove podman system service tests * cirrus: reduce int tests timeout * cirrus: remove redundant skip logic * pkg/machine/apple: machine stop timeout * CI: logformatter: link to correct PR base * Update module github.com/crc-org/crc/v2 to v2.38.0 * ExitWithError(): continued * test/system: Add test steps for journald log check in quadlet * restore: fix missing network setup * podman run use pod userns even with --pod-id-file * macos-installer: bundle krunkit * remote API: fix pod top error reporting * libpod API: return proper error status code for pod start * fix #22233 * added check for `registry.IsRemote()`. and correct error message. * fix #20686 * pkg/machine/e2e: Remove unnecessary copy of machine image. * libpod: intermediate mount if UID not mapped into the userns * libpod: avoid chowning the rundir to root in the userns * libpod: do not chmod bind mounts * libpod: unlock the thread if possible * CI Cleanup: Remove cgroups v1 support * ExitWithError() - more upgrades from Exit() * remote: fix incorrect CONTAINER_CONNECTION parsing * container: pass KillSignal and StopTimeout to the systemd scope * libpod: fix comment * e2e: test container restore in pod by name * docs: Adds all PushImage supported paramters to openapi docs. * systests: kube: bump up a timeout * cirrus.yml: add CI:ALL mode to force all tests * cirrus.yml: implement skips based on source changes * CI VMs: bump * restore: fix container restore into pod * sqlite_state: Fix RewriteVolumeConfig * chore(deps): update dependency setuptools to ~=70.1.0 * Quadlet - use specifier for unescaped values for templated container name * cirrus: check for system test leaks in nightly * test/system: check for leaks in teardown suite * test/system: speed up basic_() * test/system: fix up many tests that do not cleanup * test/system: fix podman --authfile=nonexistent-path * Update module github.com/containernetworking/plugins to v1.5.1 * Update module github.com/checkpoint-restore/checkpointctl to v1.2.1 * Update module github.com/spf13/cobra to v1.8.1 * Update module github.com/gorilla/schema to v1.4.0 * pkg/machine/wsl: force terminate wsl instance * pkg/machine/wsl: wrap command errors * [CI:DOCS] Quadlet - add note about relative path resolution * CI: do not install python packages at runtime * Release workflow: Include candidate descriptor * Minor: Fix indentation in GHA release workflow * GHA: Send release notification mail * GHA: Validate release version number * Remove references to --pull=true and --pull=false * ExitWithError, continued * podman: add new hidden flag --pull-option * [CI:DOCS] Fix typos in podman-build * infra: mark storageSet when imagestore is changed * [CI:DOCS] Add jnovy as reviewer and approver * fix(deps): update module google.golang.org/protobuf to v1.34.2 * refactor(machine,wsl): improve operations of Windows API * --squash --layers=false should be allowed * fix(deps): update module github.com/checkpoint-restore/checkpointctl to v1.2.0 * update golangci-lint to v1.59.1 * Rename master to main in CONTRIBUTING.md * podman 5, pasta and inter- container networking * libpod: do not resuse networking on start * machine/linux: Switch to virtiofs by default * machine/linux: Support virtiofs mounts (retain 9p default) * machine/linux: Use memory-backend-memfd by default * ExitWithError() - continued * Enable libkrun provider to open a debug console * Add new targets on Windows makefile (winmake.ps1) * fix(deps): update module github.com/docker/docker to v26.1.4+incompatible * fix(deps): update module github.com/crc-org/crc/v2 to v2.37.1 * fix(deps): update module golang.org/x/tools to v0.22.0 * fix(deps): update module golang.org/x/net to v0.26.0 * libpod: fix 'podman kube generate' on FreeBSD * fix(deps): update module golang.org/x/sys to v0.21.0 * libpod: do not leak systemd hc startup unit timer * vendor latest c/common * pkg/rootless: set _CONTAINERS_USERNS_CONFIGURED correctly * run bats -T, to profile timing hogs * test/system: speed up podman ps --external * test/system: speed up podman network connect/disconnect * test/system: speed up podman network reload * test/system: speed up quadlet - pod simple * test/system: speed up podman parallel build should not race * test/system: speed up podman cp dir from host to container * test/system: speed up podman build - workdir, cmd, env, label * test/system: speed up podman --log- level recognizes log levels * test/system: remove obsolete debug in net connect/disconnect test * test/system: speed up quadlet - basic * test/system: speed up user namespace preserved root ownership * System tests: add `podman system check` tests * Add `podman system check` for checking storage consistency * fix(deps): update module github.com/crc-org/crc/v2 to v2.37.0 * fix(libpod): add newline character to the end of container's hostname file * fix(deps): update module github.com/openshift/imagebuilder to v1.2.10 * fix(deps): update github.com/containers/image/v5 digest to aa93504 * Fix 5.1 release note re: runlabel * test/e2e: use local skopeo not image * fix(deps): update golang.org/x/exp digest to fd00a4e * [CI:DOCS] Add contrib/podmanimage/stable path back in repo * chore(deps): update dependency requests to ~=2.32.3 * fix(deps): update github.com/containers/image/v5 digest to 2343e81 * libpod: do not move podman with --cgroups=disabled * Update release notes on Main to v5.1.0 * test: look at the file base name * tests: simplify expected output * Sigh, new VMs again * Fail earlier when no containers exist in stats * Add Hyper-V option in windows installer * libpod: cleanup default cache on system reset * vendor: update c/image * test/system: speed up kube generate tmpfs on /tmp * test/system: speed up podman kube play tests * test/system: speed up podman shell completion test * test/system: simplify test signal handling in containers * test/system: speed up podman container rm ... * test/system: speed up podman ps - basic tests * test/system: speed up read-only from containers.conf * test/system: speed up podman logs - multi ... * test/system: speed up podman run --name * Debian: switch to crun * test/system: speed up podman generate systemd - envar * test/system: speed up podman-kube at .service template * test/system: speed up kube play healthcheck initialDelaySeconds * test/system: speed up exit- code propagation test * test/system: speed up "podman run --timeout" * test/system: fix slow kube play --wait with siginterrupt * undo auto-formatting * test/system: speed up podman events tests * Quadlet: Add support for .build files * test/system: speed up "podman auto-update using systemd" * test/system: remove podman wait test * tests: disable tests affected by a race condition * update golangci-lint to v1.59.0 * kubernetes_support.md: Mark volumeMounts.subPath as supported * working name of pod on start and stop * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.19.0 * Bump Buildah to v1.36.0 * fix(deps): update module github.com/burntsushi/toml to v1.4.0 * fix typo in Tutorials.rst * Mac PM test: Require pre-installed rosetta * test/e2e: fix new error message * Add configuration for podmansh * Update containers/common to latest main * Only stop chowning volumes once they're not empty * podman: fix --sdnotify=healthy with --rm * libpod: wait another interval for healthcheck * quadlet: Add a network requirement on .image units * test, pasta: Ignore deprecated addresses in tests * [CI:DOCS] performance: update network docs * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.18.0 * CI: disable minikube task * [CI:DOCS] Fix windows action trigger * chore(deps): update dependency setuptools to v70 * Check AppleHypervisor before accessing it * fix(deps): update module github.com/containernetworking/plugins to v1.5.0 * [CI:DOCS] Update dependency golangci/golangci-lint to v1.58.2 * add podman- clean-transient.service service to rootless * [CI:DOCS] Update podman network docs * fix incorrect host.containers.internal entry for rootless bridge mode * vendor latest c/common main * Add Rosetta support for Apple Silicon mac * bump main to 5.2.0-dev * Use a defined constant instead of a hard-coded magic value * cirrus: use faster VM's for integration tests * fix(deps): update github.com/containers/gvisor-tap-vsock digest to 01a1a0c * [CI:DOCS] Fix Mac pkg link * test: remove test_podman* scripts * test/system: fix documentation * Return StatusNotFound when multiple volumes matching occurs * container_api: do not wait for healtchecks if stopped * libpod: wait for healthy on main thread * `podman events`: check for an error after we finish reading events * remote API: restore v4 payload in container inspect * Fix updating connection when SSH port conflict happens * rootless: fix reexec to use /proc/self/exe * ExitWithError() - enforce required exit status & stderr * ExitWithError() - a few that I missed * [skip-ci] Packit: use only one value for `packages` key for `trigger: commit` copr builds * Revert "Temporarily disable rootless debian e2e testing" * CI tests: enforce TMPDIR on tmpfs * use new CI images with tmpfs /tmp * run e2e test on tmpfs * Update module github.com/crc-org/crc/v2 to v2.36.0 * [CI:DOCS] Use checkout at v4 in GH Actions * ExitWithError() - rmi_test * ExitWithError() - more r files * ExitWithError() - s files * ExitWithError() - more run_xxx tests * Fix podman-remote support for `podman farm build` * [CI:DOCS] Trigger windows installer action properly * Revert "container stop: kill conmon" * Ensure that containers do not get stuck in stopping * [CI:DOCS] Improvements to make validatepr * ExitWithError() - rest of the p files * [CI:DOCS] Update dependency golangci/golangci-lint to v1.58.1 * Graceful shutdown during podman kube down * Remove duplicate call * test/system: fix broken "podman volume globs" test * Quadlet/Container: Add GroupAdd option * Don't panic if a runtime was configured without paths * update c/{buildah,common,image,storage} to latest main * update golangci-lint to 1.58 * machine: Add LibKrun provider detection * ExitWithError() - continue tightening * fix(deps): update module google.golang.org/protobuf to v1.34.1 * test: improve test for powercap presence * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.17.3 * fix(deps): update module go.etcd.io/bbolt to v1.3.10 * fix(deps): update module golang.org/x/tools to v0.21.0 * [skip-ci] RPM: `bats` required only on Fedora * fix(deps): update module golang.org/x/exp to v0.0.0-20240506185415-9bf2ced13842 * gpdate and remove parameter settings in `.golangci.yml` * ExitWithError() - play_kube_test.go * Temporarily disable rootless debian e2e testing * fix(deps): update module golang.org/x/crypto to v0.23.0 * CI Docs: Clarify passthrough_envars() comments * Skip machine tests if they don't need to be run * Update CI VMs to F40, F39, D13 * ExitWithError() - v files * Update module golang.org/x/term to v0.20.0 * machine: Add provider detection API * util: specify a not empty pause dir for root too * Add missing option 'healthy' to output of `podman run --help` * [CI:DOCS] Add info on the quay.io images to the README.md * Add a random suffix to healthcheck unit names * test/e2e: remove toolbox image * Also substitute $HOME in runlabel with user's homedir * Update module github.com/cyphar/filepath-securejoin to v0.2.5 * Change tmpDir for macOS * ExitWithError() - pod_xxx tests * ExitWithError() -- run_test.go * Update module golang.org/x/exp to v0.0.0-20240416160154-fe59bbe5cc7f * Update module github.com/shirou/gopsutil/v3 to v3.24.4 * Update module github.com/docker/docker to v26.1.1+incompatible * GHA: Attempt fix exceeded a secondary rate limit * vendor ginkgo 2.17.2 into test/tools * Fix machine volumes with long path and paths with dashes * Update module google.golang.org/protobuf to v1.34.0 * Update module github.com/crc-org/crc/v2 to v2.35.0 * Update module github.com/onsi/gomega to v1.33.1 * test/e2e: podman unshare image mount fix tmpdir leak * test/e2e: do not leak /tmp/private_file * test/e2e: "persistentVolumeClaim with source" do not leak file * e2e tests: use /var/tmp, not $TMPDIR, as workdirs * Update dependency pytest to v8.1.2 * Remove unncessary lines at the end of specfile summary * Clean machine pull cache * Add krun support to podman machine * Use custom image for make validatepr * test/e2e: force systemd cgroup manager * e2e and bindings tests: fix $PATH setup * Makefile: remove useless HACK variable in e2e test * test/e2e: fix volumes and suid/dev/exec options * test/e2e: volumes and suid/dev/exec options works remote * test/e2e: fix limits test * Update module github.com/rootless- containers/rootlesskit/v2 to v2.1.0 * Correct option name `ip` -> `ip6` * Add the ability to automount images as volumes via play * Add support for image volume subpaths * Bump Buildah to latest main * Update Makefile to Go 1.22 for in-container * ExitWithError() - yet more low-hanging fruit * ExitWithError() - more low-hanging fruit * ExitWithError() - low-hanging fruit * chore: fix function names in comment * Remove redundant Prerequisite before build section * Remove PKG_CONFIG_PATH * Add installation instructions for openSUSE * Replace golang.org/x/exp/slices with slices from std * Update to go 1.21 * fix(deps): update module github.com/docker/docker to v26.1.0+incompatible * [CI:DOCS] Fix artifact action * [skip-ci] Packit/rpm: remove el8 jobs and spec conditionals * e2e tests: stop littering * [CI:DOCS] format podman-pull example as code * [CI:DOCS] Build & upload release artifacts with GitHub Actions * libpod: getHealthCheckLog() remove unessesary check * add containers.conf healthcheck_events support * vendor latest c/common * libpod: make healthcheck events more efficient * libpod: wrap store setup error message * [skip-ci] Packit: enable CentOS 10 Stream build jobs * pkg/systemd: use fileutils.(Le|E)xists * pkg/bindings: use fileutils.(Le|E)xists * pkg/util: use fileutils.(Le|E)xists * pkg/trust: use fileutils.(Le|E)xists * pkg/specgen: use fileutils.(Le|E)xists * pkg/rootless: use fileutils.(Le|E)xists * pkg/machine: use fileutils.(Le|E)xists * pkg/domain: use fileutils.(Le|E)xists * pkg/api: use fileutils.(Le|E)xists * libpod: use fileutils.(Le|E)xists * cmd: use fileutils.(Le|E)xists * vendor: update containers/{buildah,common,image,storage} * fix(deps): update module github.com/docker/docker to v26.0.2+incompatible [security] * fix podman-pod-restart.1.md typo * [skip-ci] Packit: switch to EPEL instead of centos-stream+epel-next * fix(deps): update module github.com/onsi/gomega to v1.33.0 * Add more annnotation information to podman kupe play man page * test/compose: remove compose v1 code * CI: remove compose v1 tests * fix: close resource file * [CI:DOCS] Fix windows installer action * fix(deps): update module tags.cncf.io/container-device-interface to v0.7.2 * add `list` as an alias to list networks * Add support for updating restart policy * Add Compat API for Update * Make `podman update` changes persistent * Emergency fix (well, skip) for failing bud tests * fix swagger doc for manifest create * [CI:DOCS] options/network: fix markdown lists * Makefile: do not hardcode `GOOS` in `podman-remote-static` target * chore(deps): update module golang.org/x/crypto to v0.17.0 [security] * chore(deps): update dependency setuptools to ~=69.5.0 * Fix some comments * swagger fix infinitive recursion on some types * install swagger from source * Revert "Swap out javascript engine" * podman exec CID without command should exit 125 * (minor) prefetch systemd image before use * Update go-swagger version * Swap out javascript engine * fix(deps): update module github.com/docker/docker to v26.0.1+incompatible * Add os, arch, and ismanifest to libpod image list * [CI:DOCS]Initial PR validation * fix(deps): update github.com/containers/gvisor-tap-vsock digest to d744d71 * vendor ginkgo 2.17.1 into test/tools * fix "concurrent map writes" in network ls compat endpoint * chore(deps): update dependency pytest to v8 * e2e: redefine ExitWithError() to require exit code * docs: fix missleading run/create --expose description * podman ps: show exposed ports under PORTS as well * rootless: drop function ReadMappingsProc * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.7.3 * New CI VMs, to give us pasta 2024-04-05 * Add big warning to GHA workflow * GHA: Fix intermittent workflow error * fix(deps): update module golang.org/x/tools to v0.20.0 * e2e tests: remove requirement for fuse-overlayfs * docs: update Quadlet volume Options desc * fix(deps): update module golang.org/x/sync to v0.7.0 * Fix relabeling failures with Z/z volumes on Mac * fix(deps): update module golang.org/x/net to v0.24.0 * Makefile: fix annoying errors in docs generation * chore: fix function names in comment * Bump tags.cncf.io/container-device-interface to v0.7.1 * fix(deps): update module golang.org/x/crypto to v0.22.0 * Detect unhandled reboots and require user intervention * podman --runroot: remove 50 char length restriction * update github.com/rootless-containers/rootlesskit to v2 * Update module github.com/gorilla/schema to v1.3.0 * Update dependency requests-mock to ~=1.12.1 * Update module github.com/crc-org/crc/v2 to v2.34.1 * rm --force work for more than one arg * [CI:DOCS] Update kube docs * fix(deps): update module github.com/shirou/gopsutil/v3 to v3.24.3 * [CI:DOCS] Add GitHub action to update version on Podman.io * [CI:DOCS] Update dependency golangci/golangci-lint to v1.57.2 * Windows: clean up temporary perl install * pkg/util: FindDeviceNodes() ignore ENOENT errors * [CI:DOCS] build deps: make-validate needs docs * test/system: add rootless-netns test for setup errors * vendor latest c/common main * container: do not chown to dest target with U * [CI:DOCS] golangci-lint: update deprecated flags * systests: conditionalize slirp4netns tests * CI: systests: instrument flaky tests * s3fs docs * test: do not skip tests under rootless * Add note about host networking to Kube PublishPort option * Inject additional build tags from the environment * libpod: use original IDs if idmap is provided * Switch back to checking out the same branch the action script runs in * docs/podman-login: Give an example of writing the persistent path * CI: Bump VMs to 2024-03-28 * [skip-ci] Update dawidd6/action-send-mail action to v3.12.0 * fix(deps): update module github.com/openshift/imagebuilder to v1.2.7 * Fix reference to deprecated types.Info * Use logformatter for podman_machine_windows_task * applehv: Print vfkit logs in --log-level debug * [CI:DOCS]Add Mario to reviewers list * [CI:DOCS] Document CI-maintenance job addition * Add golang 1.21 update warning * Add rootless network command to `podman info` * libpod: don't warn about cgroupsv1 on FreeBSD * hyperv: error if not admin * Properly parse stderr when updating container status * [skip-ci] Packit: specify fedora-latest in propose-downstream * Use built-in ssh impl for all non-pty operations * Add support for annotations * hyperv: fix machine rm -r * [skip-ci] Packit: Enable CentOS Stream 10 update job * 5.0 release note fix typo in cgroupv1 env var * fix remote build isolation on client side * chore: remove repetitive words * Dont save remote context in temp file but stream and extract * fix remote build isolation when server runs as root * util: use private propagation with bind * util: add some tests for ProcessOptions * util: refactor ProcessOptions into an internal function * util: rename files to snake case * Add LoongArch support for libpod * fix(deps): update github.com/containers/common digest to bc5f97c * [CI:DOCS] Update dependency golangci/golangci-lint to v1.57.1 * fix(deps): update module github.com/docker/docker to v25.0.5+incompatible [security] * fix(deps): update module github.com/onsi/gomega to v1.32.0 * [CI:DOCS] Update dependency golangci/golangci-lint to v1.57.0 * Update module github.com/cpuguy83/go- md2man/v2 to v2.0.4 * Fix type-o * Use correct extension in suite * minikube: instrument tests, to allow debugging failures * libpod: restart always reconfigure the netns * use new c/common pasta2 setup logic to fix dns * utils: drop conversion float->string->float * utils: do not generate duplicate range * logformatter: handle Windows logs * utils: add test for the new function * utils: move rootless code to a new function * xref-helpmsgs-manpages: cross- check Commands.rst * test/system: Add support for multipath routes in pasta networking tests * [skip-ci] rpm: use macro supported vendoring * Adjust to the standard location of gvforwarder used in new images * Makefile: add target `podman-remote-static` * Switch to 5.x WSL machine os stream using new automation * Cleanup build scratch dir if remote end disconnects while passing the context * bump main to 5.1.0-dev * Use faster gzip for compression for 3x speedup for sending large contexts to remote * pkg/machine: make checkExclusiveActiveVM race free * pkg/machine/wsl: remove unused CheckExclusiveActiveVM() * pkg/machine: CheckExclusiveActiveVM should also check for starting * pkg/machine: refresh config after we hold lock * Update dependency setuptools to ~=69.2.0 * [skip-ci] rpm: update containers-common dep on f40+ * fix invalid HTTP header values when hijacking a connection * Add doc to build podman on windows without MSYS * Removing CRI-O related annotations * fix(deps): update module github.com/containers/ocicrypt to v1.1.10 * Pass the restart policy to the individual containers * kube play: always pull when both imagePullPolicy and tag are missing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-76=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * podman-5.2.5-slfo.1.1_1.1 * podman-debuginfo-5.2.5-slfo.1.1_1.1 * podman-remote-debuginfo-5.2.5-slfo.1.1_1.1 * podman-remote-5.2.5-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * podman-docker-5.2.5-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-11218.html * https://www.suse.com/security/cve/CVE-2024-1753.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1221677 * https://bugzilla.suse.com/show_bug.cgi?id=1224112 * https://bugzilla.suse.com/show_bug.cgi?id=1231208 * https://bugzilla.suse.com/show_bug.cgi?id=1236270 * https://bugzilla.suse.com/show_bug.cgi?id=1236507 * https://bugzilla.suse.com/show_bug.cgi?id=1237641 * https://bugzilla.suse.com/show_bug.cgi?id=1239330 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:25 -0000 Subject: SUSE-SU-2025:20278-1: important: Security update for helm Message-ID: <174902204506.13583.2681983526386211376@smelt2.prg2.suse.org> # Security update for helm Announcement ID: SUSE-SU-2025:20278-1 Release Date: 2025-04-22T13:48:50Z Rating: important References: * bsc#1219969 * bsc#1220207 * bsc#1234482 * bsc#1235318 * bsc#1238688 Cross-References: * CVE-2024-25620 * CVE-2024-26147 * CVE-2024-45337 * CVE-2024-45338 * CVE-2025-22870 CVSS scores: * CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45338 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45338 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45338 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves five vulnerabilities can now be installed. ## Description: This update for helm fixes the following issues: * Update to version 3.17.2 (bsc#1238688, CVE-2025-22870): * Updating to 0.37.0 for x/net * build(deps): bump the k8s-io group with 7 updates * Update to version 3.17.1: * merge null child chart objects * build(deps): bump the k8s-io group with 7 updates * fix: check group for resource info match * Update to 3.17.0 (bsc#1235318, CVE-2024-45338): Full changelog: https://github.com/helm/helm/releases/tag/v3.17.0 * Notable Changes * Allow pulling and installation by OCI digest * Annotations and dependencies are now in chart metadata output * New --take-ownership flag for install and upgrade commands * SDK: Authorizer and registry authorizer are now configurable * Removed the Kubernetes configuration file permissions check * Added username/password to helm push and dependency build/update subcommands * Added toYamlPretty template function * Update to version 3.16.4 (bsc#1234482, CVE-2024-45337): * Bump golang.org/x/crypto from 0.30.0 to 0.31.0 * Bump the k8s-io group with 7 updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-75=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * helm-3.17.2-slfo.1.1_1.1 * helm-debuginfo-3.17.2-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * helm-bash-completion-3.17.2-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25620.html * https://www.suse.com/security/cve/CVE-2024-26147.html * https://www.suse.com/security/cve/CVE-2024-45337.html * https://www.suse.com/security/cve/CVE-2024-45338.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1219969 * https://bugzilla.suse.com/show_bug.cgi?id=1220207 * https://bugzilla.suse.com/show_bug.cgi?id=1234482 * https://bugzilla.suse.com/show_bug.cgi?id=1235318 * https://bugzilla.suse.com/show_bug.cgi?id=1238688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:28 -0000 Subject: SUSE-SU-2025:20277-1: important: Security update for libxslt Message-ID: <174902204847.13583.12667061104305512475@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:20277-1 Release Date: 2025-04-22T13:46:13Z Rating: important References: * bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References: * CVE-2023-40403 * CVE-2024-55549 * CVE-2025-24855 CVSS scores: * CVE-2023-40403 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-40403 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-55549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2024-55549 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2025-24855: Fix use-after-free of XPath context node (bsc#1239625) * CVE-2024-55549: Fix UAF related to excluded namespaces (bsc#1239637) * CVE-2023-40403: Make generate-id() deterministic (bsc#1238591) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-77=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxslt-debugsource-1.1.38-slfo.1.1_2.1 * libexslt0-debuginfo-1.1.38-slfo.1.1_2.1 * libxslt1-1.1.38-slfo.1.1_2.1 * libxslt1-debuginfo-1.1.38-slfo.1.1_2.1 * libexslt0-1.1.38-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40403.html * https://www.suse.com/security/cve/CVE-2024-55549.html * https://www.suse.com/security/cve/CVE-2025-24855.html * https://bugzilla.suse.com/show_bug.cgi?id=1238591 * https://bugzilla.suse.com/show_bug.cgi?id=1239625 * https://bugzilla.suse.com/show_bug.cgi?id=1239637 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:30 -0000 Subject: SUSE-RU-2025:20276-1: moderate: Recommended update for python-charset-normalizer Message-ID: <174902205049.13583.13508812292561371126@smelt2.prg2.suse.org> # Recommended update for python-charset-normalizer Announcement ID: SUSE-RU-2025:20276-1 Release Date: 2025-04-22T13:31:17Z Rating: moderate References: * bsc#1235781 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-charset-normalizer fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235781). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-66=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-charset-normalizer-3.1.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235781 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:32 -0000 Subject: SUSE-SU-2025:20275-1: important: Security update for libtasn1 Message-ID: <174902205259.13583.10065067711485662714@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2025:20275-1 Release Date: 2025-04-22T13:27:45Z Rating: important References: * bsc#1236878 Cross-References: * CVE-2024-12133 CVSS scores: * CVE-2024-12133 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-12133 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12133 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2024-12133: Fixed potential DoS in handling of numerous SEQUENCE OF or SET OF elements (bsc#1236878) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-63=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libtasn1-debugsource-4.19.0-slfo.1.1_2.1 * libtasn1-6-4.19.0-slfo.1.1_2.1 * libtasn1-6-debuginfo-4.19.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12133.html * https://bugzilla.suse.com/show_bug.cgi?id=1236878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:36 -0000 Subject: SUSE-SU-2025:20274-1: important: Security update for libxml2 Message-ID: <174902205622.13583.12645763052083127643@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20274-1 Release Date: 2025-04-22T12:11:42Z Rating: important References: * bsc#1237363 * bsc#1237370 * bsc#1237418 Cross-References: * CVE-2024-56171 * CVE-2025-24928 * CVE-2025-27113 CVSS scores: * CVE-2024-56171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-24928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-24928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-27113 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27113 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-56171: Fixed use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c [bsc#1237363] * CVE-2025-24928: Fixed stack-based buffer overflow in xmlSnprintfElements in valid.c [bsc#1237370] * CVE-2025-27113: Fixed NULL Pointer Dereference in libxml2 xmlPatMatch [bsc#1237418] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-65=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxml2-debugsource-2.11.6-slfo.1.1_2.1 * libxml2-tools-2.11.6-slfo.1.1_2.1 * libxml2-2-debuginfo-2.11.6-slfo.1.1_2.1 * libxml2-2-2.11.6-slfo.1.1_2.1 * libxml2-tools-debuginfo-2.11.6-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56171.html * https://www.suse.com/security/cve/CVE-2025-24928.html * https://www.suse.com/security/cve/CVE-2025-27113.html * https://bugzilla.suse.com/show_bug.cgi?id=1237363 * https://bugzilla.suse.com/show_bug.cgi?id=1237370 * https://bugzilla.suse.com/show_bug.cgi?id=1237418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:39 -0000 Subject: SUSE-RU-2025:20273-1: moderate: Recommended update for python-distro Message-ID: <174902205966.13583.524064725138102783@smelt2.prg2.suse.org> # Recommended update for python-distro Announcement ID: SUSE-RU-2025:20273-1 Release Date: 2025-04-22T12:10:36Z Rating: moderate References: * bsc#1235785 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-distro fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235785) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-68=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-distro-1.8.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235785 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:42 -0000 Subject: SUSE-SU-2025:20272-1: important: Security update for orc Message-ID: <174902206241.13583.17624646697662878463@smelt2.prg2.suse.org> # Security update for orc Announcement ID: SUSE-SU-2025:20272-1 Release Date: 2025-04-22T12:08:29Z Rating: important References: * bsc#1228184 Cross-References: * CVE-2024-40897 CVSS scores: * CVE-2024-40897 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40897 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for orc fixes the following issues: * CVE-2024-40897: Fixed stack-based buffer overflow inside the orc compiler when formatting error messages for certain input files (bsc#1228184). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-73=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * orc-debugsource-0.4.34-slfo.1.1_2.1 * liborc-0_4-0-debuginfo-0.4.34-slfo.1.1_2.1 * liborc-0_4-0-0.4.34-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40897.html * https://bugzilla.suse.com/show_bug.cgi?id=1228184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:27:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:27:43 -0000 Subject: SUSE-FU-2025:20271-1: moderate: Feature update for Public Cloud packages Message-ID: <174902206367.13583.12928620027476319236@smelt2.prg2.suse.org> # Feature update for Public Cloud packages Announcement ID: SUSE-FU-2025:20271-1 Release Date: 2025-04-22T11:50:34Z Rating: moderate References: * jsc#PED-11572 * jsc#SMO-553 Affected Products: * SUSE Linux Micro 6.1 An update that contains two features can now be installed. ## Description: This update for Public Cloud packages fixes the following issues: google-dracut-config: * Implementation of google-dracut-config at version 0.0.4 (jsc#PED-11572) google-guest-agent: * Implementation of google-guest-agent at version 20250116.00 (jsc#SMO-553) google-guest-configs: * Implementation of google-guest-configs at version 20241205.00 (jsc#SMO-553) google-guest-oslogin: * Implementation of google-guest-oslogin at version 20231116.00 (jsc#SMO-553) google-osconfig-agent: * Implementation of google-osconfig-agent at version 20250115.01 (jsc#SMO-553) growpart-rootgrow: * Implementation of growpart-rootgrow at version 1.0.7 (jsc#SMO-553) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-74=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * growpart-rootgrow-1.0.7-slfo.1.1_1.2 * google-dracut-config-0.0.4-slfo.1.1_1.1 * google-guest-configs-20241205.00-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debugsource-20231116.00-slfo.1.1_1.3 * google-guest-oslogin-debuginfo-20231116.00-slfo.1.1_1.3 * google-guest-agent-20250116.00-slfo.1.1_1.1 * google-osconfig-agent-20250115.01-slfo.1.1_1.1 * google-guest-oslogin-20231116.00-slfo.1.1_1.3 ## References: * https://jira.suse.com/browse/PED-11572 * https://jira.suse.com/browse/SMO-553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:05 -0000 Subject: SUSE-SU-2025:20283-1: important: Security update for the Linux Kernel Message-ID: <174902208559.12703.15770094191927070544@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20283-1 Release Date: 2025-04-25T09:37:28Z Rating: important References: * bsc#1224013 * bsc#1224757 * bsc#1228659 * bsc#1231910 * bsc#1234074 * bsc#1234157 * bsc#1234698 * bsc#1235550 * bsc#1235870 * bsc#1237874 * bsc#1237882 * bsc#1238052 * bsc#1238565 * bsc#1238746 * bsc#1238970 * bsc#1238990 * bsc#1239066 * bsc#1239475 * bsc#1239684 * bsc#1239906 * bsc#1239925 * bsc#1240167 * bsc#1240168 * bsc#1240171 * bsc#1240176 * bsc#1240184 * bsc#1240185 * bsc#1240375 * bsc#1240575 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240806 * bsc#1240808 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240978 * bsc#1240979 * bsc#1241038 * jsc#PED-12309 Cross-References: * CVE-2024-27415 * CVE-2024-50038 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-58018 * CVE-2024-58071 * CVE-2025-21729 * CVE-2025-21755 * CVE-2025-21806 * CVE-2025-21836 * CVE-2025-21863 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21881 * CVE-2025-21884 * CVE-2025-21887 * CVE-2025-21889 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21981 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-2312 CVSS scores: * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves 75 vulnerabilities, contains one feature and has 14 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: mm: Correct the update of max_pfn (git-fixes) * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: fix potential error return (git-fixes). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-15=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-source-rt-6.4.0-30.1 * kernel-devel-rt-6.4.0-30.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-30.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-debugsource-6.4.0-30.1 * kernel-rt-debuginfo-6.4.0-30.1 * kernel-rt-devel-6.4.0-30.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-30-rt-debuginfo-1-1.3 * kernel-rt-devel-debuginfo-6.4.0-30.1 * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-1-1.3 * kernel-livepatch-6_4_0-30-rt-1-1.3 * kernel-rt-livepatch-6.4.0-30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://jira.suse.com/browse/PED-12309 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:07 -0000 Subject: SUSE-RU-2025:20282-1: moderate: Recommended update for amazon-dracut-config Message-ID: <174902208734.12703.10425412857047794761@smelt2.prg2.suse.org> # Recommended update for amazon-dracut-config Announcement ID: SUSE-RU-2025:20282-1 Release Date: 2025-04-23T11:37:21Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for amazon-dracut-config contains the following fixes: * Initial release for amazon-dracut config on Micro 6.1: * Update to 0.0.4 * Move dracut config files to usr/lib/ dir * Update to 0.0.3 * Add provides and conflicts on generic name dracut-instance-change-config * Update to 0.0.2 * Rename config for nvme for consistency * Add dracut build requirement * Initial release v0.0.1 (PED-11572) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-81=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * amazon-dracut-config-0.0.4-slfo.1.1_1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:16 -0000 Subject: SUSE-RU-2025:20281-1: important: Recommended update for qemu Message-ID: <174902209617.12703.5799909622351173394@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2025:20281-1 Release Date: 2025-04-22T15:18:13Z Rating: important References: * bsc#1221812 * bsc#1228079 * bsc#1228343 * bsc#1230978 * bsc#1231166 * bsc#1232283 * bsc#1232728 * bsc#1233530 * bsc#1236709 * bsc#1237603 Affected Products: * SUSE Linux Micro 6.1 An update that has 10 fixes can now be installed. ## Description: This update for qemu fixes the following issues: * linux-user: Do not define struct sched_attr if libc headers do (bsc#1237603) * elfload: Fix alignment when unmapping excess reservation (bsc#1236709) * linux-user: Honor elf alignment when placing images (bsc#1236709) * tests/acpi: q35: Update host address width in DMAR (bsc#1228343) * intel_iommu: Set default aw_bits to 48 starting from QEMU 9.2 (bsc#1228343) * tests/acpi: q35: allow DMAR acpi table changes (bsc#1228343) * Update version to 8.2.9 * Full changelog here: https://lore.kernel.org/qemu- devel/568115c5-8908-4931-aae0-a57bf542f68a at tls.msk.ru/ * Some backports: gdbstub/user-target: fix gdbserver int format (%d -> %x) target/s390x: Fix MVC not always invalidating translation blocks physmem: fix qemu_ram_alloc_from_fd size calculation hw/usb/canokey: Fix buffer overflow for OUT packet target/arm: arm_reset_sve_state() should set FPSR, not FPCR hw/cxl: Fix msix_notify: Assertion `vector < dev->msix_entries_nr` tests: acpi: update expected blobs pci: acpi: Windows 'PCI Label Id' bug workaround tests: acpi: whitelist expected blobs pci/msix: Fix msix pba read vector poll end calculation pci: ensure valid link status bits for downstream ports hw/usb/hcd-xhci-pci: Use modulo to select MSI vector as per spec backends/cryptodev-vhost-user: Fix local_error leaks tests/qtest/boot-serial-test: Correct HPPA machine name target/i386/cpu: Fix notes for CPU models docs: Correct release of TCG trace-events removal target/loongarch: Use actual operand size with vbsrl check s390x/s390-virtio-ccw: don't crash on weird RAM sizes vhost-user: fix shared object return values meson.build: Disallow libnfs v6 to fix the broken macOS build hw/intc/arm_gicv3_its: Zero initialize local DTEntry etc structs roms: re-add edk2-basetools target edk2: commit version info edk2: get version + date from git submodule x86/loader: only patch linux kernels * nbd/server: avoid per-NBDRequest nbd_client_get/put() (bsc#1232283) * [openSUSE][RPM] The qemu translation is not being installed (bsc#1231166) * target/i386: Expose IBPB-BRTYPE and SBPB CPUID bits to the guest (bsc#1228079) * [openSUSE] block: Move qcow2 invalidation query-block op_blocker * scsi: megasas: Internal cdbs have 16-byte length (bsc#1233530) * Update version to 8.2.8 * Full changelog here: https://lore.kernel.org/qemu- devel/1b7d3242-abe9-408a-bd77-85162e0d0de4 at tls.msk.ru/ * Some backports: usb-hub: Fix handling port power control messages hw/audio/hda: fix memory leak on audio setup (bsc#1232728) hw/misc/mos6522: Fix bad class definition of the MOS6522 device contrib/plugins: add compat for g_memdup2 target/i386: fix hang when using slow path for ptw_setl tcg: Allow top bit of SIMD_DATA_BITS to be set in simd_desc() linux-user/arm: Select vdso for be8 and be32 modes linux-user/arm: Reduce vdso alignment to 4k linux-user: Tolerate CONFIG_LSM_MMAP_MIN_ADDR accel/tcg: Fix user-only probe_access_internal plugin check target/arm: Drop user-only special case in sve_stN_r linux-user: Fix setreuid and setregid to use direct syscalls target/i386: Fix legacy page table walk 9pfs: fix crash on 'Treaddir' request hw/nvme: fix handling of over-committed queues migration: Ensure vmstate_save() sets errp target/arm: Fix SVE SDOT/UDOT/USDOT (4-way, indexed) target/ppc: Fix mtDPDES targeting SMT siblings target/ppc: Set ctx->opcode for decode_insn32() target/riscv: Fix vcompress with rvv_ta_all_1s target/riscv/kvm: clarify how 'riscv-aia' default works target/riscv/kvm: set 'aia_mode' to default in error path hw/intc/riscv_aplic: Check and update pending when write sourcecfg hw/intc/riscv_aplic: Fix in_clrip[x] read emulation target/riscv: Set vtype.vill on CPU reset ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-79=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * qemu-audio-spice-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-nfs-8.2.9-slfo.1.1_1.1 * qemu-headless-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-img-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-spice-8.2.9-slfo.1.1_1.1 * qemu-block-curl-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-vga-8.2.9-slfo.1.1_1.1 * qemu-debugsource-8.2.9-slfo.1.1_1.1 * qemu-ui-opengl-8.2.9-slfo.1.1_1.1 * qemu-block-curl-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-ssh-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-host-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-ksm-8.2.9-slfo.1.1_1.1 * qemu-block-rbd-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-ui-spice-core-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-8.2.9-slfo.1.1_1.1 * qemu-hw-display-qxl-8.2.9-slfo.1.1_1.1 * qemu-hw-display-qxl-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-chardev-spice-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-ui-opengl-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-pci-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-host-8.2.9-slfo.1.1_1.1 * qemu-guest-agent-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-redirect-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-tools-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-iscsi-8.2.9-slfo.1.1_1.1 * qemu-block-nfs-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-block-rbd-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-ui-spice-core-8.2.9-slfo.1.1_1.1 * qemu-pr-helper-8.2.9-slfo.1.1_1.1 * qemu-block-iscsi-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-chardev-spice-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-hw-display-virtio-gpu-8.2.9-slfo.1.1_1.1 * qemu-block-ssh-8.2.9-slfo.1.1_1.1 * qemu-hw-usb-redirect-8.2.9-slfo.1.1_1.1 * qemu-pr-helper-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-guest-agent-8.2.9-slfo.1.1_1.1 * qemu-audio-spice-8.2.9-slfo.1.1_1.1 * qemu-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-img-8.2.9-slfo.1.1_1.1 * qemu-tools-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (aarch64) * qemu-arm-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-arm-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * qemu-lang-8.2.9-slfo.1.1_1.1 * qemu-vgabios-8.2.91.16.3_3_ga95067eb-slfo.1.1_1.1 * qemu-seabios-8.2.91.16.3_3_ga95067eb-slfo.1.1_1.1 * qemu-SLOF-8.2.9-slfo.1.1_1.1 * qemu-ipxe-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (ppc64le) * qemu-ppc-8.2.9-slfo.1.1_1.1 * qemu-ppc-debuginfo-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (s390x) * qemu-s390x-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-s390x-8.2.9-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (x86_64) * qemu-accel-tcg-x86-8.2.9-slfo.1.1_1.1 * qemu-accel-tcg-x86-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-x86-debuginfo-8.2.9-slfo.1.1_1.1 * qemu-x86-8.2.9-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221812 * https://bugzilla.suse.com/show_bug.cgi?id=1228079 * https://bugzilla.suse.com/show_bug.cgi?id=1228343 * https://bugzilla.suse.com/show_bug.cgi?id=1230978 * https://bugzilla.suse.com/show_bug.cgi?id=1231166 * https://bugzilla.suse.com/show_bug.cgi?id=1232283 * https://bugzilla.suse.com/show_bug.cgi?id=1232728 * https://bugzilla.suse.com/show_bug.cgi?id=1233530 * https://bugzilla.suse.com/show_bug.cgi?id=1236709 * https://bugzilla.suse.com/show_bug.cgi?id=1237603 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:19 -0000 Subject: SUSE-RU-2025:20280-1: important: Recommended update for python-kiwi Message-ID: <174902209972.12703.3496214432078651886@smelt2.prg2.suse.org> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2025:20280-1 Release Date: 2025-04-22T14:42:49Z Rating: important References: * bsc#1228741 * bsc#1235448 * bsc#1237772 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that has three fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Bump version: 10.2.11 to 10.2.12 * Fix profile env variable name regression In the effort of adapting to the latest snapper in Issue #2697 we overlooked the after effect of a different variable name in the profile environment with regards to $kiwi_btrfs_root_is_snapshot and $kiwi_btrfs_root_is_snapper_snapshot. Image builds that references the former variable name would be broken by the change. This commit makes sure no regression is introduced by providing both variants (bsc#1237772). * Fix grub mkimage call for the ppc platform The list of modules used to create a grub platform image for ppc was the same list as used for the x86 bios platform. This commit fixes this and also cleans up the inconsistency and misleading names used for creating platform specific output. * Bump version: 10.2.10 to 10.2.11 * Update box plugin documentation Add chapter about new container build feature. The box plugin can now also run the build in containers * The ubuntu 20.04 github runner is closing down Make sure to move to another runner for workloads which still uses ubuntu 20.04 * Bump version: 10.2.9 to 10.2.10 * Poetry build sdist timestamps set to epoch 0 Newer versions of poetry set the timestamp for all source files to epoch 0. Such sources are not accepted by e.g Debian FTP servers and in general I don't like when tools changes their behavior just like that. This commit forces an older version of poetry for the purpose of creating the sdist tarball which then gets published on pypi. The argumentation for reproducible builds by forcing source files to a certain timestamp doesn't fly for me. I'm open for any better solution though. * Bump version: 10.2.8 to 10.2.9 * Classify missing chkstat as debug message chkstat is a distribution specific tool. If it is present we use it, if not we don't but it's not worth a warning. * Allow to run setfiles multi threaded Use option -T0 for newer setfiles version. * Add rd.kiwi.dialog.timeout option Allow to configure the timeout value for dialogs displayed by the kiwi dracut code. By default the timeout is set to 60 seconds. With the special value "off" the dialog will never timeout. * Make sure copy actions does not drop context Use shutil.copy2 to copy files preserving their attributes in the grub BootLoader space. * Improve unit test for archive target_dir Add a test case with absolute path in the target_dir to make sure we never unpack the archive to the host system. * Fixed profiled overlay imports When building an image for profile: SOME and providing an overlay directory named SOME/... kiwi will sync the contents of this overlay directory to the root tree. However it took the toplevel name SOME/ into account which is unwanted because only the sub data structure should be synced into the new root tree. * Bump version: 10.2.7 to 10.2.8 * Use multipath child instead of parent device On multipath systems we need to find underlying child device instead of using parent device. This prevents listing all parent devices for a multipath device * Increase size for agama integration test build Agama needs more space to build now * Fixed agama integration test rubygem-byebug and rubygem-agama-yast seems to no longer exist * Update TW integration tests Package nscd was dropped from TW * Fix documentation regarding URI styles In reference to commit 760a65558f9e2e91d3eaa3a2f9503ff596984b48 the support for iso:// URI types was dropped some time ago. However, the documentation was not properly updated. This commit fixes it * Fix return value of grub helper methods The grub helper methods to find grub tools returns a None value if the tool cannot be found. This None value could be used later in a Command call where it will be used in a join() command to log the resulting commandline. This join() call then fails and raises an unhandled error causing a stack trace in the application. This commit fixes it * Added disk validation for duplicate installs Installing the same image to different storage disks on the same machine creates device conflicts with unexpected side effects. This commit adds a validation based on the PTUUID of the disk image to check if another device on the system has the same ID and if yes, does not allow to install the image again including a message which device takes the same identifier (bsc#1228741). * Fixed documentation for signing key attribute The source locator name for local files was incorrect * Bump version: 10.2.6 to 10.2.7 * Update documentation Added a new troubleshooting chapter as subsection to the Build Host Constraints named Package Manager Behavior. It serves the purpose to describe options for the customer to change the default package manager behavior which we from the kiwi side do not influence intentionally. This is a followup change to (bsc#1235448). * Drop still present tox artifacts There were still some left over tox files and the documentation contribution chapter was also wrong at several places * Add support for reading optional pkgmgr env file If there is a file .kiwi.package_manager.env in the root of the image tree it will be read and put into the caller environment for the selected package and repository manager. There are features in e.g zypper which can only be used via env variables (bsc#1235448). * Auto convert unit test XML data to schema v8.3 * Rename btrfs_root_is_snapshot Rename btrfs_root_is_snapshot to btrfs_root_is_snapper_snapshot. This happens in preparation for the changes suggested where we want to get rid of snapper specific btrfs code which will be available in snapper natively soon. To make sure a btrfs layout specific to snapper(and SUSE), the implicitly used attribute named btrfs_root_is_snapshot now becomes explicit and its new name will indicate that snapper sits behind it. Along with the rename a XSLT stylesheet to automatically convert the old name into the new name for schema v8.3 will be performed. * Bump version: 10.2.5 to 10.2.6 * Fixed donate button target * Added LUKS reencryption support Added rd.kiwi.oem.luks.reencrypt boot option consumed by the kiwi-repart dracut module. For OEM LUKS2 encrypted disk images. If set, reencrypts the disk prior an eventual resize and therefore creates a new key pool and master key. The reencryption is advisable if the image binary is not protected. With access to the image binary it's possible to extract the luks header which then allows to decrypt the data unless it was reencrypted. The reencryption process only runs if the checksum of the luks header still matches the one from the original disk image. Be aware that the reencryption will ask for the passphrase if the image has been built with an initial luks passphrase. * Fixed arm/tumbleweed/test-image-rpi No ruby required for this integration test build * Plain zipl loader needs boot partition If the rootfs is something zipl cannot read, we need an extra boot partition using a supported filesystem * Fixed IBM-Cloud-Standard profile The test-image-MicroOS integration test builds an IBM-Cloud-Standard profile as encrypted variant with a random key that is not protected by an encrypted boot image. This doesn't make sense. Thus the encryption setup for the IBM cloud standard build got removed. Use the IBM-Cloud-Secure-Execution profile to test encrypted secure linux builds * Fixed test-image-qcow-openstack rsh package was dropped from TW * Fix genprotimg for s390 builds A recent change on genprotimg now forbids to use --cert in combination with --no-verify, even though this was allowed before. * Fix documentation for repo, package gpg settings In contrast to the documentation, kiwi sets default values for any gpg setting if not explicitly specified differently. We want to avoid to inherit a behavior from how the distribution packages the package manager. This commit fixes the documentation to be in line with the implementation * Drop insecure and unsupported md5 digest Decommission the Checksum.md5() method and move all places in code to sha256(). The md5 digest is considered insecure and has also been removed from hashlib as a supported digest. * Fix config functions action The action failed on the setup of the runtime because the upgrade of pip failed. * Bump version: 10.2.4 to 10.2.5 * Changed systemfiles provider Instead of providing a static list of filenames, provide a list of package names. It is expected that the pilot of flake-pilot resolves this list against the local package database to build up the filelist for provisioning * Bump version: 10.2.3 to 10.2.4 * Update system files setup for containers The attribute provide_system_files creates a meta file in the root tree named 'systemfiles'. The contents of this file were produced by just a dump of the package database so far. For a more generic use of this data some adaptions were needed. First we allow to skip packages matching a pattern from being part of the system files. Next we do not put ghost and doc files into account. And last we handle library files in a different file named 'systemfiles.libs' where we do not add symlink targets if the target path is also part of the package. The consumer of this information is flake-pilot which syncs that library system files from the host via --copy-links. This allows a more generic use with regards to versioned libraries e.g. libc * Drop /dev/pts from bind mount locations This has created havoc in the Fedora build environments by fully unmounting /dev/pts and breaking the builders for subsquent tasks. This is a partial revert of commit daf1323c5ded7e4e7783205f5e30457b40eb322f. * Don't take ghost files into account When creating the system files information do not take ghost files and artifact files into account * Bump version: 10.2.2 to 10.2.3 * Update STYLEROOT to SUSE 2022 * Fix broken links in the documentation * Fix legacy_bios_mode detection The code in this method does not work correctly if the firmware is set to 'bios'. In bios only mode the method returned a false value which is incorrect as it should return a true value in this case. Without this patch ISO images will fail to boot because no loader gets configured. * Added /dev/pts to bind mount locations During runtime several kernel filesystems are bind mounted into the image root system such that programs expecting it can work. /dev/pts was not needed so far but seems to be a good addition to the list to make tools like sudo to work properly when called e.g. from a config.sh script. * xorriso: respect efiparttable and gpt_hybrid_mbr This should make the xorriso-based ISO build path respect the 'efiparttable' and 'gpt_hybrid_mbr' settings when building a UEFI-compatible image, making it write a GPT disk label by default instead of an MBR (msdos) one. If it's building an image that is not UEFI-compatible it will always write an MBR label, regardless of this setting. If 'gpt_hybrid_mbr' is set, xorriso will write an Ubuntu-style MBR/GPT hybrid partition table, where the MBR partition table includes a partition with type 00 and the bootable flag, as well as the partition with type ee required by the UEFI spec. This mildly violates the UEFI spec but may make the image bootable on native BIOS or CSM firmwares which refuse to boot from a disk with no partition marked 'bootable' in the MBR. If 'gpt_hybrid_mbr' is not set, xorriso will write a strictly UEFI-spec compliant label, with just the 'protective MBR' required by the UEFI spec (no bootable partition) and the correct GPT partition table. Note this is somewhat different from what gpt_hybrid_mbr does for disk images. Also, we now pass -compliance no_emul_toc when building ISOs, as recommended by upstream in https://lists.gnu.org/archive/html/bug- xorriso/2024-11/msg00012.html This tool is generally always going to be building ISOs intended for write-once use, not multi-session use (and which are rarely, these days, written to physical discs at all anyway). * Added provide/require system files for containers Added the attributes provide_system_files and require_system_files to control the provider and requester of system files in container image builds. systemfiles is a metadata file which contains all files from the package database at call time. It is used in flake-pilot to provision the systemfiles data from the host into the container instance. One possible use case for this data is a flake registration which uses a base container that is derived from a runtime container but all data from the runtime should be provisioned from the host. Using this feature tightly couples the flake to the host OS distribution and version. * Bump version: 10.2.1 to 10.2.2 * Fix scope issue Increase livetime of the the compressor instances to the livetime of RootImportOCI. They create temporary files which are referenced later and need to live longer than the block they got created in * Bump version: 10.2.0 to 10.2.1 * Fixed use of fscreateoptions for iso type The information for fscreateoptions was not passed along to the tooling if a custom filesystem attribute was specified. * Allow to derive from multiple containers Add support for multi inheritance to the derived_from attribute In the order of a comma seperated list of docker source URI's a base tree is created. This was possible only with one container so far and Fixes #2680 as well as jira#OBS-354 * Bump version: 10.1.18 to 10.2.0 * Add selinux test build to TW Also update derived docker integration test to latest Leap * kiwi/schema: Fix allowed value type for ISO publisher and application ID According to the spec, this should be constrained to 128 characters but also allow quite a few other special characters (as well as spaces). We didn't allow spaces in application ID, but allowed too much for Publisher. Now we set up both correctly. * Fix setup of kiwi environment variables Some kiwi env vars are initialized with an empty value and not overwritten if another value is provided. For the selected variables an empty value setting is not allowed because the schema also enforces the value to be set at least once. In addition a helpful option named --print-kiwi-env was added to the 'image info' command which allows to print the environment variables and their values. * Add random key support for LUKS encryption Allow to pass luks="random". In random mode use the generated keyfile as the only key to decrypt. This is only secure if the generated initrd also gets protected e.g. through encryption like it is done with the secure linux execution on zSystems * Added development group in pyproject setup generateDS and other tools are needed and were forgotten to be added when we deleted the tox dependency * Added containers integration with OBS When building in the Open Build Service (OBS) there is no way to create outgoing connections from the build workers. To allow the containers section to fetch containers from the SUSE registry we need to apply an OCI URI translation into a local path. The actual OCI container image is expected to be provided by the obs backend on the worker. Along with this commit also an integration test named test- image-disk-containers is provided (jira#OBS-351). * Fix rendering of SUSE docs The SUSE documentation is produced through a conversion of the ReST source into docbook. The name kiwi is reserved in the index and needs to be referenced as kiwi-ng when used as command. * Remove tox dependency tox was used as sort of a make target to run unit tests and more in a python virtualenv. However, since we switched everything to poetry it's no longer needed to let tox create the python virtual environments. This commit moves the tox targets into the Makefile and adapts the github workflow files accordingly. In addition the scripts container based tests were re-activated and fixed such that they succeed again. * Fix make build target Move the actions done by the tox target into the build target and call them there in a clean and easy to spot sequence. There is no need to call tox to prepare for the package submission, instead the checks and poetry runs to prepare for the package target should be called directly as part of the build target. In the future we might get rid of tox completely. * Bump version: 10.1.17 to 10.1.18 * Fixed zipl caller environment zipl gets confused with an active sysfs mount inside the root tree at call time of zipl. This commit umounts the /sys bind mount in the image tree prior calling zipl * Fix s390 test-image-disk build Add missing kernel links used by suse tools * Bump version: 10.1.16 to 10.1.17 * Fix coloring of build_status.sh flags Depending on the place of the status flag the color setup might fail. This commit fixes it * Add pytest-container as optional dependency The pyproject.toml listed pytest-container as dependency but it is used only to run the container based integration tests for the shell helper methods. For building the package this dependency should not be pulled in * Fix networking in erofs integration test The network setup was systemd- networkd based but the provided network config was not for systemd * Bump version: 10.1.15 to 10.1.16 * Fix erofs requires in spec erofs-utils for SUSE only exists in Tumbleweed. The former conditon would also add the requirement for ALP and SLFO which is wrong. This commit fixes it * Add vagrantconfig rule for vagrant format If the format="vagrant" attribute is set, a vagrantconfig section becomes mandatory. This commit enforces this rule on the schema. * Bump version: 10.1.14 to 10.1.15 * Fixed sphinx_rtd_theme setup Delete obsolete display_version attribute * Evaluate eficsm everywhere Fixed _supports_bios_modules() to take an eventually provided eficsm setup into account. The grub config still searches for i386 grub modules even if eficsm="false" is set. * Fixed debian bootstrap script calls Run scripts as commands with their native shebang and not through bash. Not all debian package scripts uses bash, some of them uses sh which can be a link to dash or other interpreters. * Update TW integration tests The package x86info was dropped from TW * Turn DiskFormat into an ordinary class * it does not need to be an abstract base class * use f-strings where applicable instead of format() * change return type of _custom_args_for_format from list to tuple * Add new containers section Allow to specify references to OCI containers in the image description During the kiwi process the containers are fetched into a temporary location and a systemd service is configured to one time load the containers into the local registry at first boot of the system. * Bump version: 10.1.13 to 10.1.14 * Revert "Install usrmerge for Debian integration test" This reverts commit 95ac861741f14c4f35611c16328384c18e53dcfb. Solution needs to be provided in code * Install usrmerge for Debian integration test * Support older apt versions for bootstrap * Run package scripts in apt bootstrap phase The bootstrap procedure based on apt only runs a manual collection of package scripts. This commit refactors the code that unpacks the bootstrap packages to a python implementation and adds a method to run the bootstrap scripts from all packages resolved by apt. * Bump version: 10.1.12 to 10.1.13 * Fix bundle extension for vagrant type When bundling result files that uses a vagrant type, kiwi creates them with the extension .vagrant.virtualbox.box or .vagrant.libvirt.box. The bundler code renames them using only the .box suffix which is too short as it is missing the subformat information. This commit fixes it and keeps this information in the result bundle file name. * Use simple quotas (squota) for volumes * Add quota attribute to volume section Allow to set quota per volume for the btrfs filesystem * Fix globbing with exclude with regex This fixes a collection of bugs when producing erofs images. On one hand, this ensures that an exclude of `/sys` doesn't accidentally match `/lib/libsystemd.so`, only `/sys/whatever`. On the other hand, this ensures that `/dev/*` does match `/dev/vda` and not just `/dev///////////`. This fixes libsystemd.so getting dropped in Kiwi- built FEX images. * Honour custom exclude for filesystem builds All other call sites honour the custom exclude file, it's just this one that needs to be fixed. This unblocks use of Kiwi for generating FEX rootfs. * test: storage: update clone_device tests with new block size * storage: clone_device: increase dd block size Increasing the block size used for dd reduces the time needed to clone a device. * Bump version: 10.1.11 to 10.1.12 * Add missing erofscompression validation In the filesystem builder I forgot to evaluate the erofscompression attribute. * Include PI and comments in XSL stylesheets So far comments and processing instructions (PI) were ignored when applying the XSL stylesheets. This commit updates all stylesheets to take them into account * Bump version: 10.1.10 to 10.1.11 * doc: Add login information test build test images ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-80=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-80=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * dracut-kiwi-oem-repart-10.1.10-slfo.1.1_2.1 * dracut-kiwi-lib-10.1.10-slfo.1.1_2.1 * dracut-kiwi-oem-dump-10.1.10-slfo.1.1_2.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * python3-kiwi-10.1.10-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228741 * https://bugzilla.suse.com/show_bug.cgi?id=1235448 * https://bugzilla.suse.com/show_bug.cgi?id=1237772 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:27 -0000 Subject: SUSE-SU-2025:20279-1: important: Security update for podman Message-ID: <174902210781.12703.3708377097960904102@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20279-1 Release Date: 2025-04-22T13:50:03Z Rating: important References: * bsc#1221677 * bsc#1224112 * bsc#1231208 * bsc#1236270 * bsc#1236507 * bsc#1237641 * bsc#1239330 Cross-References: * CVE-2023-45288 * CVE-2024-11218 * CVE-2024-1753 * CVE-2024-3727 * CVE-2024-9407 * CVE-2025-22869 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-11218 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-11218 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-11218 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-1753 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves seven vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2023-45288: Fixed closing connection when receiving too many headers (bsc#1236507). * CVE-2024-11218: Fixed container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (bsc#1236270). * CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239330). * CVE-2025-27144: Fixed Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237641). * CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208). * CVE-2024-3727: Fixed digest type (bsc#1224112). * CVE-2024-1753: Fixed full container escape at build time (bsc#1221677). Other fixes: \- Updated to version 5.2.5: * RPM: remove dup Provides * Packit: constrain koji and bodhi jobs to fedora package to avoid dupes * Validate the bind-propagation option to `--mount` * Updated Buildah to v1.37.4 * vendor: updated c/common to v0.60.4 * pkg/specgen: allow pasta when running inside userns * libpod: convert owner IDs only with :idmap * allow exposed sctp ports * libpod: setupNetNS() correctly mount netns * vendor: updated c/common to v0.60.3 * [skip-ci] Packit: split out ELN jobs and reuse fedora downstream targets * [skip-ci] Packit: Enable sidetags for bodhi updates * Updated gvisor-tap-vsock to 0.7.5 * CI: podman-machine: do not use cache registry * [CI:DOCS] Add v5.2.2 lib updates to RELEASE_NOTES.md * Update RELEASE_NOTES for v5.2.2 * [v5.2] Bump Buildah to v1.37.2, c/common v0.60.2, c/image v5.32.2 * [v5.2] golangci-lint: make darwin linting happy * [v5.2] golangci-lint: make windows linting happy * [v5.2] test/e2e: remove kernel version check * [v5.2] golangci-lint: remove most skip dirs * [v5.2] set !remote build tags where needed * [v5.2] update golangci- lint to 1.60.1 * Packit: update targets for propose-downstream * Create volume path before state initialization * Update Cirrus DEST_BRANCH * Bump to v5.2.2-dev * Bump to v5.2.1 * Update release notes for v5.2.1 * [v5.2] Add zstd:chunked test fix * [v5.2] Bump Buildah to v1.37.1, c/common v0.60.1, c/image v5.32.1 * libpod: reset state error on init * libpod: do not save expected stop errors in ctr state * libpod: fix broken saveContainerError() * Bump to v5.2.1-dev * Bump to v5.2.0 * Never skip checkout step in release workflow * Bump to v5.2.0-dev * Bump to v5.2.0-rc3 * Update release notes for v5.2.0-rc3 * Tweak versions in register_images.go * fix network cleanup flake in play kube * WIP: Fixes for vendoring Buildah * Add --compat-volumes option to build and farm build * Bump Buildah, c/storage, c/image, c/common * libpod: bind ports before network setup * pkg/api: do not leak config pointers into specgen * build: Update gvisor-tap-vsock to 0.7.4 * test/system: fix borken pasta interface name checks * test/system: fix bridge host.containers.internal test * CI: system tests: instrument to allow failure analysis * Use uploaded .zip for Windows action * RPM: podman-iptables.conf only on Fedora * Bump to v5.2.0-dev * Bump to v5.2.0-rc2 * Update release notes for v5.2.0-rc2 * test/e2e: fix ncat tests * libpod: add hidden env to set sqlite timeout * Add support for StopSignal in quadlet .container files * podman pod stats: fix race when ctr process exits * Update module github.com/vbauerster/mpb/v8 to v8.7.4 * libpod: correctly capture healthcheck output * Bump bundled krunkit to 0.1.2 * podman stats: fix race when ctr process exists * nc -p considered harmful * podman pod stats: fix pod rm race * podman ps: fix racy pod name query * system connection remove: use Args function to validate * pkg/machine/compression: skip decompress bar for empty file * nc -p considered harmful * podman system df: fix fix ErrNoSuchCtr/Volume race * podman auto-update: fix ErrNoSuchCtr race * Fix name for builder in farm connection * 700-play.bats: use unique pod/container/image/volume names * safename: consistent within same test, and, dashes * 700-kube.bats: refactor $PODMAN_TMPDIR/test.yaml * 700-play.bats: eliminate $testYaml * 700-play.bats: refactor clumsy yamlfile creation * 700-play.bats: move _write_test_yaml up near top * chore(deps): update dependency setuptools to v71 * Expand drop-in search paths * top-level (pod.d) * truncated (unit-.container.d) * Remove references and checks for --gpus * Do not crash on invalid filters * fix(deps): update module github.com/rootless- containers/rootlesskit/v2 to v2.2.0 * Bump to v5.2.0-dev * Bump to v5.2.0-rc1 * Keep the volume-driver flag deprecated * Vendor in latest containers(common, storage,image, buildah) * System tests: safe container/image/volume/etc names * Implement disable default mounts via command line * test: drop unmount for overlay * test: gracefully terminate server * libpod: shutdown Stop waits for handlers completion * libpod: cleanup store at shutdown * Add NetworkAlias= support to quadlet * cmd: call shutdown handler stop function * fix race conditions in start/attach logic * swagger: exlude new docker network types * vendor: bump c/storage * update to docker 27 * contrib: use a distinct --pull- option= for each flag * Update warning message when using external compose provider * Update module github.com/cyphar/filepath-securejoin to v0.3.0 * Ignore result of EvalSymlinks on ENOENT * test/upgrade: fix tests when netavark uses nftables * test/system: fix network reload test with nftables * test/e2e: rework some --expose tests * test: remove publish tests from e2e * CI: test nftables driver on fedora * CI: use local registry, part 3 of 3: for developers * CI: use local registry, part 2 of 3: fix tests * CI: use local registry, part 1 of 3: setup * CI: test composefs on rawhide * chore(deps): update module google.golang.org/grpc to v1.64.1 [security] * chore(deps): update dependency setuptools to ~=70.3.0 * Improve container filenname ambiguity. * containers/attach: Note bug around goroutine leak * Drop minikube CI test * add libkrun test docs * fix(deps): update module tags.cncf.io/container-device- interface to v0.8.0 * cirrus: check for header files in source code check * pkg/machine/e2e: run debug command only for macos * create runtime 's worker queue before queuing any job * test/system: fix pasta host.containers.internal test * Visual Studio BuildTools as a MinGW alternative * SetupRootless(): only reexec when needed * pkg/rootless: simplify reexec for container code * cirrus: add missing test/tools to danger files * fix(deps): update module golang.org/x/tools to v0.23.0 * Windows Installer: switch to wix5 * fix(deps): update module golang.org/x/net to v0.27.0 * pkg/machine/e2e: print tests timings at the end * pkg/machine/e2e: run debug commands after init * pkg/machine/e2e: improve timeout handling * libpod: first delete container then cidfile * fix(deps): update module golang.org/x/term to v0.22.0 * System test fixes * cirrus.yml: automatic skips based on source * fix(deps): update module github.com/containers/ocicrypt to v1.2.0 * podman events: fix error race * chore(deps): update dependency setuptools to ~=70.2.0 * fix(deps): update module github.com/gorilla/schema to v1.4.1 [security] * Update CI VM images * pkg/machine/e2e: fix broken cleanup * pkg/machine/e2e: use tmp file for connections * test/system: fix podman --image-volume to allow tmpfs storage * CI: mount tmpfs for container storage * docs: --network remove missing leading sentence * specgen: parse devices even with privileged set * vendor: update c/storage * Remove the unused machine volume-driver * feat(quadlet): log option handling * Error when machine memory exceeds system memory * machine: Always use --log-file with gvproxy * CI: Build-Each-Commit test: run only on PRs * Small fixes for testing libkrun * Podman machine resets all providers * Clearly indicate names w/ URLencoded duplicates * [skip-ci] Packit: split rhel and centos-stream jobs * apple virtiofs: fix racy mount setup * cirrus: fix broken macos artifacts URL * libpod/container_top_linux.c: fix missing header * refactor(build): improve err when file specified by -f does not exist * Minor: Remove unhelpful comment * Update module github.com/openshift/imagebuilder to v1.2.11 * Minor: Rename the OSX Cross task * [skip-ci] Remove conditionals from changelog * podman top: join the container userns * Run linting in parallel with building * Fix missing Makefile target dependency * build API: accept platform comma separated * [skip-ci] RPM: create podman-machine subpackage * ExitWithError() - more upgrades from Exit() * test/e2e: remove podman system service tests * cirrus: reduce int tests timeout * cirrus: remove redundant skip logic * pkg/machine/apple: machine stop timeout * CI: logformatter: link to correct PR base * Update module github.com/crc-org/crc/v2 to v2.38.0 * ExitWithError(): continued * test/system: Add test steps for journald log check in quadlet * restore: fix missing network setup * podman run use pod userns even with --pod-id-file * macos-installer: bundle krunkit * remote API: fix pod top error reporting * libpod API: return proper error status code for pod start * fix #22233 * added check for `registry.IsRemote()`. and correct error message. * fix #20686 * pkg/machine/e2e: Remove unnecessary copy of machine image. * libpod: intermediate mount if UID not mapped into the userns * libpod: avoid chowning the rundir to root in the userns * libpod: do not chmod bind mounts * libpod: unlock the thread if possible * CI Cleanup: Remove cgroups v1 support * ExitWithError() - more upgrades from Exit() * remote: fix incorrect CONTAINER_CONNECTION parsing * container: pass KillSignal and StopTimeout to the systemd scope * libpod: fix comment * e2e: test container restore in pod by name * docs: Adds all PushImage supported paramters to openapi docs. * systests: kube: bump up a timeout * cirrus.yml: add CI:ALL mode to force all tests * cirrus.yml: implement skips based on source changes * CI VMs: bump * restore: fix container restore into pod * sqlite_state: Fix RewriteVolumeConfig * chore(deps): update dependency setuptools to ~=70.1.0 * Quadlet - use specifier for unescaped values for templated container name * cirrus: check for system test leaks in nightly * test/system: check for leaks in teardown suite * test/system: speed up basic_() * test/system: fix up many tests that do not cleanup * test/system: fix podman --authfile=nonexistent-path * Update module github.com/containernetworking/plugins to v1.5.1 * Update module github.com/checkpoint-restore/checkpointctl to v1.2.1 * Update module github.com/spf13/cobra to v1.8.1 * Update module github.com/gorilla/schema to v1.4.0 * pkg/machine/wsl: force terminate wsl instance * pkg/machine/wsl: wrap command errors * [CI:DOCS] Quadlet - add note about relative path resolution * CI: do not install python packages at runtime * Release workflow: Include candidate descriptor * Minor: Fix indentation in GHA release workflow * GHA: Send release notification mail * GHA: Validate release version number * Remove references to --pull=true and --pull=false * ExitWithError, continued * podman: add new hidden flag --pull-option * [CI:DOCS] Fix typos in podman-build * infra: mark storageSet when imagestore is changed * [CI:DOCS] Add jnovy as reviewer and approver * fix(deps): update module google.golang.org/protobuf to v1.34.2 * refactor(machine,wsl): improve operations of Windows API * --squash --layers=false should be allowed * fix(deps): update module github.com/checkpoint-restore/checkpointctl to v1.2.0 * update golangci-lint to v1.59.1 * Rename master to main in CONTRIBUTING.md * podman 5, pasta and inter- container networking * libpod: do not resuse networking on start * machine/linux: Switch to virtiofs by default * machine/linux: Support virtiofs mounts (retain 9p default) * machine/linux: Use memory-backend-memfd by default * ExitWithError() - continued * Enable libkrun provider to open a debug console * Add new targets on Windows makefile (winmake.ps1) * fix(deps): update module github.com/docker/docker to v26.1.4+incompatible * fix(deps): update module github.com/crc-org/crc/v2 to v2.37.1 * fix(deps): update module golang.org/x/tools to v0.22.0 * fix(deps): update module golang.org/x/net to v0.26.0 * libpod: fix 'podman kube generate' on FreeBSD * fix(deps): update module golang.org/x/sys to v0.21.0 * libpod: do not leak systemd hc startup unit timer * vendor latest c/common * pkg/rootless: set _CONTAINERS_USERNS_CONFIGURED correctly * run bats -T, to profile timing hogs * test/system: speed up podman ps --external * test/system: speed up podman network connect/disconnect * test/system: speed up podman network reload * test/system: speed up quadlet - pod simple * test/system: speed up podman parallel build should not race * test/system: speed up podman cp dir from host to container * test/system: speed up podman build - workdir, cmd, env, label * test/system: speed up podman --log- level recognizes log levels * test/system: remove obsolete debug in net connect/disconnect test * test/system: speed up quadlet - basic * test/system: speed up user namespace preserved root ownership * System tests: add `podman system check` tests * Add `podman system check` for checking storage consistency * fix(deps): update module github.com/crc-org/crc/v2 to v2.37.0 * fix(libpod): add newline character to the end of container's hostname file * fix(deps): update module github.com/openshift/imagebuilder to v1.2.10 * fix(deps): update github.com/containers/image/v5 digest to aa93504 * Fix 5.1 release note re: runlabel * test/e2e: use local skopeo not image * fix(deps): update golang.org/x/exp digest to fd00a4e * [CI:DOCS] Add contrib/podmanimage/stable path back in repo * chore(deps): update dependency requests to ~=2.32.3 * fix(deps): update github.com/containers/image/v5 digest to 2343e81 * libpod: do not move podman with --cgroups=disabled * Update release notes on Main to v5.1.0 * test: look at the file base name * tests: simplify expected output * Sigh, new VMs again * Fail earlier when no containers exist in stats * Add Hyper-V option in windows installer * libpod: cleanup default cache on system reset * vendor: update c/image * test/system: speed up kube generate tmpfs on /tmp * test/system: speed up podman kube play tests * test/system: speed up podman shell completion test * test/system: simplify test signal handling in containers * test/system: speed up podman container rm ... * test/system: speed up podman ps - basic tests * test/system: speed up read-only from containers.conf * test/system: speed up podman logs - multi ... * test/system: speed up podman run --name * Debian: switch to crun * test/system: speed up podman generate systemd - envar * test/system: speed up podman-kube at .service template * test/system: speed up kube play healthcheck initialDelaySeconds * test/system: speed up exit- code propagation test * test/system: speed up "podman run --timeout" * test/system: fix slow kube play --wait with siginterrupt * undo auto-formatting * test/system: speed up podman events tests * Quadlet: Add support for .build files * test/system: speed up "podman auto-update using systemd" * test/system: remove podman wait test * tests: disable tests affected by a race condition * update golangci-lint to v1.59.0 * kubernetes_support.md: Mark volumeMounts.subPath as supported * working name of pod on start and stop * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.19.0 * Bump Buildah to v1.36.0 * fix(deps): update module github.com/burntsushi/toml to v1.4.0 * fix typo in Tutorials.rst * Mac PM test: Require pre-installed rosetta * test/e2e: fix new error message * Add configuration for podmansh * Update containers/common to latest main * Only stop chowning volumes once they're not empty * podman: fix --sdnotify=healthy with --rm * libpod: wait another interval for healthcheck * quadlet: Add a network requirement on .image units * test, pasta: Ignore deprecated addresses in tests * [CI:DOCS] performance: update network docs * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.18.0 * CI: disable minikube task * [CI:DOCS] Fix windows action trigger * chore(deps): update dependency setuptools to v70 * Check AppleHypervisor before accessing it * fix(deps): update module github.com/containernetworking/plugins to v1.5.0 * [CI:DOCS] Update dependency golangci/golangci-lint to v1.58.2 * add podman- clean-transient.service service to rootless * [CI:DOCS] Update podman network docs * fix incorrect host.containers.internal entry for rootless bridge mode * vendor latest c/common main * Add Rosetta support for Apple Silicon mac * bump main to 5.2.0-dev * Use a defined constant instead of a hard-coded magic value * cirrus: use faster VM's for integration tests * fix(deps): update github.com/containers/gvisor-tap-vsock digest to 01a1a0c * [CI:DOCS] Fix Mac pkg link * test: remove test_podman* scripts * test/system: fix documentation * Return StatusNotFound when multiple volumes matching occurs * container_api: do not wait for healtchecks if stopped * libpod: wait for healthy on main thread * `podman events`: check for an error after we finish reading events * remote API: restore v4 payload in container inspect * Fix updating connection when SSH port conflict happens * rootless: fix reexec to use /proc/self/exe * ExitWithError() - enforce required exit status & stderr * ExitWithError() - a few that I missed * [skip-ci] Packit: use only one value for `packages` key for `trigger: commit` copr builds * Revert "Temporarily disable rootless debian e2e testing" * CI tests: enforce TMPDIR on tmpfs * use new CI images with tmpfs /tmp * run e2e test on tmpfs * Update module github.com/crc-org/crc/v2 to v2.36.0 * [CI:DOCS] Use checkout at v4 in GH Actions * ExitWithError() - rmi_test * ExitWithError() - more r files * ExitWithError() - s files * ExitWithError() - more run_xxx tests * Fix podman-remote support for `podman farm build` * [CI:DOCS] Trigger windows installer action properly * Revert "container stop: kill conmon" * Ensure that containers do not get stuck in stopping * [CI:DOCS] Improvements to make validatepr * ExitWithError() - rest of the p files * [CI:DOCS] Update dependency golangci/golangci-lint to v1.58.1 * Graceful shutdown during podman kube down * Remove duplicate call * test/system: fix broken "podman volume globs" test * Quadlet/Container: Add GroupAdd option * Don't panic if a runtime was configured without paths * update c/{buildah,common,image,storage} to latest main * update golangci-lint to 1.58 * machine: Add LibKrun provider detection * ExitWithError() - continue tightening * fix(deps): update module google.golang.org/protobuf to v1.34.1 * test: improve test for powercap presence * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.17.3 * fix(deps): update module go.etcd.io/bbolt to v1.3.10 * fix(deps): update module golang.org/x/tools to v0.21.0 * [skip-ci] RPM: `bats` required only on Fedora * fix(deps): update module golang.org/x/exp to v0.0.0-20240506185415-9bf2ced13842 * gpdate and remove parameter settings in `.golangci.yml` * ExitWithError() - play_kube_test.go * Temporarily disable rootless debian e2e testing * fix(deps): update module golang.org/x/crypto to v0.23.0 * CI Docs: Clarify passthrough_envars() comments * Skip machine tests if they don't need to be run * Update CI VMs to F40, F39, D13 * ExitWithError() - v files * Update module golang.org/x/term to v0.20.0 * machine: Add provider detection API * util: specify a not empty pause dir for root too * Add missing option 'healthy' to output of `podman run --help` * [CI:DOCS] Add info on the quay.io images to the README.md * Add a random suffix to healthcheck unit names * test/e2e: remove toolbox image * Also substitute $HOME in runlabel with user's homedir * Update module github.com/cyphar/filepath-securejoin to v0.2.5 * Change tmpDir for macOS * ExitWithError() - pod_xxx tests * ExitWithError() -- run_test.go * Update module golang.org/x/exp to v0.0.0-20240416160154-fe59bbe5cc7f * Update module github.com/shirou/gopsutil/v3 to v3.24.4 * Update module github.com/docker/docker to v26.1.1+incompatible * GHA: Attempt fix exceeded a secondary rate limit * vendor ginkgo 2.17.2 into test/tools * Fix machine volumes with long path and paths with dashes * Update module google.golang.org/protobuf to v1.34.0 * Update module github.com/crc-org/crc/v2 to v2.35.0 * Update module github.com/onsi/gomega to v1.33.1 * test/e2e: podman unshare image mount fix tmpdir leak * test/e2e: do not leak /tmp/private_file * test/e2e: "persistentVolumeClaim with source" do not leak file * e2e tests: use /var/tmp, not $TMPDIR, as workdirs * Update dependency pytest to v8.1.2 * Remove unncessary lines at the end of specfile summary * Clean machine pull cache * Add krun support to podman machine * Use custom image for make validatepr * test/e2e: force systemd cgroup manager * e2e and bindings tests: fix $PATH setup * Makefile: remove useless HACK variable in e2e test * test/e2e: fix volumes and suid/dev/exec options * test/e2e: volumes and suid/dev/exec options works remote * test/e2e: fix limits test * Update module github.com/rootless- containers/rootlesskit/v2 to v2.1.0 * Correct option name `ip` -> `ip6` * Add the ability to automount images as volumes via play * Add support for image volume subpaths * Bump Buildah to latest main * Update Makefile to Go 1.22 for in-container * ExitWithError() - yet more low-hanging fruit * ExitWithError() - more low-hanging fruit * ExitWithError() - low-hanging fruit * chore: fix function names in comment * Remove redundant Prerequisite before build section * Remove PKG_CONFIG_PATH * Add installation instructions for openSUSE * Replace golang.org/x/exp/slices with slices from std * Update to go 1.21 * fix(deps): update module github.com/docker/docker to v26.1.0+incompatible * [CI:DOCS] Fix artifact action * [skip-ci] Packit/rpm: remove el8 jobs and spec conditionals * e2e tests: stop littering * [CI:DOCS] format podman-pull example as code * [CI:DOCS] Build & upload release artifacts with GitHub Actions * libpod: getHealthCheckLog() remove unessesary check * add containers.conf healthcheck_events support * vendor latest c/common * libpod: make healthcheck events more efficient * libpod: wrap store setup error message * [skip-ci] Packit: enable CentOS 10 Stream build jobs * pkg/systemd: use fileutils.(Le|E)xists * pkg/bindings: use fileutils.(Le|E)xists * pkg/util: use fileutils.(Le|E)xists * pkg/trust: use fileutils.(Le|E)xists * pkg/specgen: use fileutils.(Le|E)xists * pkg/rootless: use fileutils.(Le|E)xists * pkg/machine: use fileutils.(Le|E)xists * pkg/domain: use fileutils.(Le|E)xists * pkg/api: use fileutils.(Le|E)xists * libpod: use fileutils.(Le|E)xists * cmd: use fileutils.(Le|E)xists * vendor: update containers/{buildah,common,image,storage} * fix(deps): update module github.com/docker/docker to v26.0.2+incompatible [security] * fix podman-pod-restart.1.md typo * [skip-ci] Packit: switch to EPEL instead of centos-stream+epel-next * fix(deps): update module github.com/onsi/gomega to v1.33.0 * Add more annnotation information to podman kupe play man page * test/compose: remove compose v1 code * CI: remove compose v1 tests * fix: close resource file * [CI:DOCS] Fix windows installer action * fix(deps): update module tags.cncf.io/container-device-interface to v0.7.2 * add `list` as an alias to list networks * Add support for updating restart policy * Add Compat API for Update * Make `podman update` changes persistent * Emergency fix (well, skip) for failing bud tests * fix swagger doc for manifest create * [CI:DOCS] options/network: fix markdown lists * Makefile: do not hardcode `GOOS` in `podman-remote-static` target * chore(deps): update module golang.org/x/crypto to v0.17.0 [security] * chore(deps): update dependency setuptools to ~=69.5.0 * Fix some comments * swagger fix infinitive recursion on some types * install swagger from source * Revert "Swap out javascript engine" * podman exec CID without command should exit 125 * (minor) prefetch systemd image before use * Update go-swagger version * Swap out javascript engine * fix(deps): update module github.com/docker/docker to v26.0.1+incompatible * Add os, arch, and ismanifest to libpod image list * [CI:DOCS]Initial PR validation * fix(deps): update github.com/containers/gvisor-tap-vsock digest to d744d71 * vendor ginkgo 2.17.1 into test/tools * fix "concurrent map writes" in network ls compat endpoint * chore(deps): update dependency pytest to v8 * e2e: redefine ExitWithError() to require exit code * docs: fix missleading run/create --expose description * podman ps: show exposed ports under PORTS as well * rootless: drop function ReadMappingsProc * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.7.3 * New CI VMs, to give us pasta 2024-04-05 * Add big warning to GHA workflow * GHA: Fix intermittent workflow error * fix(deps): update module golang.org/x/tools to v0.20.0 * e2e tests: remove requirement for fuse-overlayfs * docs: update Quadlet volume Options desc * fix(deps): update module golang.org/x/sync to v0.7.0 * Fix relabeling failures with Z/z volumes on Mac * fix(deps): update module golang.org/x/net to v0.24.0 * Makefile: fix annoying errors in docs generation * chore: fix function names in comment * Bump tags.cncf.io/container-device-interface to v0.7.1 * fix(deps): update module golang.org/x/crypto to v0.22.0 * Detect unhandled reboots and require user intervention * podman --runroot: remove 50 char length restriction * update github.com/rootless-containers/rootlesskit to v2 * Update module github.com/gorilla/schema to v1.3.0 * Update dependency requests-mock to ~=1.12.1 * Update module github.com/crc-org/crc/v2 to v2.34.1 * rm --force work for more than one arg * [CI:DOCS] Update kube docs * fix(deps): update module github.com/shirou/gopsutil/v3 to v3.24.3 * [CI:DOCS] Add GitHub action to update version on Podman.io * [CI:DOCS] Update dependency golangci/golangci-lint to v1.57.2 * Windows: clean up temporary perl install * pkg/util: FindDeviceNodes() ignore ENOENT errors * [CI:DOCS] build deps: make-validate needs docs * test/system: add rootless-netns test for setup errors * vendor latest c/common main * container: do not chown to dest target with U * [CI:DOCS] golangci-lint: update deprecated flags * systests: conditionalize slirp4netns tests * CI: systests: instrument flaky tests * s3fs docs * test: do not skip tests under rootless * Add note about host networking to Kube PublishPort option * Inject additional build tags from the environment * libpod: use original IDs if idmap is provided * Switch back to checking out the same branch the action script runs in * docs/podman-login: Give an example of writing the persistent path * CI: Bump VMs to 2024-03-28 * [skip-ci] Update dawidd6/action-send-mail action to v3.12.0 * fix(deps): update module github.com/openshift/imagebuilder to v1.2.7 * Fix reference to deprecated types.Info * Use logformatter for podman_machine_windows_task * applehv: Print vfkit logs in --log-level debug * [CI:DOCS]Add Mario to reviewers list * [CI:DOCS] Document CI-maintenance job addition * Add golang 1.21 update warning * Add rootless network command to `podman info` * libpod: don't warn about cgroupsv1 on FreeBSD * hyperv: error if not admin * Properly parse stderr when updating container status * [skip-ci] Packit: specify fedora-latest in propose-downstream * Use built-in ssh impl for all non-pty operations * Add support for annotations * hyperv: fix machine rm -r * [skip-ci] Packit: Enable CentOS Stream 10 update job * 5.0 release note fix typo in cgroupv1 env var * fix remote build isolation on client side * chore: remove repetitive words * Dont save remote context in temp file but stream and extract * fix remote build isolation when server runs as root * util: use private propagation with bind * util: add some tests for ProcessOptions * util: refactor ProcessOptions into an internal function * util: rename files to snake case * Add LoongArch support for libpod * fix(deps): update github.com/containers/common digest to bc5f97c * [CI:DOCS] Update dependency golangci/golangci-lint to v1.57.1 * fix(deps): update module github.com/docker/docker to v25.0.5+incompatible [security] * fix(deps): update module github.com/onsi/gomega to v1.32.0 * [CI:DOCS] Update dependency golangci/golangci-lint to v1.57.0 * Update module github.com/cpuguy83/go- md2man/v2 to v2.0.4 * Fix type-o * Use correct extension in suite * minikube: instrument tests, to allow debugging failures * libpod: restart always reconfigure the netns * use new c/common pasta2 setup logic to fix dns * utils: drop conversion float->string->float * utils: do not generate duplicate range * logformatter: handle Windows logs * utils: add test for the new function * utils: move rootless code to a new function * xref-helpmsgs-manpages: cross- check Commands.rst * test/system: Add support for multipath routes in pasta networking tests * [skip-ci] rpm: use macro supported vendoring * Adjust to the standard location of gvforwarder used in new images * Makefile: add target `podman-remote-static` * Switch to 5.x WSL machine os stream using new automation * Cleanup build scratch dir if remote end disconnects while passing the context * bump main to 5.1.0-dev * Use faster gzip for compression for 3x speedup for sending large contexts to remote * pkg/machine: make checkExclusiveActiveVM race free * pkg/machine/wsl: remove unused CheckExclusiveActiveVM() * pkg/machine: CheckExclusiveActiveVM should also check for starting * pkg/machine: refresh config after we hold lock * Update dependency setuptools to ~=69.2.0 * [skip-ci] rpm: update containers-common dep on f40+ * fix invalid HTTP header values when hijacking a connection * Add doc to build podman on windows without MSYS * Removing CRI-O related annotations * fix(deps): update module github.com/containers/ocicrypt to v1.1.10 * Pass the restart policy to the individual containers * kube play: always pull when both imagePullPolicy and tag are missing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-76=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * podman-remote-debuginfo-5.2.5-slfo.1.1_1.1 * podman-debuginfo-5.2.5-slfo.1.1_1.1 * podman-remote-5.2.5-slfo.1.1_1.1 * podman-5.2.5-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * podman-docker-5.2.5-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-11218.html * https://www.suse.com/security/cve/CVE-2024-1753.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1221677 * https://bugzilla.suse.com/show_bug.cgi?id=1224112 * https://bugzilla.suse.com/show_bug.cgi?id=1231208 * https://bugzilla.suse.com/show_bug.cgi?id=1236270 * https://bugzilla.suse.com/show_bug.cgi?id=1236507 * https://bugzilla.suse.com/show_bug.cgi?id=1237641 * https://bugzilla.suse.com/show_bug.cgi?id=1239330 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:33 -0000 Subject: SUSE-SU-2025:20278-1: important: Security update for helm Message-ID: <174902211397.12703.3337000159406543030@smelt2.prg2.suse.org> # Security update for helm Announcement ID: SUSE-SU-2025:20278-1 Release Date: 2025-04-22T13:48:50Z Rating: important References: * bsc#1219969 * bsc#1220207 * bsc#1234482 * bsc#1235318 * bsc#1238688 Cross-References: * CVE-2024-25620 * CVE-2024-26147 * CVE-2024-45337 * CVE-2024-45338 * CVE-2025-22870 CVSS scores: * CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45338 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45338 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45338 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves five vulnerabilities can now be installed. ## Description: This update for helm fixes the following issues: * Update to version 3.17.2 (bsc#1238688, CVE-2025-22870): * Updating to 0.37.0 for x/net * build(deps): bump the k8s-io group with 7 updates * Update to version 3.17.1: * merge null child chart objects * build(deps): bump the k8s-io group with 7 updates * fix: check group for resource info match * Update to 3.17.0 (bsc#1235318, CVE-2024-45338): Full changelog: https://github.com/helm/helm/releases/tag/v3.17.0 * Notable Changes * Allow pulling and installation by OCI digest * Annotations and dependencies are now in chart metadata output * New --take-ownership flag for install and upgrade commands * SDK: Authorizer and registry authorizer are now configurable * Removed the Kubernetes configuration file permissions check * Added username/password to helm push and dependency build/update subcommands * Added toYamlPretty template function * Update to version 3.16.4 (bsc#1234482, CVE-2024-45337): * Bump golang.org/x/crypto from 0.30.0 to 0.31.0 * Bump the k8s-io group with 7 updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-75=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * helm-debuginfo-3.17.2-slfo.1.1_1.1 * helm-3.17.2-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * helm-bash-completion-3.17.2-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25620.html * https://www.suse.com/security/cve/CVE-2024-26147.html * https://www.suse.com/security/cve/CVE-2024-45337.html * https://www.suse.com/security/cve/CVE-2024-45338.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1219969 * https://bugzilla.suse.com/show_bug.cgi?id=1220207 * https://bugzilla.suse.com/show_bug.cgi?id=1234482 * https://bugzilla.suse.com/show_bug.cgi?id=1235318 * https://bugzilla.suse.com/show_bug.cgi?id=1238688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:38 -0000 Subject: SUSE-SU-2025:20277-1: important: Security update for libxslt Message-ID: <174902211856.12703.11045482503957037406@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:20277-1 Release Date: 2025-04-22T13:46:13Z Rating: important References: * bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References: * CVE-2023-40403 * CVE-2024-55549 * CVE-2025-24855 CVSS scores: * CVE-2023-40403 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-40403 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-55549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2024-55549 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2025-24855: Fix use-after-free of XPath context node (bsc#1239625) * CVE-2024-55549: Fix UAF related to excluded namespaces (bsc#1239637) * CVE-2023-40403: Make generate-id() deterministic (bsc#1238591) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-77=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxslt1-1.1.38-slfo.1.1_2.1 * libexslt0-debuginfo-1.1.38-slfo.1.1_2.1 * libxslt-debugsource-1.1.38-slfo.1.1_2.1 * libexslt0-1.1.38-slfo.1.1_2.1 * libxslt1-debuginfo-1.1.38-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40403.html * https://www.suse.com/security/cve/CVE-2024-55549.html * https://www.suse.com/security/cve/CVE-2025-24855.html * https://bugzilla.suse.com/show_bug.cgi?id=1238591 * https://bugzilla.suse.com/show_bug.cgi?id=1239625 * https://bugzilla.suse.com/show_bug.cgi?id=1239637 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:43 -0000 Subject: SUSE-RU-2025:20276-1: moderate: Recommended update for python-charset-normalizer Message-ID: <174902212323.12703.17065884081643644932@smelt2.prg2.suse.org> # Recommended update for python-charset-normalizer Announcement ID: SUSE-RU-2025:20276-1 Release Date: 2025-04-22T13:31:17Z Rating: moderate References: * bsc#1235781 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-charset-normalizer fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235781). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-66=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-charset-normalizer-3.1.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235781 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:45 -0000 Subject: SUSE-SU-2025:20275-1: important: Security update for libtasn1 Message-ID: <174902212548.12703.16303220618866352688@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2025:20275-1 Release Date: 2025-04-22T13:27:45Z Rating: important References: * bsc#1236878 Cross-References: * CVE-2024-12133 CVSS scores: * CVE-2024-12133 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-12133 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12133 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2024-12133: Fixed potential DoS in handling of numerous SEQUENCE OF or SET OF elements (bsc#1236878) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-63=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libtasn1-6-debuginfo-4.19.0-slfo.1.1_2.1 * libtasn1-debugsource-4.19.0-slfo.1.1_2.1 * libtasn1-6-4.19.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12133.html * https://bugzilla.suse.com/show_bug.cgi?id=1236878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:50 -0000 Subject: SUSE-SU-2025:20274-1: important: Security update for libxml2 Message-ID: <174902213088.12703.5893467790433431583@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20274-1 Release Date: 2025-04-22T12:11:42Z Rating: important References: * bsc#1237363 * bsc#1237370 * bsc#1237418 Cross-References: * CVE-2024-56171 * CVE-2025-24928 * CVE-2025-27113 CVSS scores: * CVE-2024-56171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-24928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-24928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-27113 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27113 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-56171: Fixed use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c [bsc#1237363] * CVE-2025-24928: Fixed stack-based buffer overflow in xmlSnprintfElements in valid.c [bsc#1237370] * CVE-2025-27113: Fixed NULL Pointer Dereference in libxml2 xmlPatMatch [bsc#1237418] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-65=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxml2-2-2.11.6-slfo.1.1_2.1 * libxml2-tools-debuginfo-2.11.6-slfo.1.1_2.1 * libxml2-tools-2.11.6-slfo.1.1_2.1 * libxml2-2-debuginfo-2.11.6-slfo.1.1_2.1 * libxml2-debugsource-2.11.6-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56171.html * https://www.suse.com/security/cve/CVE-2025-24928.html * https://www.suse.com/security/cve/CVE-2025-27113.html * https://bugzilla.suse.com/show_bug.cgi?id=1237363 * https://bugzilla.suse.com/show_bug.cgi?id=1237370 * https://bugzilla.suse.com/show_bug.cgi?id=1237418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:53 -0000 Subject: SUSE-RU-2025:20273-1: moderate: Recommended update for python-distro Message-ID: <174902213327.12703.6644051518314041398@smelt2.prg2.suse.org> # Recommended update for python-distro Announcement ID: SUSE-RU-2025:20273-1 Release Date: 2025-04-22T12:10:36Z Rating: moderate References: * bsc#1235785 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-distro fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235785) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-68=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-distro-1.8.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235785 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:55 -0000 Subject: SUSE-SU-2025:20272-1: important: Security update for orc Message-ID: <174902213561.12703.8551014218491373190@smelt2.prg2.suse.org> # Security update for orc Announcement ID: SUSE-SU-2025:20272-1 Release Date: 2025-04-22T12:08:29Z Rating: important References: * bsc#1228184 Cross-References: * CVE-2024-40897 CVSS scores: * CVE-2024-40897 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40897 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for orc fixes the following issues: * CVE-2024-40897: Fixed stack-based buffer overflow inside the orc compiler when formatting error messages for certain input files (bsc#1228184). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-73=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * liborc-0_4-0-debuginfo-0.4.34-slfo.1.1_2.1 * liborc-0_4-0-0.4.34-slfo.1.1_2.1 * orc-debugsource-0.4.34-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40897.html * https://bugzilla.suse.com/show_bug.cgi?id=1228184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:28:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:28:56 -0000 Subject: SUSE-FU-2025:20271-1: moderate: Feature update for Public Cloud packages Message-ID: <174902213690.12703.16540143246283534445@smelt2.prg2.suse.org> # Feature update for Public Cloud packages Announcement ID: SUSE-FU-2025:20271-1 Release Date: 2025-04-22T11:50:34Z Rating: moderate References: * jsc#PED-11572 * jsc#SMO-553 Affected Products: * SUSE Linux Micro 6.1 An update that contains two features can now be installed. ## Description: This update for Public Cloud packages fixes the following issues: google-dracut-config: * Implementation of google-dracut-config at version 0.0.4 (jsc#PED-11572) google-guest-agent: * Implementation of google-guest-agent at version 20250116.00 (jsc#SMO-553) google-guest-configs: * Implementation of google-guest-configs at version 20241205.00 (jsc#SMO-553) google-guest-oslogin: * Implementation of google-guest-oslogin at version 20231116.00 (jsc#SMO-553) google-osconfig-agent: * Implementation of google-osconfig-agent at version 20250115.01 (jsc#SMO-553) growpart-rootgrow: * Implementation of growpart-rootgrow at version 1.0.7 (jsc#SMO-553) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-74=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * growpart-rootgrow-1.0.7-slfo.1.1_1.2 * google-dracut-config-0.0.4-slfo.1.1_1.1 * google-guest-configs-20241205.00-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-debuginfo-20231116.00-slfo.1.1_1.3 * google-osconfig-agent-20250115.01-slfo.1.1_1.1 * google-guest-oslogin-20231116.00-slfo.1.1_1.3 * google-guest-oslogin-debugsource-20231116.00-slfo.1.1_1.3 * google-guest-agent-20250116.00-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/PED-11572 * https://jira.suse.com/browse/SMO-553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:33:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:33:57 -0000 Subject: SUSE-SU-2025:20270-1: important: Security update for the Linux Kernel Message-ID: <174902243749.13583.9723429431993200592@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20270-1 Release Date: 2025-04-17T14:37:10Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224013 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1224757 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1228659 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231910 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234074 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237874 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237882 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238052 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238565 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238746 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238970 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238990 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239066 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239684 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239986 * bsc#1239994 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240575 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240806 * bsc#1240808 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240978 * bsc#1240979 * bsc#1241038 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12309 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-27415 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58071 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21729 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21755 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21806 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21836 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21981 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-2312 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves 347 vulnerabilities, contains nine features and has 104 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). * CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: fix potential error return (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-14=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-6.4.0-28.1 * kernel-source-6.4.0-28.1 * kernel-macros-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-28.1 * kernel-default-debuginfo-6.4.0-28.1 * kernel-default-devel-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-28.1.21.6 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-28.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-28-default-1-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-1-3.1 * kernel-default-livepatch-6.4.0-28.1 * kernel-livepatch-MICRO-6-0_Update_6-debugsource-1-3.1 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-28.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debugsource-6.4.0-28.1 * kernel-kvmsmall-debuginfo-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:06 -0000 Subject: SUSE-RU-2025:20269-1: moderate: Recommended update for cockpit, cockpit-podman Message-ID: <174902244614.13583.2201650722498546860@smelt2.prg2.suse.org> # Recommended update for cockpit, cockpit-podman Announcement ID: SUSE-RU-2025:20269-1 Release Date: 2025-04-17T11:31:42Z Rating: moderate References: * bsc#1221336 * bsc#1226049 * bsc#1226050 * bsc#1226541 * bsc#1227441 * bsc#1232687 Affected Products: * SUSE Linux Micro 6.1 An update that has six fixes can now be installed. ## Description: This update for cockpit, cockpit-podman fixes the following issues: cockpit: * Updated documentation to point at new links (bsc#1226050) * Removed hardcoded RH references (bsc#1221336) * Properly disable pcp (bsc#1226049) * Use suse ID as branding (bsc#1227441) cockpit-podman: * Fixed issues searching containers (bsc#1232687) * Fixed systemd units folder (bsc#1226541) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-62=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * cockpit-debuginfo-322-slfo.1.1_1.1 * cockpit-debugsource-322-slfo.1.1_1.1 * cockpit-ws-322-slfo.1.1_1.1 * cockpit-ws-debuginfo-322-slfo.1.1_1.1 * cockpit-bridge-debuginfo-322-slfo.1.1_1.1 * cockpit-322-slfo.1.1_1.1 * cockpit-bridge-322-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * cockpit-system-322-slfo.1.1_1.1 * cockpit-networkmanager-322-slfo.1.1_1.1 * cockpit-selinux-322-slfo.1.1_1.1 * cockpit-podman-91-slfo.1.1_2.1 * cockpit-storaged-322-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221336 * https://bugzilla.suse.com/show_bug.cgi?id=1226049 * https://bugzilla.suse.com/show_bug.cgi?id=1226050 * https://bugzilla.suse.com/show_bug.cgi?id=1226541 * https://bugzilla.suse.com/show_bug.cgi?id=1227441 * https://bugzilla.suse.com/show_bug.cgi?id=1232687 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:20 -0000 Subject: SUSE-RU-2025:20268-1: important: Recommended update for salt Message-ID: <174902246068.13583.9242751823032002867@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20268-1 Release Date: 2025-04-17T11:25:21Z Rating: important References: * bsc#1215484 * bsc#1219041 * bsc#1220357 * bsc#1220905 * bsc#1226141 * bsc#1228182 * bsc#1228690 * bsc#1229109 * bsc#1229539 * bsc#1230322 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1233667 * bsc#1234022 * bsc#1234881 Affected Products: * SUSE Linux Micro 6.1 An update that has 16 fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fixed aptpkg 'NoneType object has no attribute split' error * Detect openEuler as RedHat family OS * Ensure the correct crypt module is loaded * Implement multiple inventory for ansible.targets * Make x509 module compatible with M2Crypto 0.44.0 * Removed deprecated code from x509.certificate_managed test mode * Move logrotate config to /usr/etc/logrotate.d where possible * Add DEB822 apt repository format support * Make Salt-SSH work with all SSH passwords (bsc#1215484) * Fixed issue of using update-alternatives with alts (#105) * Fixed virt_query outputter and add support for block devices * Make _auth calls visible with master stats * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Enhace batch async and fix some detected issues * Enhacement of Salt packaging * Use update-alternatives for all salt scripts * Use flexible dependencies for the subpackages * Make salt-minion to require flavored zypp-plugin * Make zyppnotify to use update-alternatives * Drop unused yumnotify plugin * Add dependency to python3-dnf-plugins-core for RHEL based * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944) (bsc#1234881) (bsc#1220905) * Adapt to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Enhance smart JSON parsing when garbage is present (bsc#1231605) * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Fixed issues running on Python 3.12 and 3.13 * Reverted setting SELinux context for minion service (bsc#1233667) * Removed System V init support * Make systemd the only supported init system by removing System V init and insserv references * Ensure package builds with no init system dependencies if built without systemd (for example for use in containers) * Apply some spec-cleaner suggestions (update copyright year, sort requirements, adjust spacing) * Fixed the condition of alternatives for Tumbleweed and Leap 16 * Use update-alternatives for salt-call and fix builing on EL8 * Build all python bindings for all flavors * Make minion reconnecting on changing master IP (bsc#1228182) * Handle logger exception when flushing already closed file * Include passlib as a recommended dependency * Make Salt Bundle more tolerant to long running jobs (bsc#1228690) * Fixed additional x509 tests and test_suse tests for SLE12 * Fixed failing x509 tests with OpenSSL < 1.1 * Avoid explicit reading of /etc/salt/minion (bsc#1220357) * Allow NamedLoaderContexts to be returned from loader * Reverted the change making reactor less blocking (bsc#1230322) * Use --cachedir for extension_modules in salt-call (bsc#1226141) * Prevent using SyncWrapper with no reason * Fixed the SELinux context for Salt Minion service (bsc#1219041) * Set contextvars as a build requirement for package * Increase warn_until_date date for code we still support * The test_debian test now uses port 80 for ubuntu keyserver * Fixed too frequent systemd service restart in test_system test * Avoid crash on wrong output of systemctl version (bsc#1229539) * Improve error handling with different OpenSSL versions * Removed redundant run_func from salt.master.MWorker._handle_aes * Fixed cloud minion configuration for multiple masters (bsc#1229109) * Use Pygit2 id instead of deprecated oid in gitfs * Fixed few failing tests to work with both Salt and Salt bundle * Skip testing unsupported OpenSSL crypto algorithms ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-67=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * salt-minion-3006.0-slfo.1.1_3.1 * salt-transactional-update-3006.0-slfo.1.1_3.1 * salt-3006.0-slfo.1.1_3.1 * python311-salt-3006.0-slfo.1.1_3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1219041 * https://bugzilla.suse.com/show_bug.cgi?id=1220357 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226141 * https://bugzilla.suse.com/show_bug.cgi?id=1228182 * https://bugzilla.suse.com/show_bug.cgi?id=1228690 * https://bugzilla.suse.com/show_bug.cgi?id=1229109 * https://bugzilla.suse.com/show_bug.cgi?id=1229539 * https://bugzilla.suse.com/show_bug.cgi?id=1230322 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1233667 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:23 -0000 Subject: SUSE-RU-2025:20267-1: moderate: Recommended update for python-pyserial Message-ID: <174902246305.13583.18257671301313929729@smelt2.prg2.suse.org> # Recommended update for python-pyserial Announcement ID: SUSE-RU-2025:20267-1 Release Date: 2025-04-17T11:25:21Z Rating: moderate References: * bsc#1235782 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-pyserial fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235782) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-61=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-pyserial-3.5-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235782 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:24 -0000 Subject: SUSE-RU-2025:20266-1: moderate: Recommended update for python-httpx Message-ID: <174902246492.13583.15403181424215176347@smelt2.prg2.suse.org> # Recommended update for python-httpx Announcement ID: SUSE-RU-2025:20266-1 Release Date: 2025-04-17T11:25:21Z Rating: moderate References: * bsc#1235784 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-httpx fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235784). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-60=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-httpx-0.24.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235784 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:29 -0000 Subject: SUSE-RU-2025:20265-1: moderate: Recommended update for suseconnect-ng Message-ID: <174902246996.13583.7430859202126407461@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2025:20265-1 Release Date: 2025-04-17T11:25:21Z Rating: moderate References: * bsc#1231185 * bsc#1231328 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update version to 1.13: * Integrating uptime-tracker * Honor auto-import-gpg-keys flag on migration (bsc#1231328) * Only send labels if targetting SCC * Skip the docker auth generation on RMT (bsc#1231185) * Add --set-labels to register command to set labels at registration time on SCC * Add a new function to display suse-uptime-tracker version * Integrate with uptime-tracker ( https://github.com/SUSE/uptime-tracker/ ) * Add a command to show the info being gathered ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-57=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-1.13.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231185 * https://bugzilla.suse.com/show_bug.cgi?id=1231328 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:32 -0000 Subject: SUSE-RU-2025:20264-1: moderate: Recommended update for container-selinux Message-ID: <174902247218.13583.15166113409430648923@smelt2.prg2.suse.org> # Recommended update for container-selinux Announcement ID: SUSE-RU-2025:20264-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1221720 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for container-selinux fixes the following issues: * Update to version 2.236.0: * Allow super privileged containers to use RealtimeKit for scheduling * Add container_ro_file_t to the podman artifact store * Update to version 2.235.0: * Bump to v2.235.0 * container_log{reader,writer}_t: allow watch file * RPM: Update gating config * feat: support /var/lib/crio * Update to version 2.234.2: * TMT: enable epel idomatically * Packit: switch back to fedora-all * RPM: Bump Epoch to 4 * rpm: ship manpage * Add proper labeling for RamaLama * Packit: remove rhel / epel jobs * packit: remove unused file * Add BuildRequires selinux-policy-%{selinuxtype} to enable building for SLFO. Might be removed in the future again when 1231252 is fixed. * Update to version 2.233.0: * container_engine_t: small change to allow non root exec in a container * RPM: explicitly list ghosted paths and skip mode verification * container-selinux install on non selinux-policy-targeted systems (#332) * set container_log_t type for /var/log/kube-apiserver * Allow kubelet_t to create a sock file kubelet_var_lib_t * dontaudit spc_t to mmap_zero * Packit: update targets (#330) * container_engine_t: another round of small improvements (#327) * Allow container_device_plugin_t to use the network (#325) * RPM: cleanup changelog (#324) * TMT: Simplify tests * Update to version 2.232.1: * Bump to v2.232.1 * TMT: fix srpm download syntax on rawhide * Bump to 2.232.0 * Packit: remove `update_release` key from downstream jobs (#313) * Update container-selinux.8 man page * Add ownership of /usr/share/udica (#312) * Packit/TMT: upstream maintenance of downstream gating tests * extend container_engine_t again * Allow spc_t to use localectl * Allow spc_t to use timedatectl * introduce container_use_xserver_devices boolean to allow GPU access * Update to version 2.231.0: * Allow container domains to communicate with spc_t unix_stream_sockets * Move to %posttrans to ensure selinux-policy got updated before the commands run (bsc#1221720) * Manual update to version 2.230.0+git4.a8e389d to include this commit that is needed for the main selinux-policy update to work: * Rename all /var/run file context entries to /run * Update to version 2.230.0: * Move to tar_scm based packaging: added _service and _servicedata * Allow containers to unmount file systems * Add buildah as a container_runtime_exec_t label * Additional rules for container_user_t * improve container_engine_t * Update to version 2.228: * Allow container domains to watch fifo_files * container_engine_t: improve for podman in kubernetes case * Allow spc_t to transition to install_t domain * Default to allowing containers to use dri devices * Allow access to BPF Filesystems * Fix kubernetes transition rule * Label kubensenter as well as kubenswrapper * Allow container domains to execute container_runtime_tmpfs_t files * Allow container domains to ptrace themselves * Allow container domains to use container_runtime_tmpfs_t as an entrypoint * Add boolean to allow containers to use dri devices * Give containers access to pod resources endpoint * Label kubenswrapper kubelet_exec_t * Update to version 2.222: * Allow containers to read/write inherited dri devices * Update to version 2.221: * Allow containers to shutdown sockets inherited from container runtimes * Allow spc_t to use execmod libraries on container file systems * Add boolean to allow containers to read all cert files * More MLS Policy allow rules * Allow container runtimes using pasta bind icmp_socket to port_t * Fix spc_t transitions from container_runtime_domain * Update to version 2.215.0: * Add some MLS rules to policy * Allow container runtime to dyntransition to spc_t * Tighten controls on confined users * Add labels for /var/lib/shared * Cleanup entrypoint definitions * Allow container_device_plugin_t access to debugfs * Allow containers which use devices to map them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-70=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * container-selinux-2.236.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221720 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:35 -0000 Subject: SUSE-RU-2025:20263-1: moderate: Recommended update for suse-build-key Message-ID: <174902247594.13583.2527563240105657673@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2025:20263-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1236779 * bsc#1237294 * jsc#PED-12321 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature and has two fixes can now be installed. ## Description: This update for suse-build-key fixes the following issues: Changed signing keys to use SHA256 UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321) * gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc * gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc * suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-69=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * suse-build-key-12.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236779 * https://bugzilla.suse.com/show_bug.cgi?id=1237294 * https://jira.suse.com/browse/PED-12321 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:39 -0000 Subject: SUSE-RU-2025:20262-1: moderate: Recommended update for aardvark-dns, netavark Message-ID: <174902247922.13583.3469473663467084770@smelt2.prg2.suse.org> # Recommended update for aardvark-dns, netavark Announcement ID: SUSE-RU-2025:20262-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1224167 * bsc#1234660 * bsc#1236567 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for aardvark-dns, netavark fixes the following issues: aardvark-dns: * Update to version 1.12.2: * coredns: work on tcp requests concurrently * tcp: add timeout to connection * cirrus: update branch names * Change av cargo categories * config: ignore enoent errors while reading configs * run cargo update * update upsteam resolvers on each refresh * fix(deps): update rust crate syslog to v7 * fix(deps): update rust crate tokio to 1.39.2 * add tcp support for forwarding (bsc#1234660) * add tcp listening support * test: add new test to check for startup error * return bind error to caller on first start * add our own error type and use it over anyhow * server: use anyhow to wrap parse_configs error * server: split out main loop into new function * main: remove aardvark-dns error prefix * coredns: remove unnecessary try_join! call * coredns: drop pointless name var * serve: read nameservers once * replace signal-hook with tokio::signal * serve: fix broken error logging * server: improve parent <-> child error handling * add some basic perf check script * fix(deps): update rust crate tokio to 1.39.0 * coredns: create reply_ip() function * coredns: match dns type explicitly * server: use only one tokio runtime * coredns: improve indentation for process_message() * coredns: move upstream resolvers detection later * coredns: do not clone sender * read AARDVARK_NO_PROXY once * coredns: move main code out of select! * coredns: fix "name" naming * coredns: remove unused forward_addr/port * coredns: fix handling of dns search domain * coredns: rework PTR lookup flow * fix(deps): update rust crate tokio to 1.38.1 * [skip-ci] TMT: Reorg upstream tests for downstream reusability * [skip-ci] Packit: use `packages: [aardvark-dns-fedora]` for podman-next builds * Be sure to have at least Epoch 2 to preserve upgrade path in c10s. * fix(deps): update rust crate log to 0.4.22 * [CI:BUILD] rpm: Update Rust macro usage * fix(deps): update rust crate tokio to 1.38.0 * Bump to 1.12.0-dev * Remove redundant source: cargo_config * Update to version 1.11.0: * Release v1.11.0 * v1.11.0 release notes * run cargo update * chore(deps): update dependency containers/automation_images to v20240529 * Internal networks cannot make external DNS requests * fix(deps): update rust crate anyhow to 1.0.86 * fix(deps): update rust crate nix to 0.29.0 * [skip-ci] RPM: use default __cargo macro across all envs * chore(deps): update dependency containers/automation_images to v20240513 * fix(deps): update rust crate anyhow to 1.0.83 * [skip-ci] Packit: separate `packages` key for rhel jobs * fix(deps): update rust crate libc to 0.2.154 * [skip-ci] Packit: enable rhel10, c10s tests and c10s downstream sync * [skip-ci] Packit: Remove EL8 jobs * fix(deps): update rust crate syslog to ^6.1.1 * fix reverse ipv6 lookup test flake * fix(deps): update hickory-dns monorepo to 0.24.1 * chore(deps): update rust crate chrono to 0.4.38 * Don't tear down all server threads on SIGHUP (bsc#1224167) * fix(deps): update rust crate anyhow to 1.0.82 * fix(deps): update rust crate tokio to 1.37.0 * Update to nix-0.28.0 * update chrono package * chore(deps): update dependency containers/automation_images to v20240320 * fix(deps): update rust crate anyhow to 1.0.81 * tests: check queried domain name in reverse lookup tests * fix: set name for answers in reverse lookups * chore: fix typo in runner script * chore: fix log message when doing reverse lookup * fix(deps): update rust crate log to 0.4.21 * fix(deps): update rust crate anyhow to 1.0.80 * chore(deps): update rust crate chrono to 0.4.34 * fix(deps): update rust crate async-broadcast to 0.7.0 * fix(deps): update rust crate tokio to 1.36.0 * [CI:DOCS] Packit: disable bodhi tasks * chore(deps): update rust crate chrono to 0.4.33 * Bump to 1.11.0-dev netavark: * Use recommended way to require latest rust?require cargo. * Update to version 1.12.2: * Release v1.12.2 * Release notes for 1.12.2 * fix new rust 1.80 lint issues * silence new rust 1.80 warnings * aardvark: on start failure delete entries again * iptables: make dns rules cover tcp as well * nftables: make dns rules cover tcp as well * Release v1.12.1 * Update release notes for v1.12.1 * Change nv cargo categories * Bump to 1.13.0-dev * Release 1.12 * Release Notes for 1.12 * run cargo update * rpm: use nftables as default for f41 * fix(deps): update rust crate serde_json to 1.0.121 * fix(deps): update rust crate tokio to 1.39.2 * aardvark-dns: trim whitespaces from error text * fix(deps): update rust crate env_logger to 0.11.5 * [skip-ci] RPM: handle iptables/nftables dependencies * fix aardvark-dns error handling * fix(deps): update rust crate tokio to 1.39.1 * fix(deps): update rust crate env_logger to 0.11.4 * fix(deps): update rust crate tokio to 1.38.1 * update mozim to 0.2.4 (bsc#1236567) * fix(deps): update rust crate serde_json to 1.0.120 * netavark: dhcp_proxy: use dns servers from dhcp lease * fix(deps): update rust crate serde_json to 1.0.119 * fix(deps): update rust crate netlink-packet-route to 0.20.1 * fix(deps): update rust crate log to 0.4.22 * Fix Epoch so upgrade path is preserved from Fedora/RHEL. * test: add macvlan metric test * fix(deps): update rust crate serde_json to 1.0.118 * fix(deps): update rust crate url to 2.5.2 * fix(deps): update rust crate prost to 0.12.6 * fix(deps): update rust crate url to 2.5.1 * fix(deps): update rust crate iptables to 0.5.2 * [CI:BUILD] rpm: Update Rust macro usage * fix(deps): update rust crate nftables to 0.4.1 * fix(deps): update rust crate tokio to 1.38.0 * Bump to 1.12.0-dev * Update to version 1.11.0: * Release v1.11.0 * Update release notes for 1.11.0 * update netlink-packet-route to 0.20.0 * run cargo update * fix: remove extra / in make install and uninstall * chore(deps): update dependency containers/automation_images to v20240529 * fix(deps): update rust crate nix to 0.29.0 * fix(deps): update rust crate nispor to 1.2.19 * fix(deps): update rust crate anyhow to 1.0.86 * fix(deps): update rust crate anyhow to 1.0.85 * [skip-ci] Packit: do not create dup jobs on podman-next * fix(deps): update rust crate anyhow to 1.0.84 * [skip-ci] RPM: use default __cargo macro across all envs * [skip-ci] RPM: switch default firewall to nftables on EL10+ * chore(deps): update dependency containers/automation_images to v20240513 * Add conditional compilation of default firewall driver * fix(deps): update rust crate serde_json to 1.0.117 * fix new clippy warnings * Update CI image to fedora 40 * fix ncat sctp tests * fix(deps): update rust crate anyhow to 1.0.83 * build(deps): bump h2 from 0.3.25 to 0.3.26 * [skip-ci] Packit: distinct `-rhel` packages value * [skip-ci] Packit: enable c10s downstream sync * fix(deps): update rust crate libc to 0.2.154 * fix(deps): update rust crate ipnet to 2.9.0 * fix(deps): update rust crate tower to 0.4.13 * fix(deps): update rust crate tokio-stream to 0.1.15 * fix(deps): update rust crate prost to 0.12.4 * fix(deps): update rust crate iptables to 0.5.1 * [skip-ci] Packit: remove el8 jobs * fix(deps): update rust crate anyhow to 1.0.82 * fix(deps): update rust crate serde to 1.0.199 * Add suffix to Aardvark internal network filenames * fix port forward with strict RPF and multi networks * renovate: stop rebasing PRs automatically * chore(deps): update rust crate chrono to 0.4.38 * fix(deps): update rust crate serde_json to 1.0.116 * fix(deps): update rust crate netlink-sys to 0.8.6 * nftables: only dump netavark table rules * update nftables to 0.4 * fix aardvark-dns netns check * fix(deps): update rust crate tokio to 1.37 * fix(deps): update rust crate netlink-packet-route to 0.19.0 * Update to nix-0.28.0 * fix(deps): update rust crate mozim to 0.2.3 * fix(deps): update rust crate nispor to 1.2.18 * Update chrono * fix(deps): update rust crate serde_json to 1.0.115 * build(deps): bump mio from 0.8.9 to 0.8.11 * [skip-ci] rpm: aardvark-dns is a hard dep across the board * Update Rust crate env_logger to 0.11.3 * Update Rust crate serde to 1.0.197 * Update Rust crate tempfile to 3.10.1 * Update Rust crate log to 0.4.21 * Update Rust crate zbus to 3.15.2 * Update Rust crate serde_json to 1.0.114 * Update Rust crate env_logger to 0.11.2 * Update Rust crate chrono to 0.4.34 * Update Rust crate tonic-build to 0.11 * Update Rust crate tonic to 0.11 * fix netavark update to not start a new aardvark-dns * Update Rust crate tempfile to 3.10.0 * Update Rust crate zbus to 3.15.0 * Update Rust crate tokio to 1.36 * Update Rust crate chrono to 0.4.33 * Do not perform network namespace detection on AV update * [CI:BUILD] Packit/rpm: fix aardvark-dns handling * Update Rust crate serde_json to 1.0.113 * Update Rust crate serde_json to 1.0.112 * Update Rust crate env_logger to 0.11.1 * update README with nftables support * Bump to v1.11.0-dev * perf-netavark: accept fw driver as argument * perf-netavark: fix missing --config arg * Update to version 1.10.3: * v1.10.3 * fix netavark update to not start a new aardvark-dns ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-64=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * netavark-1.12.2-slfo.1.1_1.1 * aardvark-dns-1.12.2-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224167 * https://bugzilla.suse.com/show_bug.cgi?id=1234660 * https://bugzilla.suse.com/show_bug.cgi?id=1236567 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:34:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:34:43 -0000 Subject: SUSE-RU-2025:20261-1: moderate: Recommended update for python-jmespath Message-ID: <174902248356.13583.5446560747870675922@smelt2.prg2.suse.org> # Recommended update for python-jmespath Announcement ID: SUSE-RU-2025:20261-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1235786 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-jmespath fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235786). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-58=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-jmespath-1.0.1-slfo.1.1_3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:06 -0000 Subject: SUSE-SU-2025:20270-1: important: Security update for the Linux Kernel Message-ID: <174902250605.12703.3319909924499720603@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20270-1 Release Date: 2025-04-17T14:37:10Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224013 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1224757 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1228659 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231910 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234074 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237874 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237882 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238052 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238565 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238746 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238970 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238990 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239066 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239684 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239986 * bsc#1239994 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240575 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240806 * bsc#1240808 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240978 * bsc#1240979 * bsc#1241038 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12309 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-27415 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58071 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21729 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21755 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21806 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21836 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21981 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-2312 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves 347 vulnerabilities, contains nine features and has 104 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). * CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: fix potential error return (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-14=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-source-6.4.0-28.1 * kernel-macros-6.4.0-28.1 * kernel-devel-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.4.0-28.1 * kernel-default-debugsource-6.4.0-28.1 * kernel-default-debuginfo-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-28.1.21.6 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-28.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-default-livepatch-6.4.0-28.1 * kernel-livepatch-MICRO-6-0_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-1-3.1 * kernel-livepatch-6_4_0-28-default-1-3.1 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-28.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-28.1 * kernel-kvmsmall-debugsource-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:16 -0000 Subject: SUSE-RU-2025:20269-1: moderate: Recommended update for cockpit, cockpit-podman Message-ID: <174902251676.12703.17088637031987151954@smelt2.prg2.suse.org> # Recommended update for cockpit, cockpit-podman Announcement ID: SUSE-RU-2025:20269-1 Release Date: 2025-04-17T11:31:42Z Rating: moderate References: * bsc#1221336 * bsc#1226049 * bsc#1226050 * bsc#1226541 * bsc#1227441 * bsc#1232687 Affected Products: * SUSE Linux Micro 6.1 An update that has six fixes can now be installed. ## Description: This update for cockpit, cockpit-podman fixes the following issues: cockpit: * Updated documentation to point at new links (bsc#1226050) * Removed hardcoded RH references (bsc#1221336) * Properly disable pcp (bsc#1226049) * Use suse ID as branding (bsc#1227441) cockpit-podman: * Fixed issues searching containers (bsc#1232687) * Fixed systemd units folder (bsc#1226541) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-62=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * cockpit-ws-322-slfo.1.1_1.1 * cockpit-bridge-debuginfo-322-slfo.1.1_1.1 * cockpit-322-slfo.1.1_1.1 * cockpit-debugsource-322-slfo.1.1_1.1 * cockpit-ws-debuginfo-322-slfo.1.1_1.1 * cockpit-debuginfo-322-slfo.1.1_1.1 * cockpit-bridge-322-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * cockpit-podman-91-slfo.1.1_2.1 * cockpit-selinux-322-slfo.1.1_1.1 * cockpit-storaged-322-slfo.1.1_1.1 * cockpit-system-322-slfo.1.1_1.1 * cockpit-networkmanager-322-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221336 * https://bugzilla.suse.com/show_bug.cgi?id=1226049 * https://bugzilla.suse.com/show_bug.cgi?id=1226050 * https://bugzilla.suse.com/show_bug.cgi?id=1226541 * https://bugzilla.suse.com/show_bug.cgi?id=1227441 * https://bugzilla.suse.com/show_bug.cgi?id=1232687 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:33 -0000 Subject: SUSE-RU-2025:20268-1: important: Recommended update for salt Message-ID: <174902253339.12703.6550320993351489814@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20268-1 Release Date: 2025-04-17T11:25:21Z Rating: important References: * bsc#1215484 * bsc#1219041 * bsc#1220357 * bsc#1220905 * bsc#1226141 * bsc#1228182 * bsc#1228690 * bsc#1229109 * bsc#1229539 * bsc#1230322 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1233667 * bsc#1234022 * bsc#1234881 Affected Products: * SUSE Linux Micro 6.1 An update that has 16 fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fixed aptpkg 'NoneType object has no attribute split' error * Detect openEuler as RedHat family OS * Ensure the correct crypt module is loaded * Implement multiple inventory for ansible.targets * Make x509 module compatible with M2Crypto 0.44.0 * Removed deprecated code from x509.certificate_managed test mode * Move logrotate config to /usr/etc/logrotate.d where possible * Add DEB822 apt repository format support * Make Salt-SSH work with all SSH passwords (bsc#1215484) * Fixed issue of using update-alternatives with alts (#105) * Fixed virt_query outputter and add support for block devices * Make _auth calls visible with master stats * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Enhace batch async and fix some detected issues * Enhacement of Salt packaging * Use update-alternatives for all salt scripts * Use flexible dependencies for the subpackages * Make salt-minion to require flavored zypp-plugin * Make zyppnotify to use update-alternatives * Drop unused yumnotify plugin * Add dependency to python3-dnf-plugins-core for RHEL based * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944) (bsc#1234881) (bsc#1220905) * Adapt to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Enhance smart JSON parsing when garbage is present (bsc#1231605) * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Fixed issues running on Python 3.12 and 3.13 * Reverted setting SELinux context for minion service (bsc#1233667) * Removed System V init support * Make systemd the only supported init system by removing System V init and insserv references * Ensure package builds with no init system dependencies if built without systemd (for example for use in containers) * Apply some spec-cleaner suggestions (update copyright year, sort requirements, adjust spacing) * Fixed the condition of alternatives for Tumbleweed and Leap 16 * Use update-alternatives for salt-call and fix builing on EL8 * Build all python bindings for all flavors * Make minion reconnecting on changing master IP (bsc#1228182) * Handle logger exception when flushing already closed file * Include passlib as a recommended dependency * Make Salt Bundle more tolerant to long running jobs (bsc#1228690) * Fixed additional x509 tests and test_suse tests for SLE12 * Fixed failing x509 tests with OpenSSL < 1.1 * Avoid explicit reading of /etc/salt/minion (bsc#1220357) * Allow NamedLoaderContexts to be returned from loader * Reverted the change making reactor less blocking (bsc#1230322) * Use --cachedir for extension_modules in salt-call (bsc#1226141) * Prevent using SyncWrapper with no reason * Fixed the SELinux context for Salt Minion service (bsc#1219041) * Set contextvars as a build requirement for package * Increase warn_until_date date for code we still support * The test_debian test now uses port 80 for ubuntu keyserver * Fixed too frequent systemd service restart in test_system test * Avoid crash on wrong output of systemctl version (bsc#1229539) * Improve error handling with different OpenSSL versions * Removed redundant run_func from salt.master.MWorker._handle_aes * Fixed cloud minion configuration for multiple masters (bsc#1229109) * Use Pygit2 id instead of deprecated oid in gitfs * Fixed few failing tests to work with both Salt and Salt bundle * Skip testing unsupported OpenSSL crypto algorithms ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-67=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * salt-3006.0-slfo.1.1_3.1 * python311-salt-3006.0-slfo.1.1_3.1 * salt-minion-3006.0-slfo.1.1_3.1 * salt-transactional-update-3006.0-slfo.1.1_3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1219041 * https://bugzilla.suse.com/show_bug.cgi?id=1220357 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226141 * https://bugzilla.suse.com/show_bug.cgi?id=1228182 * https://bugzilla.suse.com/show_bug.cgi?id=1228690 * https://bugzilla.suse.com/show_bug.cgi?id=1229109 * https://bugzilla.suse.com/show_bug.cgi?id=1229539 * https://bugzilla.suse.com/show_bug.cgi?id=1230322 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1233667 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:37 -0000 Subject: SUSE-RU-2025:20267-1: moderate: Recommended update for python-pyserial Message-ID: <174902253725.12703.7802179276665175942@smelt2.prg2.suse.org> # Recommended update for python-pyserial Announcement ID: SUSE-RU-2025:20267-1 Release Date: 2025-04-17T11:25:21Z Rating: moderate References: * bsc#1235782 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-pyserial fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235782) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-61=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-pyserial-3.5-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235782 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:39 -0000 Subject: SUSE-RU-2025:20266-1: moderate: Recommended update for python-httpx Message-ID: <174902253918.12703.14645636288380603756@smelt2.prg2.suse.org> # Recommended update for python-httpx Announcement ID: SUSE-RU-2025:20266-1 Release Date: 2025-04-17T11:25:21Z Rating: moderate References: * bsc#1235784 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-httpx fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235784). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-60=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-httpx-0.24.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235784 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:44 -0000 Subject: SUSE-RU-2025:20265-1: moderate: Recommended update for suseconnect-ng Message-ID: <174902254413.12703.4237986911030827425@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2025:20265-1 Release Date: 2025-04-17T11:25:21Z Rating: moderate References: * bsc#1231185 * bsc#1231328 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update version to 1.13: * Integrating uptime-tracker * Honor auto-import-gpg-keys flag on migration (bsc#1231328) * Only send labels if targetting SCC * Skip the docker auth generation on RMT (bsc#1231185) * Add --set-labels to register command to set labels at registration time on SCC * Add a new function to display suse-uptime-tracker version * Integrate with uptime-tracker ( https://github.com/SUSE/uptime-tracker/ ) * Add a command to show the info being gathered ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-57=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-1.13.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231185 * https://bugzilla.suse.com/show_bug.cgi?id=1231328 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:47 -0000 Subject: SUSE-RU-2025:20264-1: moderate: Recommended update for container-selinux Message-ID: <174902254754.12703.13591007881353943503@smelt2.prg2.suse.org> # Recommended update for container-selinux Announcement ID: SUSE-RU-2025:20264-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1221720 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for container-selinux fixes the following issues: * Update to version 2.236.0: * Allow super privileged containers to use RealtimeKit for scheduling * Add container_ro_file_t to the podman artifact store * Update to version 2.235.0: * Bump to v2.235.0 * container_log{reader,writer}_t: allow watch file * RPM: Update gating config * feat: support /var/lib/crio * Update to version 2.234.2: * TMT: enable epel idomatically * Packit: switch back to fedora-all * RPM: Bump Epoch to 4 * rpm: ship manpage * Add proper labeling for RamaLama * Packit: remove rhel / epel jobs * packit: remove unused file * Add BuildRequires selinux-policy-%{selinuxtype} to enable building for SLFO. Might be removed in the future again when 1231252 is fixed. * Update to version 2.233.0: * container_engine_t: small change to allow non root exec in a container * RPM: explicitly list ghosted paths and skip mode verification * container-selinux install on non selinux-policy-targeted systems (#332) * set container_log_t type for /var/log/kube-apiserver * Allow kubelet_t to create a sock file kubelet_var_lib_t * dontaudit spc_t to mmap_zero * Packit: update targets (#330) * container_engine_t: another round of small improvements (#327) * Allow container_device_plugin_t to use the network (#325) * RPM: cleanup changelog (#324) * TMT: Simplify tests * Update to version 2.232.1: * Bump to v2.232.1 * TMT: fix srpm download syntax on rawhide * Bump to 2.232.0 * Packit: remove `update_release` key from downstream jobs (#313) * Update container-selinux.8 man page * Add ownership of /usr/share/udica (#312) * Packit/TMT: upstream maintenance of downstream gating tests * extend container_engine_t again * Allow spc_t to use localectl * Allow spc_t to use timedatectl * introduce container_use_xserver_devices boolean to allow GPU access * Update to version 2.231.0: * Allow container domains to communicate with spc_t unix_stream_sockets * Move to %posttrans to ensure selinux-policy got updated before the commands run (bsc#1221720) * Manual update to version 2.230.0+git4.a8e389d to include this commit that is needed for the main selinux-policy update to work: * Rename all /var/run file context entries to /run * Update to version 2.230.0: * Move to tar_scm based packaging: added _service and _servicedata * Allow containers to unmount file systems * Add buildah as a container_runtime_exec_t label * Additional rules for container_user_t * improve container_engine_t * Update to version 2.228: * Allow container domains to watch fifo_files * container_engine_t: improve for podman in kubernetes case * Allow spc_t to transition to install_t domain * Default to allowing containers to use dri devices * Allow access to BPF Filesystems * Fix kubernetes transition rule * Label kubensenter as well as kubenswrapper * Allow container domains to execute container_runtime_tmpfs_t files * Allow container domains to ptrace themselves * Allow container domains to use container_runtime_tmpfs_t as an entrypoint * Add boolean to allow containers to use dri devices * Give containers access to pod resources endpoint * Label kubenswrapper kubelet_exec_t * Update to version 2.222: * Allow containers to read/write inherited dri devices * Update to version 2.221: * Allow containers to shutdown sockets inherited from container runtimes * Allow spc_t to use execmod libraries on container file systems * Add boolean to allow containers to read all cert files * More MLS Policy allow rules * Allow container runtimes using pasta bind icmp_socket to port_t * Fix spc_t transitions from container_runtime_domain * Update to version 2.215.0: * Add some MLS rules to policy * Allow container runtime to dyntransition to spc_t * Tighten controls on confined users * Add labels for /var/lib/shared * Cleanup entrypoint definitions * Allow container_device_plugin_t access to debugfs * Allow containers which use devices to map them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-70=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * container-selinux-2.236.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221720 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:50 -0000 Subject: SUSE-RU-2025:20263-1: moderate: Recommended update for suse-build-key Message-ID: <174902255019.12703.8314489347823705623@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2025:20263-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1236779 * bsc#1237294 * jsc#PED-12321 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature and has two fixes can now be installed. ## Description: This update for suse-build-key fixes the following issues: Changed signing keys to use SHA256 UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321) * gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc * gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc * suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-69=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * suse-build-key-12.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236779 * https://bugzilla.suse.com/show_bug.cgi?id=1237294 * https://jira.suse.com/browse/PED-12321 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:55 -0000 Subject: SUSE-RU-2025:20262-1: moderate: Recommended update for aardvark-dns, netavark Message-ID: <174902255543.12703.827729911152231633@smelt2.prg2.suse.org> # Recommended update for aardvark-dns, netavark Announcement ID: SUSE-RU-2025:20262-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1224167 * bsc#1234660 * bsc#1236567 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for aardvark-dns, netavark fixes the following issues: aardvark-dns: * Update to version 1.12.2: * coredns: work on tcp requests concurrently * tcp: add timeout to connection * cirrus: update branch names * Change av cargo categories * config: ignore enoent errors while reading configs * run cargo update * update upsteam resolvers on each refresh * fix(deps): update rust crate syslog to v7 * fix(deps): update rust crate tokio to 1.39.2 * add tcp support for forwarding (bsc#1234660) * add tcp listening support * test: add new test to check for startup error * return bind error to caller on first start * add our own error type and use it over anyhow * server: use anyhow to wrap parse_configs error * server: split out main loop into new function * main: remove aardvark-dns error prefix * coredns: remove unnecessary try_join! call * coredns: drop pointless name var * serve: read nameservers once * replace signal-hook with tokio::signal * serve: fix broken error logging * server: improve parent <-> child error handling * add some basic perf check script * fix(deps): update rust crate tokio to 1.39.0 * coredns: create reply_ip() function * coredns: match dns type explicitly * server: use only one tokio runtime * coredns: improve indentation for process_message() * coredns: move upstream resolvers detection later * coredns: do not clone sender * read AARDVARK_NO_PROXY once * coredns: move main code out of select! * coredns: fix "name" naming * coredns: remove unused forward_addr/port * coredns: fix handling of dns search domain * coredns: rework PTR lookup flow * fix(deps): update rust crate tokio to 1.38.1 * [skip-ci] TMT: Reorg upstream tests for downstream reusability * [skip-ci] Packit: use `packages: [aardvark-dns-fedora]` for podman-next builds * Be sure to have at least Epoch 2 to preserve upgrade path in c10s. * fix(deps): update rust crate log to 0.4.22 * [CI:BUILD] rpm: Update Rust macro usage * fix(deps): update rust crate tokio to 1.38.0 * Bump to 1.12.0-dev * Remove redundant source: cargo_config * Update to version 1.11.0: * Release v1.11.0 * v1.11.0 release notes * run cargo update * chore(deps): update dependency containers/automation_images to v20240529 * Internal networks cannot make external DNS requests * fix(deps): update rust crate anyhow to 1.0.86 * fix(deps): update rust crate nix to 0.29.0 * [skip-ci] RPM: use default __cargo macro across all envs * chore(deps): update dependency containers/automation_images to v20240513 * fix(deps): update rust crate anyhow to 1.0.83 * [skip-ci] Packit: separate `packages` key for rhel jobs * fix(deps): update rust crate libc to 0.2.154 * [skip-ci] Packit: enable rhel10, c10s tests and c10s downstream sync * [skip-ci] Packit: Remove EL8 jobs * fix(deps): update rust crate syslog to ^6.1.1 * fix reverse ipv6 lookup test flake * fix(deps): update hickory-dns monorepo to 0.24.1 * chore(deps): update rust crate chrono to 0.4.38 * Don't tear down all server threads on SIGHUP (bsc#1224167) * fix(deps): update rust crate anyhow to 1.0.82 * fix(deps): update rust crate tokio to 1.37.0 * Update to nix-0.28.0 * update chrono package * chore(deps): update dependency containers/automation_images to v20240320 * fix(deps): update rust crate anyhow to 1.0.81 * tests: check queried domain name in reverse lookup tests * fix: set name for answers in reverse lookups * chore: fix typo in runner script * chore: fix log message when doing reverse lookup * fix(deps): update rust crate log to 0.4.21 * fix(deps): update rust crate anyhow to 1.0.80 * chore(deps): update rust crate chrono to 0.4.34 * fix(deps): update rust crate async-broadcast to 0.7.0 * fix(deps): update rust crate tokio to 1.36.0 * [CI:DOCS] Packit: disable bodhi tasks * chore(deps): update rust crate chrono to 0.4.33 * Bump to 1.11.0-dev netavark: * Use recommended way to require latest rust?require cargo. * Update to version 1.12.2: * Release v1.12.2 * Release notes for 1.12.2 * fix new rust 1.80 lint issues * silence new rust 1.80 warnings * aardvark: on start failure delete entries again * iptables: make dns rules cover tcp as well * nftables: make dns rules cover tcp as well * Release v1.12.1 * Update release notes for v1.12.1 * Change nv cargo categories * Bump to 1.13.0-dev * Release 1.12 * Release Notes for 1.12 * run cargo update * rpm: use nftables as default for f41 * fix(deps): update rust crate serde_json to 1.0.121 * fix(deps): update rust crate tokio to 1.39.2 * aardvark-dns: trim whitespaces from error text * fix(deps): update rust crate env_logger to 0.11.5 * [skip-ci] RPM: handle iptables/nftables dependencies * fix aardvark-dns error handling * fix(deps): update rust crate tokio to 1.39.1 * fix(deps): update rust crate env_logger to 0.11.4 * fix(deps): update rust crate tokio to 1.38.1 * update mozim to 0.2.4 (bsc#1236567) * fix(deps): update rust crate serde_json to 1.0.120 * netavark: dhcp_proxy: use dns servers from dhcp lease * fix(deps): update rust crate serde_json to 1.0.119 * fix(deps): update rust crate netlink-packet-route to 0.20.1 * fix(deps): update rust crate log to 0.4.22 * Fix Epoch so upgrade path is preserved from Fedora/RHEL. * test: add macvlan metric test * fix(deps): update rust crate serde_json to 1.0.118 * fix(deps): update rust crate url to 2.5.2 * fix(deps): update rust crate prost to 0.12.6 * fix(deps): update rust crate url to 2.5.1 * fix(deps): update rust crate iptables to 0.5.2 * [CI:BUILD] rpm: Update Rust macro usage * fix(deps): update rust crate nftables to 0.4.1 * fix(deps): update rust crate tokio to 1.38.0 * Bump to 1.12.0-dev * Update to version 1.11.0: * Release v1.11.0 * Update release notes for 1.11.0 * update netlink-packet-route to 0.20.0 * run cargo update * fix: remove extra / in make install and uninstall * chore(deps): update dependency containers/automation_images to v20240529 * fix(deps): update rust crate nix to 0.29.0 * fix(deps): update rust crate nispor to 1.2.19 * fix(deps): update rust crate anyhow to 1.0.86 * fix(deps): update rust crate anyhow to 1.0.85 * [skip-ci] Packit: do not create dup jobs on podman-next * fix(deps): update rust crate anyhow to 1.0.84 * [skip-ci] RPM: use default __cargo macro across all envs * [skip-ci] RPM: switch default firewall to nftables on EL10+ * chore(deps): update dependency containers/automation_images to v20240513 * Add conditional compilation of default firewall driver * fix(deps): update rust crate serde_json to 1.0.117 * fix new clippy warnings * Update CI image to fedora 40 * fix ncat sctp tests * fix(deps): update rust crate anyhow to 1.0.83 * build(deps): bump h2 from 0.3.25 to 0.3.26 * [skip-ci] Packit: distinct `-rhel` packages value * [skip-ci] Packit: enable c10s downstream sync * fix(deps): update rust crate libc to 0.2.154 * fix(deps): update rust crate ipnet to 2.9.0 * fix(deps): update rust crate tower to 0.4.13 * fix(deps): update rust crate tokio-stream to 0.1.15 * fix(deps): update rust crate prost to 0.12.4 * fix(deps): update rust crate iptables to 0.5.1 * [skip-ci] Packit: remove el8 jobs * fix(deps): update rust crate anyhow to 1.0.82 * fix(deps): update rust crate serde to 1.0.199 * Add suffix to Aardvark internal network filenames * fix port forward with strict RPF and multi networks * renovate: stop rebasing PRs automatically * chore(deps): update rust crate chrono to 0.4.38 * fix(deps): update rust crate serde_json to 1.0.116 * fix(deps): update rust crate netlink-sys to 0.8.6 * nftables: only dump netavark table rules * update nftables to 0.4 * fix aardvark-dns netns check * fix(deps): update rust crate tokio to 1.37 * fix(deps): update rust crate netlink-packet-route to 0.19.0 * Update to nix-0.28.0 * fix(deps): update rust crate mozim to 0.2.3 * fix(deps): update rust crate nispor to 1.2.18 * Update chrono * fix(deps): update rust crate serde_json to 1.0.115 * build(deps): bump mio from 0.8.9 to 0.8.11 * [skip-ci] rpm: aardvark-dns is a hard dep across the board * Update Rust crate env_logger to 0.11.3 * Update Rust crate serde to 1.0.197 * Update Rust crate tempfile to 3.10.1 * Update Rust crate log to 0.4.21 * Update Rust crate zbus to 3.15.2 * Update Rust crate serde_json to 1.0.114 * Update Rust crate env_logger to 0.11.2 * Update Rust crate chrono to 0.4.34 * Update Rust crate tonic-build to 0.11 * Update Rust crate tonic to 0.11 * fix netavark update to not start a new aardvark-dns * Update Rust crate tempfile to 3.10.0 * Update Rust crate zbus to 3.15.0 * Update Rust crate tokio to 1.36 * Update Rust crate chrono to 0.4.33 * Do not perform network namespace detection on AV update * [CI:BUILD] Packit/rpm: fix aardvark-dns handling * Update Rust crate serde_json to 1.0.113 * Update Rust crate serde_json to 1.0.112 * Update Rust crate env_logger to 0.11.1 * update README with nftables support * Bump to v1.11.0-dev * perf-netavark: accept fw driver as argument * perf-netavark: fix missing --config arg * Update to version 1.10.3: * v1.10.3 * fix netavark update to not start a new aardvark-dns ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-64=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * netavark-1.12.2-slfo.1.1_1.1 * aardvark-dns-1.12.2-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224167 * https://bugzilla.suse.com/show_bug.cgi?id=1234660 * https://bugzilla.suse.com/show_bug.cgi?id=1236567 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:35:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:35:58 -0000 Subject: SUSE-RU-2025:20261-1: moderate: Recommended update for python-jmespath Message-ID: <174902255844.12703.17623685238704120403@smelt2.prg2.suse.org> # Recommended update for python-jmespath Announcement ID: SUSE-RU-2025:20261-1 Release Date: 2025-04-17T11:21:25Z Rating: moderate References: * bsc#1235786 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for python-jmespath fixes the following issues: * Use libalternatives instead of update-alternatives (bsc#1235786). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-58=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-jmespath-1.0.1-slfo.1.1_3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:39:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:39:43 -0000 Subject: SUSE-SU-2025:20260-1: important: Security update for the Linux Kernel Message-ID: <174902278316.13583.10320461492443576106@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20260-1 Release Date: 2025-04-17T10:48:21Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 272 vulnerabilities, contains eight features and has 91 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * add nf_tables for iptables non-legacy network handling. * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-8=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-28.1 * kernel-source-rt-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-debugsource-6.4.0-28.1 * kernel-rt-devel-6.4.0-28.1 * kernel-rt-debuginfo-6.4.0-28.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-rt-1-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-1-3.1 * kernel-rt-livepatch-6.4.0-28.1 * kernel-rt-devel-debuginfo-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:39:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:39:56 -0000 Subject: SUSE-SU-2025:20259-1: critical: Security update for docker Message-ID: <174902279656.13583.9573869063283299210@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20259-1 Release Date: 2025-03-31T16:54:11Z Rating: critical References: * bsc#1217070 * bsc#1223409 * bsc#1228324 * bsc#1228553 * bsc#1229806 * bsc#1230294 * bsc#1230331 * bsc#1230333 * bsc#1231348 * bsc#1232999 * bsc#1233819 * bsc#1234089 * bsc#1237335 Cross-References: * CVE-2023-45142 * CVE-2023-47108 * CVE-2024-29018 * CVE-2024-41110 CVSS scores: * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities and has nine fixes can now be installed. ## Description: This update for docker fixes the following issues: * This update includes fixes for: * CVE-2024-41110: Fixed Authz zero length regression (bsc#1228324) * CVE-2023-47108: Fixed otelgrpc: DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality (bsc#1217070 bsc#1229806) * CVE-2023-45142: Fixed otelhttp,otelhttptrace,otelrestful: DoS vulnerability (bsc#1228553 bsc#1229806) * Update to Docker 27.5.1-ce. See upstream changelog online at bsc#1237335 * Update to docker-buildx 0.20.1. See upstream changelog online at * Update to Docker 27.4.1-ce. See upstream changelog online at * Update to docker-buildx 0.19.3. See upstream changelog online at * Update to Docker 27.4.0-ce. See upstream changelog online at . Some notable changelogs from the last update: * * * Update to Go 1.22. * Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * Disable docker-buildx builds for SLES. It turns out that build containers with docker-buildx don't currently get the SUSE secrets mounts applied, meaning that container-suseconnect doesn't work when building images. bsc#1233819 * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Mark docker-buildx as required since classic "docker build" has been deprecated since Docker 23.0. bsc#1230331 * Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate package, but with docker-stable it will be necessary to maintain the packages together and it makes more sense to have them live in the same OBS package. bsc#1230333 * Update to Docker 26.1.5-ce. See upstream changelog online at bsc#1230294 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-37=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-27.5.1_ce-slfo.1.1_1.1 * docker-27.5.1_ce-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1223409 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 * https://bugzilla.suse.com/show_bug.cgi?id=1229806 * https://bugzilla.suse.com/show_bug.cgi?id=1230294 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://bugzilla.suse.com/show_bug.cgi?id=1232999 * https://bugzilla.suse.com/show_bug.cgi?id=1233819 * https://bugzilla.suse.com/show_bug.cgi?id=1234089 * https://bugzilla.suse.com/show_bug.cgi?id=1237335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:00 -0000 Subject: SUSE-SU-2025:20258-1: moderate: Security update for expat Message-ID: <174902280051.13583.4222517090474094839@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20258-1 Release Date: 2025-03-31T14:22:33Z Rating: moderate References: * bsc#1232579 Cross-References: * CVE-2024-50602 CVSS scores: * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: -CVE-2024-50602: Fixed DoS via XML_ResumeParser (bsc#1232579). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-23=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.5.0-slfo.1.1_2.1 * libexpat1-debuginfo-2.5.0-slfo.1.1_2.1 * libexpat1-2.5.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1232579 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:06 -0000 Subject: SUSE-SU-2025:20257-1: important: Security update for libarchive Message-ID: <174902280642.13583.6023273085605210261@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2025:20257-1 Release Date: 2025-03-31T14:21:21Z Rating: important References: * bsc#1225971 * bsc#1225972 * bsc#1231544 * bsc#1231624 * bsc#1237606 * bsc#1238610 Cross-References: * CVE-2024-20696 * CVE-2024-20697 * CVE-2024-26256 * CVE-2024-48957 * CVE-2024-48958 * CVE-2025-1632 * CVE-2025-25724 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20696 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-48957 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-48958 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1632 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1632 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1632 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1632 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-25724 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-25724 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-25724 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves seven vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2025-1632: Fixed null pointer dereference in bsdunzip.c (bsc#1237606) * CVE-2025-25724: Fixed Buffer Overflow vulnerability in libarchive (bsc#1238610) * CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624) * CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (also attributed CVE-2024-26256) (CVE-2024-26256, bsc#1225972) * CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544) * CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-50=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libarchive13-3.7.4-slfo.1.1_2.1 * libarchive13-debuginfo-3.7.4-slfo.1.1_2.1 * libarchive-debugsource-3.7.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://www.suse.com/security/cve/CVE-2024-20697.html * https://www.suse.com/security/cve/CVE-2024-26256.html * https://www.suse.com/security/cve/CVE-2024-48957.html * https://www.suse.com/security/cve/CVE-2024-48958.html * https://www.suse.com/security/cve/CVE-2025-1632.html * https://www.suse.com/security/cve/CVE-2025-25724.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 * https://bugzilla.suse.com/show_bug.cgi?id=1225972 * https://bugzilla.suse.com/show_bug.cgi?id=1231544 * https://bugzilla.suse.com/show_bug.cgi?id=1231624 * https://bugzilla.suse.com/show_bug.cgi?id=1237606 * https://bugzilla.suse.com/show_bug.cgi?id=1238610 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:10 -0000 Subject: SUSE-RU-2025:20256-1: moderate: Recommended update for vhostmd Message-ID: <174902281076.13583.8820182745428936629@smelt2.prg2.suse.org> # Recommended update for vhostmd Announcement ID: SUSE-RU-2025:20256-1 Release Date: 2025-03-31T09:23:46Z Rating: moderate References: * bsc#1230961 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for vhostmd fixes the following issues: * Updated the 'VirtualizationVendor' to only include the vendor name (bsc#1230961) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-56=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * vhostmd-debugsource-1.2-slfo.1.1_2.1 * vhostmd-debuginfo-1.2-slfo.1.1_2.1 * vm-dump-metrics-debuginfo-1.2-slfo.1.1_2.1 * vhostmd-1.2-slfo.1.1_2.1 * vm-dump-metrics-1.2-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230961 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:13 -0000 Subject: SUSE-SU-2025:20255-1: moderate: Security update for python-requests Message-ID: <174902281343.13583.7701947398984396639@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:20255-1 Release Date: 2025-03-28T13:56:40Z Rating: moderate References: * bsc#1226321 * bsc#1231500 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for python-requests fixes the following issues: * Add patch to inject the default CA bundles if they are not specified. (bsc#1226321, bsc#1231500) * Remove Requires on python-py. * update to 2.32.3: * Fixed bug breaking the ability to specify custom SSLContexts in sub-classes of HTTPAdapter. * Fixed issue where Requests started failing to run on Python versions compiled without the `ssl` module. * To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is * Fixed an issue where setting verify=False on the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, * verify=True now reuses a global SSLContext which should improve request time * Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-1=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-requests-2.32.3-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226321 * https://bugzilla.suse.com/show_bug.cgi?id=1231500 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:17 -0000 Subject: SUSE-SU-2025:20254-1: important: Security update for python-Jinja2 Message-ID: <174902281703.13583.15499389969224309892@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20254-1 Release Date: 2025-03-28T13:55:44Z Rating: important References: * bsc#1234808 * bsc#1234809 * bsc#1238879 Cross-References: * CVE-2024-56201 * CVE-2024-56326 * CVE-2025-27516 CVSS scores: * CVE-2024-56201 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56201 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56201 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56326 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27516 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-27516 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27516 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2025-27516: Fixed Jinja sandbox breakout through attr filter selecting format method (bsc#1238879) * CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808) * CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-52=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * python311-Jinja2-3.1.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56201.html * https://www.suse.com/security/cve/CVE-2024-56326.html * https://www.suse.com/security/cve/CVE-2025-27516.html * https://bugzilla.suse.com/show_bug.cgi?id=1234808 * https://bugzilla.suse.com/show_bug.cgi?id=1234809 * https://bugzilla.suse.com/show_bug.cgi?id=1238879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:20 -0000 Subject: SUSE-RU-2025:20253-1: moderate: Recommended update for elemental-toolkit Message-ID: <174902282002.13583.8948654609614472485@smelt2.prg2.suse.org> # Recommended update for elemental-toolkit Announcement ID: SUSE-RU-2025:20253-1 Release Date: 2025-03-28T13:54:51Z Rating: moderate References: * bsc#1233289 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Update to v2.2.2: * 1fbc11ea Fixes squashfs images creation (#2230) [bsc#1233289] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-40=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 x86_64) * elemental-toolkit-2.2.2-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233289 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:24 -0000 Subject: SUSE-SU-2025:20252-1: important: Security update for libsoup Message-ID: <174902282433.13583.5410203743124979550@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20252-1 Release Date: 2025-03-28T13:54:19Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52531 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: strictly don't allow NUL bytes in headers (bsc#1233285 glgo#GNOME/libsoup#377). * CVE-2024-52532: websocket: Process the frame as soon as we read data (bsc#1233287 glgo#GNOME/libsoup#391). * CVE-2024-52531: be more robust against invalid input when parsing params (bsc#1233292 glgo#GNOME/libsoup!407). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-46=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.4-slfo.1.1_2.1 * libsoup-3_0-0-3.4.4-slfo.1.1_2.1 * libsoup-debugsource-3.4.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:28 -0000 Subject: SUSE-RU-2025:20251-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <174902282835.13583.7666102935694060024@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:20251-1 Release Date: 2025-03-28T08:48:28Z Rating: moderate References: * bsc#1234444 * bsc#1235991 * bsc#1235992 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Update to version 1.0.0 (jsc#PCT-531) * API incompatibility: The check_payg_byos function no longer exits, it now returns a tuple of (flavor, exit_code). This makes the function reusable. * Update the build setup to work with the system interpreter of upcoming SLE releases. SLE 12 stays with the Python 3.4 interpreter and SLE 15 with the Python 3.6 interpreter. * Version 0.1.2 (bsc#1234444) * Improve detection of IPv4 and IPv6 network setup and use appropriate IP version for access the update servers * Improve reliability of flavor detection. Try an update server multiple times to get an answer, if we hit timeouts return the value flavor value from a cache file. * Version 0.1.1 (bsc#1235991, bsc#1235992) * Add time stamp to log * From version 0.1.0 * Doc improvements clarifying exit staus codes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-35=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 x86_64) * python-instance-billing-flavor-check-1.0.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234444 * https://bugzilla.suse.com/show_bug.cgi?id=1235991 * https://bugzilla.suse.com/show_bug.cgi?id=1235992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:31 -0000 Subject: SUSE-RU-2025:20250-1: moderate: Recommended update for microos-tools Message-ID: <174902283111.13583.14530522204093694487@smelt2.prg2.suse.org> # Recommended update for microos-tools Announcement ID: SUSE-RU-2025:20250-1 Release Date: 2025-03-28T07:52:23Z Rating: moderate References: * bsc#1232709 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for microos-tools fixes the following issues: * Update to version 2.21+git24: * Label /sys before selinux-autorelabel units run (bsc#1232709) * Added RemainAfterExit=true to autorelabel services * Added automated testing of SELinux relabelling functionality * Consistently use tabs in selinux-autorelabel-generator * test: Check for AVC denials in the journal * test: More reliable output of combustion-validate ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-53=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * microos-tools-debugsource-2.21+git24-slfo.1.1_1.1 * microos-tools-2.21+git24-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232709 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:40:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:40:53 -0000 Subject: SUSE-SU-2025:20260-1: important: Security update for the Linux Kernel Message-ID: <174902285308.12703.12395385250141463131@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20260-1 Release Date: 2025-04-17T10:48:21Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 272 vulnerabilities, contains eight features and has 91 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * add nf_tables for iptables non-legacy network handling. * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-8=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-28.1 * kernel-source-rt-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-28.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-debugsource-6.4.0-28.1 * kernel-rt-debuginfo-6.4.0-28.1 * kernel-rt-devel-6.4.0-28.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-28-rt-1-3.1 * kernel-rt-devel-debuginfo-6.4.0-28.1 * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-1-3.1 * kernel-rt-livepatch-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:08 -0000 Subject: SUSE-SU-2025:20259-1: critical: Security update for docker Message-ID: <174902286810.12703.16956430584549611131@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20259-1 Release Date: 2025-03-31T16:54:11Z Rating: critical References: * bsc#1217070 * bsc#1223409 * bsc#1228324 * bsc#1228553 * bsc#1229806 * bsc#1230294 * bsc#1230331 * bsc#1230333 * bsc#1231348 * bsc#1232999 * bsc#1233819 * bsc#1234089 * bsc#1237335 Cross-References: * CVE-2023-45142 * CVE-2023-47108 * CVE-2024-29018 * CVE-2024-41110 CVSS scores: * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities and has nine fixes can now be installed. ## Description: This update for docker fixes the following issues: * This update includes fixes for: * CVE-2024-41110: Fixed Authz zero length regression (bsc#1228324) * CVE-2023-47108: Fixed otelgrpc: DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality (bsc#1217070 bsc#1229806) * CVE-2023-45142: Fixed otelhttp,otelhttptrace,otelrestful: DoS vulnerability (bsc#1228553 bsc#1229806) * Update to Docker 27.5.1-ce. See upstream changelog online at bsc#1237335 * Update to docker-buildx 0.20.1. See upstream changelog online at * Update to Docker 27.4.1-ce. See upstream changelog online at * Update to docker-buildx 0.19.3. See upstream changelog online at * Update to Docker 27.4.0-ce. See upstream changelog online at . Some notable changelogs from the last update: * * * Update to Go 1.22. * Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * Disable docker-buildx builds for SLES. It turns out that build containers with docker-buildx don't currently get the SUSE secrets mounts applied, meaning that container-suseconnect doesn't work when building images. bsc#1233819 * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Mark docker-buildx as required since classic "docker build" has been deprecated since Docker 23.0. bsc#1230331 * Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate package, but with docker-stable it will be necessary to maintain the packages together and it makes more sense to have them live in the same OBS package. bsc#1230333 * Update to Docker 26.1.5-ce. See upstream changelog online at bsc#1230294 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-37=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-27.5.1_ce-slfo.1.1_1.1 * docker-27.5.1_ce-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1223409 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 * https://bugzilla.suse.com/show_bug.cgi?id=1229806 * https://bugzilla.suse.com/show_bug.cgi?id=1230294 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://bugzilla.suse.com/show_bug.cgi?id=1232999 * https://bugzilla.suse.com/show_bug.cgi?id=1233819 * https://bugzilla.suse.com/show_bug.cgi?id=1234089 * https://bugzilla.suse.com/show_bug.cgi?id=1237335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:10 -0000 Subject: SUSE-SU-2025:20258-1: moderate: Security update for expat Message-ID: <174902287043.12703.14253277512944214790@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20258-1 Release Date: 2025-03-31T14:22:33Z Rating: moderate References: * bsc#1232579 Cross-References: * CVE-2024-50602 CVSS scores: * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: -CVE-2024-50602: Fixed DoS via XML_ResumeParser (bsc#1232579). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-23=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.5.0-slfo.1.1_2.1 * libexpat1-2.5.0-slfo.1.1_2.1 * libexpat1-debuginfo-2.5.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1232579 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:16 -0000 Subject: SUSE-SU-2025:20257-1: important: Security update for libarchive Message-ID: <174902287613.12703.12233355234221141193@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2025:20257-1 Release Date: 2025-03-31T14:21:21Z Rating: important References: * bsc#1225971 * bsc#1225972 * bsc#1231544 * bsc#1231624 * bsc#1237606 * bsc#1238610 Cross-References: * CVE-2024-20696 * CVE-2024-20697 * CVE-2024-26256 * CVE-2024-48957 * CVE-2024-48958 * CVE-2025-1632 * CVE-2025-25724 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20696 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-48957 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-48958 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1632 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1632 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1632 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1632 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-25724 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-25724 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-25724 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves seven vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2025-1632: Fixed null pointer dereference in bsdunzip.c (bsc#1237606) * CVE-2025-25724: Fixed Buffer Overflow vulnerability in libarchive (bsc#1238610) * CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624) * CVE-2024-20697: Fixed Out of bounds Remote Code Execution Vulnerability (also attributed CVE-2024-26256) (CVE-2024-26256, bsc#1225972) * CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544) * CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-50=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libarchive-debugsource-3.7.4-slfo.1.1_2.1 * libarchive13-3.7.4-slfo.1.1_2.1 * libarchive13-debuginfo-3.7.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://www.suse.com/security/cve/CVE-2024-20697.html * https://www.suse.com/security/cve/CVE-2024-26256.html * https://www.suse.com/security/cve/CVE-2024-48957.html * https://www.suse.com/security/cve/CVE-2024-48958.html * https://www.suse.com/security/cve/CVE-2025-1632.html * https://www.suse.com/security/cve/CVE-2025-25724.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 * https://bugzilla.suse.com/show_bug.cgi?id=1225972 * https://bugzilla.suse.com/show_bug.cgi?id=1231544 * https://bugzilla.suse.com/show_bug.cgi?id=1231624 * https://bugzilla.suse.com/show_bug.cgi?id=1237606 * https://bugzilla.suse.com/show_bug.cgi?id=1238610 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:18 -0000 Subject: SUSE-RU-2025:20256-1: moderate: Recommended update for vhostmd Message-ID: <174902287866.12703.16413454934250865040@smelt2.prg2.suse.org> # Recommended update for vhostmd Announcement ID: SUSE-RU-2025:20256-1 Release Date: 2025-03-31T09:23:46Z Rating: moderate References: * bsc#1230961 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for vhostmd fixes the following issues: * Updated the 'VirtualizationVendor' to only include the vendor name (bsc#1230961) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-56=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * vhostmd-1.2-slfo.1.1_2.1 * vhostmd-debuginfo-1.2-slfo.1.1_2.1 * vm-dump-metrics-debuginfo-1.2-slfo.1.1_2.1 * vhostmd-debugsource-1.2-slfo.1.1_2.1 * vm-dump-metrics-1.2-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230961 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:21 -0000 Subject: SUSE-SU-2025:20255-1: moderate: Security update for python-requests Message-ID: <174902288157.12703.16826290997738441096@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:20255-1 Release Date: 2025-03-28T13:56:40Z Rating: moderate References: * bsc#1226321 * bsc#1231500 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for python-requests fixes the following issues: * Add patch to inject the default CA bundles if they are not specified. (bsc#1226321, bsc#1231500) * Remove Requires on python-py. * update to 2.32.3: * Fixed bug breaking the ability to specify custom SSLContexts in sub-classes of HTTPAdapter. * Fixed issue where Requests started failing to run on Python versions compiled without the `ssl` module. * To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is * Fixed an issue where setting verify=False on the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, * verify=True now reuses a global SSLContext which should improve request time * Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-1=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * python311-requests-2.32.3-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226321 * https://bugzilla.suse.com/show_bug.cgi?id=1231500 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:25 -0000 Subject: SUSE-SU-2025:20254-1: important: Security update for python-Jinja2 Message-ID: <174902288522.12703.16212956713909183530@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20254-1 Release Date: 2025-03-28T13:55:44Z Rating: important References: * bsc#1234808 * bsc#1234809 * bsc#1238879 Cross-References: * CVE-2024-56201 * CVE-2024-56326 * CVE-2025-27516 CVSS scores: * CVE-2024-56201 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56201 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56201 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56326 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27516 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-27516 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27516 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2025-27516: Fixed Jinja sandbox breakout through attr filter selecting format method (bsc#1238879) * CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808) * CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-52=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * python311-Jinja2-3.1.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56201.html * https://www.suse.com/security/cve/CVE-2024-56326.html * https://www.suse.com/security/cve/CVE-2025-27516.html * https://bugzilla.suse.com/show_bug.cgi?id=1234808 * https://bugzilla.suse.com/show_bug.cgi?id=1234809 * https://bugzilla.suse.com/show_bug.cgi?id=1238879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:27 -0000 Subject: SUSE-RU-2025:20253-1: moderate: Recommended update for elemental-toolkit Message-ID: <174902288799.12703.14549932386553642168@smelt2.prg2.suse.org> # Recommended update for elemental-toolkit Announcement ID: SUSE-RU-2025:20253-1 Release Date: 2025-03-28T13:54:51Z Rating: moderate References: * bsc#1233289 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Update to v2.2.2: * 1fbc11ea Fixes squashfs images creation (#2230) [bsc#1233289] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-40=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 x86_64) * elemental-toolkit-2.2.2-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233289 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:32 -0000 Subject: SUSE-SU-2025:20252-1: important: Security update for libsoup Message-ID: <174902289245.12703.16991291680223125553@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20252-1 Release Date: 2025-03-28T13:54:19Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52531 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: strictly don't allow NUL bytes in headers (bsc#1233285 glgo#GNOME/libsoup#377). * CVE-2024-52532: websocket: Process the frame as soon as we read data (bsc#1233287 glgo#GNOME/libsoup#391). * CVE-2024-52531: be more robust against invalid input when parsing params (bsc#1233292 glgo#GNOME/libsoup!407). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-46=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.4-slfo.1.1_2.1 * libsoup-3_0-0-3.4.4-slfo.1.1_2.1 * libsoup-debugsource-3.4.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:36 -0000 Subject: SUSE-RU-2025:20251-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <174902289605.12703.12576652129564815420@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:20251-1 Release Date: 2025-03-28T08:48:28Z Rating: moderate References: * bsc#1234444 * bsc#1235991 * bsc#1235992 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Update to version 1.0.0 (jsc#PCT-531) * API incompatibility: The check_payg_byos function no longer exits, it now returns a tuple of (flavor, exit_code). This makes the function reusable. * Update the build setup to work with the system interpreter of upcoming SLE releases. SLE 12 stays with the Python 3.4 interpreter and SLE 15 with the Python 3.6 interpreter. * Version 0.1.2 (bsc#1234444) * Improve detection of IPv4 and IPv6 network setup and use appropriate IP version for access the update servers * Improve reliability of flavor detection. Try an update server multiple times to get an answer, if we hit timeouts return the value flavor value from a cache file. * Version 0.1.1 (bsc#1235991, bsc#1235992) * Add time stamp to log * From version 0.1.0 * Doc improvements clarifying exit staus codes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-35=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 x86_64) * python-instance-billing-flavor-check-1.0.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234444 * https://bugzilla.suse.com/show_bug.cgi?id=1235991 * https://bugzilla.suse.com/show_bug.cgi?id=1235992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:41:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:41:38 -0000 Subject: SUSE-RU-2025:20250-1: moderate: Recommended update for microos-tools Message-ID: <174902289826.12703.88772793643787369@smelt2.prg2.suse.org> # Recommended update for microos-tools Announcement ID: SUSE-RU-2025:20250-1 Release Date: 2025-03-28T07:52:23Z Rating: moderate References: * bsc#1232709 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for microos-tools fixes the following issues: * Update to version 2.21+git24: * Label /sys before selinux-autorelabel units run (bsc#1232709) * Added RemainAfterExit=true to autorelabel services * Added automated testing of SELinux relabelling functionality * Consistently use tabs in selinux-autorelabel-generator * test: Check for AVC denials in the journal * test: More reliable output of combustion-validate ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-53=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * microos-tools-2.21+git24-slfo.1.1_1.1 * microos-tools-debugsource-2.21+git24-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232709 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:50:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:50:28 -0000 Subject: SUSE-SU-2025:20249-1: important: Security update for the Linux Kernel Message-ID: <174902342819.13583.8519423258081145050@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20249-1 Release Date: 2025-03-28T07:51:47Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1181674 * bsc#1194869 * bsc#1207948 * bsc#1214954 * bsc#1215199 * bsc#1216702 * bsc#1216813 * bsc#1218470 * bsc#1219170 * bsc#1219596 * bsc#1220021 * bsc#1220328 * bsc#1220430 * bsc#1220711 * bsc#1220773 * bsc#1221044 * bsc#1221303 * bsc#1221858 * bsc#1222426 * bsc#1222608 * bsc#1222721 * bsc#1222775 * bsc#1222780 * bsc#1223020 * bsc#1223023 * bsc#1223024 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223061 * bsc#1223076 * bsc#1223113 * bsc#1223187 * bsc#1223285 * bsc#1223315 * bsc#1223591 * bsc#1223592 * bsc#1223633 * bsc#1223637 * bsc#1223641 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223654 * bsc#1223660 * bsc#1223661 * bsc#1223665 * bsc#1223666 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223696 * bsc#1223698 * bsc#1223705 * bsc#1223712 * bsc#1223718 * bsc#1223728 * bsc#1223739 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223757 * bsc#1223759 * bsc#1223761 * bsc#1223762 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223805 * bsc#1223827 * bsc#1223831 * bsc#1223834 * bsc#1223869 * bsc#1223874 * bsc#1224095 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224423 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224480 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224491 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224500 * bsc#1224501 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224513 * bsc#1224517 * bsc#1224519 * bsc#1224521 * bsc#1224524 * bsc#1224526 * bsc#1224537 * bsc#1224542 * bsc#1224546 * bsc#1224552 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224573 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224582 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224603 * bsc#1224605 * bsc#1224607 * bsc#1224609 * bsc#1224611 * bsc#1224613 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224620 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224637 * bsc#1224639 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224646 * bsc#1224647 * bsc#1224650 * bsc#1224651 * bsc#1224653 * bsc#1224654 * bsc#1224657 * bsc#1224660 * bsc#1224663 * bsc#1224665 * bsc#1224666 * bsc#1224671 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224719 * bsc#1224722 * bsc#1224723 * bsc#1224726 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224747 * bsc#1224749 * bsc#1224803 * bsc#1224804 * bsc#1225502 * bsc#1225579 * bsc#1225593 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225698 * bsc#1225699 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225728 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225743 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225769 * bsc#1225775 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229025 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-47233 * CVE-2023-52463 * CVE-2023-52472 * CVE-2023-52591 * CVE-2023-52653 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52673 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52882 * CVE-2023-52923 * CVE-2024-22099 * CVE-2024-26611 * CVE-2024-26742 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26786 * CVE-2024-26794 * CVE-2024-26846 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26861 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26881 * CVE-2024-26900 * CVE-2024-26903 * CVE-2024-26922 * CVE-2024-26924 * CVE-2024-26932 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26957 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26973 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27046 * CVE-2024-27057 * CVE-2024-27062 * CVE-2024-27067 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27397 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35806 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35839 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35875 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35883 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35891 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35907 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35963 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-36002 * CVE-2024-36009 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36476 * CVE-2024-36880 * CVE-2024-36885 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36906 * CVE-2024-36908 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36955 * CVE-2024-36959 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-5660 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52591 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26764 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 610 vulnerabilities, contains three features and has 128 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). Features added: * * Disable ceph (jsc#PED-7242) * * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Add already cherry-picked ids to AMDGPU patch * Align git commit ID abbreviation guidelines and checks (git-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * Move kABI workaround patch to correct folder * Move upstreamed DRM patch into sorted section * Move upstreamed NFS patch into sorted section * Move upstreamed TPM patch into sorted section * Move upstreamed lpfc patches into sorted section * Move upstreamed ppc patch into sorted section * Move upstreamed sound patch into sorted section * Move upstreamed sound patches into sorted section * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * README.BRANCH: Remove copy of branch name * Refresh patches.suse/ALSA-hda-realtek-Add-support-for-Samsung-Galaxy- Book.patch. * Refresh patches.suse/cpufreq-intel_pstate-Temporarily-boost-P-state- when-.patch. * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' This reverts commit 2ccfee6be929dd4ea49ef59a7ae686473aae40b6 CONFIG_ARM64_SME is enabled by default so some customers may rely on SME. We need further analysis to evaluate to what extent we are impacted and in case we'll disable SME support later. * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") Apparently, jsc#PED-7242 is only deprecate ceph for 15-SP6 and disable for 15-SP7. Revert the disabling. * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) Update arm64 default configuration file * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes). * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blacklist.conf: printk/sysctl: breaks kernel without pre-requisite patches (bsc#1229025) * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * series.conf: temporarily disable upstream patch patches.suse/ocfs2-fix- UBSAN-warning-in-ocfs2_verify_volume.patch (bsc#1236138) * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-4=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-25.1 * kernel-source-rt-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-debugsource-6.4.0-25.1 * kernel-rt-devel-6.4.0-25.1 * kernel-rt-debuginfo-6.4.0-25.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-rt-livepatch-6.4.0-25.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-1-1.1 * kernel-rt-devel-debuginfo-6.4.0-25.1 * kernel-livepatch-6_4_0-25-rt-1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52463.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-5660.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:51:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:51:25 -0000 Subject: SUSE-SU-2025:20249-1: important: Security update for the Linux Kernel Message-ID: <174902348510.12703.7719055839228131557@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20249-1 Release Date: 2025-03-28T07:51:47Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1181674 * bsc#1194869 * bsc#1207948 * bsc#1214954 * bsc#1215199 * bsc#1216702 * bsc#1216813 * bsc#1218470 * bsc#1219170 * bsc#1219596 * bsc#1220021 * bsc#1220328 * bsc#1220430 * bsc#1220711 * bsc#1220773 * bsc#1221044 * bsc#1221303 * bsc#1221858 * bsc#1222426 * bsc#1222608 * bsc#1222721 * bsc#1222775 * bsc#1222780 * bsc#1223020 * bsc#1223023 * bsc#1223024 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223061 * bsc#1223076 * bsc#1223113 * bsc#1223187 * bsc#1223285 * bsc#1223315 * bsc#1223591 * bsc#1223592 * bsc#1223633 * bsc#1223637 * bsc#1223641 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223654 * bsc#1223660 * bsc#1223661 * bsc#1223665 * bsc#1223666 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223696 * bsc#1223698 * bsc#1223705 * bsc#1223712 * bsc#1223718 * bsc#1223728 * bsc#1223739 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223757 * bsc#1223759 * bsc#1223761 * bsc#1223762 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223805 * bsc#1223827 * bsc#1223831 * bsc#1223834 * bsc#1223869 * bsc#1223874 * bsc#1224095 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224423 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224480 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224491 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224500 * bsc#1224501 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224513 * bsc#1224517 * bsc#1224519 * bsc#1224521 * bsc#1224524 * bsc#1224526 * bsc#1224537 * bsc#1224542 * bsc#1224546 * bsc#1224552 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224573 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224582 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224603 * bsc#1224605 * bsc#1224607 * bsc#1224609 * bsc#1224611 * bsc#1224613 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224620 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224637 * bsc#1224639 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224646 * bsc#1224647 * bsc#1224650 * bsc#1224651 * bsc#1224653 * bsc#1224654 * bsc#1224657 * bsc#1224660 * bsc#1224663 * bsc#1224665 * bsc#1224666 * bsc#1224671 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224719 * bsc#1224722 * bsc#1224723 * bsc#1224726 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224747 * bsc#1224749 * bsc#1224803 * bsc#1224804 * bsc#1225502 * bsc#1225579 * bsc#1225593 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225698 * bsc#1225699 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225728 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225743 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225769 * bsc#1225775 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229025 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-47233 * CVE-2023-52463 * CVE-2023-52472 * CVE-2023-52591 * CVE-2023-52653 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52673 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52882 * CVE-2023-52923 * CVE-2024-22099 * CVE-2024-26611 * CVE-2024-26742 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26786 * CVE-2024-26794 * CVE-2024-26846 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26861 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26881 * CVE-2024-26900 * CVE-2024-26903 * CVE-2024-26922 * CVE-2024-26924 * CVE-2024-26932 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26957 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26973 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27046 * CVE-2024-27057 * CVE-2024-27062 * CVE-2024-27067 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27397 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35806 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35839 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35875 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35883 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35891 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35907 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35963 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-36002 * CVE-2024-36009 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36476 * CVE-2024-36880 * CVE-2024-36885 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36906 * CVE-2024-36908 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36955 * CVE-2024-36959 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-5660 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52591 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26764 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 610 vulnerabilities, contains three features and has 128 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). Features added: * * Disable ceph (jsc#PED-7242) * * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Add already cherry-picked ids to AMDGPU patch * Align git commit ID abbreviation guidelines and checks (git-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * Move kABI workaround patch to correct folder * Move upstreamed DRM patch into sorted section * Move upstreamed NFS patch into sorted section * Move upstreamed TPM patch into sorted section * Move upstreamed lpfc patches into sorted section * Move upstreamed ppc patch into sorted section * Move upstreamed sound patch into sorted section * Move upstreamed sound patches into sorted section * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * README.BRANCH: Remove copy of branch name * Refresh patches.suse/ALSA-hda-realtek-Add-support-for-Samsung-Galaxy- Book.patch. * Refresh patches.suse/cpufreq-intel_pstate-Temporarily-boost-P-state- when-.patch. * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' This reverts commit 2ccfee6be929dd4ea49ef59a7ae686473aae40b6 CONFIG_ARM64_SME is enabled by default so some customers may rely on SME. We need further analysis to evaluate to what extent we are impacted and in case we'll disable SME support later. * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") Apparently, jsc#PED-7242 is only deprecate ceph for 15-SP6 and disable for 15-SP7. Revert the disabling. * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) Update arm64 default configuration file * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes). * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blacklist.conf: printk/sysctl: breaks kernel without pre-requisite patches (bsc#1229025) * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * series.conf: temporarily disable upstream patch patches.suse/ocfs2-fix- UBSAN-warning-in-ocfs2_verify_volume.patch (bsc#1236138) * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-4=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-25.1 * kernel-source-rt-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-devel-6.4.0-25.1 * kernel-rt-debuginfo-6.4.0-25.1 * kernel-rt-debugsource-6.4.0-25.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-1-1.1 * kernel-rt-devel-debuginfo-6.4.0-25.1 * kernel-livepatch-6_4_0-25-rt-1-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-1-1.1 * kernel-rt-livepatch-6.4.0-25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52463.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-5660.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:54:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:54:43 -0000 Subject: SUSE-SU-2025:20248-1: important: Security update for the Linux Kernel Message-ID: <174902368388.13583.1201702671381982537@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20248-1 Release Date: 2025-03-27T15:23:42Z Rating: important References: * bsc#1012628 * bsc#1194869 * bsc#1214954 * bsc#1215199 * bsc#1216813 * bsc#1218470 * bsc#1220711 * bsc#1220773 * bsc#1224095 * bsc#1224726 * bsc#1225743 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230413 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-52923 * CVE-2024-26924 * CVE-2024-27397 * CVE-2024-35839 * CVE-2024-36476 * CVE-2024-36908 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 357 vulnerabilities, contains three features and has 130 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413) * Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413) * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413) * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-3=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-6.4.0-25.1 * kernel-macros-6.4.0-25.1 * kernel-source-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-25.1 * kernel-default-devel-6.4.0-25.1 * kernel-default-debuginfo-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-25.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-default-livepatch-6.4.0-25.1 * kernel-livepatch-6_4_0-25-default-1-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-1-1.2 * kernel-livepatch-6_4_0-25-default-debuginfo-1-1.2 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-25.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-25.1 * kernel-kvmsmall-debugsource-6.4.0-25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:55:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:55:11 -0000 Subject: SUSE-SU-2025:20248-1: important: Security update for the Linux Kernel Message-ID: <174902371146.12703.14186239983377108814@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20248-1 Release Date: 2025-03-27T15:23:42Z Rating: important References: * bsc#1012628 * bsc#1194869 * bsc#1214954 * bsc#1215199 * bsc#1216813 * bsc#1218470 * bsc#1220711 * bsc#1220773 * bsc#1224095 * bsc#1224726 * bsc#1225743 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230413 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-52923 * CVE-2024-26924 * CVE-2024-27397 * CVE-2024-35839 * CVE-2024-36476 * CVE-2024-36908 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 357 vulnerabilities, contains three features and has 130 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413) * Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413) * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413) * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-3=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-source-6.4.0-25.1 * kernel-devel-6.4.0-25.1 * kernel-macros-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.4.0-25.1 * kernel-default-debuginfo-6.4.0-25.1 * kernel-default-debugsource-6.4.0-25.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-25.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_5-debugsource-1-1.2 * kernel-default-livepatch-6.4.0-25.1 * kernel-livepatch-6_4_0-25-default-1-1.2 * kernel-livepatch-6_4_0-25-default-debuginfo-1-1.2 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-25.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-25.1 * kernel-kvmsmall-debugsource-6.4.0-25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:58:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:58:52 -0000 Subject: SUSE-SU-2025:20247-1: important: Security update for the Linux Kernel Message-ID: <174902393258.13583.13111766065061137398@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20247-1 Release Date: 2025-03-27T15:23:38Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode() and iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090) * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845) * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035) * supported.conf: mark ultravisor userspace access as supported (bsc#1232090) * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-1=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-macros-6.4.0-24.1 * kernel-devel-6.4.0-24.1 * kernel-source-6.4.0-24.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-24.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.4.0-24.1 * kernel-default-debugsource-6.4.0-24.1 * kernel-default-debuginfo-6.4.0-24.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-24.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-1-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-1-1.2 * kernel-default-livepatch-6.4.0-24.1 * kernel-livepatch-6_4_0-24-default-debuginfo-1-1.2 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-24.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-24.1 * kernel-kvmsmall-debugsource-6.4.0-24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 07:59:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 07:59:04 -0000 Subject: SUSE-SU-2025:20247-1: important: Security update for the Linux Kernel Message-ID: <174902394485.12703.2992464561604845079@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20247-1 Release Date: 2025-03-27T15:23:38Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode() and iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090) * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845) * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035) * supported.conf: mark ultravisor userspace access as supported (bsc#1232090) * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-1=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-macros-6.4.0-24.1 * kernel-devel-6.4.0-24.1 * kernel-source-6.4.0-24.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-24.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-24.1 * kernel-default-debugsource-6.4.0-24.1 * kernel-default-devel-6.4.0-24.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-24.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-default-livepatch-6.4.0-24.1 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-1-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-1-1.2 * kernel-livepatch-6_4_0-24-default-1-1.2 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-24.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debugsource-6.4.0-24.1 * kernel-kvmsmall-debuginfo-6.4.0-24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:15 -0000 Subject: SUSE-SU-2025:20246-1: important: Security update for the Linux Kernel Message-ID: <174902443576.12703.15067047447412587288@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20246-1 Release Date: 2025-03-27T12:56:22Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown" (bsc#1228269). * Revert "ALSA: hda: Conditionally use snooping for AMD HDMI" (stable-fixes). * Revert "KEYS: encrypted: Add check for strsep" (git-fixes). * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "driver core: Fix uevent_show() vs driver detach race" (git-fixes). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path" (git-fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Revert "wifi: iwlwifi: remove retry loops in start" (git-fixes). * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090). * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845). * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * dwc2: Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342) * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: Drop the previous HD-audio TAS2781 fix (bsc#1230132) * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: Drop OCFS2 patch causing a regression (bsc#1233255) * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035). * supported.conf: mark ultravisor userspace access as supported (bsc#1232090). * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-2=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-22.1 * kernel-source-rt-6.4.0-22.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-22.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-devel-6.4.0-22.1 * kernel-rt-debuginfo-6.4.0-22.1 * kernel-rt-debugsource-6.4.0-22.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-rt-devel-debuginfo-6.4.0-22.1 * kernel-rt-livepatch-6.4.0-22.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-1-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-1-1.1 * kernel-livepatch-6_4_0-22-rt-1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:20 -0000 Subject: SUSE-RU-2025:20245-1: important: Recommended update for lshw Message-ID: <174902444054.12703.16568758231883351508@smelt2.prg2.suse.org> # Recommended update for lshw Announcement ID: SUSE-RU-2025:20245-1 Release Date: 2025-03-27T11:47:24Z Rating: important References: * jsc#PED-9912 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for lshw fixes the following issues: * Update to version B.02.20 (jsc#9912): * update changelog * update data files * get rid of GTK deprecation warning * get rid of some snprintf warnings * Add support for 100Gbit interfaces ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-55=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * lshw-debugsource-B.02.20-slfo.1.1_1.1 * lshw-B.02.20-slfo.1.1_1.1 * lshw-debuginfo-B.02.20-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/PED-9912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:22 -0000 Subject: SUSE-RU-2025:20244-1: moderate: Recommended update for strace Message-ID: <174902444298.12703.12354539348338172209@smelt2.prg2.suse.org> # Recommended update for strace Announcement ID: SUSE-RU-2025:20244-1 Release Date: 2025-03-27T11:45:03Z Rating: moderate References: * bsc#1228216 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for strace fixes the following issues: * Update to strace 6.13 * Implemented decoding of getxattrat, setxattrat, listxattrat, and removexattrat syscalls. * Updated decoding of struct io_uring_clone_buffers, struct io_uring_napi, and struct perf_event_attr. * Updated decoding of crypto_user_alg netlink attributes of NETLINK_CRYPTO. * Implemented decoding of IFLA_MCTP_PHYS_BINDING netlink attribute. * Updated lists of AT_ _, BPF__ , FAN_ _, IORING__ , MADV_ _, NT__ , and SCM_* constants. * Updated lists of ioctl commands from Linux 6.13. * Update to strace 6.12 * Implemented decoding of EPIOCGPARAMS and EPIOCSPARAMS ioctl commands. * Implemented decoding of NS_GET_MNTNS_ID, NS_GET_PID_FROM_PIDNS, NS_GET_TGID_FROM_PIDNS, NS_GET_PID_IN_PIDNS, NS_GET_TGID_IN_PIDNS, NS_MNT_GET_INFO, NS_MNT_GET_NEXT, and NS_MNT_GET_PREV ioctl commands. * Implemented decoding of FRA_DSCP netlink attribute. * Implemented decoding of IORING_REGISTER_CLOCK and IORING_REGISTER_CLONE_BUFFERS opcodes of io_uring_register syscall. * Updated decoding of struct landlock_ruleset_attr. * Updated lists of AUDIT_ _, ETHTOOL__ , F_ _, IORING__ , LSM_ _, MAP__ , MSG_ _, NT__ , SCHED_ _, SCM__ , SO_ _, and V4L2__ constants. * Updated lists of ioctl commands from Linux 6.12. * Fix the syscall name printed by strace when PTRACE_GET_SYSCALL_INFO is in use and a syscall is restarted by a just attached tracee using restart_syscall mechanism. * Update to strace 6.11 * Implemented decoding of uretprobe syscall. * Implemented decoding of WDIOC_GETSUPPORT and WDIOC_SETOPTIONS ioctl commands. * Enhanced decoding of unknown ioctl commands in non-abbreviated mode by printing the contents of the ioctl argument buffer in hexadecimal format. * Updated decoding of listmount, statmount, and statx syscalls. * Updated lists of ETHTOOL_ _, IORING__ , IPPROTO_ _, RWF__ , STATX_ _, and V4L2__ constants. * Updated lists of ioctl commands from Linux 6.11. * Update License tag (bsc#1228216) * Update to strace 6.10 * Implemented --decode-fds=eventfd option to retrieve eventfd object details associated with eventfd file descriptors. * Implemented decoding of NETLINK_GENERIC nlctrl protocol. * Implemented decoding of F_DUPFD_QUERY fcntl. * Implemented decoding of mseal syscall. * Updated decoding of statx and prctl syscalls. * Updated decoding of BPF_RAW_TRACEPOINT_OPEN bpf command. * Updated lists of BPF_ _, IORING__ , KEXEC_ _, KEY__ , LANDLOCK_ _, PR__ , STATX_ _, TCP__ , TEE_ _, V4L2__ , and *_MAGIC constants. * Updated lists of ioctl commands from Linux 6.10. * Worked around a bug introduced in Linux 6.5 that affected system call tampering on riscv64. * Update to strace 6.9 * Implemented --always-show-pid option. * The --user|-u option has learned to recognize numeric UID:GID pair, allowing e.g. statically-built strace to be used without invoking nss plugins. * Implemented decoding of IORING_REGISTER_SYNC_CANCEL, IORING_REGISTER_FILE_ALLOC_RANGE, IORING_REGISTER_PBUF_STATUS, IORING_REGISTER_NAPI, and IORING_UNREGISTER_NAPI opcodes of io_uring_register syscall. * Implemented decoding of BPF_TOKEN_CREATE bpf syscall command. * Updated decoding of io_uring_register and pidfd_send_signal syscalls. * Updated lists of BPF_ _, CAN__ , IORING_ _, KEY__ , LSM_ _, MPOL__ , NT_ _, RWF__ , PIDFD_ _, PTP__ , TCP_ _, and_ _MAGIC constants. * Updated lists of ioctl commands from Linux 6.9. * Update to strace 6.8 * Renamed --stack-traces to --stack-trace for consistency. Old option is retained for backwards compatibility. * Implemented --stack-trace-frame-limit=N option for configuring the limit of the number of printed backtrace frames. * Implemented decoding of statmount, listmount, lsm_get_self_attr, lsm_set_self_attr, and lsm_list_modules syscalls. * Implemented decoding of setsockopt(TCP_AO_ADD_KEY). * Updated decoding of landlock_create_ruleset and landlock_add_rule syscalls. * Updated decoding of SMC_DIAG_DMBINFO netlink attribute. * Updated decoding of UBI_IOCATT ioctl command. * Enhanced decoding of mount attributes of fsmount and mount_setattr syscalls. * Updated lists of BPF_ _, KEXEC__ , KVM_ _, PERF__ , SOL_ _, STATX__ , UFFD_ _, and V4L2__ constants. * Updated lists of ioctl commands from Linux 6.8. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-54=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * strace-debuginfo-6.13-slfo.1.1_1.1 * strace-debugsource-6.13-slfo.1.1_1.1 * strace-6.13-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228216 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:30 -0000 Subject: SUSE-RU-2025:20243-1: important: Recommended update for supportutils Message-ID: <174902445075.12703.1805268348187294637@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2025:20243-1 Release Date: 2025-03-24T10:54:57Z Rating: important References: * bsc#1213291 * bsc#1220082 * bsc#1222021 * bsc#1222896 * bsc#1227127 * bsc#1228265 * bsc#1231396 * bsc#1231423 * bsc#1233726 * jsc#PED-11669 * jsc#PED-8211 * jsc#PED-8221 Affected Products: * SUSE Linux Micro 6.1 An update that contains three features and has nine fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.9 * Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291,jsc#PED-8221) * Supportconfig available in current distro (PED-7131) * Corrected display issues (bsc#1231396) * NFS takes too long, showmount times out (bsc#1231423) * Merged sle15 and master branches (bsc#1233726, jsc#PED-11669) * Changes to version 3.2.8 * Update supportconfig get pam.d sorted * yast_files: Exclude .zcat * Sanitize grub bootloader (bsc#1227127) * Sanitize regcodes * Improve product detection * Add read_values for s390x (bsc#1228265,) * hardware_info: Remove old alsa ver check * drbd_info: Fix incorrect escape of quotes * Changes in version 3.1.30 * Added -V key:value pair option (bsc#1222021,jsc#PED-8211) * Avoid getting duplicate kernel verifications in boot.text * Suppress file descriptor leak warnings from lvm commands (bsc#1220082) * Includes container log timestamps ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-51=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * supportutils-3.2.9-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213291 * https://bugzilla.suse.com/show_bug.cgi?id=1220082 * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1222896 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://bugzilla.suse.com/show_bug.cgi?id=1231396 * https://bugzilla.suse.com/show_bug.cgi?id=1231423 * https://bugzilla.suse.com/show_bug.cgi?id=1233726 * https://jira.suse.com/browse/PED-11669 * https://jira.suse.com/browse/PED-8211 * https://jira.suse.com/browse/PED-8221 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:39 -0000 Subject: SUSE-RU-2025:20242-1: moderate: Recommended update for cloud-init Message-ID: <174902445929.12703.4065080589715223417@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20242-1 Release Date: 2025-03-21T15:46:17Z Rating: moderate References: * bsc#1212476 * bsc#1219680 * bsc#1227237 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for cloud-init fixes the following issues: * Wait for udev once if we cannot find the expected MAC (bsc#1227237) * remove dependency on /usr/bin/python3 via using the macros (bsc#1212476) * Brute force approach to skip renames if the device is already present (bsc#1219680) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-49=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-slfo.1.1_2.1 * cloud-init-23.3-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212476 * https://bugzilla.suse.com/show_bug.cgi?id=1219680 * https://bugzilla.suse.com/show_bug.cgi?id=1227237 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:39 -0000 Subject: SUSE-SU-2025:01702-2: important: Security update for glibc Message-ID: <174902445936.21522.16117348488145419013@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:01702-2 Release Date: 2025-06-04T07:33:14Z Rating: important References: * bsc#1243317 Cross-References: * CVE-2025-4802 CVSS scores: * CVE-2025-4802 ( SUSE ): 9.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-4802 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4802 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen search for libraries to load in LD_LIBRARY_PATH (bsc#1243317). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1702=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1702=1 ## Package List: * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.38-150600.14.32.1 * glibc-debuginfo-2.38-150600.14.32.1 * glibc-utils-src-debugsource-2.38-150600.14.32.1 * glibc-devel-static-2.38-150600.14.32.1 * glibc-utils-debuginfo-2.38-150600.14.32.1 * glibc-utils-2.38-150600.14.32.1 * Development Tools Module 15-SP7 (x86_64) * glibc-32bit-debuginfo-2.38-150600.14.32.1 * glibc-devel-32bit-2.38-150600.14.32.1 * glibc-devel-32bit-debuginfo-2.38-150600.14.32.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * glibc-profile-2.38-150600.14.32.1 * glibc-debugsource-2.38-150600.14.32.1 * glibc-locale-base-debuginfo-2.38-150600.14.32.1 * glibc-locale-base-2.38-150600.14.32.1 * glibc-extra-2.38-150600.14.32.1 * glibc-debuginfo-2.38-150600.14.32.1 * glibc-extra-debuginfo-2.38-150600.14.32.1 * nscd-debuginfo-2.38-150600.14.32.1 * glibc-locale-2.38-150600.14.32.1 * glibc-devel-2.38-150600.14.32.1 * glibc-devel-debuginfo-2.38-150600.14.32.1 * nscd-2.38-150600.14.32.1 * libnsl1-debuginfo-2.38-150600.14.32.1 * glibc-2.38-150600.14.32.1 * libnsl1-2.38-150600.14.32.1 * Basesystem Module 15-SP7 (noarch) * glibc-lang-2.38-150600.14.32.1 * glibc-i18ndata-2.38-150600.14.32.1 * glibc-info-2.38-150600.14.32.1 * Basesystem Module 15-SP7 (x86_64) * glibc-locale-base-32bit-debuginfo-2.38-150600.14.32.1 * libnsl1-32bit-2.38-150600.14.32.1 * glibc-locale-base-32bit-2.38-150600.14.32.1 * libnsl1-32bit-debuginfo-2.38-150600.14.32.1 * glibc-32bit-debuginfo-2.38-150600.14.32.1 * glibc-32bit-2.38-150600.14.32.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4802.html * https://bugzilla.suse.com/show_bug.cgi?id=1243317 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:43 -0000 Subject: SUSE-SU-2025:01805-1: moderate: Security update for gnuplot Message-ID: <174902446379.21522.349008501314026672@smelt2.prg2.suse.org> # Security update for gnuplot Announcement ID: SUSE-SU-2025:01805-1 Release Date: 2025-06-03T11:57:54Z Rating: moderate References: * bsc#1240327 * bsc#1240328 * bsc#1240330 * bsc#1241684 Cross-References: * CVE-2025-31178 * CVE-2025-31179 * CVE-2025-31181 * CVE-2025-3359 CVSS scores: * CVE-2025-31178 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31178 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31179 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31179 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31181 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31181 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3359 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3359 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3359 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for gnuplot fixes the following issues: * CVE-2025-31178: unvalidated user input leads to segmentation fault on GetAnnotateString (bsc#1240327). * CVE-2025-31179: improper verification of time values leads to segmentation fault on xstrftime (bsc#1240328). * CVE-2025-31181: double fclose() call leads to segmentation fault on X11_graphics (bsc#1240330). * CVE-2025-3359: out-of-bounds read when parsing font names may lead to a segmentation fault (bsc#1241684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1805=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * gnuplot-4.6.5-3.9.1 * gnuplot-debuginfo-4.6.5-3.9.1 * gnuplot-debugsource-4.6.5-3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31178.html * https://www.suse.com/security/cve/CVE-2025-31179.html * https://www.suse.com/security/cve/CVE-2025-31181.html * https://www.suse.com/security/cve/CVE-2025-3359.html * https://bugzilla.suse.com/show_bug.cgi?id=1240327 * https://bugzilla.suse.com/show_bug.cgi?id=1240328 * https://bugzilla.suse.com/show_bug.cgi?id=1240330 * https://bugzilla.suse.com/show_bug.cgi?id=1241684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:45 -0000 Subject: SUSE-RU-2025:01803-1: moderate: Recommended update for kubernetes Message-ID: <174902446523.21522.9474980759623026798@smelt2.prg2.suse.org> # Recommended update for kubernetes Announcement ID: SUSE-RU-2025:01803-1 Release Date: 2025-06-03T08:06:28Z Rating: moderate References: * jsc#PED-11106 Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature can now be installed. ## Description: This update for kubernetes fixes the following issues: kubernetes client version 1.32.4 is shipped (jsc#PED-11106) Find the full changelog: https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.32.md#v1324 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1803=1 openSUSE-SLE-15.6-2025-1803=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1803=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.32-kubeadm-1.32.4-150600.13.7.1 * kubernetes1.32-scheduler-1.32.4-150600.13.7.1 * kubernetes1.32-apiserver-1.32.4-150600.13.7.1 * kubernetes1.32-controller-manager-1.32.4-150600.13.7.1 * kubernetes1.32-client-1.32.4-150600.13.7.1 * kubernetes1.32-kubelet-common-1.32.4-150600.13.7.1 * kubernetes1.32-kubelet-1.32.4-150600.13.7.1 * kubernetes1.32-client-common-1.32.4-150600.13.7.1 * kubernetes1.32-proxy-1.32.4-150600.13.7.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.32-client-bash-completion-1.32.4-150600.13.7.1 * kubernetes1.32-client-fish-completion-1.32.4-150600.13.7.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kubernetes1.32-client-common-1.32.4-150600.13.7.1 * kubernetes1.32-client-1.32.4-150600.13.7.1 * Containers Module 15-SP6 (noarch) * kubernetes1.32-client-bash-completion-1.32.4-150600.13.7.1 ## References: * https://jira.suse.com/browse/PED-11106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:46 -0000 Subject: SUSE-SU-2025:20241-1: important: Security update for gstreamer-plugins-base Message-ID: <174902446626.12703.16287208103770362407@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2025:20241-1 Release Date: 2025-03-20T10:57:43Z Rating: important References: * bsc#1234415 * bsc#1234450 * bsc#1234453 * bsc#1234455 * bsc#1234456 * bsc#1234459 * bsc#1234460 Cross-References: * CVE-2024-47538 * CVE-2024-47541 * CVE-2024-47542 * CVE-2024-47600 * CVE-2024-47607 * CVE-2024-47615 * CVE-2024-47835 CVSS scores: * CVE-2024-47538 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47538 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47538 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47541 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47542 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47600 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47600 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47600 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47607 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47607 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47607 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47835 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47835 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves seven vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-47538: Fixed a stack-buffer overflow in vorbis_handle_identification_packet (bsc#1234415). * CVE-2024-47835: Fixed NULL-pointer dereference in LRC subtitle parser (bsc#1234450). * CVE-2024-47600: Fixed Out-of-bounds read in gst-discoverer-1.0 commandline tool (bsc#1234453). * CVE-2024-47615: Fixed Out-of-bounds write in Ogg demuxer (bsc#1234456). * CVE-2024-47541: Fixed out-of-bounds write in SSA subtitle parser (bsc#1234459). * CVE-2024-47542: Fixed ID3v2 parser out-of-bounds read and NULL-pointer dereference (bsc#1234460). * CVE-2024-47607: Fixed Stack buffer-overflow in Opus decoder (bsc#1234455). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-48=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libgstallocators-1_0-0-1.24.7-slfo.1.1_2.1 * libgstapp-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstgl-1_0-0-1.24.7-slfo.1.1_2.1 * libgstgl-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstpbutils-1_0-0-1.24.7-slfo.1.1_2.1 * libgstriff-1_0-0-1.24.7-slfo.1.1_2.1 * libgstriff-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstvideo-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstaudio-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgsttag-1_0-0-1.24.7-slfo.1.1_2.1 * libgstapp-1_0-0-1.24.7-slfo.1.1_2.1 * gstreamer-plugins-base-debuginfo-1.24.7-slfo.1.1_2.1 * libgstaudio-1_0-0-1.24.7-slfo.1.1_2.1 * gstreamer-plugins-base-1.24.7-slfo.1.1_2.1 * libgstpbutils-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgsttag-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstvideo-1_0-0-1.24.7-slfo.1.1_2.1 * libgstallocators-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * gstreamer-plugins-base-debugsource-1.24.7-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47538.html * https://www.suse.com/security/cve/CVE-2024-47541.html * https://www.suse.com/security/cve/CVE-2024-47542.html * https://www.suse.com/security/cve/CVE-2024-47600.html * https://www.suse.com/security/cve/CVE-2024-47607.html * https://www.suse.com/security/cve/CVE-2024-47615.html * https://www.suse.com/security/cve/CVE-2024-47835.html * https://bugzilla.suse.com/show_bug.cgi?id=1234415 * https://bugzilla.suse.com/show_bug.cgi?id=1234450 * https://bugzilla.suse.com/show_bug.cgi?id=1234453 * https://bugzilla.suse.com/show_bug.cgi?id=1234455 * https://bugzilla.suse.com/show_bug.cgi?id=1234456 * https://bugzilla.suse.com/show_bug.cgi?id=1234459 * https://bugzilla.suse.com/show_bug.cgi?id=1234460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:49 -0000 Subject: SUSE-SU-2025:20240-1: important: Security update for gstreamer Message-ID: <174902446938.12703.10001928057868225407@smelt2.prg2.suse.org> # Security update for gstreamer Announcement ID: SUSE-SU-2025:20240-1 Release Date: 2025-03-19T11:06:59Z Rating: important References: * bsc#1234449 Cross-References: * CVE-2024-47606 CVSS scores: * CVE-2024-47606 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47606 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47606 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer fixes the following issues: * CVE-2024-47606: avoid integer overflow when allocating sysmem (bsc#1234449). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-47=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libgstreamer-1_0-0-1.24.7-slfo.1.1_2.1 * libgstreamer-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * gstreamer-1.24.7-slfo.1.1_2.1 * gstreamer-debuginfo-1.24.7-slfo.1.1_2.1 * gstreamer-debugsource-1.24.7-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47606.html * https://bugzilla.suse.com/show_bug.cgi?id=1234449 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:52 -0000 Subject: SUSE-SU-2025:01802-1: important: Security update for libsoup2 Message-ID: <174902447247.21522.10514574847513843702@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2025:01802-1 Release Date: 2025-06-03T01:15:23Z Rating: important References: * bsc#1241162 * bsc#1241214 * bsc#1241226 * bsc#1241238 * bsc#1241252 * bsc#1241263 * bsc#1243332 * bsc#1243423 Cross-References: * CVE-2025-32906 * CVE-2025-32909 * CVE-2025-32910 * CVE-2025-32911 * CVE-2025-32912 * CVE-2025-32913 * CVE-2025-4948 * CVE-2025-4969 CVSS scores: * CVE-2025-32906 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-32906 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32909 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-32909 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32909 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32910 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32910 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32910 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32911 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32911 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-32912 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-4948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4969 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4969 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-4969 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves eight vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) * CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) * CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) * CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) * CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) * CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via "params". (bsc#1241238) * CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) * CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1802=1 SUSE-2025-1802=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1802=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1802=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.9.1 * libsoup-2_4-1-2.74.3-150600.4.9.1 * libsoup2-debugsource-2.74.3-150600.4.9.1 * libsoup2-devel-2.74.3-150600.4.9.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1 * openSUSE Leap 15.6 (x86_64) * libsoup2-devel-32bit-2.74.3-150600.4.9.1 * libsoup-2_4-1-32bit-2.74.3-150600.4.9.1 * libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.9.1 * openSUSE Leap 15.6 (noarch) * libsoup2-lang-2.74.3-150600.4.9.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.9.1 * libsoup2-devel-64bit-2.74.3-150600.4.9.1 * libsoup-2_4-1-64bit-2.74.3-150600.4.9.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.9.1 * libsoup-2_4-1-2.74.3-150600.4.9.1 * libsoup2-debugsource-2.74.3-150600.4.9.1 * libsoup2-devel-2.74.3-150600.4.9.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1 * Basesystem Module 15-SP6 (noarch) * libsoup2-lang-2.74.3-150600.4.9.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.9.1 * libsoup-2_4-1-2.74.3-150600.4.9.1 * libsoup2-debugsource-2.74.3-150600.4.9.1 * libsoup2-devel-2.74.3-150600.4.9.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.9.1 * Basesystem Module 15-SP7 (noarch) * libsoup2-lang-2.74.3-150600.4.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32906.html * https://www.suse.com/security/cve/CVE-2025-32909.html * https://www.suse.com/security/cve/CVE-2025-32910.html * https://www.suse.com/security/cve/CVE-2025-32911.html * https://www.suse.com/security/cve/CVE-2025-32912.html * https://www.suse.com/security/cve/CVE-2025-32913.html * https://www.suse.com/security/cve/CVE-2025-4948.html * https://www.suse.com/security/cve/CVE-2025-4969.html * https://bugzilla.suse.com/show_bug.cgi?id=1241162 * https://bugzilla.suse.com/show_bug.cgi?id=1241214 * https://bugzilla.suse.com/show_bug.cgi?id=1241226 * https://bugzilla.suse.com/show_bug.cgi?id=1241238 * https://bugzilla.suse.com/show_bug.cgi?id=1241252 * https://bugzilla.suse.com/show_bug.cgi?id=1241263 * https://bugzilla.suse.com/show_bug.cgi?id=1243332 * https://bugzilla.suse.com/show_bug.cgi?id=1243423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:07:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:07:54 -0000 Subject: SUSE-SU-2025:20239-1: moderate: Security update for curl Message-ID: <174902447413.12703.15704925048635319580@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20239-1 Release Date: 2025-03-13T10:37:02Z Rating: moderate References: * bsc#1230093 * bsc#1232528 * bsc#1234068 * bsc#1236589 Cross-References: * CVE-2024-11053 * CVE-2024-8096 * CVE-2024-9681 * CVE-2025-0665 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2024-8096 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8096 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-8096 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9681 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9681 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9681 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9681 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2025-0665 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-0665 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-0665 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: Update to 8.12.1: * Bugfixes: * asyn-thread: fix build with 'CURL_DISABLE_SOCKETPAIR' * asyn-thread: fix HTTPS RR crash * asyn-thread: fix the returned bitmask from Curl_resolver_getsock * asyn-thread: survive a c-ares channel set to NULL * cmake: always reference OpenSSL and ZLIB via imported targets * cmake: respect 'GNUTLS_CFLAGS' when detected via 'pkg-config' * cmake: respect 'GNUTLS_LIBRARY_DIRS' in 'libcurl.pc' and 'curl-config' * content_encoding: #error on too old zlib * imap: TLS upgrade fix * ldap: drop support for legacy Novell LDAP SDK * libssh2: comparison is always true because rc <= -1 * libssh2: raise lowest supported version to 1.2.8 * libssh: drop support for libssh older than 0.9.0 * openssl-quic: ignore ciphers for h3 * pop3: TLS upgrade fix * runtests: fix the disabling of the memory tracking * runtests: quote commands to support paths with spaces * scache: add magic checks * smb: silence '-Warray-bounds' with gcc 13+ * smtp: TLS upgrade fix * tool_cfgable: sort struct fields by size, use bitfields for booleans * tool_getparam: add "TLS required" flag for each such option * vtls: fix multissl-init * wakeup_write: make sure the eventfd write sends eight bytes Update to 8.12.0: * Security fixes: * [bsc#1234068, CVE-2024-11053] curl could leak the password used for the first host to the followed-to host under certain circumstances. * [bsc#1232528, CVE-2024-9681] HSTS subdomain overwrites parent cache entry * [bsc#1236589, CVE-2025-0665] eventfd double close * Changes: * curl: add byte range support to --variable reading from file * curl: make --etag-save acknowledge --create-dirs * getinfo: fix CURLINFO_QUEUE_TIME_T and add 'time_queue' var * getinfo: provide info which auth was used for HTTP and proxy * hyper: drop support * openssl: add support to use keys and certificates from PKCS#11 provider * QUIC: 0RTT for gnutls via CURLSSLOPT_EARLYDATA * vtls: feature ssls-export for SSL session im-/export * Bugfixes: * altsvc: avoid integer overflow in expire calculation * asyn-ares: acknowledge CURLOPT_DNS_SERVERS set to NULL * asyn-ares: fix memory leak * asyn-ares: initial HTTPS resolve support * asyn-thread: use c-ares to resolve HTTPS RR * async-thread: avoid closing eventfd twice * cd2nroff: do not insist on quoted <> within backticks * cd2nroff: support "none" as a TLS backend * conncache: count shutdowns against host and max limits * content_encoding: drop support for zlib before 1.2.0.4 * content_encoding: namespace GZIP flag constants * content_encoding: put the decomp buffers into the writer structs * content_encoding: support use of custom libzstd memory functions * cookie: cap expire times to 400 days * cookie: parse only the exact expire date * curl: return error if etag options are used with multiple URLs * curl_multi_fdset: include the shutdown connections in the set * curl_sha512_256: rename symbols to the curl namespace * curl_url_set.md: adjust the added-in to 7.62.0 * doh: send HTTPS RR requests for all HTTP(S) transfers * easy: allow connect-only handle reuse with easy_perform * easy: make curl_easy_perform() return error if connection still there * easy_lock: use Sleep(1) for thread yield on old Windows * ECH: update APIs to those agreed with OpenSSL maintainers * GnuTLS: fix 'time_appconnect' for early data * HTTP/2: strip TE request header * http2: fix data_pending check * http2: fix value stored to 'result' is never read * http: ignore invalid Retry-After times * http_aws_sigv4: Fix invalid compare function handling zero-length pairs * https-connect: start next immediately on failure * lib: redirect handling by protocol handler * multi: fix curl_multi_waitfds reporting of fd_count * netrc: 'default' with no credentials is not a match * netrc: fix password-only entries * netrc: restore _netrc fallback logic * ngtcp2: fix memory leak on connect failure * openssl: define `HAVE_KEYLOG_CALLBACK` before use * openssl: fix ECH logic * osslq: use SSL_poll to determine writeability of QUIC streams * sectransp: free certificate on error * select: avoid a NULL deref in cwfds_add_sock * src: omit hugehelp and ca-embed from libcurltool * ssl session cache: change cache dimensions * system.h: add 64-bit curl_off_t definitions for NonStop * telnet: handle single-byte input option * TLS: check connection for SSL use, not handler * tool_formparse.c: make curlx_uztoso a static in here * tool_formparse: accept digits in --form type= strings * tool_getparam: ECH param parsing refix * tool_getparam: fail --hostpubsha256 if libssh2 is not used * tool_getparam: fix "Ignored Return Value" * tool_getparam: fix memory leak on error in parse_ech * tool_getparam: fix the ECH parser * tool_operate: make --etag-compare always accept a non-existing file * transfer: fix CURLOPT_CURLU override logic * urlapi: fix redirect to a new fragment or query (only) * vquic: make vquic_send_packets not return without setting psent * vtls: fix default SSL backend as a fallback * vtls: only remember the expiry timestamp in session cache * websocket: fix message send corruption * x509asn1: add parse recursion limit Update to 8.11.1: * Security fixes: * netrc and redirect credential leak [bsc#1234068, CVE-2024-11053] * Bugfixes: * build: fix ECH to always enable HTTPS RR * cookie: treat cookie name case sensitively * curl-rustls.m4: keep existing 'CPPFLAGS'/'LDFLAGS' when detected * curl: use realtime in trace timestamps * digest: produce a shorter cnonce in Digest headers * docs: document default 'User-Agent' * docs: suggest --ssl-reqd instead of --ftp-ssl * duphandle: also init netrc * hostip: don't use the resolver for FQDN localhost * http_negotiate: allow for a one byte larger channel binding buffer * krb5: fix socket/sockindex confusion, MSVC compiler warnings * libssh: use libssh sftp_aio to upload file * libssh: when using IPv6 numerical address, add brackets * mime: fix reader stall on small read lengths * mk-ca-bundle: remove CKA_NSS_SERVER_DISTRUST_AFTER conditions * mprintf: fix the integer overflow checks * multi: fix callback for 'CURLMOPT_TIMERFUNCTION' not being called again when... * netrc: address several netrc parser flaws * netrc: support large file, longer lines, longer tokens * nghttp2: use custom memory functions * OpenSSL: improvde error message on expired certificate * openssl: remove three "Useless Assignments" * openssl: stop using SSL_CTX_ function prefix for our functions * pytest: add test for use of CURLMOPT_MAX_HOST_CONNECTIONS * rtsp: check EOS in the RTSP receive and return an error code * schannel: remove TLS 1.3 ciphersuite-list support * setopt: fix CURLOPT_HTTP_CONTENT_DECODING * setopt: fix missing options for builds without HTTP & MQTT * socket: handle binding to "host!" * socketpair: fix enabling 'USE_EVENTFD' * strtok: use namespaced 'strtok_r' macro instead of redefining it Update to 8.11.0: * Security fixes: [bsc#1232528, CVE-2024-9681] * curl: HSTS subdomain overwrites parent cache entry * Changes: * curl: --create-dirs works for --dump-header as well * gtls: Add P12 format support * ipfs: add options to disable * TLS: TLSv1.3 earlydata support for curl * WebSockets: make support official (non-experimental) * Bugfixes: * build: clarify CA embed is for curl tool, mark default, improve summary * build: show if CA bundle to embed was found * build: tidy up and improve versioned-symbols options * cmake/FindNGTCP2: use library path as hint for finding crypto module * cmake: disable default OpenSSL if BearSSL, GnuTLS or Rustls is enabled * cmake: rename LDAP dependency config variables to match Find modules * cmake: replace 'check_include_file_concat()' for LDAP and GSS detection * cmake: use OpenSSL for LDAP detection only if available * curl: add build options for safe/no CA bundle search (Windows) * curl: detect ECH support dynamically, not at build time * curl_addrinfo: support operating systems with only getaddrinfo(3) * ftp: fix 0-length last write on upload from stdin * gnutls: use session cache for QUIC * hsts: improve subdomain handling * hsts: support "implied LWS" properly around max-age * http2: auto reset stream on server eos * json.md: cli-option '\--json' is an alias of '\--data-binary' * lib: move curl_path.[ch] into vssh/ * lib: remove function pointer typecasts for hmac/sha256/md5 * libssh.c: handle EGAINS during proto-connect correctly * libssh2: use the filename buffer when getting the homedir * multi.c: warn/assert on stall only without timer * negotiate: conditional check around GSS & SSL specific code * netrc: cache the netrc file in memory * ngtcp2: do not loop on recv * ngtcp2: set max window size to 10x of initial (128KB) * openssl quic: populate x509 store before handshake * openssl: extend the OpenSSL error messages * openssl: improve retries on shutdown * quic: use send/recvmmsg when available * schannel: fix TLS cert verification by IP SAN * schannel: ignore error on recv beyond close notify * select: use poll() if existing, avoid poll() with no sockets * sendf: add condition to max-filesize check * server/mqttd: fix two memory leaks * setopt: return error for bad input to CURLOPT_RTSP_REQUEST * setopt_cptr: make overflow check only done when needed * tls: avoid abusing CURLE_SSL_ENGINE_INITFAILED * tool: support --show-headers AND --remote-header-name * tool_operate: make --skip-existing work for --parallel * url: connection reuse on h3 connections * url: use same credentials on redirect * urlapi: normalize the IPv6 address * version: say quictls in MSH3 builds * vquic: fix compiler warning with gcc + MUSL * vquic: recv_mmsg, use fewer, but larger buffers * vtls: convert Curl_pin_peer_pubkey to use dynbuf * vtls: convert pubkey_pem_to_der to use dynbuf Update to 8.10.1: * Bugfixes: * autotools: fix `--with-ca-embed` build rule * cmake: ensure `CURL_USE_OPENSSL`/`USE_OPENSSL_QUIC` are set in sync * cmake: fix MSH3 to appear on the feature list * connect: store connection info when really done * FTP: partly revert eeb7c1280742f5c8fa48a4340fc1e1a1a2c7075a * http2: when uploading data from stdin, fix eos forwarding * http: make max-filesize check not count ignored bodies * lib: fix AF_INET6 use outside of USE_IPV6 * multi: check that the multi handle is valid in curl_multi_assign * QUIC: on connect, keep on trying on draining server * request: correctly reset the eos_sent flag * setopt: remove superfluous use of ternary expressions * singleuse: drop `Curl_memrchr()` for no-HTTP builds * tool_cb_wrt: use "curl_response" if no file name in URL * transfer: fix sendrecv() without interim poll * vtls: fix `Curl_ssl_conn_config_match` doc param Update to version 8.10.0: * Security fixes: * [bsc#1230093, CVE-2024-8096] curl: OCSP stapling bypass with GnuTLS * Changes: * curl: make --rate accept "number of units" * curl: make --show-headers the same as --include * curl: support --dump-header % to direct to stderr * curl: support embedding a CA bundle and --dump-ca-embed * curl: support repeated use of the verbose option; -vv etc * curl: use libuv for parallel transfers with --test-event * vtls: stop offering alpn http/1.1 for http2-prior-knowledge * Bugfixes: * curl: allow 500MB data URL encode strings * curl: warn on unsupported SSL options * Curl_rand_bytes to control env override * curl_sha512_256: fix symbol collisions with nettle library * dist: fix reproducible build from release tarball * http2: fix GOAWAY message sent to server * http2: improve rate limiting of downloads * INSTALL.md: MultiSSL and QUIC are mutually exclusive * lib: add eos flag to send methods * lib: make SSPI global symbols use Curl_ prefix * lib: prefer `CURL_SHA256_DIGEST_LENGTH` over the unprefixed name * lib: remove the final strncpy() calls * lib: remove use of RANDOM_FILE * Makefile.mk: fixup enabling libidn2 * max-filesize.md: mention zero disables the limit * mime: avoid inifite loop in client reader * ngtcp2: use NGHTTP3 prefix instead of NGTCP2 for errors in h3 callbacks * openssl quic: fix memory leak * openssl: certinfo errors now fail correctly * openssl: fix the data race when sharing an SSL session between threads * openssl: improve shutdown handling * POP3: fix multi-line responses * pop3: use the protocol handler ->write_resp * progress: ratelimit/progress tweaks * rand: only provide weak random when needed * sectransp: fix setting tls version * setopt: make CURLOPT_TFTP_BLKSIZE accept bad values * sha256: fix symbol collision between nettle (GnuTLS) and OpenSSL * sigpipe: init the struct so that first apply ignores * smb: convert superflous assign into assert * smtp: add tracing feature * spnego_gssapi: implement TLS channel bindings for openssl * src: delete `curlx_m*printf()` aliases * ssh: deduplicate SSH backend includes (and fix libssh cmake unity build) * tool_operhlp: fix "potentially uninitialized local variable 'pc' used" * tool_paramhlp: bump maximum post data size in memory to 16GB * transfer: skip EOS read when download done * url: fix connection reuse for HTTP/2 upgrades * urlapi: verify URL _decoded_ hostname when set * urldata: introduce `data->mid`, a unique identifier inside a multi * vtls: add SSLSUPP_CIPHER_LIST * vtls: fix static function name collisions between TLS backends * vtls: init ssl peer only once * websocket: introduce blocking sends * ws: flags to opcodes should ignore CURLWS_CONT flag * x509asn1: raise size limit for x509 certification information ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-44=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.12.1-slfo.1.1_1.1 * curl-8.12.1-slfo.1.1_1.1 * libcurl4-8.12.1-slfo.1.1_1.1 * libcurl4-debuginfo-8.12.1-slfo.1.1_1.1 * curl-debugsource-8.12.1-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://www.suse.com/security/cve/CVE-2024-8096.html * https://www.suse.com/security/cve/CVE-2024-9681.html * https://www.suse.com/security/cve/CVE-2025-0665.html * https://bugzilla.suse.com/show_bug.cgi?id=1230093 * https://bugzilla.suse.com/show_bug.cgi?id=1232528 * https://bugzilla.suse.com/show_bug.cgi?id=1234068 * https://bugzilla.suse.com/show_bug.cgi?id=1236589 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:01 -0000 Subject: SUSE-SU-2025:01801-1: important: Security update for libsoup Message-ID: <174902448157.21522.8529517820012312450@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:01801-1 Release Date: 2025-06-02T23:45:02Z Rating: important References: * bsc#1241162 * bsc#1241214 * bsc#1241226 * bsc#1241238 * bsc#1241252 * bsc#1241263 * bsc#1243332 * bsc#1243423 Cross-References: * CVE-2025-32906 * CVE-2025-32909 * CVE-2025-32910 * CVE-2025-32911 * CVE-2025-32912 * CVE-2025-32913 * CVE-2025-4948 * CVE-2025-4969 CVSS scores: * CVE-2025-32906 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-32906 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32909 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-32909 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32909 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32910 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32910 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32910 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32911 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32911 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-32912 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-4948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4969 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4969 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-4969 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves eight vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) * CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) * CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) * CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) * CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) * CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via "params". (bsc#1241238) * CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) * CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1801=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1801=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1801=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1801=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1801=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1801=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsoup-2_4-1-2.68.4-150200.4.9.1 * libsoup-debugsource-2.68.4-150200.4.9.1 * typelib-1_0-Soup-2_4-2.68.4-150200.4.9.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.9.1 * libsoup-devel-2.68.4-150200.4.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libsoup-lang-2.68.4-150200.4.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.9.1 * libsoup-debugsource-2.68.4-150200.4.9.1 * typelib-1_0-Soup-2_4-2.68.4-150200.4.9.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.9.1 * libsoup-devel-2.68.4-150200.4.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * libsoup-lang-2.68.4-150200.4.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsoup-2_4-1-2.68.4-150200.4.9.1 * libsoup-debugsource-2.68.4-150200.4.9.1 * typelib-1_0-Soup-2_4-2.68.4-150200.4.9.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.9.1 * libsoup-devel-2.68.4-150200.4.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libsoup-lang-2.68.4-150200.4.9.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsoup-2_4-1-2.68.4-150200.4.9.1 * libsoup-debugsource-2.68.4-150200.4.9.1 * typelib-1_0-Soup-2_4-2.68.4-150200.4.9.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.9.1 * libsoup-devel-2.68.4-150200.4.9.1 * SUSE Enterprise Storage 7.1 (noarch) * libsoup-lang-2.68.4-150200.4.9.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.9.1 * libsoup-debugsource-2.68.4-150200.4.9.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.9.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.9.1 * libsoup-debugsource-2.68.4-150200.4.9.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32906.html * https://www.suse.com/security/cve/CVE-2025-32909.html * https://www.suse.com/security/cve/CVE-2025-32910.html * https://www.suse.com/security/cve/CVE-2025-32911.html * https://www.suse.com/security/cve/CVE-2025-32912.html * https://www.suse.com/security/cve/CVE-2025-32913.html * https://www.suse.com/security/cve/CVE-2025-4948.html * https://www.suse.com/security/cve/CVE-2025-4969.html * https://bugzilla.suse.com/show_bug.cgi?id=1241162 * https://bugzilla.suse.com/show_bug.cgi?id=1241214 * https://bugzilla.suse.com/show_bug.cgi?id=1241226 * https://bugzilla.suse.com/show_bug.cgi?id=1241238 * https://bugzilla.suse.com/show_bug.cgi?id=1241252 * https://bugzilla.suse.com/show_bug.cgi?id=1241263 * https://bugzilla.suse.com/show_bug.cgi?id=1243332 * https://bugzilla.suse.com/show_bug.cgi?id=1243423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:05 -0000 Subject: SUSE-RU-2025:20238-1: moderate: Recommended update for systemd Message-ID: <174902448520.12703.13118792207891070535@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20238-1 Release Date: 2025-03-11T14:13:05Z Rating: moderate References: * bsc#1220338 * bsc#1229228 * bsc#1232227 * bsc#1232844 * bsc#1233752 * bsc#1234015 * bsc#1234313 * bsc#1234765 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that has eight fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Fixed agetty fails to open credentials directory (bsc#1229228) * hwdb: comment out the entry for Logitech MX Keys for Mac * test: answer 2nd mdadm --create question for compat with new version * core/unit-serialize: fix serialization of markers * locale-setup: do not load locale from environemnt when /etc/locale.conf is unchanged * core: fix assert when AddDependencyUnitFiles is called with invalid parameter * Fix systemd-network recommending libidn2-devel (bsc#1234765) * tpm2-util: Also retry unsealing after policy_pcr returns PCR_CHANGED (bsc#1233752 bsc#1234313) * Add a allow/denylist for reading sysfs attributes (bsc#1234015) * udev: add new builtin net_driver * udev-builtin-net_id: split-out pci_get_onboard_index() from dev_pci_onboard() * udev-builtin-net_id: split-out get_pci_slot_specifiers() * udev-builtin-net_id: introduce get_port_specifier() helper function * udev-builtin-net_id: split out get_dev_port() and make its failure critical * udev-builtin-net_id: split-out pci_get_hotplug_slot() and pci_get_hotplug_slot_from_address() * udev-builtin-net_id: return earlier when hotplug slot is not found * udev-builtin-net_id: skip non-directory entry earlier * udev-builtin-net_id: make names_xen() self-contained * udev-builtin-net_id: use sd_device_get_sysnum() to get index of netdevsim * udev-builtin-net_id: make names_netdevsim() self-contained * udev-builtin-net_id: make names_platform() self-contained * udev-builtin-net_id: make names_vio() self-contained * udev-builtin-net_id: make names_ccw() self-contained * udev-builtin-net_id: make dev_devicetree_onboard() self-contained * udev-builtin-net_id: make names_mac() self-contained * udev-builtin-net_id: split out get_ifname_prefix() * udev-builtin-net_id: swap arguments for streq() and friends * udev-builtin-net_id: drop unused value from NetNameType * Drop suppor for efivar SystemdOptions (bsc#1220338) Upstream deprecated it and plan to drop it in the future. Let's get ahead and drop it now as this feature is unlikely to be used on SUSE distros and it might be used to gain access to encrypted SLEM systems with unattended disk unlock and with secure boot disabled. * pid1: make clear that $WATCHDOG_USEC is set for the shutdown binary, noone else (bsc#1232227) * udev: skipping empty udev rules file while collecting the stats (bsc#1232844) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-39=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-39=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * udev-254.23-slfo.1.1_1.1 * libudev1-debuginfo-254.23-slfo.1.1_1.1 * systemd-debuginfo-254.23-slfo.1.1_1.1 * systemd-254.23-slfo.1.1_1.1 * systemd-journal-remote-254.23-slfo.1.1_1.1 * systemd-portable-254.23-slfo.1.1_1.1 * systemd-container-254.23-slfo.1.1_1.1 * systemd-container-debuginfo-254.23-slfo.1.1_1.1 * systemd-coredump-debuginfo-254.23-slfo.1.1_1.1 * libsystemd0-debuginfo-254.23-slfo.1.1_1.1 * systemd-experimental-254.23-slfo.1.1_1.1 * systemd-journal-remote-debuginfo-254.23-slfo.1.1_1.1 * systemd-portable-debuginfo-254.23-slfo.1.1_1.1 * systemd-experimental-debuginfo-254.23-slfo.1.1_1.1 * udev-debuginfo-254.23-slfo.1.1_1.1 * libsystemd0-254.23-slfo.1.1_1.1 * libudev1-254.23-slfo.1.1_1.1 * systemd-coredump-254.23-slfo.1.1_1.1 * systemd-debugsource-254.23-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (ppc64le) * systemd-sysvcompat-254.23-slfo.1.1_1.1 * systemd-sysvcompat-debuginfo-254.23-slfo.1.1_1.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * systemd-devel-254.23-slfo.1.1_1.1 * systemd-debugsource-254.23-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220338 * https://bugzilla.suse.com/show_bug.cgi?id=1229228 * https://bugzilla.suse.com/show_bug.cgi?id=1232227 * https://bugzilla.suse.com/show_bug.cgi?id=1232844 * https://bugzilla.suse.com/show_bug.cgi?id=1233752 * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1234313 * https://bugzilla.suse.com/show_bug.cgi?id=1234765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:06 -0000 Subject: SUSE-RU-2025:20237-1: important: Recommended update for helm Message-ID: <174902448654.12703.1489881788338617138@smelt2.prg2.suse.org> # Recommended update for helm Announcement ID: SUSE-RU-2025:20237-1 Release Date: 2025-03-11T10:04:56Z Rating: important References: * jsc#SLE-21196 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for helm fixes the following issues: helm is shipped in version 3.16.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-38=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * helm-debuginfo-3.16.3-slfo.1.1_1.1 * helm-3.16.3-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * helm-bash-completion-3.16.3-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/SLE-21196 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:07 -0000 Subject: SUSE-RU-2025:01800-1: moderate: Recommended update for python-pyzmq Message-ID: <174902448728.21522.7263928050586319256@smelt2.prg2.suse.org> # Recommended update for python-pyzmq Announcement ID: SUSE-RU-2025:01800-1 Release Date: 2025-06-02T18:54:39Z Rating: moderate References: * bsc#1241624 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for python-pyzmq fixes the following issues: * Prevent open files leak by closing sockets on timeout (bsc#1241624) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1800=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1800=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1800=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1800=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1800=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1800=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1800=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1800=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1800=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1800=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1800=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1800=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1800=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1800=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1800=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1800=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1800=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1800=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1800=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1800=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1800=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1800=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1800=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1800=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1800=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1800=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-pyzmq-devel-17.1.2-150000.3.8.1 * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-pyzmq-devel-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python3-pyzmq-17.1.2-150000.3.8.1 * python-pyzmq-debuginfo-17.1.2-150000.3.8.1 * python-pyzmq-debugsource-17.1.2-150000.3.8.1 * python3-pyzmq-debuginfo-17.1.2-150000.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241624 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:08 -0000 Subject: SUSE-SU-2025:20236-1: moderate: Security update for glibc Message-ID: <174902448878.12703.5456621302621558747@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20236-1 Release Date: 2025-03-07T17:05:51Z Rating: moderate References: * bsc#1236282 Cross-References: * CVE-2025-0395 CVSS scores: * CVE-2025-0395 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-0395 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0395 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2025-0395: Fixed buffer overflow in the assert() function (bsc#1236282). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-32=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * glibc-locale-2.38-slfo.1.1_3.1 * glibc-locale-base-2.38-slfo.1.1_3.1 * glibc-2.38-slfo.1.1_3.1 * glibc-devel-2.38-slfo.1.1_3.1 * glibc-devel-debuginfo-2.38-slfo.1.1_3.1 * glibc-debugsource-2.38-slfo.1.1_3.1 * glibc-debuginfo-2.38-slfo.1.1_3.1 * glibc-locale-base-debuginfo-2.38-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0395.html * https://bugzilla.suse.com/show_bug.cgi?id=1236282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:15 -0000 Subject: SUSE-RU-2025:20243-1: important: Recommended update for supportutils Message-ID: <174902449534.21522.11846965470691987430@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2025:20243-1 Release Date: 2025-03-24T10:54:57Z Rating: important References: * bsc#1213291 * bsc#1220082 * bsc#1222021 * bsc#1222896 * bsc#1227127 * bsc#1228265 * bsc#1231396 * bsc#1231423 * bsc#1233726 * jsc#PED-11669 * jsc#PED-8211 * jsc#PED-8221 Affected Products: * SUSE Linux Micro 6.1 An update that contains three features and has nine fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.9 * Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291,jsc#PED-8221) * Supportconfig available in current distro (PED-7131) * Corrected display issues (bsc#1231396) * NFS takes too long, showmount times out (bsc#1231423) * Merged sle15 and master branches (bsc#1233726, jsc#PED-11669) * Changes to version 3.2.8 * Update supportconfig get pam.d sorted * yast_files: Exclude .zcat * Sanitize grub bootloader (bsc#1227127) * Sanitize regcodes * Improve product detection * Add read_values for s390x (bsc#1228265,) * hardware_info: Remove old alsa ver check * drbd_info: Fix incorrect escape of quotes * Changes in version 3.1.30 * Added -V key:value pair option (bsc#1222021,jsc#PED-8211) * Avoid getting duplicate kernel verifications in boot.text * Suppress file descriptor leak warnings from lvm commands (bsc#1220082) * Includes container log timestamps ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-51=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * supportutils-3.2.9-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213291 * https://bugzilla.suse.com/show_bug.cgi?id=1220082 * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1222896 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://bugzilla.suse.com/show_bug.cgi?id=1231396 * https://bugzilla.suse.com/show_bug.cgi?id=1231423 * https://bugzilla.suse.com/show_bug.cgi?id=1233726 * https://jira.suse.com/browse/PED-11669 * https://jira.suse.com/browse/PED-8211 * https://jira.suse.com/browse/PED-8221 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:17 -0000 Subject: SUSE-SU-2025:20235-1: moderate: Security update for pcp Message-ID: <174902449720.12703.17180832552657665941@smelt2.prg2.suse.org> # Security update for pcp Announcement ID: SUSE-SU-2025:20235-1 Release Date: 2025-03-07T16:42:41Z Rating: moderate References: * bsc#1217783 * bsc#1217826 * bsc#1222121 * bsc#1230551 * bsc#1230552 Cross-References: * CVE-2023-6917 * CVE-2024-3019 * CVE-2024-45769 * CVE-2024-45770 CVSS scores: * CVE-2023-6917 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6917 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2023-6917 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-3019 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45769 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45770 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-45770 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45770 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities and has one fix can now be installed. ## Description: This update for pcp fixes the following issues: * CVE-2024-45769: Fixed `pmcd` heap corruption through metric pmstore operations (bsc#1230551). * CVE-2024-45770: Fixed `pmpost` symlink attack allowing escalating `pcp` to `root` user (bsc#1230552). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-33=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libpcp_import1-6.2.0-slfo.1.1_3.1 * libpcp3-debuginfo-6.2.0-slfo.1.1_3.1 * pcp-debugsource-6.2.0-slfo.1.1_3.1 * libpcp_import1-debuginfo-6.2.0-slfo.1.1_3.1 * libpcp3-6.2.0-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (noarch) * pcp-conf-6.2.0-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6917.html * https://www.suse.com/security/cve/CVE-2024-3019.html * https://www.suse.com/security/cve/CVE-2024-45769.html * https://www.suse.com/security/cve/CVE-2024-45770.html * https://bugzilla.suse.com/show_bug.cgi?id=1217783 * https://bugzilla.suse.com/show_bug.cgi?id=1217826 * https://bugzilla.suse.com/show_bug.cgi?id=1222121 * https://bugzilla.suse.com/show_bug.cgi?id=1230551 * https://bugzilla.suse.com/show_bug.cgi?id=1230552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:19 -0000 Subject: SUSE-RU-2025:20234-1: moderate: Recommended update for irqbalance Message-ID: <174902449951.12703.14686864849067050196@smelt2.prg2.suse.org> # Recommended update for irqbalance Announcement ID: SUSE-RU-2025:20234-1 Release Date: 2025-03-07T16:31:49Z Rating: moderate References: * bsc#1235248 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for irqbalance fixes the following issues: * Removed ProtectKernelTunables=yes from irqbalance.service to fix "Cannot change IRQ %d affinity: Read-only file system" errors. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-34=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * irqbalance-debuginfo-1.9.4.0.git+f8b8cdd-slfo.1.1_2.1 * irqbalance-1.9.4.0.git+f8b8cdd-slfo.1.1_2.1 * irqbalance-debugsource-1.9.4.0.git+f8b8cdd-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235248 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:28 -0000 Subject: SUSE-SU-2025:20241-1: important: Security update for gstreamer-plugins-base Message-ID: <174902450850.21522.14938015837170102381@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2025:20241-1 Release Date: 2025-03-20T10:57:43Z Rating: important References: * bsc#1234415 * bsc#1234450 * bsc#1234453 * bsc#1234455 * bsc#1234456 * bsc#1234459 * bsc#1234460 Cross-References: * CVE-2024-47538 * CVE-2024-47541 * CVE-2024-47542 * CVE-2024-47600 * CVE-2024-47607 * CVE-2024-47615 * CVE-2024-47835 CVSS scores: * CVE-2024-47538 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47538 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47538 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47541 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47542 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47600 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47600 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47600 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47607 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47607 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47607 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47835 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47835 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves seven vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-47538: Fixed a stack-buffer overflow in vorbis_handle_identification_packet (bsc#1234415). * CVE-2024-47835: Fixed NULL-pointer dereference in LRC subtitle parser (bsc#1234450). * CVE-2024-47600: Fixed Out-of-bounds read in gst-discoverer-1.0 commandline tool (bsc#1234453). * CVE-2024-47615: Fixed Out-of-bounds write in Ogg demuxer (bsc#1234456). * CVE-2024-47541: Fixed out-of-bounds write in SSA subtitle parser (bsc#1234459). * CVE-2024-47542: Fixed ID3v2 parser out-of-bounds read and NULL-pointer dereference (bsc#1234460). * CVE-2024-47607: Fixed Stack buffer-overflow in Opus decoder (bsc#1234455). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-48=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libgstallocators-1_0-0-1.24.7-slfo.1.1_2.1 * libgstvideo-1_0-0-1.24.7-slfo.1.1_2.1 * libgstaudio-1_0-0-1.24.7-slfo.1.1_2.1 * libgstriff-1_0-0-1.24.7-slfo.1.1_2.1 * libgsttag-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstriff-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * gstreamer-plugins-base-1.24.7-slfo.1.1_2.1 * libgstpbutils-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgsttag-1_0-0-1.24.7-slfo.1.1_2.1 * libgstvideo-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * gstreamer-plugins-base-debuginfo-1.24.7-slfo.1.1_2.1 * libgstapp-1_0-0-1.24.7-slfo.1.1_2.1 * libgstaudio-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstgl-1_0-0-1.24.7-slfo.1.1_2.1 * libgstapp-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * libgstpbutils-1_0-0-1.24.7-slfo.1.1_2.1 * libgstgl-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 * gstreamer-plugins-base-debugsource-1.24.7-slfo.1.1_2.1 * libgstallocators-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47538.html * https://www.suse.com/security/cve/CVE-2024-47541.html * https://www.suse.com/security/cve/CVE-2024-47542.html * https://www.suse.com/security/cve/CVE-2024-47600.html * https://www.suse.com/security/cve/CVE-2024-47607.html * https://www.suse.com/security/cve/CVE-2024-47615.html * https://www.suse.com/security/cve/CVE-2024-47835.html * https://bugzilla.suse.com/show_bug.cgi?id=1234415 * https://bugzilla.suse.com/show_bug.cgi?id=1234450 * https://bugzilla.suse.com/show_bug.cgi?id=1234453 * https://bugzilla.suse.com/show_bug.cgi?id=1234455 * https://bugzilla.suse.com/show_bug.cgi?id=1234456 * https://bugzilla.suse.com/show_bug.cgi?id=1234459 * https://bugzilla.suse.com/show_bug.cgi?id=1234460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:22 -0000 Subject: SUSE-RU-2025:20242-1: moderate: Recommended update for cloud-init Message-ID: <174902450247.21522.6704239176082906414@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20242-1 Release Date: 2025-03-21T15:46:17Z Rating: moderate References: * bsc#1212476 * bsc#1219680 * bsc#1227237 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for cloud-init fixes the following issues: * Wait for udev once if we cannot find the expected MAC (bsc#1227237) * remove dependency on /usr/bin/python3 via using the macros (bsc#1212476) * Brute force approach to skip renames if the device is already present (bsc#1219680) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-49=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-slfo.1.1_2.1 * cloud-init-config-suse-23.3-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212476 * https://bugzilla.suse.com/show_bug.cgi?id=1219680 * https://bugzilla.suse.com/show_bug.cgi?id=1227237 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:30 -0000 Subject: SUSE-SU-2025:20231-1: important: Security update for pam_u2f Message-ID: <174902451069.12703.1622221443987223575@smelt2.prg2.suse.org> # Security update for pam_u2f Announcement ID: SUSE-SU-2025:20231-1 Release Date: 2025-03-05T14:55:47Z Rating: important References: * bsc#1233517 Cross-References: * CVE-2025-23013 CVSS scores: * CVE-2025-23013 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-23013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23013 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for pam_u2f fixes the following issues: * CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-29=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * pam_u2f-1.3.0-slfo.1.1_2.1 * pam_u2f-debugsource-1.3.0-slfo.1.1_2.1 * pam_u2f-debuginfo-1.3.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23013.html * https://bugzilla.suse.com/show_bug.cgi?id=1233517 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:23 -0000 Subject: SUSE-SU-2025:20233-1: moderate: Security update for openssl-3 Message-ID: <174902450331.12703.7360711905783540909@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:20233-1 Release Date: 2025-03-07T16:28:37Z Rating: moderate References: * bsc#1236136 Cross-References: * CVE-2024-13176 CVSS scores: * CVE-2024-13176 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-13176 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-13176 ( NVD ): 4.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation(bsc#1236136). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-31=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * openssl-3-debuginfo-3.1.4-slfo.1.1_4.1 * openssl-3-debugsource-3.1.4-slfo.1.1_4.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-slfo.1.1_4.1 * libopenssl3-debuginfo-3.1.4-slfo.1.1_4.1 * libopenssl3-3.1.4-slfo.1.1_4.1 * openssl-3-3.1.4-slfo.1.1_4.1 * libopenssl-3-fips-provider-3.1.4-slfo.1.1_4.1 * libopenssl-3-devel-3.1.4-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-13176.html * https://bugzilla.suse.com/show_bug.cgi?id=1236136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:33 -0000 Subject: SUSE-SU-2025:20230-1: moderate: Security update for haproxy Message-ID: <174902451328.12703.14848665543478928865@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:20230-1 Release Date: 2025-03-05T14:55:47Z Rating: moderate References: * bsc#1233973 Cross-References: * CVE-2024-53008 CVSS scores: * CVE-2024-53008 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-53008 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-53008 ( NVD ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: Update to version 2.8.11+git0.01c1056a4: * VUL-0: CVE-2024-53008: haproxy: HTTP/3 request smuggling via malformed HTTP headers forwarded to a HTTP/1.1 non-compliant back-end server (bsc#1233973) * BUG/MINOR: cfgparse-listen: fix option httpslog override warning message * BUG/MEDIUM: promex: Wait to have the request before sending the response * BUG/MEDIUM: cache/stats: Wait to have the request before sending the response * BUG/MEDIUM: queue: implement a flag to check for the dequeuing * BUG/MINOR: clock: validate that now_offset still applies to the current date * BUG/MINOR: clock: make time jump corrections a bit more accurate * BUG/MINOR: polling: fix time reporting when using busy polling * BUG/MAJOR: mux-h1: Wake SC to perform 0-copy forwarding in CLOSING state * BUG/MEDIUM: pattern: prevent UAF on reused pattern expr * BUG/MINOR: pattern: prevent const sample from being tampered in pat_match_beg() * BUG/MEDIUM: clock: detect and cover jumps during execution * REGTESTS: fix random failures with wrong_ip_port_logging.vtc under load * DOC: configuration: place the HAPROXY_HTTP_LOG_FMT example on the correct line * BUG/MINOR: pattern: do not leave a leading comma on "set" error messages * BUG/MINOR: pattern: pat_ref_set: return 0 if err was found * BUG/MINOR: pattern: pat_ref_set: fix UAF reported by coverity * BUG/MINOR: stconn: Request to send something to be woken up when the pipe is full * BUG/MEDIUM: mux-pt/mux-h1: Release the pipe on connection error on sending path * BUG/MEDIUM: clock: also update the date offset on time jumps * DOC: config: correct the table for option tcplog * BUG/MINOR: h3: properly reject too long header responses * BUG/MINOR: proto_uxst: delete fd from fdtab if listen() fails * BUG/MINOR: mux-quic: do not send too big MAX_STREAMS ID * REGTESTS: mcli: test the pipelined commands on master CLI * BUG/MEDIUM: mworker/cli: fix pipelined modes on master CLI * MINOR: channel: implement ci_insert() function * BUG/MINOR: proto_tcp: keep error msg if listen() fails * BUG/MINOR: proto_tcp: delete fd from fdtab if listen() fails * BUG/MINOR: quic/trace: make quic_conn_enc_level_init() emit NEW not CLOSE * BUG/MINOR: trace/quic: make "qconn" selectable as a lockon criterion * BUG/MINOR: trace: automatically start in waiting mode with "start " * BUG/MEDIUM: trace: fix null deref in lockon mechanism since TRACE_ENABLED() * BUG/MINOR: trace/quic: permit to lock on frontend/connect/session etc * BUG/MINOR: trace/quic: enable conn/session pointer recovery from quic_conn * BUG/MINOR: fcgi-app: handle a possible strdup() failure * BUG/MEDIUM: mux-h2: Propagate term flags to SE on error in h2s_wake_one_stream * BUG/MEDIUM: h2: Only report early HTX EOM for tunneled streams * BUG/MEDIUM: http-ana: Report error on write error waiting for the response * BUG/MEDIUM: quic: prevent conn freeze on 0RTT undeciphered content * BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was set * BUG/MEDIUM: mux-h1: Properly handle empty message when an error is triggered * BUG/MEDIUM: cli: Always release back endpoint between two commands on the mcli * BUG/MEDIUM: stream: Prevent mux upgrades if client connection is no longer ready * BUG/MEDIUM: init: fix fd_hard_limit default in compute_ideal_maxconn * MEDIUM: init: set default for fd_hard_limit via DEFAULT_MAXFD (take #2) * BUG/MEDIUM: queue: deal with a rare TOCTOU in assign_server_and_queue() * MINOR: queue: add a function to check for TOCTOU after queueing * BUG/MEDIUM: jwt: Clear SSL error queue on error when checking the signature * BUG/MINOR: quic: Lack of precision when computing K (cubic only cc) * BUG/MINOR: cli: Atomically inc the global request counter between CLI commands * BUG/MINOR: server: Don't warn fallback IP is used during init-addr resolution * BUG/MINOR: stick-table: fix crash for src_inc_gpc() without stkcounter * DOC: config: improve the http-keep-alive section * DOC: configuration: issuers-chain-path not compatible with OCSP * BUG/MEDIUM: ssl_sock: fix deadlock in ssl_sock_load_ocsp() on error path * BUG/MEDIUM: debug/cli: fix "show threads" crashing with low thread counts * BUG/MINOR: session: Eval L4/L5 rules defined in the default section * BUG/MEDIUM: bwlim: Be sure to never set the analyze expiration date in past * BUG/MEDIUM: spoe: Be sure to create a SPOE applet if none on the current thread * BUG/MEDIUM: h1: Reject empty Transfer-encoding header * BUG/MINOR: h1: Reject empty coding name as last transfer-encoding value * BUG/MINOR: h1: Fail to parse empty transfer coding names * BUG/MINOR: jwt: fix variable initialisation * DOC: configuration: update maxconn description * BUG/MINOR: jwt: don't try to load files with HMAC algorithm * MEDIUM: ssl: initialize the SSL stack explicitely * DOC: configuration: more details about the master-worker mode * BUG/MEDIUM: quic: fix possible exit from qc_check_dcid() without unlocking * BUG/MINOR: quic: fix race-condition on trace for CID retrieval * BUG/MINOR: quic: fix race condition in qc_check_dcid() * BUG/MEDIUM: quic: fix race-condition in quic_get_cid_tid() * BUG/MEDIUM: h3: ensure the ":scheme" pseudo header is totally valid * BUG/MEDIUM: h3: ensure the ":method" pseudo header is totally valid * MINOR: activity: make the memory profiling hash size configurable at build time * BUG/MINOR: hlua: report proper context upon error in hlua_cli_io_handler_fct() * BUG/MINOR: quic: fix BUG_ON() on Tx pkt alloc failure * BUG/MINOR: mux-quic: fix crash on qcs SD alloc failure * BUG/MINOR: h3: fix crash on STOP_SENDING receive after GOAWAY emission * DOC: api/event_hdl: small updates, fix an example and add some precisions * SCRIPTS: git-show-backports: do not truncate git-show output * DOC: configuration: fix alphabetical order of bind options * DOC: management: rename show stats domain cli "dns" to "resolvers" * DOC/MINOR: management: add missed -dR and -dv options * BUG/MINOR: proxy: fix header_unique_id leak on deinit() * BUG/MINOR: proxy: fix source interface and usesrc leaks on deinit() * BUG/MINOR: proxy: fix dyncookie_key leak on deinit() * BUG/MINOR: proxy: fix check_{command,path} leak on deinit() * BUG/MINOR: proxy: fix log_tag leak on deinit() * BUG/MINOR: proxy: fix server_id_hdr_name leak on deinit() * BUG/MINOR: quic: fix computed length of emitted STREAM frames * [RELEASE] Released version 2.8.10 * BUG/MEDIUM: quic: don't blindly rely on unaligned accesses * BUG/MAJOR: connection: fix server used_conns with H2 + reuse safe * BUG/MEDIUM: http_ana: ignore NTLM for reuse aggressive/always and no H1 * BUG/MAJOR: server: do not delete srv referenced by session * MINOR: session: rename private conns elements * BUG/MEDIUM: quic: fix connection freeze on post handshake * BUG/MEDIUM: server: fix dynamic servers initial settings * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning * BUG/MINOR: activity: fix Delta_calls and Delta_bytes count * BUG/MINOR: ssl/ocsp: init callback func ptr as NULL * CLEANUP: ssl/ocsp: readable ifdef in ssl_sock_load_ocsp * BUILD: fd: errno is also needed without poll() * CI: scripts: fix build of vtest regarding option -C * REGTESTS: acl_cli_spaces: avoid a warning caused by undefined logs * DOC: config: fix incorrect section reference about custom log format * DOC: quic: specify that connection migration is not supported * BUG/MINOR: server: Don't reset resolver options on a new default-server line * BUG/MINOR: http-htx: Support default path during scheme based normalization * BUG/MINOR: quic: adjust restriction for stateless reset emission * MEDIUM: config: prevent communication with privileged ports * BUILD: quic: fix unused variable warning when threads are disabled * BUG/MEDIUM: mux-quic: Create sedesc in same time of the QUIC stream * BUG/MEDIUM: quic_tls: prevent LibreSSL < 4.0 from negotiating CHACHA20_POLY1305 * BUG/MAJOR: quic: Crash with TLS_AES_128_CCM_SHA256 (libressl only) * BUG/MINOR: connection: parse PROXY TLV for LOCAL mode * DOC: configuration: update the crt-list documentation * CLEANUP: ssl/cli: remove unused code in dump_crtlist_conf * BUG/MINOR: stats: Don't state the 303 redirect response is chunked * BUG/MINOR: htpp-ana/stats: Specify that HTX redirect messages have a C-L header * BUG/MEDIUM: fd: prevent memory waste in fdtab array * BUILD: stick-tables: better mark the stktable_data as 32-bit aligned * BUG/MEDIUM: h1: Reject CONNECT request if the target has a scheme * BUG/MINOR: h1: Check authority for non-CONNECT methods only if a scheme is found * BUG/MEDIUM: stick-tables: properly mark stktable_data as packed * BUG/MEDIUM: htx: mark htx_sl as packed since it may be realigned * BUG/MINOR: qpack: fix error code reported on QPACK decoding failure * BUG/MINOR: mux-quic: fix error code on shutdown for non HTTP/3 * BUG/MINOR: log: smp_rgs array issues with inherited global log directives * BUG/MINOR: log: keep the ref in dup_logger() * MINOR: log: add dup_logsrv() helper function * DOC: lua: fix filters.txt file location * BUG/MINOR: haproxy: only tid 0 must not sleep if got signal * BUILD: clock: improve check for pthread_getcpuclockid() * BUG/MINOR: mworker: reintroduce way to disable seamless reload with -x /dev/null * BUG/MINOR: h1: fix detection of upper bytes in the URI * BUG/MINOR: backend: use cum_sess counters instead of cum_conn * BUG/MINOR: fd: my_closefrom() on Linux could skip contiguous series of sockets * BUG/MINOR: sock: handle a weird condition with connect() * BUG/MINOR: stconn: Fix sc_mux_strm() return value * BUG/MEDIUM: cache: Vary not working properly on anything other than accept- encoding * BUG/MINOR: server: fix slowstart behavior * BUG/MEDIUM: peers: Fix exit condition when max-updates-at-once is reached * BUG/MEDIUM: spoe: Always retry when an applet fails to send a frame * BUG/MEDIUM: applet: Fix applet API to put input data in a buffer * BUG/MEDIUM: evports: do not clear returned events list on signal * BUG/MEDIUM: stconn: Don't forward channel data if input data must be filtered * BUG/MEDIUM: grpc: Fix several unaligned 32/64 bits accesses * MINOR: net_helper: Add support for floats/doubles. * CI: revert kernel addr randomization introduced in 3a0fc864 * BUG/MEDIUM: peers/trace: fix crash when listing event types * BUG/MINOR: debug: make sure DEBUG_STRICT=0 does work as documented * BUG/MINOR: http-ana: Fix TX_L7_RETRY and TX_D_L7_RETRY values * BUG/MEDIUM: http-ana: Deliver 502 on keep-alive for fressh server connection * CLEANUP: log: lf_text_len() returns a pointer not an integer * BUG/MINOR: log: invalid snprintf() usage in sess_build_logline() * BUG/MINOR: tools/log: invalid encode_{chunk,string} usage * BUG/MINOR: log: fix lf_text_len() truncate inconsistency * BUG/MINOR: listener: always assign distinct IDs to shards * BUG/MINOR: cli: Report an error to user if command or payload is too big * [RELEASE] Released version 2.8.9 * BUILD: proxy: Replace free_logformat_list() to manually release log-format * [RELEASE] Released version 2.8.8 * BUG/MINOR: proxy: fix logformat expression leak in use_backend rules * BUG/MINOR: backend: properly handle redispatch 0 * BUG/MINOR: server: ignore 'enabled' for dynamic servers * BUG/MEDIUM: cli: Warn if pipelined commands are delimited by a \n * MINOR: cli: Remove useless loop on commands to find unescaped semi-colon * MINOR: server: allow cookie for dynamic servers * BUG/MINOR: server: fix persistence cookie for dynamic servers * BUG/MINOR: ssl: Detect more 'ocsp-update' incompatibilities * BUG/MINOR: ssl: Wrong ocsp-update "incompatibility" error message * BUG/MINOR: server: 'source' interface ignored from 'default-server' directive * OPTIM: http_ext: avoid useless copy in http_7239_extract_{ipv4,ipv6} * BUG/MEDIUM: mux-fcgi: Properly handle EOM flag on end-of-trailers HTX block * BUG/MINOR: mux-quic: close all QCS before freeing QCC tasklet * BUG/MEDIUM: ssl: Fix crash in ocsp-update log function * BUG/MINOR: session: ensure conn owner is set after insert into session * BUG/MEDIUM: spoe: Return an invalid frame on recv if size is too small * CI: temporarily adjust kernel entropy to work with ASAN/clang * BUG/MINOR: spoe: Be sure to be able to quickly close IDLE applets on soft- stop * BUG/MEDIUM: spoe: Don't rely on stream's expiration to detect processing timeout * BUG/MINOR: listener: Don't schedule frontend without task in listener_release() * BUG/MINOR: listener: Wake proxy's mngmt task up if necessary on session release * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread (2nd try) * MINOR: hlua: use accessors for stream hlua ctx * DEBUG: lua: precisely identify if stream is stuck inside lua or not * BUG/MINOR: hlua: fix missing lock in hlua_filter_delete() * BUG/MINOR: hlua: missing lock in hlua_filter_new() * BUG/MINOR: hlua: segfault when loading the same filter from different contexts * BUG/MINOR: ssl: fix possible ctx memory leak in sample_conv_aes_gcm() * DOC: configuration: clarify ciphersuites usage (V2) * BUILD: solaris: fix compilation errors * BUG/MINOR: cfgparse: report proper location for log-format-sd errors * BUG/MINOR: ssl/cli: typo in new ssl crl-file CLI description * CI: skip scheduled builds on forks * BUG/MINOR: sink: fix a race condition in the TCP log forwarding code * BUG/MINOR: hlua: don't call ha_alert() in hlua_event_subscribe() * BUG/MAJOR: hlua: improper lock usage with hlua_ctx_resume() * BUG/MEDIUM: hlua: improper lock usage with SET_SAFE_LJMP() * BUG/MINOR: hlua: improper lock usage in hlua_filter_new() * BUG/MINOR: hlua: improper lock usage in hlua_filter_callback() * BUG/MINOR: hlua: fix possible crash in hlua_filter_new() under load * BUG/MINOR: hlua: don't use lua_tostring() from unprotected contexts * BUG/MINOR: hlua: fix unsafe lua_tostring() usage with empty stack * BUG/MINOR: tools: seed the statistical PRNG slightly better * MINOR: hlua: Be able to disable logging from lua * BUG/MINOR: hlua: Fix log level to the right value when set via TXN:set_loglevel * BUG/MINOR: config/quic: Alert about PROXY protocol use on a QUIC listener * DOC: configuration: clarify ciphersuites usage * LICENSE: http_ext: fix GPL license version * LICENSE: event_hdl: fix GPL license version * BUG/MINOR: ssl/cli: duplicate cleaning code in cli_parse_del_crtlist * BUG/MINOR: ist: only store NUL byte on succeeded alloc * BUG/MINOR: quic: fix output of show quic * BUG/MAJOR: server: fix stream crash due to deleted server * BUG/MINOR: stats: drop srv refcount on early release * BUG/MINOR: ist: allocate nul byte on istdup * MINOR: quic: warn on bind on multiple addresses if no IP_PKTINFO support * DOC: quic: fix recommandation for bind on multiple address * BUG/MEDIUM: quic: fix transient send error with listener socket * BUG/MEDIUM: hlua: Don't loop if a lua socket does not consume received data * BUG/MEDIUM: hlua: Be able to garbage collect uninitialized lua sockets * BUG/MEDIUM: applet: Immediately free appctx on early error * DOC: quic: Missing tuning setting in "Global parameters" * BUG/MINOR: qpack: reject invalid dynamic table capacity * BUG/MINOR: qpack: reject invalid increment count decoding * BUG/MINOR: quic: reject HANDSHAKE_DONE as server * BUG/MINOR: quic: reject unknown frame type * BUG/MAJOR: promex: fix crash on deleted server * MINOR: connection: add sample fetches to report per-connection glitches * MINOR: mux-h2: implement MUX_CTL_GET_GLITCHES * MINOR: connection: add a new mux_ctl to report number of connection glitches * MEDIUM: mux-h2: allow to set the glitches threshold to kill a connection * MINOR: mux-h2: always use h2c_report_glitch() * MINOR: mux-h2: count late reduction of INITIAL_WINDOW_SIZE as a glitch * MINOR: mux-h2: count excess of CONTINUATION frames as a glitch * BUG/MINOR: mux-h2: count rejected DATA frames against the connection's flow control * MINOR: mux-h2: add a counter of "glitches" on a connection * [RELEASE] Released version 2.8.7 * BUG/MAJOR: ssl/ocsp: crash with ocsp when old process exit or using ocsp CLI * [RELEASE] Released version 2.8.6 * DEV: makefile: fix POSIX compatibility for "range" target * DEV: makefile: add a new "range" target to iteratively build all commits * CI: Update to actions/cache at v4 * DOC: internal: update missing data types in peers-v2.0.txt * DOC: install: recommend pcre2 * DOC: httpclient: add dedicated httpclient section * DOC: configuration: clarify http-request wait-for-body * BUILD: address a few remaining calloc(size, n) cases * BUG/MINOR: ext-check: cannot use without preserve-env * MINOR: ext-check: add an option to preserve environment variables * BUG/MINOR: diag: run the final diags before quitting when using -c * BUG/MINOR: diag: always show the version before dumping a diag warning * MINOR: errors: ha_alert() and ha_warning() uses warn_exec_path() * MINOR: quic: Add a counter for reordered packets * MINOR: quic: Dynamic packet reordering threshold * MINOR: quic: Update K CUBIC calculation (RFC 9438) * BUG/MEDIUM: quic: Wrong K CUBIC calculation. * MINOR: quic: Stop using 1024th of a second. * BUG/MINOR: quic: fix possible integer wrap around in cubic window calculation * CLEANUP: quic: Code clarifications for QUIC CUBIC (RFC 9438) * BUG/MINOR: quic: Wrong ack ranges handling when reaching the limit. * BUG/MEDIUM: quic: fix crash on invalid qc_stream_buf_free() BUG_ON * BUG/MEDIUM: qpack: allow 6xx..9xx status codes * BUG/MEDIUM: h3: do not crash on invalid response status code * MINOR: h3: add traces for stream sending function * BUG/MEDIUM: quic: remove unsent data from qc_stream_desc buf * MINOR: quic: extract qc_stream_buf free in a dedicated function * MINOR: quic: Stop hardcoding a scale shifting value (CUBIC_BETA_SCALE_FACTOR_SHIFT) * CLEANUP: quic: Remove unused CUBIC_BETA_SCALE_FACTOR_SHIFT macro. * BUG/MEDIUM: mux-quic: report early error on stream * BUG/MINOR: h3: fix checking on NULL Tx buffer * BUG/MEDIUM: ssl: Fix crash when calling "update ssl ocsp-response" when an update is ongoing * REGTESTS: ssl: Add OCSP related tests * REGTESTS: ssl: Fix empty line in cli command input * BUG/MINOR: ssl: Reenable ocsp auto-update after an "add ssl crt-list" * BUG/MINOR: ssl: Destroy ckch instances before the store during deinit * BUG/MEDIUM: ocsp: Separate refcount per instance and per store * MINOR: ssl: Use OCSP_CERTID instead of ckch_store in ckch_store_build_certid * BUG/MINOR: ssl: Clear the ckch instance when deleting a crt-list line * BUG/MINOR: ssl: Duplicate ocsp update mode when dup'ing ckch * BUG/MINOR: ssl: Fix error message after ssl_sock_load_ocsp call * BUG/MAJOR: ssl_sock: Always clear retry flags in read/write functions * BUG/MEDIUM: h1: always reject the NUL character in header values * BUG/MINOR: h1-htx: properly initialize the err_pos field * BUG/MEDIUM: h1: Don't support LF only to mark the end of a chunk size * BUG/MINOR: h1: Don't support LF only at the end of chunks * BUG/MEDIUM: stconn: Don't check pending shutdown to wake an applet up * BUG/MEDIUM: stconn: Allow expiration update when READ/WRITE event is pending * BUG/MEDIUM: pool: fix rare risk of deadlock in pool_flush() * BUG/MINOR: jwt: fix jwt_verify crash on 32-bit archs * BUG/MEDIUM: cli: fix once for all the problem of missing trailing LFs * BUG/MINOR: vars/cli: fix missing LF after "get var" output * BUG/MEDIUM: cli: some err/warn msg dumps add LR into CSV output on stat's CLI * REGTESTS: add a test to ensure map-ordering is preserved * MINOR: mux-h2/traces: add a missing trace on connection WU with negative inc * BUG/MEDIUM: mux-h2: refine connection vs stream error on headers * MINOR: mux-h2/traces: clarify the "rejected H2 request" event * MINOR: mux-h2/traces: explicitly show the error/refused stream states * MINOR: mux-h2/traces: also suggest invalid header upon parsing error * MINOR: debug: make BUG_ON() catch build errors even without DEBUG_STRICT * MINOR: debug: make ABORT_NOW() store the caller's line number when using abort * MINOR: debug: make sure calls to ha_crash_now() are never merged * MINOR: compiler: add a new DO_NOT_FOLD() macro to prevent code folding * BUG/MEDIUM: quic: keylog callback not called (USE_OPENSSL_COMPAT) * BUG/MINOR: mux-h2: also count streams for refused ones * BUG/MINOR: mux-quic: do not prevent non-STREAM sending on flow control * DOC: configuration: corrected description of keyword tune.ssl.ocsp- update.mindelay * MINOR: mux-h2: support limiting the total number of H2 streams per connection * BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up * BUG/MEDIUM: stconn: Forward shutdown on write timeout only if it is forwardable * BUG/MEDIUM: h3: fix incorrect snd_buf return value * CLEANUP: quic: Remaining useless code into server part * BUG/MINOR: h3: close connection on sending alloc errors * BUG/MINOR: h3: properly handle alloc failure on finalize * BUG/MINOR: h3: close connection on header list too big * MINOR: h3: check connection error during sending * BUG/MINOR: quic: Missing call to TLS message callbacks * BUG/MINOR: quic: Wrong keylog callback setting. * BUG/MINOR: mux-quic: always report error to SC on RESET_STREAM emission * BUG/MEDIUM: stats: unhandled switching rules with TCP frontend * MINOR: stats: store the parent proxy in stats ctx (http) * DOC: config: Update documentation about local haproxy response * BUG/MINOR: resolvers: default resolvers fails when network not configured * BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty * BUG/MEDIUM: quic: QUIC CID removed from tree without locking * BUG/MEDIUM: quic: Possible buffer overflow when building TLS records * BUG/MINOR: mworker/cli: fix set severity-output support * DOC: configuration: typo req.ssl_hello_type * [RELEASE] Released version 2.8.5 * BUG/MEDIUM: proxy: always initialize the default settings after init * BUG/MINOR: lua: Wrong OCSP CID after modifying an SSL certficate (LUA) * BUG/MINOR: ssl: Wrong OCSP CID after modifying an SSL certficate * MINOR: ssl/cli: Add ha_(warning|alert) msgs to CLI ckch callback * BUG/MINOR: ssl: Double free of OCSP Certificate ID * BUG/MINOR: quic: Packet number spaces too lately initialized * BUG/MINOR: quic: Missing QUIC connection path member initialization * BUG/MINOR: quic: Possible leak of TX packets under heavy load * BUG/MEDIUM: quic: Possible crash during retransmissions and heavy load * BUG/MINOR: cache: Remove incomplete entries from the cache when stream is closed * BUG/MEDIUM: peers: fix partial message decoding * DOC: Clarify the differences between field() and word() * BUG/MINOR: sample: Make the `word` converter compatible with `-m found` * REGTESTS: sample: Test the behavior of consecutive delimiters for the field converter * DOC: config: fix monitor-fail typo * DOC: config: add matrix entry for "max-session-srv-conns" * DOC: config: specify supported sections for "max-session-srv-conns" * BUG/MINOR: cfgparse-listen: fix warning being reported as an alert * BUG/MINOR: config: Stopped parsing upon unmatched environment variables * BUG/MINOR: quic_tp: fix preferred_address decoding * DOC: config: fix missing characters in set-spoe-group action * BUG/MINOR: h3: always reject PUSH_PROMISE * BUG/MINOR: h3: fix TRAILERS encoding * BUG/MEDIUM: master/cli: Properly pin the master CLI on thread 1 / group 1 * BUG/MINOR: compression: possible NULL dereferences in comp_prepare_compress_request() * BUG/MINOR: quic: fix CONNECTION_CLOSE_APP encoding * DOC: lua: fix Proxy.get_mode() output * DOC: lua: add sticktable class reference from Proxy.stktable * REGTESTS: connection: disable http_reuse_be_transparent.vtc if !TPROXY * DOC: config: fix timeout check inheritance restrictions * DOC: 51d: updated 51Degrees repo URL for v3.2.10 * BUG/MINOR: server: do not leak default-server in defaults sections * BUG/MINOR: quic: Possible RX packet memory leak under heavy load * BUG/MEDIUM: quic: Possible crash for connections to be killed * BUG/MINOR: sock: mark abns sockets as non-suspendable and always unbind them * BUG/MINOR: startup: set GTUNE_SOCKET_TRANSFER correctly * REGTESTS: http: add a test to validate chunked responses delivery * BUG/MINOR: proxy/stktable: missing frees on proxy cleanup * MINOR: stktable: add stktable_deinit function * BUG/MINOR: stream/cli: report correct stream age in "show sess" * BUG/MEDIUM: mux-fcgi: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h1: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h2: fail earlier on malloc in takeover() * BUG/MAJOR: quic: complete thread migration before tcp-rules * [RELEASE] Released version 2.8.4 * BUG/MINOR: stconn: Report read activity on non-indep streams for partial sends * BUG/MINOR: stconn/applet: Report send activity only if there was output data * BUG/MINOR: stconn: Use HTX-aware channel's functions to get info on buffer * BUG/MINOR: stconn: Fix streamer detection for HTX streams * MINOR: channel: Add functions to get info on buffers and deal with HTX streams * MINOR: htx: Use a macro for overhead induced by HTX * BUG/MEDIUM: stconn: Update fsb date on partial sends * BUG/MEDIUM: stream: Don't call mux .ctl() callback if not implemented * BUG/MEDIUM: mworker: set the master variable earlier * BUG/MEDIUM: applet: Report a send activity everytime data were sent * BUG/MEDIUM: stconn: Report a send activity everytime data were sent * REGTESTS: http: Improve script testing abortonclose option * BUG/MEDIUM: stream: Properly handle abortonclose when set on backend only * MEDIUM: mux-h1: Handle MUX_SUBS_RECV flag in h1_ctl() and susbscribe for reads * MINOR: connection: Add a CTL flag to notify mux it should wait for reads again * BUG/MINOR: stconn: Handle abortonclose if backend connection was already set up * BUG/MEDIUM: connection: report connection errors even when no mux is installed * DOC: quic: Wrong syntax for "quic-cc-algo" keyword. * BUG/MINOR: sink: don't learn srv port from srv addr * BUG/MEDIUM: applet: Remove appctx from buffer wait list on release * DOC: config: use the word 'backend' instead of 'proxy' in 'track' description * BUG/MINOR: quic: fix retry token check inconsistency * DOC: management: -q is quiet all the time * BUG/MEDIUM: stconn: Don't update stream expiration date if already expired * BUG/MEDIUM: quic: Avoid some crashes upon TX packet allocation failures * BUG/MEDIUM: quic: Possible crashes when sending too short Initial packets * BUG/MEDIUM: quic: Avoid trying to send ACK frames from an empty ack ranges tree * BUG/MINOR: quic: idle timer task requeued in the past * BUG/MEDIUM: pool: fix releasable pool calculation when overloaded * BUG/MEDIUM: freq-ctr: Don't report overshoot for long inactivity period * BUG/MINOR: mux-h1: Properly handle http-request and http-keep-alive timeouts * BUG/MINOR: stick-table/cli: Check for invalid ipv4 key * BUG/MEDIUM: quic: fix sslconns on quic_conn alloc failure * BUG/MEDIUM: quic: fix actconn on quic_conn alloc failure * CLEANUP: htx: Properly indent htx_reserve_max_data() function * BUG/MINOR: stconn: Sanitize report for read activity * BUG/MEDIUM: Don't apply a max value on room_needed in sc_need_room() * BUG/MEDIUM: stconn: Don't report rcv/snd expiration date if SC cannot epxire * BUG/MEDIUM: pattern: don't trim pools under lock in pat_ref_purge_range() * BUG/MINOR: cfgparse/stktable: fix error message on stktable_init() failure * BUG/MINOR: stktable: missing free in parse_stick_table() * BUG/MINOR: tcpcheck: Report hexstring instead of binary one on check failure * BUG/MEDIUM: ssl: segfault when cipher is NULL * BUG/MINOR: mux-quic: fix early close if unset client timeout * BUG/MINOR: ssl: suboptimal certificate selection with TLSv1.3 and dual ECDSA/RSA * MEDIUM: quic: count quic_conn for global sslconns * MEDIUM: quic: count quic_conn instance for maxconn * MINOR: frontend: implement a dedicated actconn increment function * BUG/MINOR: ssl: use a thread-safe sslconns increment * BUG/MINOR: quic: do not consider idle timeout on CLOSING state * BUG/MEDIUM: server: "proto" not working for dynamic servers * MINOR: connection: add conn_pr_mode_to_proto_mode() helper func * DEBUG: mux-h2/flags: fix list of h2c flags used by the flags decoder * MINOR: lua: Add flags to configure logging behaviour * BUG/MINOR: ssl: load correctly @system-ca when ca-base is define * DOC: internal: filters: fix reference to entities.pdf * BUG/MINOR: mux-h2: update tracked counters with req cnt/req err * BUG/MINOR: mux-h2: commit the current stream ID even on reject * BUG/MEDIUM: peers: Fix synchro for huge number of tables * BUG/MEDIUM: peers: Be sure to always refresh recconnect timer in sync task * BUG/MINOR: trace: fix trace parser error reporting * BUG/MINOR: mux-h2: fix http-request and http-keep-alive timeouts again * BUG/MEDIUM: mux-h2: Don't report an error on shutr if a shutw is pending * BUG/MINOR: mux-h2: make up other blocked streams upon removal from list * BUG/MINOR: mux-h1: Send a 400-bad-request on shutdown before the first request * BUG/MEDIUM: quic-conn: free unsent frames on retransmit to prevent crash * BUG/MINOR: mux-quic: fix free on qcs-new fail alloc * BUG/MINOR: h3: strengthen host/authority header parsing * BUG/MINOR: mux-quic: support initial 0 max-stream-data * BUG/MEDIUM: mux-quic: fix RESET_STREAM on send-only stream * BUG/MINOR: quic: reject packet with no frame * BUG/MINOR: quic: Avoid crashing with unsupported cryptographic algos * BUG/MEDIUM: stconn: Fix comparison sign in sc_need_room() * BUG/MINOR: hq-interop: simplify parser requirement * BUG/MEDIUM: h1: Ignore C-L value in the H1 parser if T-E is also set * BUG/MINOR: mux-h1: Ignore C-L when sending H1 messages if T-E is also set * BUG/MINOR: mux-h1: Handle read0 in rcv_pipe() only when data receipt was tried * BUG/MEDIUM: hlua: Initialize appctx used by a lua socket on connect only * MINOR: hlua: Test the hlua struct first when the lua socket is connecting * MINOR: hlua: Save the lua socket's server in its context * MINOR: hlua: Save the lua socket's timeout in its context * MINOR: hlua: Don't preform operations on a not connected socket * MINOR: hlua: Set context's appctx when the lua socket is created * BUG/MEDIUM: http-ana: Try to handle response before handling server abort * BUG/MEDIUM: quic_conn: let the scheduler kill the task when needed * BUG/MEDIUM: actions: always apply a longest match on prefix lookup * BUG/MINOR: mux-quic: remove full demux flag on ncbuf release * BUG/MEDIUM: server/cli: don't delete a dynamic server that has streams * MINOR: pattern: fix pat_{parse,match}_ip() function comments * BUG/MINOR: server: add missing free for server->rdr_pfx * BUG/MAJOR: mux-h2: Report a protocol error for any DATA frame before headers * BUG/MINOR: freq_ctr: fix possible negative rate with the scaled API * BUG/MEDIUM: master/cli: Pin the master CLI on the first thread of the group 1 * BUG/MINOR: promex: fix backend_agg_check_status * BUG/MEDIUM: mux-fcgi: Don't swap trash and dbuf when handling STDERR records * BUG/MINOR: hlua/init: coroutine may not resume itself * BUG/MEDIUM: hlua: don't pass stale nargs argument to lua_resume() * CI: musl: drop shopt in workflow invocation * CI: musl: highlight section if there are coredumps * Revert "BUG/MEDIUM: quic: missing check of dcid for init pkt including a token" * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread * MINOR: hlua: add hlua_stream_ctx_prepare helper function * BUILD: quic: fix build on centos 8 and USE_QUIC_OPENSSL_COMPAT * BUG/MINOR: quic: ssl_quic_initial_ctx() uses error count not error code * BUG/MINOR: quic: allow-0rtt warning must only be emitted with quic bind * BUILD: Makefile: add USE_QUIC_OPENSSL_COMPAT to make help * MINOR: quic+openssl_compat: Emit an alert for "allow-0rtt" option * MINOR: quic+openssl_compat: Do not start without "limited-quic" * MINOR: quic: Warning for OpenSSL wrapper QUIC bindings without "limited- quic" * BUG/MINOR: quic+openssl_compat: Non initialized TLS encryption levels * DOC: quic: Add "limited-quic" new tuning setting * MINOR: quic: Add "limited-quic" new tuning setting * MINOR: quic: SSL context initialization with QUIC OpenSSL wrapper. * MINOR: quic: Add a quic_openssl_compat struct to quic_conn struct * MINOR: quic: Call the keylog callback for QUIC openssl wrapper from SSL_CTX_keylog() * MINOR: quic: Initialize TLS contexts for QUIC openssl wrapper * MINOR: quic: Export some KDF functions (QUIC-TLS) * MINOR: quic: Add a compilation option for the QUIC OpenSSL wrapper * MINOR: quic: Do not enable 0RTT with SSL_set_quic_early_data_enabled() * MINOR: quic: Set the QUIC connection as extra data before calling SSL_set_quic_method() * MINOR: quic: Do not enable O-RTT with USE_QUIC_OPENSSL_COMPAT * MINOR: quic: Include QUIC opensssl wrapper header from TLS stacks compatibility header * MINOR: quic: QUIC openssl wrapper implementation * BUG/MINOR: quic: Wrong cluster secret initialization * BUG/MINOR: quic: Leak of frames to send. * BUILD: bug: make BUG_ON() void to avoid a rare warning ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-27=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * haproxy-debugsource-2.8.11+git0.01c1056a4-slfo.1.1_1.1 * haproxy-2.8.11+git0.01c1056a4-slfo.1.1_1.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53008.html * https://bugzilla.suse.com/show_bug.cgi?id=1233973 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:26 -0000 Subject: SUSE-SU-2025:20232-1: important: Security update for glib2 Message-ID: <174902450668.12703.1448878162193715782@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20232-1 Release Date: 2025-03-05T15:01:46Z Rating: important References: * bsc#1233282 Cross-References: * CVE-2024-52533 CVSS scores: * CVE-2024-52533 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2024-52533: Fixed a single byte buffer overflow in set_connect_msg() (bsc#1233282) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-28=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libgio-2_0-0-2.78.6-slfo.1.1_2.1 * libglib-2_0-0-2.78.6-slfo.1.1_2.1 * libgobject-2_0-0-2.78.6-slfo.1.1_2.1 * libgobject-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * libglib-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * glib2-tools-debuginfo-2.78.6-slfo.1.1_2.1 * glib2-tools-2.78.6-slfo.1.1_2.1 * libgmodule-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * glib2-debugsource-2.78.6-slfo.1.1_2.1 * libgmodule-2_0-0-2.78.6-slfo.1.1_2.1 * libgio-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52533.html * https://bugzilla.suse.com/show_bug.cgi?id=1233282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:36 -0000 Subject: SUSE-SU-2025:20239-1: moderate: Security update for curl Message-ID: <174902451633.21522.4726974647754217458@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20239-1 Release Date: 2025-03-13T10:37:02Z Rating: moderate References: * bsc#1230093 * bsc#1232528 * bsc#1234068 * bsc#1236589 Cross-References: * CVE-2024-11053 * CVE-2024-8096 * CVE-2024-9681 * CVE-2025-0665 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2024-8096 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8096 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-8096 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9681 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9681 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9681 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9681 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2025-0665 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-0665 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-0665 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: Update to 8.12.1: * Bugfixes: * asyn-thread: fix build with 'CURL_DISABLE_SOCKETPAIR' * asyn-thread: fix HTTPS RR crash * asyn-thread: fix the returned bitmask from Curl_resolver_getsock * asyn-thread: survive a c-ares channel set to NULL * cmake: always reference OpenSSL and ZLIB via imported targets * cmake: respect 'GNUTLS_CFLAGS' when detected via 'pkg-config' * cmake: respect 'GNUTLS_LIBRARY_DIRS' in 'libcurl.pc' and 'curl-config' * content_encoding: #error on too old zlib * imap: TLS upgrade fix * ldap: drop support for legacy Novell LDAP SDK * libssh2: comparison is always true because rc <= -1 * libssh2: raise lowest supported version to 1.2.8 * libssh: drop support for libssh older than 0.9.0 * openssl-quic: ignore ciphers for h3 * pop3: TLS upgrade fix * runtests: fix the disabling of the memory tracking * runtests: quote commands to support paths with spaces * scache: add magic checks * smb: silence '-Warray-bounds' with gcc 13+ * smtp: TLS upgrade fix * tool_cfgable: sort struct fields by size, use bitfields for booleans * tool_getparam: add "TLS required" flag for each such option * vtls: fix multissl-init * wakeup_write: make sure the eventfd write sends eight bytes Update to 8.12.0: * Security fixes: * [bsc#1234068, CVE-2024-11053] curl could leak the password used for the first host to the followed-to host under certain circumstances. * [bsc#1232528, CVE-2024-9681] HSTS subdomain overwrites parent cache entry * [bsc#1236589, CVE-2025-0665] eventfd double close * Changes: * curl: add byte range support to --variable reading from file * curl: make --etag-save acknowledge --create-dirs * getinfo: fix CURLINFO_QUEUE_TIME_T and add 'time_queue' var * getinfo: provide info which auth was used for HTTP and proxy * hyper: drop support * openssl: add support to use keys and certificates from PKCS#11 provider * QUIC: 0RTT for gnutls via CURLSSLOPT_EARLYDATA * vtls: feature ssls-export for SSL session im-/export * Bugfixes: * altsvc: avoid integer overflow in expire calculation * asyn-ares: acknowledge CURLOPT_DNS_SERVERS set to NULL * asyn-ares: fix memory leak * asyn-ares: initial HTTPS resolve support * asyn-thread: use c-ares to resolve HTTPS RR * async-thread: avoid closing eventfd twice * cd2nroff: do not insist on quoted <> within backticks * cd2nroff: support "none" as a TLS backend * conncache: count shutdowns against host and max limits * content_encoding: drop support for zlib before 1.2.0.4 * content_encoding: namespace GZIP flag constants * content_encoding: put the decomp buffers into the writer structs * content_encoding: support use of custom libzstd memory functions * cookie: cap expire times to 400 days * cookie: parse only the exact expire date * curl: return error if etag options are used with multiple URLs * curl_multi_fdset: include the shutdown connections in the set * curl_sha512_256: rename symbols to the curl namespace * curl_url_set.md: adjust the added-in to 7.62.0 * doh: send HTTPS RR requests for all HTTP(S) transfers * easy: allow connect-only handle reuse with easy_perform * easy: make curl_easy_perform() return error if connection still there * easy_lock: use Sleep(1) for thread yield on old Windows * ECH: update APIs to those agreed with OpenSSL maintainers * GnuTLS: fix 'time_appconnect' for early data * HTTP/2: strip TE request header * http2: fix data_pending check * http2: fix value stored to 'result' is never read * http: ignore invalid Retry-After times * http_aws_sigv4: Fix invalid compare function handling zero-length pairs * https-connect: start next immediately on failure * lib: redirect handling by protocol handler * multi: fix curl_multi_waitfds reporting of fd_count * netrc: 'default' with no credentials is not a match * netrc: fix password-only entries * netrc: restore _netrc fallback logic * ngtcp2: fix memory leak on connect failure * openssl: define `HAVE_KEYLOG_CALLBACK` before use * openssl: fix ECH logic * osslq: use SSL_poll to determine writeability of QUIC streams * sectransp: free certificate on error * select: avoid a NULL deref in cwfds_add_sock * src: omit hugehelp and ca-embed from libcurltool * ssl session cache: change cache dimensions * system.h: add 64-bit curl_off_t definitions for NonStop * telnet: handle single-byte input option * TLS: check connection for SSL use, not handler * tool_formparse.c: make curlx_uztoso a static in here * tool_formparse: accept digits in --form type= strings * tool_getparam: ECH param parsing refix * tool_getparam: fail --hostpubsha256 if libssh2 is not used * tool_getparam: fix "Ignored Return Value" * tool_getparam: fix memory leak on error in parse_ech * tool_getparam: fix the ECH parser * tool_operate: make --etag-compare always accept a non-existing file * transfer: fix CURLOPT_CURLU override logic * urlapi: fix redirect to a new fragment or query (only) * vquic: make vquic_send_packets not return without setting psent * vtls: fix default SSL backend as a fallback * vtls: only remember the expiry timestamp in session cache * websocket: fix message send corruption * x509asn1: add parse recursion limit Update to 8.11.1: * Security fixes: * netrc and redirect credential leak [bsc#1234068, CVE-2024-11053] * Bugfixes: * build: fix ECH to always enable HTTPS RR * cookie: treat cookie name case sensitively * curl-rustls.m4: keep existing 'CPPFLAGS'/'LDFLAGS' when detected * curl: use realtime in trace timestamps * digest: produce a shorter cnonce in Digest headers * docs: document default 'User-Agent' * docs: suggest --ssl-reqd instead of --ftp-ssl * duphandle: also init netrc * hostip: don't use the resolver for FQDN localhost * http_negotiate: allow for a one byte larger channel binding buffer * krb5: fix socket/sockindex confusion, MSVC compiler warnings * libssh: use libssh sftp_aio to upload file * libssh: when using IPv6 numerical address, add brackets * mime: fix reader stall on small read lengths * mk-ca-bundle: remove CKA_NSS_SERVER_DISTRUST_AFTER conditions * mprintf: fix the integer overflow checks * multi: fix callback for 'CURLMOPT_TIMERFUNCTION' not being called again when... * netrc: address several netrc parser flaws * netrc: support large file, longer lines, longer tokens * nghttp2: use custom memory functions * OpenSSL: improvde error message on expired certificate * openssl: remove three "Useless Assignments" * openssl: stop using SSL_CTX_ function prefix for our functions * pytest: add test for use of CURLMOPT_MAX_HOST_CONNECTIONS * rtsp: check EOS in the RTSP receive and return an error code * schannel: remove TLS 1.3 ciphersuite-list support * setopt: fix CURLOPT_HTTP_CONTENT_DECODING * setopt: fix missing options for builds without HTTP & MQTT * socket: handle binding to "host!" * socketpair: fix enabling 'USE_EVENTFD' * strtok: use namespaced 'strtok_r' macro instead of redefining it Update to 8.11.0: * Security fixes: [bsc#1232528, CVE-2024-9681] * curl: HSTS subdomain overwrites parent cache entry * Changes: * curl: --create-dirs works for --dump-header as well * gtls: Add P12 format support * ipfs: add options to disable * TLS: TLSv1.3 earlydata support for curl * WebSockets: make support official (non-experimental) * Bugfixes: * build: clarify CA embed is for curl tool, mark default, improve summary * build: show if CA bundle to embed was found * build: tidy up and improve versioned-symbols options * cmake/FindNGTCP2: use library path as hint for finding crypto module * cmake: disable default OpenSSL if BearSSL, GnuTLS or Rustls is enabled * cmake: rename LDAP dependency config variables to match Find modules * cmake: replace 'check_include_file_concat()' for LDAP and GSS detection * cmake: use OpenSSL for LDAP detection only if available * curl: add build options for safe/no CA bundle search (Windows) * curl: detect ECH support dynamically, not at build time * curl_addrinfo: support operating systems with only getaddrinfo(3) * ftp: fix 0-length last write on upload from stdin * gnutls: use session cache for QUIC * hsts: improve subdomain handling * hsts: support "implied LWS" properly around max-age * http2: auto reset stream on server eos * json.md: cli-option '\--json' is an alias of '\--data-binary' * lib: move curl_path.[ch] into vssh/ * lib: remove function pointer typecasts for hmac/sha256/md5 * libssh.c: handle EGAINS during proto-connect correctly * libssh2: use the filename buffer when getting the homedir * multi.c: warn/assert on stall only without timer * negotiate: conditional check around GSS & SSL specific code * netrc: cache the netrc file in memory * ngtcp2: do not loop on recv * ngtcp2: set max window size to 10x of initial (128KB) * openssl quic: populate x509 store before handshake * openssl: extend the OpenSSL error messages * openssl: improve retries on shutdown * quic: use send/recvmmsg when available * schannel: fix TLS cert verification by IP SAN * schannel: ignore error on recv beyond close notify * select: use poll() if existing, avoid poll() with no sockets * sendf: add condition to max-filesize check * server/mqttd: fix two memory leaks * setopt: return error for bad input to CURLOPT_RTSP_REQUEST * setopt_cptr: make overflow check only done when needed * tls: avoid abusing CURLE_SSL_ENGINE_INITFAILED * tool: support --show-headers AND --remote-header-name * tool_operate: make --skip-existing work for --parallel * url: connection reuse on h3 connections * url: use same credentials on redirect * urlapi: normalize the IPv6 address * version: say quictls in MSH3 builds * vquic: fix compiler warning with gcc + MUSL * vquic: recv_mmsg, use fewer, but larger buffers * vtls: convert Curl_pin_peer_pubkey to use dynbuf * vtls: convert pubkey_pem_to_der to use dynbuf Update to 8.10.1: * Bugfixes: * autotools: fix `--with-ca-embed` build rule * cmake: ensure `CURL_USE_OPENSSL`/`USE_OPENSSL_QUIC` are set in sync * cmake: fix MSH3 to appear on the feature list * connect: store connection info when really done * FTP: partly revert eeb7c1280742f5c8fa48a4340fc1e1a1a2c7075a * http2: when uploading data from stdin, fix eos forwarding * http: make max-filesize check not count ignored bodies * lib: fix AF_INET6 use outside of USE_IPV6 * multi: check that the multi handle is valid in curl_multi_assign * QUIC: on connect, keep on trying on draining server * request: correctly reset the eos_sent flag * setopt: remove superfluous use of ternary expressions * singleuse: drop `Curl_memrchr()` for no-HTTP builds * tool_cb_wrt: use "curl_response" if no file name in URL * transfer: fix sendrecv() without interim poll * vtls: fix `Curl_ssl_conn_config_match` doc param Update to version 8.10.0: * Security fixes: * [bsc#1230093, CVE-2024-8096] curl: OCSP stapling bypass with GnuTLS * Changes: * curl: make --rate accept "number of units" * curl: make --show-headers the same as --include * curl: support --dump-header % to direct to stderr * curl: support embedding a CA bundle and --dump-ca-embed * curl: support repeated use of the verbose option; -vv etc * curl: use libuv for parallel transfers with --test-event * vtls: stop offering alpn http/1.1 for http2-prior-knowledge * Bugfixes: * curl: allow 500MB data URL encode strings * curl: warn on unsupported SSL options * Curl_rand_bytes to control env override * curl_sha512_256: fix symbol collisions with nettle library * dist: fix reproducible build from release tarball * http2: fix GOAWAY message sent to server * http2: improve rate limiting of downloads * INSTALL.md: MultiSSL and QUIC are mutually exclusive * lib: add eos flag to send methods * lib: make SSPI global symbols use Curl_ prefix * lib: prefer `CURL_SHA256_DIGEST_LENGTH` over the unprefixed name * lib: remove the final strncpy() calls * lib: remove use of RANDOM_FILE * Makefile.mk: fixup enabling libidn2 * max-filesize.md: mention zero disables the limit * mime: avoid inifite loop in client reader * ngtcp2: use NGHTTP3 prefix instead of NGTCP2 for errors in h3 callbacks * openssl quic: fix memory leak * openssl: certinfo errors now fail correctly * openssl: fix the data race when sharing an SSL session between threads * openssl: improve shutdown handling * POP3: fix multi-line responses * pop3: use the protocol handler ->write_resp * progress: ratelimit/progress tweaks * rand: only provide weak random when needed * sectransp: fix setting tls version * setopt: make CURLOPT_TFTP_BLKSIZE accept bad values * sha256: fix symbol collision between nettle (GnuTLS) and OpenSSL * sigpipe: init the struct so that first apply ignores * smb: convert superflous assign into assert * smtp: add tracing feature * spnego_gssapi: implement TLS channel bindings for openssl * src: delete `curlx_m*printf()` aliases * ssh: deduplicate SSH backend includes (and fix libssh cmake unity build) * tool_operhlp: fix "potentially uninitialized local variable 'pc' used" * tool_paramhlp: bump maximum post data size in memory to 16GB * transfer: skip EOS read when download done * url: fix connection reuse for HTTP/2 upgrades * urlapi: verify URL _decoded_ hostname when set * urldata: introduce `data->mid`, a unique identifier inside a multi * vtls: add SSLSUPP_CIPHER_LIST * vtls: fix static function name collisions between TLS backends * vtls: init ssl peer only once * websocket: introduce blocking sends * ws: flags to opcodes should ignore CURLWS_CONT flag * x509asn1: raise size limit for x509 certification information ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-44=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * curl-debugsource-8.12.1-slfo.1.1_1.1 * curl-8.12.1-slfo.1.1_1.1 * libcurl4-8.12.1-slfo.1.1_1.1 * libcurl4-debuginfo-8.12.1-slfo.1.1_1.1 * curl-debuginfo-8.12.1-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://www.suse.com/security/cve/CVE-2024-8096.html * https://www.suse.com/security/cve/CVE-2024-9681.html * https://www.suse.com/security/cve/CVE-2025-0665.html * https://bugzilla.suse.com/show_bug.cgi?id=1230093 * https://bugzilla.suse.com/show_bug.cgi?id=1232528 * https://bugzilla.suse.com/show_bug.cgi?id=1234068 * https://bugzilla.suse.com/show_bug.cgi?id=1236589 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:31 -0000 Subject: SUSE-SU-2025:20240-1: important: Security update for gstreamer Message-ID: <174902451175.21522.16633970328588287693@smelt2.prg2.suse.org> # Security update for gstreamer Announcement ID: SUSE-SU-2025:20240-1 Release Date: 2025-03-19T11:06:59Z Rating: important References: * bsc#1234449 Cross-References: * CVE-2024-47606 CVSS scores: * CVE-2024-47606 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47606 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47606 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer fixes the following issues: * CVE-2024-47606: avoid integer overflow when allocating sysmem (bsc#1234449). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-47=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * gstreamer-debugsource-1.24.7-slfo.1.1_2.1 * gstreamer-1.24.7-slfo.1.1_2.1 * gstreamer-debuginfo-1.24.7-slfo.1.1_2.1 * libgstreamer-1_0-0-1.24.7-slfo.1.1_2.1 * libgstreamer-1_0-0-debuginfo-1.24.7-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47606.html * https://bugzilla.suse.com/show_bug.cgi?id=1234449 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:40 -0000 Subject: SUSE-RU-2025:20228-1: moderate: Recommended update for selinux-policy Message-ID: <174902452038.12703.16786527042556859952@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2025:20228-1 Release Date: 2025-03-04T08:21:45Z Rating: moderate References: * bsc#1230961 * bsc#1232655 * bsc#1232753 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Update to version 20241031+git6.af97b0a3: * Allow vhostmd_t list virtqemud pid dirs (bsc#1230961) * Update to version 20241031+git4.96add794: * Label /run/libvirt/qemu/channel with virtqemud_var_run_t (bsc#1230961) * Update macros.selinux-policy to trigger a full relabel on transactional systems upon module installation. This is rather expensive and will hopefully be replaced by a more fine grained solution later on (bsc#1232753) * Update to version 20241031+git2.f85cbd70: * Allow virt_dbus_t to connect to virtd_t over unix_stream_socket (bsc#1232655) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-25=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * selinux-policy-targeted-20241031+git6.af97b0a3-slfo.1.1_1.1 * selinux-policy-devel-20241031+git6.af97b0a3-slfo.1.1_1.1 * cockpit-networkmanager-321-slfo.1.1_2.5 * selinux-policy-20241031+git6.af97b0a3-slfo.1.1_1.1 * cockpit-selinux-321-slfo.1.1_2.5 * container-selinux-2.211.0-slfo.1.1_1.5 * swtpm-selinux-0.9.0-slfo.1.1_2.5 * passt-selinux-20240906.6b38f07-slfo.1.1_1.6 * cockpit-storaged-321-slfo.1.1_2.5 * pcp-conf-6.2.0-slfo.1.1_1.3 * cockpit-system-321-slfo.1.1_2.5 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * cockpit-bridge-debuginfo-321-slfo.1.1_2.5 * libpcp_import1-6.2.0-slfo.1.1_1.3 * cockpit-debuginfo-321-slfo.1.1_2.5 * swtpm-0.9.0-slfo.1.1_2.5 * swtpm-debugsource-0.9.0-slfo.1.1_2.5 * libpcp3-debuginfo-6.2.0-slfo.1.1_1.3 * tpm2.0-abrmd-debugsource-3.0.0-slfo.1.1_1.3 * cockpit-bridge-321-slfo.1.1_2.5 * tpm2.0-abrmd-debuginfo-3.0.0-slfo.1.1_1.3 * passt-debugsource-20240906.6b38f07-slfo.1.1_1.6 * libpcp3-6.2.0-slfo.1.1_1.3 * cockpit-321-slfo.1.1_2.5 * libtss2-tcti-tabrmd0-debuginfo-3.0.0-slfo.1.1_1.3 * swtpm-debuginfo-0.9.0-slfo.1.1_2.5 * libpcp_import1-debuginfo-6.2.0-slfo.1.1_1.3 * libtss2-tcti-tabrmd0-3.0.0-slfo.1.1_1.3 * passt-20240906.6b38f07-slfo.1.1_1.6 * cockpit-ws-321-slfo.1.1_2.5 * pcp-debugsource-6.2.0-slfo.1.1_1.3 * passt-debuginfo-20240906.6b38f07-slfo.1.1_1.6 * cockpit-debugsource-321-slfo.1.1_2.5 * tpm2.0-abrmd-3.0.0-slfo.1.1_1.3 * cockpit-ws-debuginfo-321-slfo.1.1_2.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230961 * https://bugzilla.suse.com/show_bug.cgi?id=1232655 * https://bugzilla.suse.com/show_bug.cgi?id=1232753 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:36 -0000 Subject: SUSE-SU-2025:20229-1: moderate: Security update for pam Message-ID: <174902451680.12703.13198261633252766899@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:20229-1 Release Date: 2025-03-05T14:53:42Z Rating: moderate References: * bsc#1233078 Cross-References: * CVE-2024-10963 CVSS scores: * CVE-2024-10963 ( SUSE ): 8.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10963 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-10963 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-10963: Fixed improper hostname interpretation inpam_access that could lead to access control bypass (bsc#1233078) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-30=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * pam-1.6.1-slfo.1.1_2.1 * pam-debuginfo-1.6.1-slfo.1.1_2.1 * pam-debugsource-1.6.1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10963.html * https://bugzilla.suse.com/show_bug.cgi?id=1233078 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:45 -0000 Subject: SUSE-RU-2025:20238-1: moderate: Recommended update for systemd Message-ID: <174902452544.21522.8389023757887730720@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20238-1 Release Date: 2025-03-11T14:13:05Z Rating: moderate References: * bsc#1220338 * bsc#1229228 * bsc#1232227 * bsc#1232844 * bsc#1233752 * bsc#1234015 * bsc#1234313 * bsc#1234765 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that has eight fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Fixed agetty fails to open credentials directory (bsc#1229228) * hwdb: comment out the entry for Logitech MX Keys for Mac * test: answer 2nd mdadm --create question for compat with new version * core/unit-serialize: fix serialization of markers * locale-setup: do not load locale from environemnt when /etc/locale.conf is unchanged * core: fix assert when AddDependencyUnitFiles is called with invalid parameter * Fix systemd-network recommending libidn2-devel (bsc#1234765) * tpm2-util: Also retry unsealing after policy_pcr returns PCR_CHANGED (bsc#1233752 bsc#1234313) * Add a allow/denylist for reading sysfs attributes (bsc#1234015) * udev: add new builtin net_driver * udev-builtin-net_id: split-out pci_get_onboard_index() from dev_pci_onboard() * udev-builtin-net_id: split-out get_pci_slot_specifiers() * udev-builtin-net_id: introduce get_port_specifier() helper function * udev-builtin-net_id: split out get_dev_port() and make its failure critical * udev-builtin-net_id: split-out pci_get_hotplug_slot() and pci_get_hotplug_slot_from_address() * udev-builtin-net_id: return earlier when hotplug slot is not found * udev-builtin-net_id: skip non-directory entry earlier * udev-builtin-net_id: make names_xen() self-contained * udev-builtin-net_id: use sd_device_get_sysnum() to get index of netdevsim * udev-builtin-net_id: make names_netdevsim() self-contained * udev-builtin-net_id: make names_platform() self-contained * udev-builtin-net_id: make names_vio() self-contained * udev-builtin-net_id: make names_ccw() self-contained * udev-builtin-net_id: make dev_devicetree_onboard() self-contained * udev-builtin-net_id: make names_mac() self-contained * udev-builtin-net_id: split out get_ifname_prefix() * udev-builtin-net_id: swap arguments for streq() and friends * udev-builtin-net_id: drop unused value from NetNameType * Drop suppor for efivar SystemdOptions (bsc#1220338) Upstream deprecated it and plan to drop it in the future. Let's get ahead and drop it now as this feature is unlikely to be used on SUSE distros and it might be used to gain access to encrypted SLEM systems with unattended disk unlock and with secure boot disabled. * pid1: make clear that $WATCHDOG_USEC is set for the shutdown binary, noone else (bsc#1232227) * udev: skipping empty udev rules file while collecting the stats (bsc#1232844) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-39=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-39=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libudev1-254.23-slfo.1.1_1.1 * systemd-container-254.23-slfo.1.1_1.1 * systemd-coredump-debuginfo-254.23-slfo.1.1_1.1 * systemd-journal-remote-254.23-slfo.1.1_1.1 * systemd-experimental-254.23-slfo.1.1_1.1 * systemd-experimental-debuginfo-254.23-slfo.1.1_1.1 * systemd-container-debuginfo-254.23-slfo.1.1_1.1 * systemd-portable-254.23-slfo.1.1_1.1 * systemd-254.23-slfo.1.1_1.1 * libudev1-debuginfo-254.23-slfo.1.1_1.1 * systemd-journal-remote-debuginfo-254.23-slfo.1.1_1.1 * systemd-portable-debuginfo-254.23-slfo.1.1_1.1 * libsystemd0-254.23-slfo.1.1_1.1 * udev-254.23-slfo.1.1_1.1 * systemd-coredump-254.23-slfo.1.1_1.1 * systemd-debugsource-254.23-slfo.1.1_1.1 * udev-debuginfo-254.23-slfo.1.1_1.1 * libsystemd0-debuginfo-254.23-slfo.1.1_1.1 * systemd-debuginfo-254.23-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (ppc64le) * systemd-sysvcompat-254.23-slfo.1.1_1.1 * systemd-sysvcompat-debuginfo-254.23-slfo.1.1_1.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * systemd-devel-254.23-slfo.1.1_1.1 * systemd-debugsource-254.23-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220338 * https://bugzilla.suse.com/show_bug.cgi?id=1229228 * https://bugzilla.suse.com/show_bug.cgi?id=1232227 * https://bugzilla.suse.com/show_bug.cgi?id=1232844 * https://bugzilla.suse.com/show_bug.cgi?id=1233752 * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1234313 * https://bugzilla.suse.com/show_bug.cgi?id=1234765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:56 -0000 Subject: SUSE-RU-2025:20234-1: moderate: Recommended update for irqbalance Message-ID: <174902453646.21522.5214998726529867388@smelt2.prg2.suse.org> # Recommended update for irqbalance Announcement ID: SUSE-RU-2025:20234-1 Release Date: 2025-03-07T16:31:49Z Rating: moderate References: * bsc#1235248 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for irqbalance fixes the following issues: * Removed ProtectKernelTunables=yes from irqbalance.service to fix "Cannot change IRQ %d affinity: Read-only file system" errors. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-34=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * irqbalance-1.9.4.0.git+f8b8cdd-slfo.1.1_2.1 * irqbalance-debuginfo-1.9.4.0.git+f8b8cdd-slfo.1.1_2.1 * irqbalance-debugsource-1.9.4.0.git+f8b8cdd-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235248 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:46 -0000 Subject: SUSE-RU-2025:20237-1: important: Recommended update for helm Message-ID: <174902452642.21522.16043470819632421720@smelt2.prg2.suse.org> # Recommended update for helm Announcement ID: SUSE-RU-2025:20237-1 Release Date: 2025-03-11T10:04:56Z Rating: important References: * jsc#SLE-21196 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for helm fixes the following issues: helm is shipped in version 3.16.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-38=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * helm-debuginfo-3.16.3-slfo.1.1_1.1 * helm-3.16.3-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * helm-bash-completion-3.16.3-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/SLE-21196 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:58 -0000 Subject: SUSE-SU-2025:20233-1: moderate: Security update for openssl-3 Message-ID: <174902453874.21522.7029109819592161854@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:20233-1 Release Date: 2025-03-07T16:28:37Z Rating: moderate References: * bsc#1236136 Cross-References: * CVE-2024-13176 CVSS scores: * CVE-2024-13176 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-13176 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-13176 ( NVD ): 4.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation(bsc#1236136). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-31=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * openssl-3-debugsource-3.1.4-slfo.1.1_4.1 * openssl-3-3.1.4-slfo.1.1_4.1 * libopenssl3-3.1.4-slfo.1.1_4.1 * libopenssl3-debuginfo-3.1.4-slfo.1.1_4.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-slfo.1.1_4.1 * libopenssl-3-devel-3.1.4-slfo.1.1_4.1 * libopenssl-3-fips-provider-3.1.4-slfo.1.1_4.1 * openssl-3-debuginfo-3.1.4-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-13176.html * https://bugzilla.suse.com/show_bug.cgi?id=1236136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:47 -0000 Subject: SUSE-SU-2025:20227-1: important: Security update for kernel-firmware Message-ID: <174902452785.12703.12111721056455033395@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2025:20227-1 Release Date: 2025-02-26T13:57:21Z Rating: important References: * bsc#1219458 * bsc#1229069 * bsc#1229272 * bsc#1230007 * bsc#1230596 * bsc#1234027 Cross-References: * CVE-2023-31315 CVSS scores: * CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has five fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update to version 20241128 (git commit ea71da6f0690): * i915: Update Xe2LPD DMC to v2.24 * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * iwlwifi: add Bz-gf FW for core89-91 release * amdgpu: update smu 13.0.10 firmware * amdgpu: update sdma 6.0.3 firmware * amdgpu: update psp 13.0.10 firmware * amdgpu: update gc 11.0.3 firmware * amdgpu: add smu 13.0.14 firmware * amdgpu: add sdma 4.4.5 firmware * amdgpu: add psp 13.0.14 firmware * amdgpu: add gc 9.4.4 firmware * amdgpu: update vcn 3.1.2 firmware * amdgpu: update psp 13.0.5 firmware * amdgpu: update psp 13.0.8 firmware * amdgpu: update vega20 firmware * amdgpu: update vega12 firmware * amdgpu: update psp 14.0.4 firmware * amdgpu: update gc 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update vcn 4.0.0 firmware * amdgpu: update smu 13.0.0 firmware * amdgpu: update psp 13.0.0 firmware * amdgpu: update gc 11.0.0 firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update psp 13.0.11 firmware * amdgpu: update gc 11.0.4 firmware * amdgpu: update vcn 4.0.2 firmware * amdgpu: update psp 13.0.4 firmware * amdgpu: update gc 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update vpe 6.1.1 firmware * amdgpu: update vcn 4.0.6 firmware * amdgpu: update psp 14.0.1 firmware * amdgpu: update gc 11.5.1 firmware * amdgpu: update vcn 4.0.5 firmware * amdgpu: update psp 14.0.0 firmware * amdgpu: update gc 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update arcturus firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update sdma 4.4.2 firmware * amdgpu: update psp 13.0.6 firmware * amdgpu: update gc 9.4.3 firmware * amdgpu: update vcn 4.0.4 firmware * amdgpu: update psp 13.0.7 firmware * amdgpu: update gc 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * Update aliases from 6.13-rc1 * Update to version 20241125 (git commit 508d770ee6f3): * ice: update ice DDP wireless_edge package to 1.3.20.0 * ice: update ice DDP comms package to 1.3.52.0 * ice: update ice DDP package to ice-1.3.41.0 * amdgpu: update DMCUB to v9.0.10.0 for DCN314 * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * Update to version 20241121 (git commit 48bb90cceb88): * linux-firmware: Update AMD cpu microcode * xe: Update GUC to v70.36.0 for BMG, LNL * i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL * Update to version 20241119 (git commit 60cdfe1831e8): * iwlwifi: add Bz-gf FW for core91-69 release * Update aliases from 6.12 * Update to version 20241113 (git commit 1727aceef4d2): * qcom: venus-5.4: add venus firmware file for qcs615 * qcom: update venus firmware file for SC7280 * QCA: Add 22 bluetooth firmware nvm files for QCA2066 * Update to version 20241112 (git commit c57a0a42468b): * mediatek MT7922: update bluetooth firmware to 20241106163512 * mediatek MT7921: update bluetooth firmware to 20241106151414 * linux-firmware: update firmware for MT7922 WiFi device * linux-firmware: update firmware for MT7921 WiFi device * qcom: Add QDU100 firmware image files. * qcom: Update aic100 firmware files * dedup-firmware.sh: fix infinite loop for --verbose * rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7 * cnm: update chips&media wave521c firmware. * mediatek MT7920: update bluetooth firmware to 20241104091246 * linux-firmware: update firmware for MT7920 WiFi device * copy-firmware.sh: Run check_whence.py only if in a git repo * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * rtw89: 8852a: update fw to v0.13.36.2 * rtw88: Add firmware v52.14.0 for RTL8812AU * i915: Update Xe2LPD DMC to v2.23 * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * linux-firmware: update firmware for MT7925 WiFi device * WHENCE: Add sof-tolg for mt8195 * linux-firmware: Update firmware file for Intel BlazarI core * qcom: Add link for QCS6490 GPU firmware * qcom: update gpu firmwares for qcs615 chipset * cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops * mediatek: Add sof-tolg for mt8195 * Update to version 20241029 (git commit 048795eef350): * ath11k: move WCN6750 firmware to the device-specific subdir * xe: Update LNL GSC to v104.0.0.1263 * i915: Update MTL/ARL GSC to v102.1.15.1926 * Update to version 20241028 (git commit 987607d681cb): * amdgpu: DMCUB updates for various AMDGPU ASICs * i915: Add Xe3LPD DMC * cnm: update chips&media wave521c firmware. * linux-firmware: Add firmware for Cirrus CS35L41 * linux-firmware: Update firmware file for Intel BlazarU core * Makefile: error out of 'install' if COPYOPTS is set * Update to version 20241018 (git commit 2f0464118f40): * check_whence.py: skip some validation if git ls-files fails * qcom: Add Audio firmware for X1E80100 CRD/QCPs * amdgpu: DMCUB updates forvarious AMDGPU ASICs * brcm: replace NVRAM for Jetson TX1 * rtlwifi: Update firmware for RTL8192FU to v7.3 * make: separate installation and de-duplication targets * check_whence.py: check the permissions * Remove execute bit from firmware files * configure: remove unused file * rtl_nic: add firmware rtl8125d-1 * Update to version 20241014 (git commit 99f9c7ed1f4a): * iwlwifi: add gl/Bz FW for core91-69 release * iwlwifi: update ty/So/Ma firmwares for core91-69 release * iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops * cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops * linux-firmware: update firmware for en8811h 2.5G ethernet phy * QCA: Add Bluetooth firmwares for WCN785x with UART transport * Update to version 20241011 (git commit 808cba847c70): * mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher * ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596) * ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1 * ath12k: QCN9274 hw2.0: add board-2.bin * copy-firmware.sh: rename variables in symlink hanlding * copy-firmware.sh: remove no longer reachable test -L * copy-firmware.sh: remove no longer reachable test -f * copy-firmware.sh: call ./check_whence.py before parsing the file * copy-firmware.sh: warn if the destination folder is not empty * copy-firmware.sh: add err() helper * copy-firmware.sh: fix indentation * copy-firmware.sh: reset and consistently handle destdir * Revert "copy-firmware: Support additional compressor options" * copy-firmware.sh: flesh out and fix dedup-firmware.sh * Style update yaml files * editorconfig: add initial config file * check_whence.py: annotate replacement strings as raw * check_whence.py: LC_ALL=C sort -u the filelist * check_whence.py: ban link-to-a-link * check_whence.py: use consistent naming * Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin * tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31 * Drop obsoleted --ignore-duplicates option to copy-firmware.sh * Drop the ath12k workaround again * Update to version 20241010 (git commit d4e688aa74a0): * rtlwifi: Add firmware v39.0 for RTL8192DU * Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer firmware in this package instead) * update aliases * Update to version 20241004 (git commit bbb77872a8a7): * amdgpu: DMCUB DCN35 update * brcm: Add BCM4354 NVRAM for Jetson TX1 * brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram * Update to version 20241001 (git commit 51e5af813eaf): * linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920) * linux-firmware: add firmware for MT7920 * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update VCN 3.1.2 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update PSP 14.0.4 firmware * amdgpu: update GC 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update SMU 13.0.6 firmware * amdgpu: update SDMA 4.4.2 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * qcom: update gpu firmwares for qcm6490 chipset * mt76: mt7996: add firmware files for mt7992 chipset * mt76: mt7996: add firmware files for mt7996 chipset variants * qcom: add gpu firmwares for sa8775p chipset * rtw89: 8922a: add fw format-2 v0.35.42.1 * Pick up the fixed ath12k firmware from https://git.codelinaro.org/clo/ath- firmware/ath12k-firmware (bsc#1230596) * Update aliases from 6.11.x and 6.12-rc1 * Update to version 20240913 (git commit bcbdd1670bc3): * amdgpu: update DMCUB to v0.0.233.0 DCN351 * copy-firmware: Handle links to uncompressed files * WHENCE: Fix battmgr.jsn entry type * Temporary revert for ath12k firmware (bsc#1230596) * Update to version 20240912 (git commit 47c72fee8fe3): * amdgpu: Add VPE 6.1.3 microcode * amdgpu: add SDMA 6.1.2 microcode * amdgpu: Add support for PSP 14.0.4 * amdgpu: add GC 11.5.2 microcode * qcom: qcm6490: add ADSP and CDSP firmware * linux-firmware: Update firmware file for Intel Bluetooth Magnetor core * linux-firmware: Update firmware file for Intel BlazarU core * linux-firmware: Update firmware file for Intel Bluetooth Solar core * Update to version 20240911 (git commit 59def907425d): * rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272) * Update to version 20240910 (git commit 2a7b69a3fa30): * realtek: rt1320: Add patch firmware of MCU * i915: Update MTL DMC v2.23 * cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops * Update to version 20240903 (git commit 96af55bd3d0b): * amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007) * iwlwifi: add Bz FW for core89-58 release * rtl_nic: add firmware rtl8126a-3 * linux-firmware: update firmware for MT7921 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7921) * Update to version 20240830 (git commit d6c600d46981): * amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351 * qcom: vpu: restore compatibility with kernels before 6.6 * Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w updates for bsc#1234027) * amdgpu: DMCUB updates forvarious AMDGPU ASICs * rtw89: 8922a: add fw format-1 v0.35.41.0 * linux-firmware: update firmware for MT7925 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * rtl_bt: Add firmware and config files for RTL8922A * rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part * rtl_bt: de-dupe identical config.bin files * rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin * linux-firmware: Update AMD SEV firmware * linux-firmware: update firmware for MT7996 * Revert "i915: Update MTL DMC v2.22" * ath12k: WCN7850 hw2.0: update board-2.bin * ath11k: WCN6855 hw2.0: update to WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41 * ath11k: WCN6855 hw2.0: update board-2.bin * ath11k: QCA2066 hw2.1: add to WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3 * ath11k: QCA2066 hw2.1: add board-2.bin * ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1 * qcom: vpu: add video firmware for sa8775p * amdgpu: DMCUB updates for various AMDGPU ASICs * Update to version 20240809 (git commit 36db650dae03): * qcom: update path for video firmware for vpu-1/2/3.0 * QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642 * rtw89: 8852c: add fw format-1 v0.27.97.0 * rtw89: 8852bt: add firmware 0.29.91.0 * amdgpu: Update ISP FW for isp v4.1.1 * mediatek: Update mt8195 SOF firmware * amdgpu: DMCUB updates for DCN314 * xe: First GuC release v70.29.2 for BMG * xe: Add GuC v70.29.2 for LNL * i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL * i915: Update MTL DMC v2.22 * i915: update MTL GSC to v102.0.10.1878 * xe: Add BMG HuC 8.2.10 * xe: Add GSC 104.0.0.1161 for LNL * xe: Add LNL HuC 9.4.13 * i915: update DG2 HuC to v7.10.16 * amdgpu: Update ISP FW for isp v4.1.1 * QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-20=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-firmware-media-20241128-slfo.1.1_1.1 * kernel-firmware-ath12k-20241128-slfo.1.1_1.1 * kernel-firmware-sound-20241128-slfo.1.1_1.1 * kernel-firmware-bluetooth-20241128-slfo.1.1_1.1 * kernel-firmware-usb-network-20241128-slfo.1.1_1.1 * kernel-firmware-network-20241128-slfo.1.1_1.1 * kernel-firmware-serial-20241128-slfo.1.1_1.1 * kernel-firmware-ath11k-20241128-slfo.1.1_1.1 * kernel-firmware-dpaa2-20241128-slfo.1.1_1.1 * kernel-firmware-amdgpu-20241128-slfo.1.1_1.1 * kernel-firmware-bnx2-20241128-slfo.1.1_1.1 * kernel-firmware-liquidio-20241128-slfo.1.1_1.1 * kernel-firmware-brcm-20241128-slfo.1.1_1.1 * kernel-firmware-realtek-20241128-slfo.1.1_1.1 * kernel-firmware-i915-20241128-slfo.1.1_1.1 * kernel-firmware-qcom-20241128-slfo.1.1_1.1 * kernel-firmware-nfp-20241128-slfo.1.1_1.1 * kernel-firmware-nvidia-20241128-slfo.1.1_1.1 * kernel-firmware-prestera-20241128-slfo.1.1_1.1 * kernel-firmware-platform-20241128-slfo.1.1_1.1 * kernel-firmware-qlogic-20241128-slfo.1.1_1.1 * kernel-firmware-atheros-20241128-slfo.1.1_1.1 * kernel-firmware-mediatek-20241128-slfo.1.1_1.1 * kernel-firmware-intel-20241128-slfo.1.1_1.1 * kernel-firmware-mellanox-20241128-slfo.1.1_1.1 * kernel-firmware-mwifiex-20241128-slfo.1.1_1.1 * kernel-firmware-iwlwifi-20241128-slfo.1.1_1.1 * kernel-firmware-ueagle-20241128-slfo.1.1_1.1 * kernel-firmware-ti-20241128-slfo.1.1_1.1 * kernel-firmware-all-20241128-slfo.1.1_1.1 * kernel-firmware-radeon-20241128-slfo.1.1_1.1 * kernel-firmware-marvell-20241128-slfo.1.1_1.1 * kernel-firmware-ath10k-20241128-slfo.1.1_1.1 * ucode-amd-20241128-slfo.1.1_1.1 * kernel-firmware-chelsio-20241128-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31315.html * https://bugzilla.suse.com/show_bug.cgi?id=1219458 * https://bugzilla.suse.com/show_bug.cgi?id=1229069 * https://bugzilla.suse.com/show_bug.cgi?id=1229272 * https://bugzilla.suse.com/show_bug.cgi?id=1230007 * https://bugzilla.suse.com/show_bug.cgi?id=1230596 * https://bugzilla.suse.com/show_bug.cgi?id=1234027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:48 -0000 Subject: SUSE-SU-2025:20236-1: moderate: Security update for glibc Message-ID: <174902452837.21522.4354144859371645306@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20236-1 Release Date: 2025-03-07T17:05:51Z Rating: moderate References: * bsc#1236282 Cross-References: * CVE-2025-0395 CVSS scores: * CVE-2025-0395 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-0395 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0395 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2025-0395: Fixed buffer overflow in the assert() function (bsc#1236282). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-32=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * glibc-devel-2.38-slfo.1.1_3.1 * glibc-locale-base-2.38-slfo.1.1_3.1 * glibc-debugsource-2.38-slfo.1.1_3.1 * glibc-2.38-slfo.1.1_3.1 * glibc-locale-base-debuginfo-2.38-slfo.1.1_3.1 * glibc-debuginfo-2.38-slfo.1.1_3.1 * glibc-locale-2.38-slfo.1.1_3.1 * glibc-devel-debuginfo-2.38-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0395.html * https://bugzilla.suse.com/show_bug.cgi?id=1236282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:04 -0000 Subject: SUSE-SU-2025:20232-1: important: Security update for glib2 Message-ID: <174902454445.21522.11963938052184645645@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20232-1 Release Date: 2025-03-05T15:01:46Z Rating: important References: * bsc#1233282 Cross-References: * CVE-2024-52533 CVSS scores: * CVE-2024-52533 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2024-52533: Fixed a single byte buffer overflow in set_connect_msg() (bsc#1233282) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-28=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libglib-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * libgmodule-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * libgobject-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * libgmodule-2_0-0-2.78.6-slfo.1.1_2.1 * glib2-debugsource-2.78.6-slfo.1.1_2.1 * libgio-2_0-0-debuginfo-2.78.6-slfo.1.1_2.1 * libgobject-2_0-0-2.78.6-slfo.1.1_2.1 * libglib-2_0-0-2.78.6-slfo.1.1_2.1 * libgio-2_0-0-2.78.6-slfo.1.1_2.1 * glib2-tools-debuginfo-2.78.6-slfo.1.1_2.1 * glib2-tools-2.78.6-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52533.html * https://bugzilla.suse.com/show_bug.cgi?id=1233282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:06 -0000 Subject: SUSE-SU-2025:20231-1: important: Security update for pam_u2f Message-ID: <174902454679.21522.7585507144711022420@smelt2.prg2.suse.org> # Security update for pam_u2f Announcement ID: SUSE-SU-2025:20231-1 Release Date: 2025-03-05T14:55:47Z Rating: important References: * bsc#1233517 Cross-References: * CVE-2025-23013 CVSS scores: * CVE-2025-23013 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-23013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23013 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for pam_u2f fixes the following issues: * CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-29=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * pam_u2f-debugsource-1.3.0-slfo.1.1_2.1 * pam_u2f-debuginfo-1.3.0-slfo.1.1_2.1 * pam_u2f-1.3.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23013.html * https://bugzilla.suse.com/show_bug.cgi?id=1233517 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:53 -0000 Subject: SUSE-SU-2025:20235-1: moderate: Security update for pcp Message-ID: <174902453366.21522.4136327080285878155@smelt2.prg2.suse.org> # Security update for pcp Announcement ID: SUSE-SU-2025:20235-1 Release Date: 2025-03-07T16:42:41Z Rating: moderate References: * bsc#1217783 * bsc#1217826 * bsc#1222121 * bsc#1230551 * bsc#1230552 Cross-References: * CVE-2023-6917 * CVE-2024-3019 * CVE-2024-45769 * CVE-2024-45770 CVSS scores: * CVE-2023-6917 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6917 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2023-6917 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-3019 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45769 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45770 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-45770 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45770 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities and has one fix can now be installed. ## Description: This update for pcp fixes the following issues: * CVE-2024-45769: Fixed `pmcd` heap corruption through metric pmstore operations (bsc#1230551). * CVE-2024-45770: Fixed `pmpost` symlink attack allowing escalating `pcp` to `root` user (bsc#1230552). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-33=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libpcp_import1-6.2.0-slfo.1.1_3.1 * libpcp_import1-debuginfo-6.2.0-slfo.1.1_3.1 * libpcp3-6.2.0-slfo.1.1_3.1 * pcp-debugsource-6.2.0-slfo.1.1_3.1 * libpcp3-debuginfo-6.2.0-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (noarch) * pcp-conf-6.2.0-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6917.html * https://www.suse.com/security/cve/CVE-2024-3019.html * https://www.suse.com/security/cve/CVE-2024-45769.html * https://www.suse.com/security/cve/CVE-2024-45770.html * https://bugzilla.suse.com/show_bug.cgi?id=1217783 * https://bugzilla.suse.com/show_bug.cgi?id=1217826 * https://bugzilla.suse.com/show_bug.cgi?id=1222121 * https://bugzilla.suse.com/show_bug.cgi?id=1230551 * https://bugzilla.suse.com/show_bug.cgi?id=1230552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:09 -0000 Subject: SUSE-SU-2025:20224-1: moderate: Security update for cloud-regionsrv-client, python-toml Message-ID: <174902454958.12703.16536196471186469394@smelt2.prg2.suse.org> # Security update for cloud-regionsrv-client, python-toml Announcement ID: SUSE-SU-2025:20224-1 Release Date: 2025-02-20T12:44:50Z Rating: moderate References: * bsc#1222985 * bsc#1227308 * bsc#1229137 * bsc#1229472 * bsc#1230615 * bsc#1232770 * bsc#1233333 * bsc#1234050 Affected Products: * SUSE Linux Micro 6.1 An update that has eight fixes can now be installed. ## Description: This update for cloud-regionsrv-client, python-toml contains the following fixes: cloud-regionsrv-client: \- Update to 10.3.11 (bsc#1234050) \+ Send registration code for the extensions, not only base product * Update to 10.3.9: (bsc#1234050) * Send registration code for the extensions, not only base product * Update to 10.3.8: (bsc#1233333) * Fix the package requirements for cloud-regionsrv-client * Follow changes to suseconnect error reporting from stdout to stderr * Update to 10.3.7: (bsc#1232770) * Fix the product triplet for LTSS, it is always SLES-LTSS, not $BASEPRODUCT- LTSS * Update to 10.3.6: (jsc#PCT-471, bsc#1230615) * Fix sudo setup ~ permissions cloudguestregistryauth ~ directory ownership /etc/sudoers.d * spec file ~ Remove traces of registry related entries on SLE 12 * Forward port ~ fix for sles12 disable registry ~ fix for sles12 no trans_update * Deregister non free extensions at registercloudguest --clean * Fix registry cleanup at registercloudguest --clean, don't remove files * Prevent duplicate search entries in registry setup * Update EC2 plugin to 1.0.5 * Switch to using the region endpoint from IMDS to determine the region instead of deriving the data from the availability zone * Update to 10.3.5: * Update spec file to build in all code streams and have proper dependencies. * Update to 10.3.4: * Modify the message when network access over a specific IP version does not work. This is an informational message and should not look like an error * Inform the user that LTSS registration takes a little longer * fix for sles12 no transactional update: * SLE 12 family has no products with transactional-update we do not need to look for this condition * From 10.3.3: (bsc#1229472) * Handle changes in process structure to properly identify the running zypper parent process and only check for 1 PID * From 10.3.2: * Remove rgnsrv-clnt-fix-docker-setup patch included upstream * From 10.3.1: (jsc#PCT-400) * Add support for LTSS registration * Add fix for sles12 disable registry issue: ~ No container support in SLE 12 * Add fix for docker setup: (bsc#1229137) * The entry for the update infrastructure registry mirror was written incorrectly causing docker daemon startup to fail. * Update to version 10.3.0: (bsc#1227308, bsc#1222985) * Add support for sidecar registry Podman and rootless Docker support to set up the necessary configuration for the container engines to run as defined * Add running command as root through sudoers file python-toml: \- Includes python311-toml as dependency for cloud-regionsrv-client ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-18=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1 * cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1 * cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1 * cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1 * cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1 * cloud-regionsrv-client-10.3.11-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222985 * https://bugzilla.suse.com/show_bug.cgi?id=1227308 * https://bugzilla.suse.com/show_bug.cgi?id=1229137 * https://bugzilla.suse.com/show_bug.cgi?id=1229472 * https://bugzilla.suse.com/show_bug.cgi?id=1230615 * https://bugzilla.suse.com/show_bug.cgi?id=1232770 * https://bugzilla.suse.com/show_bug.cgi?id=1233333 * https://bugzilla.suse.com/show_bug.cgi?id=1234050 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:13 -0000 Subject: SUSE-SU-2025:20229-1: moderate: Security update for pam Message-ID: <174902455398.21522.5206247884134074401@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:20229-1 Release Date: 2025-03-05T14:53:42Z Rating: moderate References: * bsc#1233078 Cross-References: * CVE-2024-10963 CVSS scores: * CVE-2024-10963 ( SUSE ): 8.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10963 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-10963 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-10963: Fixed improper hostname interpretation inpam_access that could lead to access control bypass (bsc#1233078) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-30=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * pam-debugsource-1.6.1-slfo.1.1_2.1 * pam-1.6.1-slfo.1.1_2.1 * pam-debuginfo-1.6.1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10963.html * https://bugzilla.suse.com/show_bug.cgi?id=1233078 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:58 -0000 Subject: SUSE-SU-2025:20225-1: critical: Security update for pam_pkcs11 Message-ID: <174902453806.12703.6795467674016419461@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:20225-1 Release Date: 2025-02-26T13:36:07Z Rating: critical References: * bsc#1236314 Cross-References: * CVE-2025-24531 CVSS scores: * CVE-2025-24531 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-24531 ( SUSE ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-24531: Fixed regression in version 0.6.12 returning PAM_IGNORE in many situations with possible authentication bypass (bsc#1236314). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-22=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64) * pam_pkcs11-debugsource-0.6.12-slfo.1.1_2.1 * pam_pkcs11-debuginfo-0.6.12-slfo.1.1_2.1 * pam_pkcs11-0.6.12-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.12-slfo.1.1_3.1 * pam_pkcs11-debuginfo-0.6.12-slfo.1.1_3.1 * pam_pkcs11-0.6.12-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24531.html * https://bugzilla.suse.com/show_bug.cgi?id=1236314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:11 -0000 Subject: SUSE-SU-2025:20230-1: moderate: Security update for haproxy Message-ID: <174902455163.21522.363397403976561582@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:20230-1 Release Date: 2025-03-05T14:55:47Z Rating: moderate References: * bsc#1233973 Cross-References: * CVE-2024-53008 CVSS scores: * CVE-2024-53008 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-53008 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-53008 ( NVD ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: Update to version 2.8.11+git0.01c1056a4: * VUL-0: CVE-2024-53008: haproxy: HTTP/3 request smuggling via malformed HTTP headers forwarded to a HTTP/1.1 non-compliant back-end server (bsc#1233973) * BUG/MINOR: cfgparse-listen: fix option httpslog override warning message * BUG/MEDIUM: promex: Wait to have the request before sending the response * BUG/MEDIUM: cache/stats: Wait to have the request before sending the response * BUG/MEDIUM: queue: implement a flag to check for the dequeuing * BUG/MINOR: clock: validate that now_offset still applies to the current date * BUG/MINOR: clock: make time jump corrections a bit more accurate * BUG/MINOR: polling: fix time reporting when using busy polling * BUG/MAJOR: mux-h1: Wake SC to perform 0-copy forwarding in CLOSING state * BUG/MEDIUM: pattern: prevent UAF on reused pattern expr * BUG/MINOR: pattern: prevent const sample from being tampered in pat_match_beg() * BUG/MEDIUM: clock: detect and cover jumps during execution * REGTESTS: fix random failures with wrong_ip_port_logging.vtc under load * DOC: configuration: place the HAPROXY_HTTP_LOG_FMT example on the correct line * BUG/MINOR: pattern: do not leave a leading comma on "set" error messages * BUG/MINOR: pattern: pat_ref_set: return 0 if err was found * BUG/MINOR: pattern: pat_ref_set: fix UAF reported by coverity * BUG/MINOR: stconn: Request to send something to be woken up when the pipe is full * BUG/MEDIUM: mux-pt/mux-h1: Release the pipe on connection error on sending path * BUG/MEDIUM: clock: also update the date offset on time jumps * DOC: config: correct the table for option tcplog * BUG/MINOR: h3: properly reject too long header responses * BUG/MINOR: proto_uxst: delete fd from fdtab if listen() fails * BUG/MINOR: mux-quic: do not send too big MAX_STREAMS ID * REGTESTS: mcli: test the pipelined commands on master CLI * BUG/MEDIUM: mworker/cli: fix pipelined modes on master CLI * MINOR: channel: implement ci_insert() function * BUG/MINOR: proto_tcp: keep error msg if listen() fails * BUG/MINOR: proto_tcp: delete fd from fdtab if listen() fails * BUG/MINOR: quic/trace: make quic_conn_enc_level_init() emit NEW not CLOSE * BUG/MINOR: trace/quic: make "qconn" selectable as a lockon criterion * BUG/MINOR: trace: automatically start in waiting mode with "start " * BUG/MEDIUM: trace: fix null deref in lockon mechanism since TRACE_ENABLED() * BUG/MINOR: trace/quic: permit to lock on frontend/connect/session etc * BUG/MINOR: trace/quic: enable conn/session pointer recovery from quic_conn * BUG/MINOR: fcgi-app: handle a possible strdup() failure * BUG/MEDIUM: mux-h2: Propagate term flags to SE on error in h2s_wake_one_stream * BUG/MEDIUM: h2: Only report early HTX EOM for tunneled streams * BUG/MEDIUM: http-ana: Report error on write error waiting for the response * BUG/MEDIUM: quic: prevent conn freeze on 0RTT undeciphered content * BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was set * BUG/MEDIUM: mux-h1: Properly handle empty message when an error is triggered * BUG/MEDIUM: cli: Always release back endpoint between two commands on the mcli * BUG/MEDIUM: stream: Prevent mux upgrades if client connection is no longer ready * BUG/MEDIUM: init: fix fd_hard_limit default in compute_ideal_maxconn * MEDIUM: init: set default for fd_hard_limit via DEFAULT_MAXFD (take #2) * BUG/MEDIUM: queue: deal with a rare TOCTOU in assign_server_and_queue() * MINOR: queue: add a function to check for TOCTOU after queueing * BUG/MEDIUM: jwt: Clear SSL error queue on error when checking the signature * BUG/MINOR: quic: Lack of precision when computing K (cubic only cc) * BUG/MINOR: cli: Atomically inc the global request counter between CLI commands * BUG/MINOR: server: Don't warn fallback IP is used during init-addr resolution * BUG/MINOR: stick-table: fix crash for src_inc_gpc() without stkcounter * DOC: config: improve the http-keep-alive section * DOC: configuration: issuers-chain-path not compatible with OCSP * BUG/MEDIUM: ssl_sock: fix deadlock in ssl_sock_load_ocsp() on error path * BUG/MEDIUM: debug/cli: fix "show threads" crashing with low thread counts * BUG/MINOR: session: Eval L4/L5 rules defined in the default section * BUG/MEDIUM: bwlim: Be sure to never set the analyze expiration date in past * BUG/MEDIUM: spoe: Be sure to create a SPOE applet if none on the current thread * BUG/MEDIUM: h1: Reject empty Transfer-encoding header * BUG/MINOR: h1: Reject empty coding name as last transfer-encoding value * BUG/MINOR: h1: Fail to parse empty transfer coding names * BUG/MINOR: jwt: fix variable initialisation * DOC: configuration: update maxconn description * BUG/MINOR: jwt: don't try to load files with HMAC algorithm * MEDIUM: ssl: initialize the SSL stack explicitely * DOC: configuration: more details about the master-worker mode * BUG/MEDIUM: quic: fix possible exit from qc_check_dcid() without unlocking * BUG/MINOR: quic: fix race-condition on trace for CID retrieval * BUG/MINOR: quic: fix race condition in qc_check_dcid() * BUG/MEDIUM: quic: fix race-condition in quic_get_cid_tid() * BUG/MEDIUM: h3: ensure the ":scheme" pseudo header is totally valid * BUG/MEDIUM: h3: ensure the ":method" pseudo header is totally valid * MINOR: activity: make the memory profiling hash size configurable at build time * BUG/MINOR: hlua: report proper context upon error in hlua_cli_io_handler_fct() * BUG/MINOR: quic: fix BUG_ON() on Tx pkt alloc failure * BUG/MINOR: mux-quic: fix crash on qcs SD alloc failure * BUG/MINOR: h3: fix crash on STOP_SENDING receive after GOAWAY emission * DOC: api/event_hdl: small updates, fix an example and add some precisions * SCRIPTS: git-show-backports: do not truncate git-show output * DOC: configuration: fix alphabetical order of bind options * DOC: management: rename show stats domain cli "dns" to "resolvers" * DOC/MINOR: management: add missed -dR and -dv options * BUG/MINOR: proxy: fix header_unique_id leak on deinit() * BUG/MINOR: proxy: fix source interface and usesrc leaks on deinit() * BUG/MINOR: proxy: fix dyncookie_key leak on deinit() * BUG/MINOR: proxy: fix check_{command,path} leak on deinit() * BUG/MINOR: proxy: fix log_tag leak on deinit() * BUG/MINOR: proxy: fix server_id_hdr_name leak on deinit() * BUG/MINOR: quic: fix computed length of emitted STREAM frames * [RELEASE] Released version 2.8.10 * BUG/MEDIUM: quic: don't blindly rely on unaligned accesses * BUG/MAJOR: connection: fix server used_conns with H2 + reuse safe * BUG/MEDIUM: http_ana: ignore NTLM for reuse aggressive/always and no H1 * BUG/MAJOR: server: do not delete srv referenced by session * MINOR: session: rename private conns elements * BUG/MEDIUM: quic: fix connection freeze on post handshake * BUG/MEDIUM: server: fix dynamic servers initial settings * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning * BUG/MINOR: activity: fix Delta_calls and Delta_bytes count * BUG/MINOR: ssl/ocsp: init callback func ptr as NULL * CLEANUP: ssl/ocsp: readable ifdef in ssl_sock_load_ocsp * BUILD: fd: errno is also needed without poll() * CI: scripts: fix build of vtest regarding option -C * REGTESTS: acl_cli_spaces: avoid a warning caused by undefined logs * DOC: config: fix incorrect section reference about custom log format * DOC: quic: specify that connection migration is not supported * BUG/MINOR: server: Don't reset resolver options on a new default-server line * BUG/MINOR: http-htx: Support default path during scheme based normalization * BUG/MINOR: quic: adjust restriction for stateless reset emission * MEDIUM: config: prevent communication with privileged ports * BUILD: quic: fix unused variable warning when threads are disabled * BUG/MEDIUM: mux-quic: Create sedesc in same time of the QUIC stream * BUG/MEDIUM: quic_tls: prevent LibreSSL < 4.0 from negotiating CHACHA20_POLY1305 * BUG/MAJOR: quic: Crash with TLS_AES_128_CCM_SHA256 (libressl only) * BUG/MINOR: connection: parse PROXY TLV for LOCAL mode * DOC: configuration: update the crt-list documentation * CLEANUP: ssl/cli: remove unused code in dump_crtlist_conf * BUG/MINOR: stats: Don't state the 303 redirect response is chunked * BUG/MINOR: htpp-ana/stats: Specify that HTX redirect messages have a C-L header * BUG/MEDIUM: fd: prevent memory waste in fdtab array * BUILD: stick-tables: better mark the stktable_data as 32-bit aligned * BUG/MEDIUM: h1: Reject CONNECT request if the target has a scheme * BUG/MINOR: h1: Check authority for non-CONNECT methods only if a scheme is found * BUG/MEDIUM: stick-tables: properly mark stktable_data as packed * BUG/MEDIUM: htx: mark htx_sl as packed since it may be realigned * BUG/MINOR: qpack: fix error code reported on QPACK decoding failure * BUG/MINOR: mux-quic: fix error code on shutdown for non HTTP/3 * BUG/MINOR: log: smp_rgs array issues with inherited global log directives * BUG/MINOR: log: keep the ref in dup_logger() * MINOR: log: add dup_logsrv() helper function * DOC: lua: fix filters.txt file location * BUG/MINOR: haproxy: only tid 0 must not sleep if got signal * BUILD: clock: improve check for pthread_getcpuclockid() * BUG/MINOR: mworker: reintroduce way to disable seamless reload with -x /dev/null * BUG/MINOR: h1: fix detection of upper bytes in the URI * BUG/MINOR: backend: use cum_sess counters instead of cum_conn * BUG/MINOR: fd: my_closefrom() on Linux could skip contiguous series of sockets * BUG/MINOR: sock: handle a weird condition with connect() * BUG/MINOR: stconn: Fix sc_mux_strm() return value * BUG/MEDIUM: cache: Vary not working properly on anything other than accept- encoding * BUG/MINOR: server: fix slowstart behavior * BUG/MEDIUM: peers: Fix exit condition when max-updates-at-once is reached * BUG/MEDIUM: spoe: Always retry when an applet fails to send a frame * BUG/MEDIUM: applet: Fix applet API to put input data in a buffer * BUG/MEDIUM: evports: do not clear returned events list on signal * BUG/MEDIUM: stconn: Don't forward channel data if input data must be filtered * BUG/MEDIUM: grpc: Fix several unaligned 32/64 bits accesses * MINOR: net_helper: Add support for floats/doubles. * CI: revert kernel addr randomization introduced in 3a0fc864 * BUG/MEDIUM: peers/trace: fix crash when listing event types * BUG/MINOR: debug: make sure DEBUG_STRICT=0 does work as documented * BUG/MINOR: http-ana: Fix TX_L7_RETRY and TX_D_L7_RETRY values * BUG/MEDIUM: http-ana: Deliver 502 on keep-alive for fressh server connection * CLEANUP: log: lf_text_len() returns a pointer not an integer * BUG/MINOR: log: invalid snprintf() usage in sess_build_logline() * BUG/MINOR: tools/log: invalid encode_{chunk,string} usage * BUG/MINOR: log: fix lf_text_len() truncate inconsistency * BUG/MINOR: listener: always assign distinct IDs to shards * BUG/MINOR: cli: Report an error to user if command or payload is too big * [RELEASE] Released version 2.8.9 * BUILD: proxy: Replace free_logformat_list() to manually release log-format * [RELEASE] Released version 2.8.8 * BUG/MINOR: proxy: fix logformat expression leak in use_backend rules * BUG/MINOR: backend: properly handle redispatch 0 * BUG/MINOR: server: ignore 'enabled' for dynamic servers * BUG/MEDIUM: cli: Warn if pipelined commands are delimited by a \n * MINOR: cli: Remove useless loop on commands to find unescaped semi-colon * MINOR: server: allow cookie for dynamic servers * BUG/MINOR: server: fix persistence cookie for dynamic servers * BUG/MINOR: ssl: Detect more 'ocsp-update' incompatibilities * BUG/MINOR: ssl: Wrong ocsp-update "incompatibility" error message * BUG/MINOR: server: 'source' interface ignored from 'default-server' directive * OPTIM: http_ext: avoid useless copy in http_7239_extract_{ipv4,ipv6} * BUG/MEDIUM: mux-fcgi: Properly handle EOM flag on end-of-trailers HTX block * BUG/MINOR: mux-quic: close all QCS before freeing QCC tasklet * BUG/MEDIUM: ssl: Fix crash in ocsp-update log function * BUG/MINOR: session: ensure conn owner is set after insert into session * BUG/MEDIUM: spoe: Return an invalid frame on recv if size is too small * CI: temporarily adjust kernel entropy to work with ASAN/clang * BUG/MINOR: spoe: Be sure to be able to quickly close IDLE applets on soft- stop * BUG/MEDIUM: spoe: Don't rely on stream's expiration to detect processing timeout * BUG/MINOR: listener: Don't schedule frontend without task in listener_release() * BUG/MINOR: listener: Wake proxy's mngmt task up if necessary on session release * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread (2nd try) * MINOR: hlua: use accessors for stream hlua ctx * DEBUG: lua: precisely identify if stream is stuck inside lua or not * BUG/MINOR: hlua: fix missing lock in hlua_filter_delete() * BUG/MINOR: hlua: missing lock in hlua_filter_new() * BUG/MINOR: hlua: segfault when loading the same filter from different contexts * BUG/MINOR: ssl: fix possible ctx memory leak in sample_conv_aes_gcm() * DOC: configuration: clarify ciphersuites usage (V2) * BUILD: solaris: fix compilation errors * BUG/MINOR: cfgparse: report proper location for log-format-sd errors * BUG/MINOR: ssl/cli: typo in new ssl crl-file CLI description * CI: skip scheduled builds on forks * BUG/MINOR: sink: fix a race condition in the TCP log forwarding code * BUG/MINOR: hlua: don't call ha_alert() in hlua_event_subscribe() * BUG/MAJOR: hlua: improper lock usage with hlua_ctx_resume() * BUG/MEDIUM: hlua: improper lock usage with SET_SAFE_LJMP() * BUG/MINOR: hlua: improper lock usage in hlua_filter_new() * BUG/MINOR: hlua: improper lock usage in hlua_filter_callback() * BUG/MINOR: hlua: fix possible crash in hlua_filter_new() under load * BUG/MINOR: hlua: don't use lua_tostring() from unprotected contexts * BUG/MINOR: hlua: fix unsafe lua_tostring() usage with empty stack * BUG/MINOR: tools: seed the statistical PRNG slightly better * MINOR: hlua: Be able to disable logging from lua * BUG/MINOR: hlua: Fix log level to the right value when set via TXN:set_loglevel * BUG/MINOR: config/quic: Alert about PROXY protocol use on a QUIC listener * DOC: configuration: clarify ciphersuites usage * LICENSE: http_ext: fix GPL license version * LICENSE: event_hdl: fix GPL license version * BUG/MINOR: ssl/cli: duplicate cleaning code in cli_parse_del_crtlist * BUG/MINOR: ist: only store NUL byte on succeeded alloc * BUG/MINOR: quic: fix output of show quic * BUG/MAJOR: server: fix stream crash due to deleted server * BUG/MINOR: stats: drop srv refcount on early release * BUG/MINOR: ist: allocate nul byte on istdup * MINOR: quic: warn on bind on multiple addresses if no IP_PKTINFO support * DOC: quic: fix recommandation for bind on multiple address * BUG/MEDIUM: quic: fix transient send error with listener socket * BUG/MEDIUM: hlua: Don't loop if a lua socket does not consume received data * BUG/MEDIUM: hlua: Be able to garbage collect uninitialized lua sockets * BUG/MEDIUM: applet: Immediately free appctx on early error * DOC: quic: Missing tuning setting in "Global parameters" * BUG/MINOR: qpack: reject invalid dynamic table capacity * BUG/MINOR: qpack: reject invalid increment count decoding * BUG/MINOR: quic: reject HANDSHAKE_DONE as server * BUG/MINOR: quic: reject unknown frame type * BUG/MAJOR: promex: fix crash on deleted server * MINOR: connection: add sample fetches to report per-connection glitches * MINOR: mux-h2: implement MUX_CTL_GET_GLITCHES * MINOR: connection: add a new mux_ctl to report number of connection glitches * MEDIUM: mux-h2: allow to set the glitches threshold to kill a connection * MINOR: mux-h2: always use h2c_report_glitch() * MINOR: mux-h2: count late reduction of INITIAL_WINDOW_SIZE as a glitch * MINOR: mux-h2: count excess of CONTINUATION frames as a glitch * BUG/MINOR: mux-h2: count rejected DATA frames against the connection's flow control * MINOR: mux-h2: add a counter of "glitches" on a connection * [RELEASE] Released version 2.8.7 * BUG/MAJOR: ssl/ocsp: crash with ocsp when old process exit or using ocsp CLI * [RELEASE] Released version 2.8.6 * DEV: makefile: fix POSIX compatibility for "range" target * DEV: makefile: add a new "range" target to iteratively build all commits * CI: Update to actions/cache at v4 * DOC: internal: update missing data types in peers-v2.0.txt * DOC: install: recommend pcre2 * DOC: httpclient: add dedicated httpclient section * DOC: configuration: clarify http-request wait-for-body * BUILD: address a few remaining calloc(size, n) cases * BUG/MINOR: ext-check: cannot use without preserve-env * MINOR: ext-check: add an option to preserve environment variables * BUG/MINOR: diag: run the final diags before quitting when using -c * BUG/MINOR: diag: always show the version before dumping a diag warning * MINOR: errors: ha_alert() and ha_warning() uses warn_exec_path() * MINOR: quic: Add a counter for reordered packets * MINOR: quic: Dynamic packet reordering threshold * MINOR: quic: Update K CUBIC calculation (RFC 9438) * BUG/MEDIUM: quic: Wrong K CUBIC calculation. * MINOR: quic: Stop using 1024th of a second. * BUG/MINOR: quic: fix possible integer wrap around in cubic window calculation * CLEANUP: quic: Code clarifications for QUIC CUBIC (RFC 9438) * BUG/MINOR: quic: Wrong ack ranges handling when reaching the limit. * BUG/MEDIUM: quic: fix crash on invalid qc_stream_buf_free() BUG_ON * BUG/MEDIUM: qpack: allow 6xx..9xx status codes * BUG/MEDIUM: h3: do not crash on invalid response status code * MINOR: h3: add traces for stream sending function * BUG/MEDIUM: quic: remove unsent data from qc_stream_desc buf * MINOR: quic: extract qc_stream_buf free in a dedicated function * MINOR: quic: Stop hardcoding a scale shifting value (CUBIC_BETA_SCALE_FACTOR_SHIFT) * CLEANUP: quic: Remove unused CUBIC_BETA_SCALE_FACTOR_SHIFT macro. * BUG/MEDIUM: mux-quic: report early error on stream * BUG/MINOR: h3: fix checking on NULL Tx buffer * BUG/MEDIUM: ssl: Fix crash when calling "update ssl ocsp-response" when an update is ongoing * REGTESTS: ssl: Add OCSP related tests * REGTESTS: ssl: Fix empty line in cli command input * BUG/MINOR: ssl: Reenable ocsp auto-update after an "add ssl crt-list" * BUG/MINOR: ssl: Destroy ckch instances before the store during deinit * BUG/MEDIUM: ocsp: Separate refcount per instance and per store * MINOR: ssl: Use OCSP_CERTID instead of ckch_store in ckch_store_build_certid * BUG/MINOR: ssl: Clear the ckch instance when deleting a crt-list line * BUG/MINOR: ssl: Duplicate ocsp update mode when dup'ing ckch * BUG/MINOR: ssl: Fix error message after ssl_sock_load_ocsp call * BUG/MAJOR: ssl_sock: Always clear retry flags in read/write functions * BUG/MEDIUM: h1: always reject the NUL character in header values * BUG/MINOR: h1-htx: properly initialize the err_pos field * BUG/MEDIUM: h1: Don't support LF only to mark the end of a chunk size * BUG/MINOR: h1: Don't support LF only at the end of chunks * BUG/MEDIUM: stconn: Don't check pending shutdown to wake an applet up * BUG/MEDIUM: stconn: Allow expiration update when READ/WRITE event is pending * BUG/MEDIUM: pool: fix rare risk of deadlock in pool_flush() * BUG/MINOR: jwt: fix jwt_verify crash on 32-bit archs * BUG/MEDIUM: cli: fix once for all the problem of missing trailing LFs * BUG/MINOR: vars/cli: fix missing LF after "get var" output * BUG/MEDIUM: cli: some err/warn msg dumps add LR into CSV output on stat's CLI * REGTESTS: add a test to ensure map-ordering is preserved * MINOR: mux-h2/traces: add a missing trace on connection WU with negative inc * BUG/MEDIUM: mux-h2: refine connection vs stream error on headers * MINOR: mux-h2/traces: clarify the "rejected H2 request" event * MINOR: mux-h2/traces: explicitly show the error/refused stream states * MINOR: mux-h2/traces: also suggest invalid header upon parsing error * MINOR: debug: make BUG_ON() catch build errors even without DEBUG_STRICT * MINOR: debug: make ABORT_NOW() store the caller's line number when using abort * MINOR: debug: make sure calls to ha_crash_now() are never merged * MINOR: compiler: add a new DO_NOT_FOLD() macro to prevent code folding * BUG/MEDIUM: quic: keylog callback not called (USE_OPENSSL_COMPAT) * BUG/MINOR: mux-h2: also count streams for refused ones * BUG/MINOR: mux-quic: do not prevent non-STREAM sending on flow control * DOC: configuration: corrected description of keyword tune.ssl.ocsp- update.mindelay * MINOR: mux-h2: support limiting the total number of H2 streams per connection * BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up * BUG/MEDIUM: stconn: Forward shutdown on write timeout only if it is forwardable * BUG/MEDIUM: h3: fix incorrect snd_buf return value * CLEANUP: quic: Remaining useless code into server part * BUG/MINOR: h3: close connection on sending alloc errors * BUG/MINOR: h3: properly handle alloc failure on finalize * BUG/MINOR: h3: close connection on header list too big * MINOR: h3: check connection error during sending * BUG/MINOR: quic: Missing call to TLS message callbacks * BUG/MINOR: quic: Wrong keylog callback setting. * BUG/MINOR: mux-quic: always report error to SC on RESET_STREAM emission * BUG/MEDIUM: stats: unhandled switching rules with TCP frontend * MINOR: stats: store the parent proxy in stats ctx (http) * DOC: config: Update documentation about local haproxy response * BUG/MINOR: resolvers: default resolvers fails when network not configured * BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty * BUG/MEDIUM: quic: QUIC CID removed from tree without locking * BUG/MEDIUM: quic: Possible buffer overflow when building TLS records * BUG/MINOR: mworker/cli: fix set severity-output support * DOC: configuration: typo req.ssl_hello_type * [RELEASE] Released version 2.8.5 * BUG/MEDIUM: proxy: always initialize the default settings after init * BUG/MINOR: lua: Wrong OCSP CID after modifying an SSL certficate (LUA) * BUG/MINOR: ssl: Wrong OCSP CID after modifying an SSL certficate * MINOR: ssl/cli: Add ha_(warning|alert) msgs to CLI ckch callback * BUG/MINOR: ssl: Double free of OCSP Certificate ID * BUG/MINOR: quic: Packet number spaces too lately initialized * BUG/MINOR: quic: Missing QUIC connection path member initialization * BUG/MINOR: quic: Possible leak of TX packets under heavy load * BUG/MEDIUM: quic: Possible crash during retransmissions and heavy load * BUG/MINOR: cache: Remove incomplete entries from the cache when stream is closed * BUG/MEDIUM: peers: fix partial message decoding * DOC: Clarify the differences between field() and word() * BUG/MINOR: sample: Make the `word` converter compatible with `-m found` * REGTESTS: sample: Test the behavior of consecutive delimiters for the field converter * DOC: config: fix monitor-fail typo * DOC: config: add matrix entry for "max-session-srv-conns" * DOC: config: specify supported sections for "max-session-srv-conns" * BUG/MINOR: cfgparse-listen: fix warning being reported as an alert * BUG/MINOR: config: Stopped parsing upon unmatched environment variables * BUG/MINOR: quic_tp: fix preferred_address decoding * DOC: config: fix missing characters in set-spoe-group action * BUG/MINOR: h3: always reject PUSH_PROMISE * BUG/MINOR: h3: fix TRAILERS encoding * BUG/MEDIUM: master/cli: Properly pin the master CLI on thread 1 / group 1 * BUG/MINOR: compression: possible NULL dereferences in comp_prepare_compress_request() * BUG/MINOR: quic: fix CONNECTION_CLOSE_APP encoding * DOC: lua: fix Proxy.get_mode() output * DOC: lua: add sticktable class reference from Proxy.stktable * REGTESTS: connection: disable http_reuse_be_transparent.vtc if !TPROXY * DOC: config: fix timeout check inheritance restrictions * DOC: 51d: updated 51Degrees repo URL for v3.2.10 * BUG/MINOR: server: do not leak default-server in defaults sections * BUG/MINOR: quic: Possible RX packet memory leak under heavy load * BUG/MEDIUM: quic: Possible crash for connections to be killed * BUG/MINOR: sock: mark abns sockets as non-suspendable and always unbind them * BUG/MINOR: startup: set GTUNE_SOCKET_TRANSFER correctly * REGTESTS: http: add a test to validate chunked responses delivery * BUG/MINOR: proxy/stktable: missing frees on proxy cleanup * MINOR: stktable: add stktable_deinit function * BUG/MINOR: stream/cli: report correct stream age in "show sess" * BUG/MEDIUM: mux-fcgi: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h1: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h2: fail earlier on malloc in takeover() * BUG/MAJOR: quic: complete thread migration before tcp-rules * [RELEASE] Released version 2.8.4 * BUG/MINOR: stconn: Report read activity on non-indep streams for partial sends * BUG/MINOR: stconn/applet: Report send activity only if there was output data * BUG/MINOR: stconn: Use HTX-aware channel's functions to get info on buffer * BUG/MINOR: stconn: Fix streamer detection for HTX streams * MINOR: channel: Add functions to get info on buffers and deal with HTX streams * MINOR: htx: Use a macro for overhead induced by HTX * BUG/MEDIUM: stconn: Update fsb date on partial sends * BUG/MEDIUM: stream: Don't call mux .ctl() callback if not implemented * BUG/MEDIUM: mworker: set the master variable earlier * BUG/MEDIUM: applet: Report a send activity everytime data were sent * BUG/MEDIUM: stconn: Report a send activity everytime data were sent * REGTESTS: http: Improve script testing abortonclose option * BUG/MEDIUM: stream: Properly handle abortonclose when set on backend only * MEDIUM: mux-h1: Handle MUX_SUBS_RECV flag in h1_ctl() and susbscribe for reads * MINOR: connection: Add a CTL flag to notify mux it should wait for reads again * BUG/MINOR: stconn: Handle abortonclose if backend connection was already set up * BUG/MEDIUM: connection: report connection errors even when no mux is installed * DOC: quic: Wrong syntax for "quic-cc-algo" keyword. * BUG/MINOR: sink: don't learn srv port from srv addr * BUG/MEDIUM: applet: Remove appctx from buffer wait list on release * DOC: config: use the word 'backend' instead of 'proxy' in 'track' description * BUG/MINOR: quic: fix retry token check inconsistency * DOC: management: -q is quiet all the time * BUG/MEDIUM: stconn: Don't update stream expiration date if already expired * BUG/MEDIUM: quic: Avoid some crashes upon TX packet allocation failures * BUG/MEDIUM: quic: Possible crashes when sending too short Initial packets * BUG/MEDIUM: quic: Avoid trying to send ACK frames from an empty ack ranges tree * BUG/MINOR: quic: idle timer task requeued in the past * BUG/MEDIUM: pool: fix releasable pool calculation when overloaded * BUG/MEDIUM: freq-ctr: Don't report overshoot for long inactivity period * BUG/MINOR: mux-h1: Properly handle http-request and http-keep-alive timeouts * BUG/MINOR: stick-table/cli: Check for invalid ipv4 key * BUG/MEDIUM: quic: fix sslconns on quic_conn alloc failure * BUG/MEDIUM: quic: fix actconn on quic_conn alloc failure * CLEANUP: htx: Properly indent htx_reserve_max_data() function * BUG/MINOR: stconn: Sanitize report for read activity * BUG/MEDIUM: Don't apply a max value on room_needed in sc_need_room() * BUG/MEDIUM: stconn: Don't report rcv/snd expiration date if SC cannot epxire * BUG/MEDIUM: pattern: don't trim pools under lock in pat_ref_purge_range() * BUG/MINOR: cfgparse/stktable: fix error message on stktable_init() failure * BUG/MINOR: stktable: missing free in parse_stick_table() * BUG/MINOR: tcpcheck: Report hexstring instead of binary one on check failure * BUG/MEDIUM: ssl: segfault when cipher is NULL * BUG/MINOR: mux-quic: fix early close if unset client timeout * BUG/MINOR: ssl: suboptimal certificate selection with TLSv1.3 and dual ECDSA/RSA * MEDIUM: quic: count quic_conn for global sslconns * MEDIUM: quic: count quic_conn instance for maxconn * MINOR: frontend: implement a dedicated actconn increment function * BUG/MINOR: ssl: use a thread-safe sslconns increment * BUG/MINOR: quic: do not consider idle timeout on CLOSING state * BUG/MEDIUM: server: "proto" not working for dynamic servers * MINOR: connection: add conn_pr_mode_to_proto_mode() helper func * DEBUG: mux-h2/flags: fix list of h2c flags used by the flags decoder * MINOR: lua: Add flags to configure logging behaviour * BUG/MINOR: ssl: load correctly @system-ca when ca-base is define * DOC: internal: filters: fix reference to entities.pdf * BUG/MINOR: mux-h2: update tracked counters with req cnt/req err * BUG/MINOR: mux-h2: commit the current stream ID even on reject * BUG/MEDIUM: peers: Fix synchro for huge number of tables * BUG/MEDIUM: peers: Be sure to always refresh recconnect timer in sync task * BUG/MINOR: trace: fix trace parser error reporting * BUG/MINOR: mux-h2: fix http-request and http-keep-alive timeouts again * BUG/MEDIUM: mux-h2: Don't report an error on shutr if a shutw is pending * BUG/MINOR: mux-h2: make up other blocked streams upon removal from list * BUG/MINOR: mux-h1: Send a 400-bad-request on shutdown before the first request * BUG/MEDIUM: quic-conn: free unsent frames on retransmit to prevent crash * BUG/MINOR: mux-quic: fix free on qcs-new fail alloc * BUG/MINOR: h3: strengthen host/authority header parsing * BUG/MINOR: mux-quic: support initial 0 max-stream-data * BUG/MEDIUM: mux-quic: fix RESET_STREAM on send-only stream * BUG/MINOR: quic: reject packet with no frame * BUG/MINOR: quic: Avoid crashing with unsupported cryptographic algos * BUG/MEDIUM: stconn: Fix comparison sign in sc_need_room() * BUG/MINOR: hq-interop: simplify parser requirement * BUG/MEDIUM: h1: Ignore C-L value in the H1 parser if T-E is also set * BUG/MINOR: mux-h1: Ignore C-L when sending H1 messages if T-E is also set * BUG/MINOR: mux-h1: Handle read0 in rcv_pipe() only when data receipt was tried * BUG/MEDIUM: hlua: Initialize appctx used by a lua socket on connect only * MINOR: hlua: Test the hlua struct first when the lua socket is connecting * MINOR: hlua: Save the lua socket's server in its context * MINOR: hlua: Save the lua socket's timeout in its context * MINOR: hlua: Don't preform operations on a not connected socket * MINOR: hlua: Set context's appctx when the lua socket is created * BUG/MEDIUM: http-ana: Try to handle response before handling server abort * BUG/MEDIUM: quic_conn: let the scheduler kill the task when needed * BUG/MEDIUM: actions: always apply a longest match on prefix lookup * BUG/MINOR: mux-quic: remove full demux flag on ncbuf release * BUG/MEDIUM: server/cli: don't delete a dynamic server that has streams * MINOR: pattern: fix pat_{parse,match}_ip() function comments * BUG/MINOR: server: add missing free for server->rdr_pfx * BUG/MAJOR: mux-h2: Report a protocol error for any DATA frame before headers * BUG/MINOR: freq_ctr: fix possible negative rate with the scaled API * BUG/MEDIUM: master/cli: Pin the master CLI on the first thread of the group 1 * BUG/MINOR: promex: fix backend_agg_check_status * BUG/MEDIUM: mux-fcgi: Don't swap trash and dbuf when handling STDERR records * BUG/MINOR: hlua/init: coroutine may not resume itself * BUG/MEDIUM: hlua: don't pass stale nargs argument to lua_resume() * CI: musl: drop shopt in workflow invocation * CI: musl: highlight section if there are coredumps * Revert "BUG/MEDIUM: quic: missing check of dcid for init pkt including a token" * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread * MINOR: hlua: add hlua_stream_ctx_prepare helper function * BUILD: quic: fix build on centos 8 and USE_QUIC_OPENSSL_COMPAT * BUG/MINOR: quic: ssl_quic_initial_ctx() uses error count not error code * BUG/MINOR: quic: allow-0rtt warning must only be emitted with quic bind * BUILD: Makefile: add USE_QUIC_OPENSSL_COMPAT to make help * MINOR: quic+openssl_compat: Emit an alert for "allow-0rtt" option * MINOR: quic+openssl_compat: Do not start without "limited-quic" * MINOR: quic: Warning for OpenSSL wrapper QUIC bindings without "limited- quic" * BUG/MINOR: quic+openssl_compat: Non initialized TLS encryption levels * DOC: quic: Add "limited-quic" new tuning setting * MINOR: quic: Add "limited-quic" new tuning setting * MINOR: quic: SSL context initialization with QUIC OpenSSL wrapper. * MINOR: quic: Add a quic_openssl_compat struct to quic_conn struct * MINOR: quic: Call the keylog callback for QUIC openssl wrapper from SSL_CTX_keylog() * MINOR: quic: Initialize TLS contexts for QUIC openssl wrapper * MINOR: quic: Export some KDF functions (QUIC-TLS) * MINOR: quic: Add a compilation option for the QUIC OpenSSL wrapper * MINOR: quic: Do not enable 0RTT with SSL_set_quic_early_data_enabled() * MINOR: quic: Set the QUIC connection as extra data before calling SSL_set_quic_method() * MINOR: quic: Do not enable O-RTT with USE_QUIC_OPENSSL_COMPAT * MINOR: quic: Include QUIC opensssl wrapper header from TLS stacks compatibility header * MINOR: quic: QUIC openssl wrapper implementation * BUG/MINOR: quic: Wrong cluster secret initialization * BUG/MINOR: quic: Leak of frames to send. * BUILD: bug: make BUG_ON() void to avoid a rare warning ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-27=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * haproxy-2.8.11+git0.01c1056a4-slfo.1.1_1.1 * haproxy-debugsource-2.8.11+git0.01c1056a4-slfo.1.1_1.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53008.html * https://bugzilla.suse.com/show_bug.cgi?id=1233973 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:16 -0000 Subject: SUSE-SU-2025:20223-1: critical: Security update for rsync Message-ID: <174902455690.12703.6336280359129810154@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2025:20223-1 Release Date: 2025-02-07T09:57:24Z Rating: critical References: * bsc#1234100 * bsc#1234101 * bsc#1234102 * bsc#1234103 * bsc#1234104 * bsc#1235475 Cross-References: * CVE-2024-12084 * CVE-2024-12085 * CVE-2024-12086 * CVE-2024-12087 * CVE-2024-12088 * CVE-2024-12747 CVSS scores: * CVE-2024-12084 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12084 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12084 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12085 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12085 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-12085 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-12086 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12086 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-12086 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2024-12087 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12087 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-12087 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-12088 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12747 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-12747 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-12747 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves six vulnerabilities can now be installed. ## Description: This update for rsync fixes the following issues: * Bump protocol version to 32 - make it easier to show server is patched. * Fix FLAG_GOT_DIR_FLIST collission with FLAG_HLINKED * Security update,CVE-2024-12747, bsc#1235475 race condition in handling symbolic links * Security update, fix multiple vulnerabilities: * CVE-2024-12084, bsc#1234100 - Heap Buffer Overflow in Checksum Parsing * CVE-2024-12085, bsc#1234101 - Info Leak via uninitialized Stack contents defeats ASLR * CVE-2024-12086, bsc#1234102 - Server leaks arbitrary client files * CVE-2024-12087, bsc#1234103 - Server can make client write files outside of destination directory using symbolic links * CVE-2024-12088, bsc#1234104 - --safe-links Bypass ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-15=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * rsync-debugsource-3.3.0-slfo.1.1_3.1 * rsync-3.3.0-slfo.1.1_3.1 * rsync-debuginfo-3.3.0-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12084.html * https://www.suse.com/security/cve/CVE-2024-12085.html * https://www.suse.com/security/cve/CVE-2024-12086.html * https://www.suse.com/security/cve/CVE-2024-12087.html * https://www.suse.com/security/cve/CVE-2024-12088.html * https://www.suse.com/security/cve/CVE-2024-12747.html * https://bugzilla.suse.com/show_bug.cgi?id=1234100 * https://bugzilla.suse.com/show_bug.cgi?id=1234101 * https://bugzilla.suse.com/show_bug.cgi?id=1234102 * https://bugzilla.suse.com/show_bug.cgi?id=1234103 * https://bugzilla.suse.com/show_bug.cgi?id=1234104 * https://bugzilla.suse.com/show_bug.cgi?id=1235475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:18 -0000 Subject: SUSE-RU-2025:20228-1: moderate: Recommended update for selinux-policy Message-ID: <174902455884.21522.10750474008245941415@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2025:20228-1 Release Date: 2025-03-04T08:21:45Z Rating: moderate References: * bsc#1230961 * bsc#1232655 * bsc#1232753 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Update to version 20241031+git6.af97b0a3: * Allow vhostmd_t list virtqemud pid dirs (bsc#1230961) * Update to version 20241031+git4.96add794: * Label /run/libvirt/qemu/channel with virtqemud_var_run_t (bsc#1230961) * Update macros.selinux-policy to trigger a full relabel on transactional systems upon module installation. This is rather expensive and will hopefully be replaced by a more fine grained solution later on (bsc#1232753) * Update to version 20241031+git2.f85cbd70: * Allow virt_dbus_t to connect to virtd_t over unix_stream_socket (bsc#1232655) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-25=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * selinux-policy-targeted-20241031+git6.af97b0a3-slfo.1.1_1.1 * cockpit-networkmanager-321-slfo.1.1_2.5 * cockpit-selinux-321-slfo.1.1_2.5 * selinux-policy-20241031+git6.af97b0a3-slfo.1.1_1.1 * passt-selinux-20240906.6b38f07-slfo.1.1_1.6 * cockpit-storaged-321-slfo.1.1_2.5 * container-selinux-2.211.0-slfo.1.1_1.5 * pcp-conf-6.2.0-slfo.1.1_1.3 * selinux-policy-devel-20241031+git6.af97b0a3-slfo.1.1_1.1 * cockpit-system-321-slfo.1.1_2.5 * swtpm-selinux-0.9.0-slfo.1.1_2.5 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * pcp-debugsource-6.2.0-slfo.1.1_1.3 * swtpm-debugsource-0.9.0-slfo.1.1_2.5 * libtss2-tcti-tabrmd0-debuginfo-3.0.0-slfo.1.1_1.3 * cockpit-ws-321-slfo.1.1_2.5 * cockpit-bridge-321-slfo.1.1_2.5 * passt-debuginfo-20240906.6b38f07-slfo.1.1_1.6 * libpcp_import1-debuginfo-6.2.0-slfo.1.1_1.3 * passt-20240906.6b38f07-slfo.1.1_1.6 * cockpit-debuginfo-321-slfo.1.1_2.5 * libpcp_import1-6.2.0-slfo.1.1_1.3 * passt-debugsource-20240906.6b38f07-slfo.1.1_1.6 * libpcp3-debuginfo-6.2.0-slfo.1.1_1.3 * tpm2.0-abrmd-debugsource-3.0.0-slfo.1.1_1.3 * cockpit-ws-debuginfo-321-slfo.1.1_2.5 * libtss2-tcti-tabrmd0-3.0.0-slfo.1.1_1.3 * libpcp3-6.2.0-slfo.1.1_1.3 * tpm2.0-abrmd-3.0.0-slfo.1.1_1.3 * swtpm-0.9.0-slfo.1.1_2.5 * cockpit-bridge-debuginfo-321-slfo.1.1_2.5 * cockpit-321-slfo.1.1_2.5 * swtpm-debuginfo-0.9.0-slfo.1.1_2.5 * tpm2.0-abrmd-debuginfo-3.0.0-slfo.1.1_1.3 * cockpit-debugsource-321-slfo.1.1_2.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230961 * https://bugzilla.suse.com/show_bug.cgi?id=1232655 * https://bugzilla.suse.com/show_bug.cgi?id=1232753 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:20 -0000 Subject: SUSE-RU-2025:20222-1: moderate: Recommended update for ocl-icd, opencl-headers Message-ID: <174902456072.12703.423270000633092175@smelt2.prg2.suse.org> # Recommended update for ocl-icd, opencl-headers Announcement ID: SUSE-RU-2025:20222-1 Release Date: 2025-02-05T12:40:07Z Rating: moderate References: * jsc#PED-11441 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for ocl-icd, opencl-headers fixes the following issues: This update ships ocl-icd / libOpenCL1 in version 2.3.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-14=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * ocl-icd-debugsource-2.3.1-slfo.1.1_1.1 * libOpenCL1-2.3.1-slfo.1.1_1.1 * libOpenCL1-debuginfo-2.3.1-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/PED-11441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:25 -0000 Subject: SUSE-RU-2025:20221-1: moderate: Recommended update for iptables Message-ID: <174902456569.12703.17221098797704950097@smelt2.prg2.suse.org> # Recommended update for iptables Announcement ID: SUSE-RU-2025:20221-1 Release Date: 2025-02-03T09:02:51Z Rating: moderate References: * bsc#1234996 * bsc#1235088 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for iptables fixes the following issues: * Fixes checking existence of rules. Fixes issues with rule creation with podman/netavark. (bsc#1235088, bsc#1234996) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-11=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * xtables-plugins-1.8.9-slfo.1.1_2.1 * libip4tc2-1.8.9-slfo.1.1_2.1 * iptables-debuginfo-1.8.9-slfo.1.1_2.1 * iptables-debugsource-1.8.9-slfo.1.1_2.1 * libip6tc2-1.8.9-slfo.1.1_2.1 * libxtables12-1.8.9-slfo.1.1_2.1 * libip4tc2-debuginfo-1.8.9-slfo.1.1_2.1 * xtables-plugins-debuginfo-1.8.9-slfo.1.1_2.1 * libxtables12-debuginfo-1.8.9-slfo.1.1_2.1 * iptables-1.8.9-slfo.1.1_2.1 * libip6tc2-debuginfo-1.8.9-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234996 * https://bugzilla.suse.com/show_bug.cgi?id=1235088 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:27 -0000 Subject: SUSE-SU-2025:20227-1: important: Security update for kernel-firmware Message-ID: <174902456786.21522.14955116025447088023@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2025:20227-1 Release Date: 2025-02-26T13:57:21Z Rating: important References: * bsc#1219458 * bsc#1229069 * bsc#1229272 * bsc#1230007 * bsc#1230596 * bsc#1234027 Cross-References: * CVE-2023-31315 CVSS scores: * CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has five fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update to version 20241128 (git commit ea71da6f0690): * i915: Update Xe2LPD DMC to v2.24 * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * iwlwifi: add Bz-gf FW for core89-91 release * amdgpu: update smu 13.0.10 firmware * amdgpu: update sdma 6.0.3 firmware * amdgpu: update psp 13.0.10 firmware * amdgpu: update gc 11.0.3 firmware * amdgpu: add smu 13.0.14 firmware * amdgpu: add sdma 4.4.5 firmware * amdgpu: add psp 13.0.14 firmware * amdgpu: add gc 9.4.4 firmware * amdgpu: update vcn 3.1.2 firmware * amdgpu: update psp 13.0.5 firmware * amdgpu: update psp 13.0.8 firmware * amdgpu: update vega20 firmware * amdgpu: update vega12 firmware * amdgpu: update psp 14.0.4 firmware * amdgpu: update gc 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update vcn 4.0.0 firmware * amdgpu: update smu 13.0.0 firmware * amdgpu: update psp 13.0.0 firmware * amdgpu: update gc 11.0.0 firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update psp 13.0.11 firmware * amdgpu: update gc 11.0.4 firmware * amdgpu: update vcn 4.0.2 firmware * amdgpu: update psp 13.0.4 firmware * amdgpu: update gc 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update vpe 6.1.1 firmware * amdgpu: update vcn 4.0.6 firmware * amdgpu: update psp 14.0.1 firmware * amdgpu: update gc 11.5.1 firmware * amdgpu: update vcn 4.0.5 firmware * amdgpu: update psp 14.0.0 firmware * amdgpu: update gc 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update arcturus firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update sdma 4.4.2 firmware * amdgpu: update psp 13.0.6 firmware * amdgpu: update gc 9.4.3 firmware * amdgpu: update vcn 4.0.4 firmware * amdgpu: update psp 13.0.7 firmware * amdgpu: update gc 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * Update aliases from 6.13-rc1 * Update to version 20241125 (git commit 508d770ee6f3): * ice: update ice DDP wireless_edge package to 1.3.20.0 * ice: update ice DDP comms package to 1.3.52.0 * ice: update ice DDP package to ice-1.3.41.0 * amdgpu: update DMCUB to v9.0.10.0 for DCN314 * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * Update to version 20241121 (git commit 48bb90cceb88): * linux-firmware: Update AMD cpu microcode * xe: Update GUC to v70.36.0 for BMG, LNL * i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL * Update to version 20241119 (git commit 60cdfe1831e8): * iwlwifi: add Bz-gf FW for core91-69 release * Update aliases from 6.12 * Update to version 20241113 (git commit 1727aceef4d2): * qcom: venus-5.4: add venus firmware file for qcs615 * qcom: update venus firmware file for SC7280 * QCA: Add 22 bluetooth firmware nvm files for QCA2066 * Update to version 20241112 (git commit c57a0a42468b): * mediatek MT7922: update bluetooth firmware to 20241106163512 * mediatek MT7921: update bluetooth firmware to 20241106151414 * linux-firmware: update firmware for MT7922 WiFi device * linux-firmware: update firmware for MT7921 WiFi device * qcom: Add QDU100 firmware image files. * qcom: Update aic100 firmware files * dedup-firmware.sh: fix infinite loop for --verbose * rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7 * cnm: update chips&media wave521c firmware. * mediatek MT7920: update bluetooth firmware to 20241104091246 * linux-firmware: update firmware for MT7920 WiFi device * copy-firmware.sh: Run check_whence.py only if in a git repo * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * rtw89: 8852a: update fw to v0.13.36.2 * rtw88: Add firmware v52.14.0 for RTL8812AU * i915: Update Xe2LPD DMC to v2.23 * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * linux-firmware: update firmware for MT7925 WiFi device * WHENCE: Add sof-tolg for mt8195 * linux-firmware: Update firmware file for Intel BlazarI core * qcom: Add link for QCS6490 GPU firmware * qcom: update gpu firmwares for qcs615 chipset * cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops * mediatek: Add sof-tolg for mt8195 * Update to version 20241029 (git commit 048795eef350): * ath11k: move WCN6750 firmware to the device-specific subdir * xe: Update LNL GSC to v104.0.0.1263 * i915: Update MTL/ARL GSC to v102.1.15.1926 * Update to version 20241028 (git commit 987607d681cb): * amdgpu: DMCUB updates for various AMDGPU ASICs * i915: Add Xe3LPD DMC * cnm: update chips&media wave521c firmware. * linux-firmware: Add firmware for Cirrus CS35L41 * linux-firmware: Update firmware file for Intel BlazarU core * Makefile: error out of 'install' if COPYOPTS is set * Update to version 20241018 (git commit 2f0464118f40): * check_whence.py: skip some validation if git ls-files fails * qcom: Add Audio firmware for X1E80100 CRD/QCPs * amdgpu: DMCUB updates forvarious AMDGPU ASICs * brcm: replace NVRAM for Jetson TX1 * rtlwifi: Update firmware for RTL8192FU to v7.3 * make: separate installation and de-duplication targets * check_whence.py: check the permissions * Remove execute bit from firmware files * configure: remove unused file * rtl_nic: add firmware rtl8125d-1 * Update to version 20241014 (git commit 99f9c7ed1f4a): * iwlwifi: add gl/Bz FW for core91-69 release * iwlwifi: update ty/So/Ma firmwares for core91-69 release * iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops * cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops * linux-firmware: update firmware for en8811h 2.5G ethernet phy * QCA: Add Bluetooth firmwares for WCN785x with UART transport * Update to version 20241011 (git commit 808cba847c70): * mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher * ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596) * ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1 * ath12k: QCN9274 hw2.0: add board-2.bin * copy-firmware.sh: rename variables in symlink hanlding * copy-firmware.sh: remove no longer reachable test -L * copy-firmware.sh: remove no longer reachable test -f * copy-firmware.sh: call ./check_whence.py before parsing the file * copy-firmware.sh: warn if the destination folder is not empty * copy-firmware.sh: add err() helper * copy-firmware.sh: fix indentation * copy-firmware.sh: reset and consistently handle destdir * Revert "copy-firmware: Support additional compressor options" * copy-firmware.sh: flesh out and fix dedup-firmware.sh * Style update yaml files * editorconfig: add initial config file * check_whence.py: annotate replacement strings as raw * check_whence.py: LC_ALL=C sort -u the filelist * check_whence.py: ban link-to-a-link * check_whence.py: use consistent naming * Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin * tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31 * Drop obsoleted --ignore-duplicates option to copy-firmware.sh * Drop the ath12k workaround again * Update to version 20241010 (git commit d4e688aa74a0): * rtlwifi: Add firmware v39.0 for RTL8192DU * Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer firmware in this package instead) * update aliases * Update to version 20241004 (git commit bbb77872a8a7): * amdgpu: DMCUB DCN35 update * brcm: Add BCM4354 NVRAM for Jetson TX1 * brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram * Update to version 20241001 (git commit 51e5af813eaf): * linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920) * linux-firmware: add firmware for MT7920 * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update VCN 3.1.2 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update PSP 14.0.4 firmware * amdgpu: update GC 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update SMU 13.0.6 firmware * amdgpu: update SDMA 4.4.2 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * qcom: update gpu firmwares for qcm6490 chipset * mt76: mt7996: add firmware files for mt7992 chipset * mt76: mt7996: add firmware files for mt7996 chipset variants * qcom: add gpu firmwares for sa8775p chipset * rtw89: 8922a: add fw format-2 v0.35.42.1 * Pick up the fixed ath12k firmware from https://git.codelinaro.org/clo/ath- firmware/ath12k-firmware (bsc#1230596) * Update aliases from 6.11.x and 6.12-rc1 * Update to version 20240913 (git commit bcbdd1670bc3): * amdgpu: update DMCUB to v0.0.233.0 DCN351 * copy-firmware: Handle links to uncompressed files * WHENCE: Fix battmgr.jsn entry type * Temporary revert for ath12k firmware (bsc#1230596) * Update to version 20240912 (git commit 47c72fee8fe3): * amdgpu: Add VPE 6.1.3 microcode * amdgpu: add SDMA 6.1.2 microcode * amdgpu: Add support for PSP 14.0.4 * amdgpu: add GC 11.5.2 microcode * qcom: qcm6490: add ADSP and CDSP firmware * linux-firmware: Update firmware file for Intel Bluetooth Magnetor core * linux-firmware: Update firmware file for Intel BlazarU core * linux-firmware: Update firmware file for Intel Bluetooth Solar core * Update to version 20240911 (git commit 59def907425d): * rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272) * Update to version 20240910 (git commit 2a7b69a3fa30): * realtek: rt1320: Add patch firmware of MCU * i915: Update MTL DMC v2.23 * cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops * Update to version 20240903 (git commit 96af55bd3d0b): * amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007) * iwlwifi: add Bz FW for core89-58 release * rtl_nic: add firmware rtl8126a-3 * linux-firmware: update firmware for MT7921 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7921) * Update to version 20240830 (git commit d6c600d46981): * amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351 * qcom: vpu: restore compatibility with kernels before 6.6 * Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w updates for bsc#1234027) * amdgpu: DMCUB updates forvarious AMDGPU ASICs * rtw89: 8922a: add fw format-1 v0.35.41.0 * linux-firmware: update firmware for MT7925 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * rtl_bt: Add firmware and config files for RTL8922A * rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part * rtl_bt: de-dupe identical config.bin files * rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin * linux-firmware: Update AMD SEV firmware * linux-firmware: update firmware for MT7996 * Revert "i915: Update MTL DMC v2.22" * ath12k: WCN7850 hw2.0: update board-2.bin * ath11k: WCN6855 hw2.0: update to WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41 * ath11k: WCN6855 hw2.0: update board-2.bin * ath11k: QCA2066 hw2.1: add to WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3 * ath11k: QCA2066 hw2.1: add board-2.bin * ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1 * qcom: vpu: add video firmware for sa8775p * amdgpu: DMCUB updates for various AMDGPU ASICs * Update to version 20240809 (git commit 36db650dae03): * qcom: update path for video firmware for vpu-1/2/3.0 * QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642 * rtw89: 8852c: add fw format-1 v0.27.97.0 * rtw89: 8852bt: add firmware 0.29.91.0 * amdgpu: Update ISP FW for isp v4.1.1 * mediatek: Update mt8195 SOF firmware * amdgpu: DMCUB updates for DCN314 * xe: First GuC release v70.29.2 for BMG * xe: Add GuC v70.29.2 for LNL * i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL * i915: Update MTL DMC v2.22 * i915: update MTL GSC to v102.0.10.1878 * xe: Add BMG HuC 8.2.10 * xe: Add GSC 104.0.0.1161 for LNL * xe: Add LNL HuC 9.4.13 * i915: update DG2 HuC to v7.10.16 * amdgpu: Update ISP FW for isp v4.1.1 * QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-20=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-firmware-liquidio-20241128-slfo.1.1_1.1 * kernel-firmware-mediatek-20241128-slfo.1.1_1.1 * kernel-firmware-ath12k-20241128-slfo.1.1_1.1 * kernel-firmware-qlogic-20241128-slfo.1.1_1.1 * kernel-firmware-dpaa2-20241128-slfo.1.1_1.1 * kernel-firmware-prestera-20241128-slfo.1.1_1.1 * kernel-firmware-atheros-20241128-slfo.1.1_1.1 * kernel-firmware-serial-20241128-slfo.1.1_1.1 * kernel-firmware-realtek-20241128-slfo.1.1_1.1 * kernel-firmware-ti-20241128-slfo.1.1_1.1 * kernel-firmware-ueagle-20241128-slfo.1.1_1.1 * kernel-firmware-platform-20241128-slfo.1.1_1.1 * kernel-firmware-bnx2-20241128-slfo.1.1_1.1 * kernel-firmware-radeon-20241128-slfo.1.1_1.1 * kernel-firmware-sound-20241128-slfo.1.1_1.1 * kernel-firmware-amdgpu-20241128-slfo.1.1_1.1 * kernel-firmware-i915-20241128-slfo.1.1_1.1 * kernel-firmware-network-20241128-slfo.1.1_1.1 * kernel-firmware-marvell-20241128-slfo.1.1_1.1 * ucode-amd-20241128-slfo.1.1_1.1 * kernel-firmware-bluetooth-20241128-slfo.1.1_1.1 * kernel-firmware-nvidia-20241128-slfo.1.1_1.1 * kernel-firmware-chelsio-20241128-slfo.1.1_1.1 * kernel-firmware-media-20241128-slfo.1.1_1.1 * kernel-firmware-usb-network-20241128-slfo.1.1_1.1 * kernel-firmware-brcm-20241128-slfo.1.1_1.1 * kernel-firmware-nfp-20241128-slfo.1.1_1.1 * kernel-firmware-mwifiex-20241128-slfo.1.1_1.1 * kernel-firmware-ath10k-20241128-slfo.1.1_1.1 * kernel-firmware-iwlwifi-20241128-slfo.1.1_1.1 * kernel-firmware-mellanox-20241128-slfo.1.1_1.1 * kernel-firmware-qcom-20241128-slfo.1.1_1.1 * kernel-firmware-ath11k-20241128-slfo.1.1_1.1 * kernel-firmware-intel-20241128-slfo.1.1_1.1 * kernel-firmware-all-20241128-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31315.html * https://bugzilla.suse.com/show_bug.cgi?id=1219458 * https://bugzilla.suse.com/show_bug.cgi?id=1229069 * https://bugzilla.suse.com/show_bug.cgi?id=1229272 * https://bugzilla.suse.com/show_bug.cgi?id=1230007 * https://bugzilla.suse.com/show_bug.cgi?id=1230596 * https://bugzilla.suse.com/show_bug.cgi?id=1234027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:30 -0000 Subject: SUSE-RU-2025:20220-1: moderate: Recommended update for libzypp Message-ID: <174902457050.12703.15133313043571017434@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2025:20220-1 Release Date: 2025-02-03T09:02:51Z Rating: moderate References: * bsc#1225451 * bsc#1233393 * bsc#1234304 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for libzypp fixes the following issues: Version 17.35.16: * Url: queryparams without value should not have a trailing "=". * Url query part: `=` is a safe char in value (bsc#1234304) * RpmDb: Recognize rpmdb.sqlite as database file (#593) * cmake: check location of fcgi header and adjust include accordingly. On Debian and derivatives the fcgi headers are not stored in a fastcgi/ subdirectory.(#590) * The 20MB download limit must not apply to non-metadata files like package URLs provided via the CLI (bsc#1233393). * BuildCache: Don't try to retrieve missing raw metadata if no permission to write the cache (bsc#1225451) * RepoManager: throw RepoNoPermissionException if the user has no permission to update(write) the caches (bsc#1225451) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-3=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.35.16-slfo.1.1_1.1 * libzypp-debugsource-17.35.16-slfo.1.1_1.1 * libzypp-17.35.16-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225451 * https://bugzilla.suse.com/show_bug.cgi?id=1233393 * https://bugzilla.suse.com/show_bug.cgi?id=1234304 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:35 -0000 Subject: SUSE-SU-2025:20226-1: important: Security update for openssh Message-ID: <174902457545.21522.16662196541005339936@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20226-1 Release Date: 2025-02-26T13:46:04Z Rating: important References: * bsc#1227456 * bsc#1229010 * bsc#1229072 * bsc#1229449 * bsc#1236826 * bsc#1237040 * bsc#1237041 Cross-References: * CVE-2025-26465 * CVE-2025-26466 CVSS scores: * CVE-2025-26465 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-26466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities and has five fixes can now be installed. ## Description: This update for openssh fixes the following issues: Security issues fixed: * CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS- enabled client (bsc#1237040) * CVE-2025-26466: Fixed a DoS attack against OpenSSH's client and server (bsc#1237041) Other issues fixed: * Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). * Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow. (bsc#1229449) * Fixed RFC4256 implementation so that keyboard-interactive authentication method can send instructions and sshd shows them to users even before a prompt is requested. This fixes MFA push notifications (bsc#1229010). * Fix a dbus connection leaked in the logind patch that was missing a sd_bus_unref call * Add a patch that fixes a small memory leak when parsing the subsystem configuration option: * Remove empty line at the end of sshd-sle.pamd (bsc#1227456) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-21=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * openssh-common-9.6p1-slfo.1.1_2.1 * openssh-clients-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-debugsource-9.6p1-slfo.1.1_2.1 * openssh-server-9.6p1-slfo.1.1_2.1 * openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1 * openssh-common-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-server-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-fips-9.6p1-slfo.1.1_2.1 * openssh-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-clients-9.6p1-slfo.1.1_2.1 * openssh-9.6p1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26465.html * https://www.suse.com/security/cve/CVE-2025-26466.html * https://bugzilla.suse.com/show_bug.cgi?id=1227456 * https://bugzilla.suse.com/show_bug.cgi?id=1229010 * https://bugzilla.suse.com/show_bug.cgi?id=1229072 * https://bugzilla.suse.com/show_bug.cgi?id=1229449 * https://bugzilla.suse.com/show_bug.cgi?id=1236826 * https://bugzilla.suse.com/show_bug.cgi?id=1237040 * https://bugzilla.suse.com/show_bug.cgi?id=1237041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:36 -0000 Subject: SUSE-SU-2025:20219-1: moderate: Security update for u-boot Message-ID: <174902457604.12703.18095111535427504868@smelt2.prg2.suse.org> # Security update for u-boot Announcement ID: SUSE-SU-2025:20219-1 Release Date: 2025-04-29T11:10:08Z Rating: moderate References: * bsc#1237284 * bsc#1237287 Cross-References: * CVE-2024-57256 * CVE-2024-57258 CVSS scores: * CVE-2024-57256 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57256 ( NVD ): 7.1 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-57258 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57258 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57258 ( NVD ): 7.1 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for u-boot fixes the following issues: * CVE-2024-57256: Fixed integer overflow in U-Boot's ext4 symlink resolution function (bsc#1237284) * CVE-2024-57258: Fixed multiple integer overflows in U-Boot's memory allocator (bsc#1237287) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-302=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-302=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64) * u-boot-rpiarm64-doc-2023.04-2.1 * u-boot-rpiarm64-2023.04-2.1 * SUSE Linux Micro Extras 6.0 (aarch64) * u-boot-tools-2023.04-2.1 * u-boot-tools-debuginfo-2023.04-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57256.html * https://www.suse.com/security/cve/CVE-2024-57258.html * https://bugzilla.suse.com/show_bug.cgi?id=1237284 * https://bugzilla.suse.com/show_bug.cgi?id=1237287 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:38 -0000 Subject: SUSE-RU-2025:20218-1: moderate: Recommended update for gettext-runtime Message-ID: <174902457836.12703.16705329349617315122@smelt2.prg2.suse.org> # Recommended update for gettext-runtime Announcement ID: SUSE-RU-2025:20218-1 Release Date: 2025-05-07T06:36:04Z Rating: moderate References: * bsc#1227316 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has one fix can now be installed. ## Description: This update for gettext-runtime fixes the following issues: * Fixed handling of po files with malformed header (bsc#1227316) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-311=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-311=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtextstyle0-debuginfo-0.21.1-6.1 * gettext-runtime-debugsource-0.21.1-6.1 * gettext-runtime-debuginfo-0.21.1-6.1 * gettext-runtime-0.21.1-6.1 * libtextstyle0-0.21.1-6.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * gettext-runtime-debugsource-0.21.1-6.1 * gettext-tools-0.21.1-6.1 * gettext-runtime-mini-0.21.1-6.1 * gettext-runtime-mini-debugsource-0.21.1-6.1 * gettext-tools-mini-0.21.1-6.1 * gettext-tools-mini-debuginfo-0.21.1-6.1 * gettext-tools-debuginfo-0.21.1-6.1 * gettext-runtime-mini-debuginfo-0.21.1-6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:38 -0000 Subject: SUSE-SU-2025:20225-1: critical: Security update for pam_pkcs11 Message-ID: <174902457889.21522.7980522021306097341@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:20225-1 Release Date: 2025-02-26T13:36:07Z Rating: critical References: * bsc#1236314 Cross-References: * CVE-2025-24531 CVSS scores: * CVE-2025-24531 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-24531 ( SUSE ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-24531: Fixed regression in version 0.6.12 returning PAM_IGNORE in many situations with possible authentication bypass (bsc#1236314). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-22=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64) * pam_pkcs11-debuginfo-0.6.12-slfo.1.1_2.1 * pam_pkcs11-0.6.12-slfo.1.1_2.1 * pam_pkcs11-debugsource-0.6.12-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (ppc64le s390x x86_64) * pam_pkcs11-0.6.12-slfo.1.1_3.1 * pam_pkcs11-debuginfo-0.6.12-slfo.1.1_3.1 * pam_pkcs11-debugsource-0.6.12-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24531.html * https://bugzilla.suse.com/show_bug.cgi?id=1236314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:42 -0000 Subject: SUSE-SU-2025:20217-1: moderate: Security update for gdk-pixbuf Message-ID: <174902458247.12703.6019311219678169591@smelt2.prg2.suse.org> # Security update for gdk-pixbuf Announcement ID: SUSE-SU-2025:20217-1 Release Date: 2025-05-06T10:27:07Z Rating: moderate References: * bsc#1219276 * bsc#1223903 Cross-References: * CVE-2022-48622 CVSS scores: * CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for gdk-pixbuf fixes the following issues: Update to version 2.42.12: * Fix a build failure, * Fix occasional build failures, * ani: Reject files with multiple INA or IART chunks, * ani: Reject files with multiple anih chunks (CVE-2022-48622 bsc#1219276), * ani: validate chunk size, * Updated translations. * Enable other image loaders (most notably needed seems xpm,xbm). (boo#1223903, glgo#GNOME/gdk-pixbuf!169). Update to version 2.42.11: * Disable fringe loaders by default. * Introspection fixes. * Updated translations. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-310=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-1.1 * gdk-pixbuf-query-loaders-debuginfo-2.42.12-1.1 * gdk-pixbuf-debugsource-2.42.12-1.1 * libgdk_pixbuf-2_0-0-2.42.12-1.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-1.1 * gdk-pixbuf-query-loaders-2.42.12-1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48622.html * https://bugzilla.suse.com/show_bug.cgi?id=1219276 * https://bugzilla.suse.com/show_bug.cgi?id=1223903 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:45 -0000 Subject: SUSE-SU-2025:20216-1: moderate: Security update for containerd Message-ID: <174902458584.12703.2338472374264974103@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:20216-1 Release Date: 2025-04-30T09:27:22Z Rating: moderate References: * bsc#1239749 Cross-References: * CVE-2024-40635 CVSS scores: * CVE-2024-40635 ( SUSE ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N * CVE-2024-40635 ( NVD ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for containerd fixes the following issues: * Updated containerd to v1.7.27. * CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-309=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * containerd-1.7.27-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40635.html * https://bugzilla.suse.com/show_bug.cgi?id=1239749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:48 -0000 Subject: SUSE-SU-2025:20224-1: moderate: Security update for cloud-regionsrv-client, python-toml Message-ID: <174902458852.21522.18281626396176382324@smelt2.prg2.suse.org> # Security update for cloud-regionsrv-client, python-toml Announcement ID: SUSE-SU-2025:20224-1 Release Date: 2025-02-20T12:44:50Z Rating: moderate References: * bsc#1222985 * bsc#1227308 * bsc#1229137 * bsc#1229472 * bsc#1230615 * bsc#1232770 * bsc#1233333 * bsc#1234050 Affected Products: * SUSE Linux Micro 6.1 An update that has eight fixes can now be installed. ## Description: This update for cloud-regionsrv-client, python-toml contains the following fixes: cloud-regionsrv-client: \- Update to 10.3.11 (bsc#1234050) \+ Send registration code for the extensions, not only base product * Update to 10.3.9: (bsc#1234050) * Send registration code for the extensions, not only base product * Update to 10.3.8: (bsc#1233333) * Fix the package requirements for cloud-regionsrv-client * Follow changes to suseconnect error reporting from stdout to stderr * Update to 10.3.7: (bsc#1232770) * Fix the product triplet for LTSS, it is always SLES-LTSS, not $BASEPRODUCT- LTSS * Update to 10.3.6: (jsc#PCT-471, bsc#1230615) * Fix sudo setup ~ permissions cloudguestregistryauth ~ directory ownership /etc/sudoers.d * spec file ~ Remove traces of registry related entries on SLE 12 * Forward port ~ fix for sles12 disable registry ~ fix for sles12 no trans_update * Deregister non free extensions at registercloudguest --clean * Fix registry cleanup at registercloudguest --clean, don't remove files * Prevent duplicate search entries in registry setup * Update EC2 plugin to 1.0.5 * Switch to using the region endpoint from IMDS to determine the region instead of deriving the data from the availability zone * Update to 10.3.5: * Update spec file to build in all code streams and have proper dependencies. * Update to 10.3.4: * Modify the message when network access over a specific IP version does not work. This is an informational message and should not look like an error * Inform the user that LTSS registration takes a little longer * fix for sles12 no transactional update: * SLE 12 family has no products with transactional-update we do not need to look for this condition * From 10.3.3: (bsc#1229472) * Handle changes in process structure to properly identify the running zypper parent process and only check for 1 PID * From 10.3.2: * Remove rgnsrv-clnt-fix-docker-setup patch included upstream * From 10.3.1: (jsc#PCT-400) * Add support for LTSS registration * Add fix for sles12 disable registry issue: ~ No container support in SLE 12 * Add fix for docker setup: (bsc#1229137) * The entry for the update infrastructure registry mirror was written incorrectly causing docker daemon startup to fail. * Update to version 10.3.0: (bsc#1227308, bsc#1222985) * Add support for sidecar registry Podman and rootless Docker support to set up the necessary configuration for the container engines to run as defined * Add running command as root through sudoers file python-toml: \- Includes python311-toml as dependency for cloud-regionsrv-client ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-18=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1 * cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1 * cloud-regionsrv-client-10.3.11-slfo.1.1_2.1 * cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1 * cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222985 * https://bugzilla.suse.com/show_bug.cgi?id=1227308 * https://bugzilla.suse.com/show_bug.cgi?id=1229137 * https://bugzilla.suse.com/show_bug.cgi?id=1229472 * https://bugzilla.suse.com/show_bug.cgi?id=1230615 * https://bugzilla.suse.com/show_bug.cgi?id=1232770 * https://bugzilla.suse.com/show_bug.cgi?id=1233333 * https://bugzilla.suse.com/show_bug.cgi?id=1234050 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:08:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:08:55 -0000 Subject: SUSE-SU-2025:20226-1: important: Security update for openssh Message-ID: <174902453554.12703.16095574361835590005@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20226-1 Release Date: 2025-02-26T13:46:04Z Rating: important References: * bsc#1227456 * bsc#1229010 * bsc#1229072 * bsc#1229449 * bsc#1236826 * bsc#1237040 * bsc#1237041 Cross-References: * CVE-2025-26465 * CVE-2025-26466 CVSS scores: * CVE-2025-26465 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-26466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities and has five fixes can now be installed. ## Description: This update for openssh fixes the following issues: Security issues fixed: * CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS- enabled client (bsc#1237040) * CVE-2025-26466: Fixed a DoS attack against OpenSSH's client and server (bsc#1237041) Other issues fixed: * Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). * Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow. (bsc#1229449) * Fixed RFC4256 implementation so that keyboard-interactive authentication method can send instructions and sshd shows them to users even before a prompt is requested. This fixes MFA push notifications (bsc#1229010). * Fix a dbus connection leaked in the logind patch that was missing a sd_bus_unref call * Add a patch that fixes a small memory leak when parsing the subsystem configuration option: * Remove empty line at the end of sshd-sle.pamd (bsc#1227456) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-21=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * openssh-server-9.6p1-slfo.1.1_2.1 * openssh-clients-9.6p1-slfo.1.1_2.1 * openssh-server-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-common-9.6p1-slfo.1.1_2.1 * openssh-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1 * openssh-common-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-clients-debuginfo-9.6p1-slfo.1.1_2.1 * openssh-fips-9.6p1-slfo.1.1_2.1 * openssh-9.6p1-slfo.1.1_2.1 * openssh-debugsource-9.6p1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26465.html * https://www.suse.com/security/cve/CVE-2025-26466.html * https://bugzilla.suse.com/show_bug.cgi?id=1227456 * https://bugzilla.suse.com/show_bug.cgi?id=1229010 * https://bugzilla.suse.com/show_bug.cgi?id=1229072 * https://bugzilla.suse.com/show_bug.cgi?id=1229449 * https://bugzilla.suse.com/show_bug.cgi?id=1236826 * https://bugzilla.suse.com/show_bug.cgi?id=1237040 * https://bugzilla.suse.com/show_bug.cgi?id=1237041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:50 -0000 Subject: SUSE-SU-2025:20215-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174902459045.12703.6537925388134528014@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20215-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1235008 * bsc#1235431 Cross-References: * CVE-2024-53237 * CVE-2024-56650 CVSS scores: * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-20=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-3-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-3-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:54 -0000 Subject: SUSE-SU-2025:20214-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <174902459481.12703.594681535737360246@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20214-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-19=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_3-debugsource-4-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-4-1.2 * kernel-livepatch-6_4_0-20-default-4-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:55 -0000 Subject: SUSE-SU-2025:20223-1: critical: Security update for rsync Message-ID: <174902459515.21522.16375384625115771561@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2025:20223-1 Release Date: 2025-02-07T09:57:24Z Rating: critical References: * bsc#1234100 * bsc#1234101 * bsc#1234102 * bsc#1234103 * bsc#1234104 * bsc#1235475 Cross-References: * CVE-2024-12084 * CVE-2024-12085 * CVE-2024-12086 * CVE-2024-12087 * CVE-2024-12088 * CVE-2024-12747 CVSS scores: * CVE-2024-12084 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12084 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12084 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12085 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12085 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-12085 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-12086 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12086 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-12086 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2024-12087 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12087 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-12087 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-12088 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12747 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-12747 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-12747 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves six vulnerabilities can now be installed. ## Description: This update for rsync fixes the following issues: * Bump protocol version to 32 - make it easier to show server is patched. * Fix FLAG_GOT_DIR_FLIST collission with FLAG_HLINKED * Security update,CVE-2024-12747, bsc#1235475 race condition in handling symbolic links * Security update, fix multiple vulnerabilities: * CVE-2024-12084, bsc#1234100 - Heap Buffer Overflow in Checksum Parsing * CVE-2024-12085, bsc#1234101 - Info Leak via uninitialized Stack contents defeats ASLR * CVE-2024-12086, bsc#1234102 - Server leaks arbitrary client files * CVE-2024-12087, bsc#1234103 - Server can make client write files outside of destination directory using symbolic links * CVE-2024-12088, bsc#1234104 - --safe-links Bypass ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-15=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * rsync-3.3.0-slfo.1.1_3.1 * rsync-debuginfo-3.3.0-slfo.1.1_3.1 * rsync-debugsource-3.3.0-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12084.html * https://www.suse.com/security/cve/CVE-2024-12085.html * https://www.suse.com/security/cve/CVE-2024-12086.html * https://www.suse.com/security/cve/CVE-2024-12087.html * https://www.suse.com/security/cve/CVE-2024-12088.html * https://www.suse.com/security/cve/CVE-2024-12747.html * https://bugzilla.suse.com/show_bug.cgi?id=1234100 * https://bugzilla.suse.com/show_bug.cgi?id=1234101 * https://bugzilla.suse.com/show_bug.cgi?id=1234102 * https://bugzilla.suse.com/show_bug.cgi?id=1234103 * https://bugzilla.suse.com/show_bug.cgi?id=1234104 * https://bugzilla.suse.com/show_bug.cgi?id=1235475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:56 -0000 Subject: SUSE-RU-2025:20222-1: moderate: Recommended update for ocl-icd, opencl-headers Message-ID: <174902459662.21522.10047329000073690867@smelt2.prg2.suse.org> # Recommended update for ocl-icd, opencl-headers Announcement ID: SUSE-RU-2025:20222-1 Release Date: 2025-02-05T12:40:07Z Rating: moderate References: * jsc#PED-11441 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for ocl-icd, opencl-headers fixes the following issues: This update ships ocl-icd / libOpenCL1 in version 2.3.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-14=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libOpenCL1-debuginfo-2.3.1-slfo.1.1_1.1 * libOpenCL1-2.3.1-slfo.1.1_1.1 * ocl-icd-debugsource-2.3.1-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/PED-11441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:09:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:09:59 -0000 Subject: SUSE-SU-2025:20213-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174902459948.12703.5520607153307888099@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20213-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-18=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-4-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-4-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:00 -0000 Subject: SUSE-RU-2025:20221-1: moderate: Recommended update for iptables Message-ID: <174902460066.21522.8561297283692546440@smelt2.prg2.suse.org> # Recommended update for iptables Announcement ID: SUSE-RU-2025:20221-1 Release Date: 2025-02-03T09:02:51Z Rating: moderate References: * bsc#1234996 * bsc#1235088 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for iptables fixes the following issues: * Fixes checking existence of rules. Fixes issues with rule creation with podman/netavark. (bsc#1235088, bsc#1234996) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-11=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * iptables-debuginfo-1.8.9-slfo.1.1_2.1 * iptables-1.8.9-slfo.1.1_2.1 * xtables-plugins-1.8.9-slfo.1.1_2.1 * libip6tc2-debuginfo-1.8.9-slfo.1.1_2.1 * libxtables12-1.8.9-slfo.1.1_2.1 * libxtables12-debuginfo-1.8.9-slfo.1.1_2.1 * xtables-plugins-debuginfo-1.8.9-slfo.1.1_2.1 * libip6tc2-1.8.9-slfo.1.1_2.1 * iptables-debugsource-1.8.9-slfo.1.1_2.1 * libip4tc2-1.8.9-slfo.1.1_2.1 * libip4tc2-debuginfo-1.8.9-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234996 * https://bugzilla.suse.com/show_bug.cgi?id=1235088 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:03 -0000 Subject: SUSE-RU-2025:20220-1: moderate: Recommended update for libzypp Message-ID: <174902460399.21522.1882001409990453632@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2025:20220-1 Release Date: 2025-02-03T09:02:51Z Rating: moderate References: * bsc#1225451 * bsc#1233393 * bsc#1234304 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for libzypp fixes the following issues: Version 17.35.16: * Url: queryparams without value should not have a trailing "=". * Url query part: `=` is a safe char in value (bsc#1234304) * RpmDb: Recognize rpmdb.sqlite as database file (#593) * cmake: check location of fcgi header and adjust include accordingly. On Debian and derivatives the fcgi headers are not stored in a fastcgi/ subdirectory.(#590) * The 20MB download limit must not apply to non-metadata files like package URLs provided via the CLI (bsc#1233393). * BuildCache: Don't try to retrieve missing raw metadata if no permission to write the cache (bsc#1225451) * RepoManager: throw RepoNoPermissionException if the user has no permission to update(write) the caches (bsc#1225451) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-3=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libzypp-debuginfo-17.35.16-slfo.1.1_1.1 * libzypp-debugsource-17.35.16-slfo.1.1_1.1 * libzypp-17.35.16-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225451 * https://bugzilla.suse.com/show_bug.cgi?id=1233393 * https://bugzilla.suse.com/show_bug.cgi?id=1234304 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:05 -0000 Subject: SUSE-SU-2025:20212-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <174902460510.12703.8494509022687853936@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20212-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-17=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-11-rt-debuginfo-4-1.2 * kernel-livepatch-6_4_0-11-rt-4-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-4-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:10 -0000 Subject: SUSE-SU-2025:20219-1: moderate: Security update for u-boot Message-ID: <174902461007.21522.16790761865009789653@smelt2.prg2.suse.org> # Security update for u-boot Announcement ID: SUSE-SU-2025:20219-1 Release Date: 2025-04-29T11:10:08Z Rating: moderate References: * bsc#1237284 * bsc#1237287 Cross-References: * CVE-2024-57256 * CVE-2024-57258 CVSS scores: * CVE-2024-57256 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57256 ( NVD ): 7.1 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-57258 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57258 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57258 ( NVD ): 7.1 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for u-boot fixes the following issues: * CVE-2024-57256: Fixed integer overflow in U-Boot's ext4 symlink resolution function (bsc#1237284) * CVE-2024-57258: Fixed multiple integer overflows in U-Boot's memory allocator (bsc#1237287) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-302=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-302=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64) * u-boot-rpiarm64-2023.04-2.1 * u-boot-rpiarm64-doc-2023.04-2.1 * SUSE Linux Micro Extras 6.0 (aarch64) * u-boot-tools-debuginfo-2023.04-2.1 * u-boot-tools-2023.04-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57256.html * https://www.suse.com/security/cve/CVE-2024-57258.html * https://bugzilla.suse.com/show_bug.cgi?id=1237284 * https://bugzilla.suse.com/show_bug.cgi?id=1237287 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:11 -0000 Subject: SUSE-SU-2025:20211-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174902461163.12703.2238259959328096000@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20211-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-16=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-10-rt-4-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-4-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:13 -0000 Subject: SUSE-RU-2025:20218-1: moderate: Recommended update for gettext-runtime Message-ID: <174902461313.21522.8092706599476811675@smelt2.prg2.suse.org> # Recommended update for gettext-runtime Announcement ID: SUSE-RU-2025:20218-1 Release Date: 2025-05-07T06:36:04Z Rating: moderate References: * bsc#1227316 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has one fix can now be installed. ## Description: This update for gettext-runtime fixes the following issues: * Fixed handling of po files with malformed header (bsc#1227316) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-311=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-311=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gettext-runtime-debuginfo-0.21.1-6.1 * libtextstyle0-0.21.1-6.1 * libtextstyle0-debuginfo-0.21.1-6.1 * gettext-runtime-debugsource-0.21.1-6.1 * gettext-runtime-0.21.1-6.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * gettext-tools-mini-debuginfo-0.21.1-6.1 * gettext-runtime-mini-debuginfo-0.21.1-6.1 * gettext-tools-0.21.1-6.1 * gettext-runtime-debugsource-0.21.1-6.1 * gettext-tools-debuginfo-0.21.1-6.1 * gettext-runtime-mini-debugsource-0.21.1-6.1 * gettext-tools-mini-0.21.1-6.1 * gettext-runtime-mini-0.21.1-6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:16 -0000 Subject: SUSE-SU-2025:20210-1: important: Security update for elemental-toolkit Message-ID: <174902461695.12703.15420841761505764437@smelt2.prg2.suse.org> # Security update for elemental-toolkit Announcement ID: SUSE-SU-2025:20210-1 Release Date: 2025-04-29T11:14:14Z Rating: important References: * bsc#1238700 * bsc#1239335 Cross-References: * CVE-2025-22869 * CVE-2025-22870 CVSS scores: * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Updated to version 2.1.3: * Simplify podman calls in CI steup * Switched GHA runners to Ubuntu 24.04 * Updated year in headers * Updated to go1.23, required by the new x/crypto module * CVE-2025-22870: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700) * CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange (bsc#1239335) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-305=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-toolkit-2.1.3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1238700 * https://bugzilla.suse.com/show_bug.cgi?id=1239335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:19 -0000 Subject: SUSE-SU-2025:20217-1: moderate: Security update for gdk-pixbuf Message-ID: <174902461914.21522.15379526310833059015@smelt2.prg2.suse.org> # Security update for gdk-pixbuf Announcement ID: SUSE-SU-2025:20217-1 Release Date: 2025-05-06T10:27:07Z Rating: moderate References: * bsc#1219276 * bsc#1223903 Cross-References: * CVE-2022-48622 CVSS scores: * CVE-2022-48622 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2022-48622 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for gdk-pixbuf fixes the following issues: Update to version 2.42.12: * Fix a build failure, * Fix occasional build failures, * ani: Reject files with multiple INA or IART chunks, * ani: Reject files with multiple anih chunks (CVE-2022-48622 bsc#1219276), * ani: validate chunk size, * Updated translations. * Enable other image loaders (most notably needed seems xpm,xbm). (boo#1223903, glgo#GNOME/gdk-pixbuf!169). Update to version 2.42.11: * Disable fringe loaders by default. * Introspection fixes. * Updated translations. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-310=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gdk-pixbuf-query-loaders-debuginfo-2.42.12-1.1 * gdk-pixbuf-query-loaders-2.42.12-1.1 * libgdk_pixbuf-2_0-0-2.42.12-1.1 * libgdk_pixbuf-2_0-0-debuginfo-2.42.12-1.1 * typelib-1_0-GdkPixbuf-2_0-2.42.12-1.1 * gdk-pixbuf-debugsource-2.42.12-1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48622.html * https://bugzilla.suse.com/show_bug.cgi?id=1219276 * https://bugzilla.suse.com/show_bug.cgi?id=1223903 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:19 -0000 Subject: SUSE-SU-2025:20209-1: low: Security update for gpg2 Message-ID: <174902461927.12703.13374617124637216548@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2025:20209-1 Release Date: 2025-04-29T11:10:56Z Rating: low References: * bsc#1239119 Cross-References: * CVE-2025-30258 CVSS scores: * CVE-2025-30258 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-30258 ( SUSE ): 2.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L * CVE-2025-30258 ( NVD ): 2.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-30258: Fixed DoS due to a malicious subkey in the keyring (bsc#1239119) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-306=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gpg2-debugsource-2.4.4-2.1 * gpg2-2.4.4-2.1 * gpg2-debuginfo-2.4.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30258.html * https://bugzilla.suse.com/show_bug.cgi?id=1239119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:25 -0000 Subject: SUSE-SU-2025:20215-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174902462523.21522.685430408789448794@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20215-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1235008 * bsc#1235431 Cross-References: * CVE-2024-53237 * CVE-2024-56650 CVSS scores: * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-20=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-debuginfo-3-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-3-1.2 * kernel-livepatch-6_4_0-24-default-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:20 -0000 Subject: SUSE-OU-2025:20208-1: moderate: Optional update for usbguard Message-ID: <174902462060.12703.9721124369909589580@smelt2.prg2.suse.org> # Optional update for usbguard Announcement ID: SUSE-OU-2025:20208-1 Release Date: 2025-04-29T11:10:55Z Rating: moderate References: * jsc#PED-9508 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for usbguard fixes the following issues: This update includes usbguard in version 1.1.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-303=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libprotobuf-lite23_4_0-debuginfo-23.4-9.1 * usbguard-tools-1.1.3-1.1 * libprotobuf-lite23_4_0-23.4-9.1 * protobuf-debugsource-23.4-9.1 * libprotobuf23_4_0-23.4-9.1 * usbguard-tools-debuginfo-1.1.3-1.1 * libqb-debugsource-2.0.8+20230721.002171b-1.5 * libqb100-debuginfo-2.0.8+20230721.002171b-1.5 * libqb100-2.0.8+20230721.002171b-1.5 * libprotobuf23_4_0-debuginfo-23.4-9.1 * usbguard-1.1.3-1.1 * libusbguard1-debuginfo-1.1.3-1.1 * usbguard-debugsource-1.1.3-1.1 * usbguard-debuginfo-1.1.3-1.1 * libusbguard1-1.1.3-1.1 ## References: * https://jira.suse.com/browse/PED-9508 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:30 -0000 Subject: SUSE-SU-2025:20214-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <174902463071.21522.12762604516230655387@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20214-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-19=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-20-default-4-1.2 * kernel-livepatch-MICRO-6-0_Update_3-debugsource-4-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-4-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:21 -0000 Subject: SUSE-SU-2025:20216-1: moderate: Security update for containerd Message-ID: <174902462122.21522.9900672455004558482@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:20216-1 Release Date: 2025-04-30T09:27:22Z Rating: moderate References: * bsc#1239749 Cross-References: * CVE-2024-40635 CVSS scores: * CVE-2024-40635 ( SUSE ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N * CVE-2024-40635 ( NVD ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for containerd fixes the following issues: * Updated containerd to v1.7.27. * CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-309=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * containerd-1.7.27-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40635.html * https://bugzilla.suse.com/show_bug.cgi?id=1239749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:33 -0000 Subject: SUSE-SU-2025:20207-1: important: Security update for expat Message-ID: <174902463351.12703.17300222871214482509@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20207-1 Release Date: 2025-04-29T11:07:48Z Rating: important References: * bsc#1219559 * bsc#1219561 * bsc#1221289 * bsc#1229930 * bsc#1229931 * bsc#1229932 * bsc#1232579 * bsc#1232601 * bsc#1239618 * jsc#SLE-21253 Cross-References: * CVE-2013-0340 * CVE-2019-15903 * CVE-2023-52425 * CVE-2023-52426 * CVE-2024-28757 * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 * CVE-2024-50602 * CVE-2024-8176 CVSS scores: * CVE-2019-15903 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52426 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves 10 vulnerabilities and contains one feature can now be installed. ## Description: This update for expat fixes the following issues: Version update to 2.7.1: * Bug fixes: * Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: * XML_GetCurrentByteCount * XML_GetCurrentByteIndex * XML_GetCurrentColumnNumber * XML_GetCurrentLineNumber * XML_GetInputContext * Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self-certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat _.so.1.10.1) to 11:2:10 (libexpat_.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re-enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives Version update to 2.7.0 (CVE-2024-8176 [bsc#1239618]) * Security fixes: * CVE-2024-8176 -- Fix crash from chaining a large number of entities caused by stack overflow by resolving use of recursion, for all three uses of entities: * general entities in character data ("&g1;") * general entities in attribute values ("") * parameter entities ("%p1;") Known impact is (reliable and easy) denial of service: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C (Base Score: 7.5, Temporal Score: 7.2) Please note that a layer of compression around XML can significantly reduce the minimum attack payload size. * Other changes: * Document changes since the previous release * Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do Version update to 2.6.4: * Security fixes: [bsc#1232601][bsc#1232579] * CVE-2024-50602 -- Fix crash within function XML_ResumeParser from a NULL pointer dereference by disallowing function XML_StopParser to (stop or) suspend an unstarted parser. A new error code XML_ERROR_NOT_STARTED was introduced to properly communicate this situation. // CWE-476 CWE-754 * Other changes: * Version info bumped from 10:3:9 (libexpat _.so.1.9.3) to 11:0:10 (libexpat_.so.1.10.0); see https://verbump.de/ for what these numbers do Update to 2.6.3: * Security fixes: * CVE-2024-45490, bsc#1229930 -- Calling function XML_ParseBuffer with len < 0 without noticing and then calling XML_GetBuffer will have XML_ParseBuffer fail to recognize the problem and XML_GetBuffer corrupt memory. With the fix, XML_ParseBuffer now complains with error XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse has been doing since Expat 2.2.1, and now documented. Impact is denial of service to potentially artitrary code execution. * CVE-2024-45491, bsc#1229931 -- Internal function dtdCopy can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). Impact is denial of service to potentially artitrary code execution. * CVE-2024-45492, bsc#1229932 -- Internal function nextScaffoldPart can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). Impact is denial of service to potentially artitrary code execution. * Other changes: * Version info bumped from 10:2:9 (libexpat _.so.1.9.2) to 10:3:9 (libexpat_.so.1.9.3); see https://verbump.de/ for what these numbers do Update to 2.6.2: * CVE-2024-28757 -- Prevent billion laughs attacks with isolated use of external parsers (bsc#1221289) * Reject direct parameter entity recursion and avoid the related undefined behavior Update to 2.6.1: * Expose billion laughs API with XML_DTD defined and XML_GE undefined, regression from 2.6.0 * Make tests independent of CPU speed, and thus more robust Update to 2.6.0: * Security fixes: * CVE-2023-52425 (bsc#1219559) Fix quadratic runtime issues with big tokens that can cause denial of service, in partial where dealing with compressed XML input. Applications that parsed a document in one go -- a single call to functions XML_Parse or XML_ParseBuffer -- were not affected. The smaller the chunks/buffers you use for parsing previously, the bigger the problem prior to the fix. Backporters should be careful to no omit parts of pull request #789 and to include earlier pull request #771, in order to not break the fix. * CVE-2023-52426 (bsc#1219561) Fix billion laughs attacks for users compiling _without_ XML_DTD defined (which is not common). Users with XML_DTD defined have been protected since Expat >=2.4.0 (and that was CVE-2013-0340 back then). * Bug fixes: * Fix parse-size-dependent "invalid token" error for external entities that start with a byte order mark * Fix NULL pointer dereference in setContext via XML_ExternalEntityParserCreate for compilation with XML_DTD undefined * Protect against closing entities out of order * Other changes: * Improve support for arc4random/arc4random_buf * Improve buffer growth in XML_GetBuffer and XML_Parse * xmlwf: Support --help and --version * xmlwf: Support custom buffer size for XML_GetBuffer and read * xmlwf: Improve language and URL clickability in help output * examples: Add new example "element_declarations.c" * Be stricter about macro XML_CONTEXT_BYTES at build time * Make inclusion to expat_config.h consistent * Autotools: configure.ac: Support --disable-maintainer-mode * Autotools: Sync CMake templates with CMake 3.26 * Autotools: Make installation of shipped man page doc/xmlwf.1 independent of docbook2man availability * Autotools|CMake: Add missing -DXML_STATIC to pkg-config file section "Cflags.private" in order to fix compilation against static libexpat using pkg-config on Windows * Autotools|CMake: Require a C99 compiler (a de-facto requirement already since Expat 2.2.2 of 2017) * Autotools|CMake: Fix PACKAGE_BUGREPORT variable * Autotools|CMake: Make test suite require a C++11 compiler * CMake: Require CMake >=3.5.0 * CMake: Lowercase off_t and size_t to help a bug in Meson * CMake: Sort xmlwf sources alphabetically * CMake|Windows: Fix generation of DLL file version info * CMake: Build tests/benchmark/benchmark.c as well for a build with -DEXPAT_BUILD_TESTS=ON * docs: Document the importance of isFinal + adjust tests accordingly * docs: Improve use of "NULL" and "null" * docs: Be specific about version of XML (XML 1.0r4) and version of C (C99); (XML 1.0r5 will need a sponsor.) * docs: reference.html: Promote function XML_ParseBuffer more * docs: reference.html: Add HTML anchors to XML_* macros * docs: reference.html: Upgrade to OK.css 1.2.0 * docs: Fix typos * docs|CI: Use HTTPS URLs instead of HTTP at various places * Address compiler warnings * Address clang-tidy warnings * Version info bumped from 9:10:8 (libexpat _.so.1.8.10) to 10:0:9 (libexpat_.so.1.9.0); see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-304=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libexpat1-2.7.1-1.1 * expat-debugsource-2.7.1-1.1 * libexpat1-debuginfo-2.7.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2013-0340.html * https://www.suse.com/security/cve/CVE-2019-15903.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2023-52426.html * https://www.suse.com/security/cve/CVE-2024-28757.html * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://www.suse.com/security/cve/CVE-2024-50602.html * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1219559 * https://bugzilla.suse.com/show_bug.cgi?id=1219561 * https://bugzilla.suse.com/show_bug.cgi?id=1221289 * https://bugzilla.suse.com/show_bug.cgi?id=1229930 * https://bugzilla.suse.com/show_bug.cgi?id=1229931 * https://bugzilla.suse.com/show_bug.cgi?id=1229932 * https://bugzilla.suse.com/show_bug.cgi?id=1232579 * https://bugzilla.suse.com/show_bug.cgi?id=1232601 * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:37 -0000 Subject: SUSE-SU-2025:20213-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174902463703.21522.17648186659481512064@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20213-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-18=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-4-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-4-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:42 -0000 Subject: SUSE-SU-2025:20212-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <174902464292.21522.3956599107239169961@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20212-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-17=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-4-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-4-1.2 * kernel-livepatch-6_4_0-11-rt-4-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:10:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:10:58 -0000 Subject: SUSE-SU-2025:20211-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174902465875.21522.13956270258604589842@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20211-1 Release Date: 2025-04-29T11:24:25Z Rating: moderate References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-53237: Fixed bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008) * CVE-2024-53082: Fixed virtio_net: Add hash_key_length check (bsc#1233677) * CVE-2024-8805: Fixed BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840) * CVE-2024-56650: Fixed netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-16=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-10-rt-4-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-4-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:03 -0000 Subject: SUSE-SU-2025:20210-1: important: Security update for elemental-toolkit Message-ID: <174902466310.21522.14994259117847807280@smelt2.prg2.suse.org> # Security update for elemental-toolkit Announcement ID: SUSE-SU-2025:20210-1 Release Date: 2025-04-29T11:14:14Z Rating: important References: * bsc#1238700 * bsc#1239335 Cross-References: * CVE-2025-22869 * CVE-2025-22870 CVSS scores: * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Updated to version 2.1.3: * Simplify podman calls in CI steup * Switched GHA runners to Ubuntu 24.04 * Updated year in headers * Updated to go1.23, required by the new x/crypto module * CVE-2025-22870: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700) * CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange (bsc#1239335) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-305=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-toolkit-2.1.3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1238700 * https://bugzilla.suse.com/show_bug.cgi?id=1239335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:05 -0000 Subject: SUSE-SU-2025:20209-1: low: Security update for gpg2 Message-ID: <174902466586.21522.13180586378388367418@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2025:20209-1 Release Date: 2025-04-29T11:10:56Z Rating: low References: * bsc#1239119 Cross-References: * CVE-2025-30258 CVSS scores: * CVE-2025-30258 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-30258 ( SUSE ): 2.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L * CVE-2025-30258 ( NVD ): 2.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-30258: Fixed DoS due to a malicious subkey in the keyring (bsc#1239119) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-306=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gpg2-2.4.4-2.1 * gpg2-debuginfo-2.4.4-2.1 * gpg2-debugsource-2.4.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30258.html * https://bugzilla.suse.com/show_bug.cgi?id=1239119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:07 -0000 Subject: SUSE-OU-2025:20208-1: moderate: Optional update for usbguard Message-ID: <174902466719.21522.7478421884971217882@smelt2.prg2.suse.org> # Optional update for usbguard Announcement ID: SUSE-OU-2025:20208-1 Release Date: 2025-04-29T11:10:55Z Rating: moderate References: * jsc#PED-9508 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for usbguard fixes the following issues: This update includes usbguard in version 1.1.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-303=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libprotobuf-lite23_4_0-debuginfo-23.4-9.1 * usbguard-debuginfo-1.1.3-1.1 * libqb100-2.0.8+20230721.002171b-1.5 * libqb-debugsource-2.0.8+20230721.002171b-1.5 * usbguard-1.1.3-1.1 * libusbguard1-1.1.3-1.1 * usbguard-tools-debuginfo-1.1.3-1.1 * libprotobuf23_4_0-23.4-9.1 * usbguard-debugsource-1.1.3-1.1 * libusbguard1-debuginfo-1.1.3-1.1 * libqb100-debuginfo-2.0.8+20230721.002171b-1.5 * protobuf-debugsource-23.4-9.1 * libprotobuf-lite23_4_0-23.4-9.1 * usbguard-tools-1.1.3-1.1 * libprotobuf23_4_0-debuginfo-23.4-9.1 ## References: * https://jira.suse.com/browse/PED-9508 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:25 -0000 Subject: SUSE-SU-2025:20207-1: important: Security update for expat Message-ID: <174902468534.21522.2238068141909857562@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20207-1 Release Date: 2025-04-29T11:07:48Z Rating: important References: * bsc#1219559 * bsc#1219561 * bsc#1221289 * bsc#1229930 * bsc#1229931 * bsc#1229932 * bsc#1232579 * bsc#1232601 * bsc#1239618 * jsc#SLE-21253 Cross-References: * CVE-2013-0340 * CVE-2019-15903 * CVE-2023-52425 * CVE-2023-52426 * CVE-2024-28757 * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 * CVE-2024-50602 * CVE-2024-8176 CVSS scores: * CVE-2019-15903 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-15903 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52426 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves 10 vulnerabilities and contains one feature can now be installed. ## Description: This update for expat fixes the following issues: Version update to 2.7.1: * Bug fixes: * Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: * XML_GetCurrentByteCount * XML_GetCurrentByteIndex * XML_GetCurrentColumnNumber * XML_GetCurrentLineNumber * XML_GetInputContext * Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self-certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat _.so.1.10.1) to 11:2:10 (libexpat_.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re-enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives Version update to 2.7.0 (CVE-2024-8176 [bsc#1239618]) * Security fixes: * CVE-2024-8176 -- Fix crash from chaining a large number of entities caused by stack overflow by resolving use of recursion, for all three uses of entities: * general entities in character data ("&g1;") * general entities in attribute values ("") * parameter entities ("%p1;") Known impact is (reliable and easy) denial of service: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C (Base Score: 7.5, Temporal Score: 7.2) Please note that a layer of compression around XML can significantly reduce the minimum attack payload size. * Other changes: * Document changes since the previous release * Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do Version update to 2.6.4: * Security fixes: [bsc#1232601][bsc#1232579] * CVE-2024-50602 -- Fix crash within function XML_ResumeParser from a NULL pointer dereference by disallowing function XML_StopParser to (stop or) suspend an unstarted parser. A new error code XML_ERROR_NOT_STARTED was introduced to properly communicate this situation. // CWE-476 CWE-754 * Other changes: * Version info bumped from 10:3:9 (libexpat _.so.1.9.3) to 11:0:10 (libexpat_.so.1.10.0); see https://verbump.de/ for what these numbers do Update to 2.6.3: * Security fixes: * CVE-2024-45490, bsc#1229930 -- Calling function XML_ParseBuffer with len < 0 without noticing and then calling XML_GetBuffer will have XML_ParseBuffer fail to recognize the problem and XML_GetBuffer corrupt memory. With the fix, XML_ParseBuffer now complains with error XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse has been doing since Expat 2.2.1, and now documented. Impact is denial of service to potentially artitrary code execution. * CVE-2024-45491, bsc#1229931 -- Internal function dtdCopy can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). Impact is denial of service to potentially artitrary code execution. * CVE-2024-45492, bsc#1229932 -- Internal function nextScaffoldPart can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). Impact is denial of service to potentially artitrary code execution. * Other changes: * Version info bumped from 10:2:9 (libexpat _.so.1.9.2) to 10:3:9 (libexpat_.so.1.9.3); see https://verbump.de/ for what these numbers do Update to 2.6.2: * CVE-2024-28757 -- Prevent billion laughs attacks with isolated use of external parsers (bsc#1221289) * Reject direct parameter entity recursion and avoid the related undefined behavior Update to 2.6.1: * Expose billion laughs API with XML_DTD defined and XML_GE undefined, regression from 2.6.0 * Make tests independent of CPU speed, and thus more robust Update to 2.6.0: * Security fixes: * CVE-2023-52425 (bsc#1219559) Fix quadratic runtime issues with big tokens that can cause denial of service, in partial where dealing with compressed XML input. Applications that parsed a document in one go -- a single call to functions XML_Parse or XML_ParseBuffer -- were not affected. The smaller the chunks/buffers you use for parsing previously, the bigger the problem prior to the fix. Backporters should be careful to no omit parts of pull request #789 and to include earlier pull request #771, in order to not break the fix. * CVE-2023-52426 (bsc#1219561) Fix billion laughs attacks for users compiling _without_ XML_DTD defined (which is not common). Users with XML_DTD defined have been protected since Expat >=2.4.0 (and that was CVE-2013-0340 back then). * Bug fixes: * Fix parse-size-dependent "invalid token" error for external entities that start with a byte order mark * Fix NULL pointer dereference in setContext via XML_ExternalEntityParserCreate for compilation with XML_DTD undefined * Protect against closing entities out of order * Other changes: * Improve support for arc4random/arc4random_buf * Improve buffer growth in XML_GetBuffer and XML_Parse * xmlwf: Support --help and --version * xmlwf: Support custom buffer size for XML_GetBuffer and read * xmlwf: Improve language and URL clickability in help output * examples: Add new example "element_declarations.c" * Be stricter about macro XML_CONTEXT_BYTES at build time * Make inclusion to expat_config.h consistent * Autotools: configure.ac: Support --disable-maintainer-mode * Autotools: Sync CMake templates with CMake 3.26 * Autotools: Make installation of shipped man page doc/xmlwf.1 independent of docbook2man availability * Autotools|CMake: Add missing -DXML_STATIC to pkg-config file section "Cflags.private" in order to fix compilation against static libexpat using pkg-config on Windows * Autotools|CMake: Require a C99 compiler (a de-facto requirement already since Expat 2.2.2 of 2017) * Autotools|CMake: Fix PACKAGE_BUGREPORT variable * Autotools|CMake: Make test suite require a C++11 compiler * CMake: Require CMake >=3.5.0 * CMake: Lowercase off_t and size_t to help a bug in Meson * CMake: Sort xmlwf sources alphabetically * CMake|Windows: Fix generation of DLL file version info * CMake: Build tests/benchmark/benchmark.c as well for a build with -DEXPAT_BUILD_TESTS=ON * docs: Document the importance of isFinal + adjust tests accordingly * docs: Improve use of "NULL" and "null" * docs: Be specific about version of XML (XML 1.0r4) and version of C (C99); (XML 1.0r5 will need a sponsor.) * docs: reference.html: Promote function XML_ParseBuffer more * docs: reference.html: Add HTML anchors to XML_* macros * docs: reference.html: Upgrade to OK.css 1.2.0 * docs: Fix typos * docs|CI: Use HTTPS URLs instead of HTTP at various places * Address compiler warnings * Address clang-tidy warnings * Version info bumped from 9:10:8 (libexpat _.so.1.8.10) to 10:0:9 (libexpat_.so.1.9.0); see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-304=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * expat-debugsource-2.7.1-1.1 * libexpat1-debuginfo-2.7.1-1.1 * libexpat1-2.7.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2013-0340.html * https://www.suse.com/security/cve/CVE-2019-15903.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2023-52426.html * https://www.suse.com/security/cve/CVE-2024-28757.html * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://www.suse.com/security/cve/CVE-2024-50602.html * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1219559 * https://bugzilla.suse.com/show_bug.cgi?id=1219561 * https://bugzilla.suse.com/show_bug.cgi?id=1221289 * https://bugzilla.suse.com/show_bug.cgi?id=1229930 * https://bugzilla.suse.com/show_bug.cgi?id=1229931 * https://bugzilla.suse.com/show_bug.cgi?id=1229932 * https://bugzilla.suse.com/show_bug.cgi?id=1232579 * https://bugzilla.suse.com/show_bug.cgi?id=1232601 * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:31 -0000 Subject: SUSE-SU-2025:20205-1: important: Security update for docker Message-ID: <174902469185.21522.10644214965340278412@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20205-1 Release Date: 2025-04-24T14:58:45Z Rating: important References: * bsc#1223409 * bsc#1234089 * bsc#1237335 * bsc#1237367 * bsc#1239185 * bsc#1239322 * bsc#1239765 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2024-29018 * CVE-2025-0495 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-0495 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-0495 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N * CVE-2025-0495 ( NVD ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities, contains two features and has three fixes can now be installed. ## Description: This update for docker fixes the following issues: * Updated to docker-buildx v0.22.0. * Updated to Docker 27.5.1-ce. * CVE-2025-0495: buildx: Fixed credential leakage to telemetry endpoints (bsc#1239765) * CVE-2025-22868: Fixed golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185) * CVE-2025-22869: Fixed golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322). * CVE-2024-29018:moby: external DNS requests from 'internal' networks could lead to data exfiltration (bsc#1234089) * Make container-selinux requirement conditional on selinux-policy (bsc#1237367) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-301=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-buildx-debuginfo-0.22.0-2.1 * docker-buildx-0.22.0-2.1 * docker-debuginfo-27.5.1_ce-2.1 * docker-27.5.1_ce-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2025-0495.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1223409 * https://bugzilla.suse.com/show_bug.cgi?id=1234089 * https://bugzilla.suse.com/show_bug.cgi?id=1237335 * https://bugzilla.suse.com/show_bug.cgi?id=1237367 * https://bugzilla.suse.com/show_bug.cgi?id=1239185 * https://bugzilla.suse.com/show_bug.cgi?id=1239322 * https://bugzilla.suse.com/show_bug.cgi?id=1239765 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:40 -0000 Subject: SUSE-SU-2025:20204-1: important: Security update for freetype2 Message-ID: <174902470040.21522.6811808279716764273@smelt2.prg2.suse.org> # Security update for freetype2 Announcement ID: SUSE-SU-2025:20204-1 Release Date: 2025-04-24T14:47:38Z Rating: important References: * bsc#1035807 * bsc#1036457 * bsc#1079600 * bsc#1198823 * bsc#1198830 * bsc#1198832 * bsc#867620 Cross-References: * CVE-2014-2240 * CVE-2014-2241 * CVE-2017-8105 * CVE-2017-8287 * CVE-2022-27404 * CVE-2022-27405 * CVE-2022-27406 CVSS scores: * CVE-2017-8105 ( SUSE ): 5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2017-8105 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-8287 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2017-8287 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-27404 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2022-27404 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-27405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-27406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-27406 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities can now be installed. ## Description: This update for freetype2 fixes the following issues: Update to 2.13.2: * Some fields in the `FT_Outline` structure have been changed from signed to unsigned type, which better reflects the actual usage. It is also an additional means to protect against malformed input. * Rare double-free crashes in the cache subsystem have been fixed. * Excessive stack allocation in the autohinter has been fixed. * The B/W rasterizer has received a major upkeep that results in large performance improvements. The rendering speed has increased and even doubled for very complex glyphs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-300=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libfreetype6-2.13.3-1.1 * freetype2-debugsource-2.13.3-1.1 * libfreetype6-debuginfo-2.13.3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2014-2240.html * https://www.suse.com/security/cve/CVE-2014-2241.html * https://www.suse.com/security/cve/CVE-2017-8105.html * https://www.suse.com/security/cve/CVE-2017-8287.html * https://www.suse.com/security/cve/CVE-2022-27404.html * https://www.suse.com/security/cve/CVE-2022-27405.html * https://www.suse.com/security/cve/CVE-2022-27406.html * https://bugzilla.suse.com/show_bug.cgi?id=1035807 * https://bugzilla.suse.com/show_bug.cgi?id=1036457 * https://bugzilla.suse.com/show_bug.cgi?id=1079600 * https://bugzilla.suse.com/show_bug.cgi?id=1198823 * https://bugzilla.suse.com/show_bug.cgi?id=1198830 * https://bugzilla.suse.com/show_bug.cgi?id=1198832 * https://bugzilla.suse.com/show_bug.cgi?id=867620 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:40 -0000 Subject: SUSE-SU-2025:20206-1: important: Security update for the Linux Kernel Message-ID: <174902470064.12703.1240158755052239831@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20206-1 Release Date: 2025-04-25T08:19:39Z Rating: important References: * bsc#1224013 * bsc#1224757 * bsc#1228659 * bsc#1231910 * bsc#1234074 * bsc#1234157 * bsc#1234698 * bsc#1235550 * bsc#1235870 * bsc#1237874 * bsc#1237882 * bsc#1238052 * bsc#1238565 * bsc#1238746 * bsc#1238970 * bsc#1238990 * bsc#1239066 * bsc#1239475 * bsc#1239684 * bsc#1239906 * bsc#1239925 * bsc#1240167 * bsc#1240168 * bsc#1240171 * bsc#1240176 * bsc#1240184 * bsc#1240185 * bsc#1240375 * bsc#1240575 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240806 * bsc#1240808 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240978 * bsc#1240979 * bsc#1241038 * jsc#PED-12309 Cross-References: * CVE-2024-27415 * CVE-2024-50038 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-58018 * CVE-2024-58071 * CVE-2025-21729 * CVE-2025-21755 * CVE-2025-21806 * CVE-2025-21836 * CVE-2025-21863 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21881 * CVE-2025-21884 * CVE-2025-21887 * CVE-2025-21889 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21981 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-2312 CVSS scores: * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 75 vulnerabilities, contains one feature and has 14 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: mm: Correct the update of max_pfn (git-fixes) * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: fix potential error return (git-fixes). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-15=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-15=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-rt-6.4.0-30.1 * kernel-devel-rt-6.4.0-30.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-30.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-30-rt-debuginfo-1-1.3 * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-1-1.3 * kernel-livepatch-6_4_0-30-rt-1-1.3 * kernel-rt-livepatch-6.4.0-30.1 * kernel-rt-debugsource-6.4.0-30.1 * kernel-rt-debuginfo-6.4.0-30.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-30.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-debugsource-6.4.0-30.1 * kernel-rt-devel-6.4.0-30.1 * kernel-rt-devel-debuginfo-6.4.0-30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://jira.suse.com/browse/PED-12309 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:47 -0000 Subject: SUSE-RU-2025:20203-1: moderate: Recommended update for systemd Message-ID: <174902470708.21522.14155402582934863508@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20203-1 Release Date: 2025-04-23T14:14:20Z Rating: moderate References: * bsc#1234015 * bsc#1236886 * jsc#PED-12317 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that contains one feature and has two fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Maintain the network device naming scheme used on SLE15 (jsc#PED-12317) This shouldn't cause problems as predictable naming schemes are disabled on SLMicro-6.1 (net.ifnames=0 is set on the kernel command line by default). * allow/denylist for reading sysfs attributes when composing a NIC name (bsc#1234015) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-299=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-299=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-portable-debuginfo-254.24-1.1 * udev-254.24-1.1 * libsystemd0-254.24-1.1 * systemd-debugsource-254.24-1.1 * libudev1-254.24-1.1 * systemd-coredump-debuginfo-254.24-1.1 * udev-debuginfo-254.24-1.1 * systemd-portable-254.24-1.1 * systemd-254.24-1.1 * systemd-container-debuginfo-254.24-1.1 * systemd-debuginfo-254.24-1.1 * libudev1-debuginfo-254.24-1.1 * systemd-experimental-254.24-1.1 * systemd-journal-remote-254.24-1.1 * systemd-coredump-254.24-1.1 * systemd-experimental-debuginfo-254.24-1.1 * libsystemd0-debuginfo-254.24-1.1 * systemd-container-254.24-1.1 * systemd-journal-remote-debuginfo-254.24-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-debugsource-254.24-1.1 * systemd-devel-254.24-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1236886 * https://jira.suse.com/browse/PED-12317 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:47 -0000 Subject: SUSE-SU-2025:20205-1: important: Security update for docker Message-ID: <174902470736.12703.15663244732254208753@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20205-1 Release Date: 2025-04-24T14:58:45Z Rating: important References: * bsc#1223409 * bsc#1234089 * bsc#1237335 * bsc#1237367 * bsc#1239185 * bsc#1239322 * bsc#1239765 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2024-29018 * CVE-2025-0495 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-0495 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-0495 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N * CVE-2025-0495 ( NVD ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities, contains two features and has three fixes can now be installed. ## Description: This update for docker fixes the following issues: * Updated to docker-buildx v0.22.0. * Updated to Docker 27.5.1-ce. * CVE-2025-0495: buildx: Fixed credential leakage to telemetry endpoints (bsc#1239765) * CVE-2025-22868: Fixed golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185) * CVE-2025-22869: Fixed golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322). * CVE-2024-29018:moby: external DNS requests from 'internal' networks could lead to data exfiltration (bsc#1234089) * Make container-selinux requirement conditional on selinux-policy (bsc#1237367) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-301=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-buildx-0.22.0-2.1 * docker-buildx-debuginfo-0.22.0-2.1 * docker-27.5.1_ce-2.1 * docker-debuginfo-27.5.1_ce-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2025-0495.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1223409 * https://bugzilla.suse.com/show_bug.cgi?id=1234089 * https://bugzilla.suse.com/show_bug.cgi?id=1237335 * https://bugzilla.suse.com/show_bug.cgi?id=1237367 * https://bugzilla.suse.com/show_bug.cgi?id=1239185 * https://bugzilla.suse.com/show_bug.cgi?id=1239322 * https://bugzilla.suse.com/show_bug.cgi?id=1239765 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:50 -0000 Subject: SUSE-RU-2025:20202-1: important: Recommended update for open-vm-tools Message-ID: <174902471067.21522.2725659508188146589@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:20202-1 Release Date: 2025-04-23T13:59:11Z Rating: important References: * bsc#1237180 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Ensure vmtoolsd.service and vgauthd.service are set to enabled by default. Do this by removing vmblock-fuse.service from the %pre section in the spec file. vmblock-fuse.service still remains in the %pre desktop section (bsc#1237180). * remove unused pcre build dependency * Revert previous change. The proposed solutions was non-standard. * Ensure vmtoolsd.service, vgauthd.service, and vmblock-fuse.service are set to enabled by default (bsc#1237180). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-298=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * open-vm-tools-12.5.0-2.1 * libvmtools0-debuginfo-12.5.0-2.1 * open-vm-tools-debugsource-12.5.0-2.1 * open-vm-tools-debuginfo-12.5.0-2.1 * libvmtools0-12.5.0-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237180 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:54 -0000 Subject: SUSE-SU-2025:20201-1: important: Security update for libxslt Message-ID: <174902471413.21522.1975079794784682885@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:20201-1 Release Date: 2025-04-23T13:11:09Z Rating: important References: * bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References: * CVE-2023-40403 * CVE-2024-55549 * CVE-2025-24855 CVSS scores: * CVE-2023-40403 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-40403 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-55549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2024-55549 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2025-24855: Fix use-after-free of XPath context node (bsc#1239625) * CVE-2024-55549: Fix UAF related to excluded namespaces (bsc#1239637) * CVE-2023-40403: Make generate-id() deterministic (bsc#1238591) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-297=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxslt1-1.1.38-4.1 * libexslt0-1.1.38-4.1 * libexslt0-debuginfo-1.1.38-4.1 * libxslt-debugsource-1.1.38-4.1 * libxslt1-debuginfo-1.1.38-4.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40403.html * https://www.suse.com/security/cve/CVE-2024-55549.html * https://www.suse.com/security/cve/CVE-2025-24855.html * https://bugzilla.suse.com/show_bug.cgi?id=1238591 * https://bugzilla.suse.com/show_bug.cgi?id=1239625 * https://bugzilla.suse.com/show_bug.cgi?id=1239637 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:55 -0000 Subject: SUSE-RU-2025:20200-1: moderate: Recommended update for toolbox Message-ID: <174902471548.21522.4726103526695566795@smelt2.prg2.suse.org> # Recommended update for toolbox Announcement ID: SUSE-RU-2025:20200-1 Release Date: 2025-04-22T14:29:25Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for toolbox fixes the following issues: * switch back to toolbox version 5.5 as SLFO code base still has limited set of toos available (and supported) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-294=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * toolbox-2.3+git20231030.3a6ef35-4.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:11:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:11:59 -0000 Subject: SUSE-SU-2025:20199-1: important: Security update for pam_pkcs11 Message-ID: <174902471953.21522.9118086670136179286@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:20199-1 Release Date: 2025-04-22T14:29:25Z Rating: important References: * bsc#1237058 * bsc#1237062 Cross-References: * CVE-2025-24031 * CVE-2025-24032 CVSS scores: * CVE-2025-24031 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24031 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-24032 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24032 ( SUSE ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L * CVE-2025-24032 ( NVD ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-24031: Fixed segmentation fault on ctrl-c/ctrl-d when asked for PIN (bsc#1237058). * CVE-2025-24032: Fixed authentication bypass with default value for `cert_policy` (`none`) (bsc#1237062). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-293=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.12-3.1 * pam_pkcs11-debuginfo-0.6.12-3.1 * pam_pkcs11-0.6.12-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24031.html * https://www.suse.com/security/cve/CVE-2025-24032.html * https://bugzilla.suse.com/show_bug.cgi?id=1237058 * https://bugzilla.suse.com/show_bug.cgi?id=1237062 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:03 -0000 Subject: SUSE-SU-2025:20198-1: important: Security update for podman Message-ID: <174902472383.21522.2541269623345519327@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20198-1 Release Date: 2025-04-22T14:29:25Z Rating: important References: * bsc#1239330 Cross-References: * CVE-2024-6104 * CVE-2025-22869 * CVE-2025-27144 CVSS scores: * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239330). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-292=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-4.1 * podman-remote-4.9.5-4.1 * podman-4.9.5-4.1 * podman-remote-debuginfo-4.9.5-4.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1239330 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:07 -0000 Subject: SUSE-SU-2025:20197-1: moderate: Security update for git Message-ID: <174902472710.21522.16065984439961548177@smelt2.prg2.suse.org> # Security update for git Announcement ID: SUSE-SU-2025:20197-1 Release Date: 2025-04-22T14:06:49Z Rating: moderate References: * bsc#1235600 * bsc#1235601 Cross-References: * CVE-2024-50349 * CVE-2024-52006 CVSS scores: * CVE-2024-50349 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-50349 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-52006 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-52006 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for git fixes the following issues: * CVE-2024-50349: Passwords for trusted sites could be sent to untrusted sites (bsc#1235600). * CVE-2024-52006: Carriage Returns via the credential protocol to credential helpers (bsc#1235601). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-290=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * git-core-debuginfo-2.45.1-2.1 * git-debugsource-2.45.1-2.1 * git-core-2.45.1-2.1 * git-2.45.1-2.1 * git-debuginfo-2.45.1-2.1 * perl-Git-2.45.1-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50349.html * https://www.suse.com/security/cve/CVE-2024-52006.html * https://bugzilla.suse.com/show_bug.cgi?id=1235600 * https://bugzilla.suse.com/show_bug.cgi?id=1235601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:07 -0000 Subject: SUSE-SU-2025:20204-1: important: Security update for freetype2 Message-ID: <174902472724.12703.1308493127871943784@smelt2.prg2.suse.org> # Security update for freetype2 Announcement ID: SUSE-SU-2025:20204-1 Release Date: 2025-04-24T14:47:38Z Rating: important References: * bsc#1035807 * bsc#1036457 * bsc#1079600 * bsc#1198823 * bsc#1198830 * bsc#1198832 * bsc#867620 Cross-References: * CVE-2014-2240 * CVE-2014-2241 * CVE-2017-8105 * CVE-2017-8287 * CVE-2022-27404 * CVE-2022-27405 * CVE-2022-27406 CVSS scores: * CVE-2017-8105 ( SUSE ): 5.6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2017-8105 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-8287 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2017-8287 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-27404 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2022-27404 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-27405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-27406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-27406 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities can now be installed. ## Description: This update for freetype2 fixes the following issues: Update to 2.13.2: * Some fields in the `FT_Outline` structure have been changed from signed to unsigned type, which better reflects the actual usage. It is also an additional means to protect against malformed input. * Rare double-free crashes in the cache subsystem have been fixed. * Excessive stack allocation in the autohinter has been fixed. * The B/W rasterizer has received a major upkeep that results in large performance improvements. The rendering speed has increased and even doubled for very complex glyphs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-300=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * freetype2-debugsource-2.13.3-1.1 * libfreetype6-2.13.3-1.1 * libfreetype6-debuginfo-2.13.3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2014-2240.html * https://www.suse.com/security/cve/CVE-2014-2241.html * https://www.suse.com/security/cve/CVE-2017-8105.html * https://www.suse.com/security/cve/CVE-2017-8287.html * https://www.suse.com/security/cve/CVE-2022-27404.html * https://www.suse.com/security/cve/CVE-2022-27405.html * https://www.suse.com/security/cve/CVE-2022-27406.html * https://bugzilla.suse.com/show_bug.cgi?id=1035807 * https://bugzilla.suse.com/show_bug.cgi?id=1036457 * https://bugzilla.suse.com/show_bug.cgi?id=1079600 * https://bugzilla.suse.com/show_bug.cgi?id=1198823 * https://bugzilla.suse.com/show_bug.cgi?id=1198830 * https://bugzilla.suse.com/show_bug.cgi?id=1198832 * https://bugzilla.suse.com/show_bug.cgi?id=867620 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:11 -0000 Subject: SUSE-SU-2025:20196-1: important: Security update for helm Message-ID: <174902473169.21522.869722376343645079@smelt2.prg2.suse.org> # Security update for helm Announcement ID: SUSE-SU-2025:20196-1 Release Date: 2025-04-22T14:06:49Z Rating: important References: * bsc#1219969 * bsc#1220207 * bsc#1234482 * bsc#1235318 * bsc#1238688 Cross-References: * CVE-2024-25620 * CVE-2024-26147 * CVE-2024-45337 * CVE-2024-45338 * CVE-2025-22870 CVSS scores: * CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45338 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45338 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45338 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for helm fixes the following issues: * Update to version 3.17.2 (bsc#1238688, CVE-2025-22870): * Updating to 0.37.0 for x/net * build(deps): bump the k8s-io group with 7 updates * Update to version 3.17.1: * merge null child chart objects * build(deps): bump the k8s-io group with 7 updates * fix: check group for resource info match * Update to 3.17.0 (bsc#1235318, CVE-2024-45338): Full changelog: https://github.com/helm/helm/releases/tag/v3.17.0 * Notable Changes * Allow pulling and installation by OCI digest * Annotations and dependencies are now in chart metadata output * New --take-ownership flag for install and upgrade commands * SDK: Authorizer and registry authorizer are now configurable * Removed the Kubernetes configuration file permissions check * Added username/password to helm push and dependency build/update subcommands * Added toYamlPretty template function * Update to version 3.16.4 (bsc#1234482, CVE-2024-45337): * Bump golang.org/x/crypto from 0.30.0 to 0.31.0 * Bump the k8s-io group with 7 updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-291=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * helm-3.17.2-1.1 * helm-debuginfo-3.17.2-1.1 * SUSE Linux Micro 6.0 (noarch) * helm-bash-completion-3.17.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25620.html * https://www.suse.com/security/cve/CVE-2024-26147.html * https://www.suse.com/security/cve/CVE-2024-45337.html * https://www.suse.com/security/cve/CVE-2024-45338.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1219969 * https://bugzilla.suse.com/show_bug.cgi?id=1220207 * https://bugzilla.suse.com/show_bug.cgi?id=1234482 * https://bugzilla.suse.com/show_bug.cgi?id=1235318 * https://bugzilla.suse.com/show_bug.cgi?id=1238688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:12 -0000 Subject: SUSE-RU-2025:20203-1: moderate: Recommended update for systemd Message-ID: <174902473236.12703.16980632370913219444@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20203-1 Release Date: 2025-04-23T14:14:20Z Rating: moderate References: * bsc#1234015 * bsc#1236886 * jsc#PED-12317 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that contains one feature and has two fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Maintain the network device naming scheme used on SLE15 (jsc#PED-12317) This shouldn't cause problems as predictable naming schemes are disabled on SLMicro-6.1 (net.ifnames=0 is set on the kernel command line by default). * allow/denylist for reading sysfs attributes when composing a NIC name (bsc#1234015) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-299=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-299=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-debugsource-254.24-1.1 * systemd-coredump-254.24-1.1 * libudev1-debuginfo-254.24-1.1 * systemd-container-debuginfo-254.24-1.1 * udev-254.24-1.1 * systemd-portable-debuginfo-254.24-1.1 * systemd-experimental-254.24-1.1 * systemd-journal-remote-debuginfo-254.24-1.1 * systemd-portable-254.24-1.1 * systemd-debuginfo-254.24-1.1 * systemd-experimental-debuginfo-254.24-1.1 * libsystemd0-254.24-1.1 * libsystemd0-debuginfo-254.24-1.1 * systemd-254.24-1.1 * systemd-coredump-debuginfo-254.24-1.1 * udev-debuginfo-254.24-1.1 * systemd-container-254.24-1.1 * systemd-journal-remote-254.24-1.1 * libudev1-254.24-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-debugsource-254.24-1.1 * systemd-devel-254.24-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1236886 * https://jira.suse.com/browse/PED-12317 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:17 -0000 Subject: SUSE-SU-2025:20201-1: important: Security update for libxslt Message-ID: <174902473760.12703.14625515130302195774@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:20201-1 Release Date: 2025-04-23T13:11:09Z Rating: important References: * bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References: * CVE-2023-40403 * CVE-2024-55549 * CVE-2025-24855 CVSS scores: * CVE-2023-40403 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-40403 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-55549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2024-55549 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2025-24855: Fix use-after-free of XPath context node (bsc#1239625) * CVE-2024-55549: Fix UAF related to excluded namespaces (bsc#1239637) * CVE-2023-40403: Make generate-id() deterministic (bsc#1238591) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-297=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxslt1-1.1.38-4.1 * libexslt0-1.1.38-4.1 * libexslt0-debuginfo-1.1.38-4.1 * libxslt-debugsource-1.1.38-4.1 * libxslt1-debuginfo-1.1.38-4.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40403.html * https://www.suse.com/security/cve/CVE-2024-55549.html * https://www.suse.com/security/cve/CVE-2025-24855.html * https://bugzilla.suse.com/show_bug.cgi?id=1238591 * https://bugzilla.suse.com/show_bug.cgi?id=1239625 * https://bugzilla.suse.com/show_bug.cgi?id=1239637 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:14 -0000 Subject: SUSE-RU-2025:20202-1: important: Recommended update for open-vm-tools Message-ID: <174902473434.12703.17465200830372542758@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:20202-1 Release Date: 2025-04-23T13:59:11Z Rating: important References: * bsc#1237180 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Ensure vmtoolsd.service and vgauthd.service are set to enabled by default. Do this by removing vmblock-fuse.service from the %pre section in the spec file. vmblock-fuse.service still remains in the %pre desktop section (bsc#1237180). * remove unused pcre build dependency * Revert previous change. The proposed solutions was non-standard. * Ensure vmtoolsd.service, vgauthd.service, and vmblock-fuse.service are set to enabled by default (bsc#1237180). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-298=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * open-vm-tools-debuginfo-12.5.0-2.1 * open-vm-tools-12.5.0-2.1 * libvmtools0-12.5.0-2.1 * open-vm-tools-debugsource-12.5.0-2.1 * libvmtools0-debuginfo-12.5.0-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237180 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:15 -0000 Subject: SUSE-RU-2025:20195-1: important: Recommended update for python-azure-agent Message-ID: <174902473592.21522.16533039725318807266@smelt2.prg2.suse.org> # Recommended update for python-azure-agent Announcement ID: SUSE-RU-2025:20195-1 Release Date: 2025-04-22T09:43:24Z Rating: important References: * bsc#1203164 * bsc#1222620 * bsc#1227600 * bsc#1235140 * jsc#PED-1298 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature and has four fixes can now be installed. ## Description: This update for python-azure-agent fixes the following issues: * Update to version 2.12.04 (bsc#1235140) * Remove the patch handeled by config file specialization sub-packages * The waagent script is executable and we set the proper interpreter using the macro for multibuild python. Do prefix the execution in the service file wit the interpreter * Fix install_requires list syntax * Update spec file * Remove conditions for distros no longer maintained * Simplify build and install conditionals using macros * Enable GA versioning * Cgroups api refactor for v2 * Fix JIT for FIPS 140-3 * reset network service unit file if python version changes * Recognize SLE-Micro as a SLE based distribution * Add distutils/version.py to azurelinuxagent * Use legacycrypt instead of crypt on Python greater than 3.13 * Fix osutil/default route_add to pass string array. * Fix argument to GoalState.init * Add lock around access to fast_track.json * Add DistroVersion class to compare distro versions * LogCollector should skip and log warning for files that don't exist * check for unexpected process in agent cgroups before cgroups enabled * [Redo with correct source/target]: Remove check for "ibXX" interface format and rework mac-address regex to expand support * Fix Ubuntu version codename for 24.04 * Update test certificate data * move setupslice after cgroupsv2 check, remove unit file for log collector and remove fiirewall daemon-reload * Address pylint warning deprecated-method * Run pylint on Python 3.11 * Run unit tests with pytest on Python greater than 3.10 * Log logcollector cgroups if process is found in unexpected slice * remove secret and use cert for aad app in e2e pipeline * suppress pylint warn contextmanager-generator-missing-cleanup * Switching to SNI based authentication for aad app * updated PR template * Avoiding mocked exception from being lost on test when using python 3.12: complete mocked info * Add more useful logging statement for agent unit properties * Remove wireserver fallback for imds calls * Remove unused import * Add support for Azure Linux 3 * Fix pytest warnings * Allow use of node 16 * Send controller/cgroup path telemetry * From 2.13.0.2 * Add support for nftables (+ refactoring of firewall code) * Create walinuxagent nftable atomically * Features in progress (Verify extension signature/Policy Enforcement) * Parse encodedSignature property from EGS * Add Regorus policy engine framework * Remove Regorus and platform check for policy enforcement * Telemetry (update logcollector telemetry with common properties) * Handle non-boolean when parsing extension manifests * Fix unicode type check when parsing extension manifests * Telemetry: high-priority events * Telemetry: report apparent dead code * Cleanup: remove AMA extension services cgroups tracking code * Accommodate the new behavior in OpenSSL 3.2.2 when given an empty input * From 2.11.1.12 * Remove multi config extension status only on extension delete * From 2.111.1.4 * General Improvements * Improvements in telemetry for firewall settings * From 2.10.0.8 * GA versioning * Disabled GA versioning * Add regular expression to match logs from very old agents * Remove empty "distro" module * Enable Python 2.7 for unit tests * Add check for noexec on Permission denied errors * Reorganize file structure of unit tests * Report useful message when extension processing is disabled * Add log and telemetry event for extension disabled * Cleanup common directory * Fix agent memory usage check * enable rhel/centos agent-cgroups * Add support for EC certificates * Add Cpu Arch in local logs and telemetry events * Clarify support status of installing from source. * Gathering Guest ProxyAgent Log Files * Remove debug info from waagent.status.json * Handle errors when adding logs to the archive * Update supported Ubuntu versions * Fix pylint warning * Add information about HTTP proxies * update the proxy agenet log folder for logcollector * Add config parameter to wait for cloud-init (Extensions.WaitForCloudInit) [Added in 2.10.0.8] * Adding AutoUpdate.UpdateToLatestVersion new flag support [Added in 2.10.0.8] * Check certificates only if certificates are included in goal state * Redact access tokens from extension's output * Fix name of single IB device when provisioning RDMA * Port NSBSD system to the latest version of waagent * fix daemon version * fix version checking in setup.py * fix(ubuntu): Point to correct dhcp lease files * Download certs on FT GS after check_certificates only when missing from disk * Add support for EC certificates [Added in 2.10.0.5] * Fix for "local variable _COLLECT_NOEXEC_ERRORS referenced before assignment" [Added in 2.10.0.5] * Cache daemon version [Added in 2.10.0.5] * undo get daemon version change [Added in 2.10.0.5] * fix self-update frequency to spread over 24 hrs for regular type and 4 hrs for hotfix [Added in 2.10.0.5] * ignore dependencies from extensions that do not have settings [Added in 2.10.0.6] * Do not reset the mode of a extension's log directory [Added in 2.10.0.8] * skip cgroup monitoring if log collector doesn't start by the agent. [Added in 2.10.0.8] * NM should not be restarted during hostname publish if NM_CONTROLLED=y [Added in 2.10.0.8] * Daemon should remove stale published_hostname file and log useful warning [Added in 2.10.0.8] * Revert changes to publish_hostname in RedhatOSModernUtil [Added in 2.10.0.8] * Recover primary nic if down after publishing hostname in RedhatOSUtil [Added in 2.10.0.8] * fix a few typos in the spec file and use proper macros where applicable * remove python3 requires * Restart the agent (bsc#1227600) * The agent service gets restarted in post but may fail due to a missing config file. config files were split into their own package previously. When we detect that we have to restore a config file we also need to restart the agent again. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-289=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-pyasn1-0.5.0-2.9 * python-azure-agent-2.12.0.4-1.1 * python-azure-agent-config-micro-2.12.0.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1203164 * https://bugzilla.suse.com/show_bug.cgi?id=1222620 * https://bugzilla.suse.com/show_bug.cgi?id=1227600 * https://bugzilla.suse.com/show_bug.cgi?id=1235140 * https://jira.suse.com/browse/PED-1298 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:24 -0000 Subject: SUSE-RU-2025:20194-1: important: Recommended update for qemu Message-ID: <174902474419.21522.14259728158977275762@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2025:20194-1 Release Date: 2025-04-22T04:23:14Z Rating: important References: * bsc#1221812 * bsc#1228079 * bsc#1228343 * bsc#1230978 * bsc#1231166 * bsc#1232283 * bsc#1232728 * bsc#1233530 * bsc#1236709 * bsc#1237603 Affected Products: * SUSE Linux Micro 6.0 An update that has 10 fixes can now be installed. ## Description: This update for qemu fixes the following issues: * linux-user: Do not define struct sched_attr if libc headers do (bsc#1237603) * elfload: Fix alignment when unmapping excess reservation (bsc#1236709) * linux-user: Honor elf alignment when placing images (bsc#1236709) * tests/acpi: q35: Update host address width in DMAR (bsc#1228343) * intel_iommu: Set default aw_bits to 48 starting from QEMU 9.2 (bsc#1228343) * tests/acpi: q35: allow DMAR acpi table changes (bsc#1228343) * Update version to 8.2.9 * Full changelog here: https://lore.kernel.org/qemu- devel/568115c5-8908-4931-aae0-a57bf542f68a at tls.msk.ru/ * Some backports: gdbstub/user-target: fix gdbserver int format (%d -> %x) target/s390x: Fix MVC not always invalidating translation blocks physmem: fix qemu_ram_alloc_from_fd size calculation hw/usb/canokey: Fix buffer overflow for OUT packet target/arm: arm_reset_sve_state() should set FPSR, not FPCR hw/cxl: Fix msix_notify: Assertion `vector < dev->msix_entries_nr` tests: acpi: update expected blobs pci: acpi: Windows 'PCI Label Id' bug workaround tests: acpi: whitelist expected blobs pci/msix: Fix msix pba read vector poll end calculation pci: ensure valid link status bits for downstream ports hw/usb/hcd-xhci-pci: Use modulo to select MSI vector as per spec backends/cryptodev-vhost-user: Fix local_error leaks tests/qtest/boot-serial-test: Correct HPPA machine name target/i386/cpu: Fix notes for CPU models docs: Correct release of TCG trace-events removal target/loongarch: Use actual operand size with vbsrl check s390x/s390-virtio-ccw: don't crash on weird RAM sizes vhost-user: fix shared object return values meson.build: Disallow libnfs v6 to fix the broken macOS build hw/intc/arm_gicv3_its: Zero initialize local DTEntry etc structs roms: re-add edk2-basetools target edk2: commit version info edk2: get version + date from git submodule x86/loader: only patch linux kernels * nbd/server: avoid per-NBDRequest nbd_client_get/put() (bsc#1232283) * [openSUSE][RPM] The qemu translation is not being installed (bsc#1231166) * target/i386: Expose IBPB-BRTYPE and SBPB CPUID bits to the guest (bsc#1228079) * [openSUSE] block: Move qcow2 invalidation query-block op_blocker * scsi: megasas: Internal cdbs have 16-byte length (bsc#1233530) * Update version to 8.2.8 * Full changelog here: https://lore.kernel.org/qemu- devel/1b7d3242-abe9-408a-bd77-85162e0d0de4 at tls.msk.ru/ * Some backports: usb-hub: Fix handling port power control messages hw/audio/hda: fix memory leak on audio setup (bsc#1232728) hw/misc/mos6522: Fix bad class definition of the MOS6522 device contrib/plugins: add compat for g_memdup2 target/i386: fix hang when using slow path for ptw_setl tcg: Allow top bit of SIMD_DATA_BITS to be set in simd_desc() linux-user/arm: Select vdso for be8 and be32 modes linux-user/arm: Reduce vdso alignment to 4k linux-user: Tolerate CONFIG_LSM_MMAP_MIN_ADDR accel/tcg: Fix user-only probe_access_internal plugin check target/arm: Drop user-only special case in sve_stN_r linux-user: Fix setreuid and setregid to use direct syscalls target/i386: Fix legacy page table walk 9pfs: fix crash on 'Treaddir' request hw/nvme: fix handling of over-committed queues migration: Ensure vmstate_save() sets errp target/arm: Fix SVE SDOT/UDOT/USDOT (4-way, indexed) target/ppc: Fix mtDPDES targeting SMT siblings target/ppc: Set ctx->opcode for decode_insn32() target/riscv: Fix vcompress with rvv_ta_all_1s target/riscv/kvm: clarify how 'riscv-aia' default works target/riscv/kvm: set 'aia_mode' to default in error path hw/intc/riscv_aplic: Check and update pending when write sourcecfg hw/intc/riscv_aplic: Fix in_clrip[x] read emulation target/riscv: Set vtype.vill on CPU reset ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-287=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-block-curl-debuginfo-8.2.9-1.1 * qemu-ui-opengl-debuginfo-8.2.9-1.1 * qemu-block-ssh-8.2.9-1.1 * qemu-img-debuginfo-8.2.9-1.1 * qemu-pr-helper-debuginfo-8.2.9-1.1 * qemu-ui-spice-core-debuginfo-8.2.9-1.1 * qemu-block-rbd-debuginfo-8.2.9-1.1 * qemu-block-iscsi-8.2.9-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.9-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.9-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.9-1.1 * qemu-ksm-8.2.9-1.1 * qemu-pr-helper-8.2.9-1.1 * qemu-8.2.9-1.1 * qemu-audio-spice-debuginfo-8.2.9-1.1 * qemu-hw-display-qxl-debuginfo-8.2.9-1.1 * qemu-debugsource-8.2.9-1.1 * qemu-hw-display-virtio-vga-8.2.9-1.1 * qemu-hw-usb-redirect-8.2.9-1.1 * qemu-tools-8.2.9-1.1 * qemu-tools-debuginfo-8.2.9-1.1 * qemu-hw-display-qxl-8.2.9-1.1 * qemu-audio-spice-8.2.9-1.1 * qemu-block-ssh-debuginfo-8.2.9-1.1 * qemu-img-8.2.9-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.9-1.1 * qemu-hw-display-virtio-gpu-8.2.9-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.9-1.1 * qemu-chardev-spice-debuginfo-8.2.9-1.1 * qemu-ui-opengl-8.2.9-1.1 * qemu-guest-agent-8.2.9-1.1 * qemu-block-iscsi-debuginfo-8.2.9-1.1 * qemu-hw-usb-host-8.2.9-1.1 * qemu-ui-spice-core-8.2.9-1.1 * qemu-hw-usb-host-debuginfo-8.2.9-1.1 * qemu-block-rbd-8.2.9-1.1 * qemu-block-curl-8.2.9-1.1 * qemu-guest-agent-debuginfo-8.2.9-1.1 * qemu-chardev-spice-8.2.9-1.1 * qemu-debuginfo-8.2.9-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-x86-8.2.9-1.1 * qemu-x86-debuginfo-8.2.9-1.1 * qemu-accel-tcg-x86-8.2.9-1.1 * qemu-accel-tcg-x86-debuginfo-8.2.9-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-seabios-8.2.91.16.3_3_ga95067eb-1.1 * qemu-lang-8.2.9-1.1 * qemu-vgabios-8.2.91.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.9-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-8.2.9-1.1 * qemu-s390x-debuginfo-8.2.9-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-8.2.9-1.1 * qemu-arm-debuginfo-8.2.9-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221812 * https://bugzilla.suse.com/show_bug.cgi?id=1228079 * https://bugzilla.suse.com/show_bug.cgi?id=1228343 * https://bugzilla.suse.com/show_bug.cgi?id=1230978 * https://bugzilla.suse.com/show_bug.cgi?id=1231166 * https://bugzilla.suse.com/show_bug.cgi?id=1232283 * https://bugzilla.suse.com/show_bug.cgi?id=1232728 * https://bugzilla.suse.com/show_bug.cgi?id=1233530 * https://bugzilla.suse.com/show_bug.cgi?id=1236709 * https://bugzilla.suse.com/show_bug.cgi?id=1237603 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:18 -0000 Subject: SUSE-RU-2025:20200-1: moderate: Recommended update for toolbox Message-ID: <174902473897.12703.2754229025122664180@smelt2.prg2.suse.org> # Recommended update for toolbox Announcement ID: SUSE-RU-2025:20200-1 Release Date: 2025-04-22T14:29:25Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for toolbox fixes the following issues: * switch back to toolbox version 5.5 as SLFO code base still has limited set of toos available (and supported) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-294=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * toolbox-2.3+git20231030.3a6ef35-4.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:25 -0000 Subject: SUSE-FU-2025:20193-1: moderate: Feature update for Public Cloud packages Message-ID: <174902474581.21522.1407520941516567175@smelt2.prg2.suse.org> # Feature update for Public Cloud packages Announcement ID: SUSE-FU-2025:20193-1 Release Date: 2025-04-22T03:32:11Z Rating: moderate References: * jsc#SMO-553 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for Public Cloud packages fixes the following issues: google-guest-agent: * Implementation of google-guest-agent at version 20250116.00 (jsc#SMO-553) google-guest-configs: * Implementation of google-guest-configs at version 20241205.00 (jsc#SMO-553) google-guest-oslogin: * Implementation of google-guest-oslogin at version 20231116.00 (jsc#SMO-553) google-osconfig-agent: * Implementation of google-osconfig-agent at version 20250115.01 (jsc#SMO-553) growpart-rootgrow: * Implementation of growpart-rootgrow at version 1.0.7 (jsc#SMO-553) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-288=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * google-guest-oslogin-debuginfo-20231116.00-1.2 * google-guest-oslogin-debugsource-20231116.00-1.2 * google-guest-agent-20250116.00-1.1 * google-osconfig-agent-20250115.01-1.1 * google-guest-oslogin-20231116.00-1.2 * SUSE Linux Micro 6.0 (noarch) * google-guest-configs-20241205.00-1.1 * growpart-rootgrow-1.0.7-1.1 ## References: * https://jira.suse.com/browse/SMO-553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:22 -0000 Subject: SUSE-SU-2025:20199-1: important: Security update for pam_pkcs11 Message-ID: <174902474296.12703.34260889888665144@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:20199-1 Release Date: 2025-04-22T14:29:25Z Rating: important References: * bsc#1237058 * bsc#1237062 Cross-References: * CVE-2025-24031 * CVE-2025-24032 CVSS scores: * CVE-2025-24031 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24031 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-24032 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24032 ( SUSE ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L * CVE-2025-24032 ( NVD ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-24031: Fixed segmentation fault on ctrl-c/ctrl-d when asked for PIN (bsc#1237058). * CVE-2025-24032: Fixed authentication bypass with default value for `cert_policy` (`none`) (bsc#1237062). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-293=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam_pkcs11-debuginfo-0.6.12-3.1 * pam_pkcs11-debugsource-0.6.12-3.1 * pam_pkcs11-0.6.12-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24031.html * https://www.suse.com/security/cve/CVE-2025-24032.html * https://bugzilla.suse.com/show_bug.cgi?id=1237058 * https://bugzilla.suse.com/show_bug.cgi?id=1237062 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:50 -0000 Subject: SUSE-RU-2025:20194-1: important: Recommended update for qemu Message-ID: <174902477021.12703.6248113640046776766@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2025:20194-1 Release Date: 2025-04-22T04:23:14Z Rating: important References: * bsc#1221812 * bsc#1228079 * bsc#1228343 * bsc#1230978 * bsc#1231166 * bsc#1232283 * bsc#1232728 * bsc#1233530 * bsc#1236709 * bsc#1237603 Affected Products: * SUSE Linux Micro 6.0 An update that has 10 fixes can now be installed. ## Description: This update for qemu fixes the following issues: * linux-user: Do not define struct sched_attr if libc headers do (bsc#1237603) * elfload: Fix alignment when unmapping excess reservation (bsc#1236709) * linux-user: Honor elf alignment when placing images (bsc#1236709) * tests/acpi: q35: Update host address width in DMAR (bsc#1228343) * intel_iommu: Set default aw_bits to 48 starting from QEMU 9.2 (bsc#1228343) * tests/acpi: q35: allow DMAR acpi table changes (bsc#1228343) * Update version to 8.2.9 * Full changelog here: https://lore.kernel.org/qemu- devel/568115c5-8908-4931-aae0-a57bf542f68a at tls.msk.ru/ * Some backports: gdbstub/user-target: fix gdbserver int format (%d -> %x) target/s390x: Fix MVC not always invalidating translation blocks physmem: fix qemu_ram_alloc_from_fd size calculation hw/usb/canokey: Fix buffer overflow for OUT packet target/arm: arm_reset_sve_state() should set FPSR, not FPCR hw/cxl: Fix msix_notify: Assertion `vector < dev->msix_entries_nr` tests: acpi: update expected blobs pci: acpi: Windows 'PCI Label Id' bug workaround tests: acpi: whitelist expected blobs pci/msix: Fix msix pba read vector poll end calculation pci: ensure valid link status bits for downstream ports hw/usb/hcd-xhci-pci: Use modulo to select MSI vector as per spec backends/cryptodev-vhost-user: Fix local_error leaks tests/qtest/boot-serial-test: Correct HPPA machine name target/i386/cpu: Fix notes for CPU models docs: Correct release of TCG trace-events removal target/loongarch: Use actual operand size with vbsrl check s390x/s390-virtio-ccw: don't crash on weird RAM sizes vhost-user: fix shared object return values meson.build: Disallow libnfs v6 to fix the broken macOS build hw/intc/arm_gicv3_its: Zero initialize local DTEntry etc structs roms: re-add edk2-basetools target edk2: commit version info edk2: get version + date from git submodule x86/loader: only patch linux kernels * nbd/server: avoid per-NBDRequest nbd_client_get/put() (bsc#1232283) * [openSUSE][RPM] The qemu translation is not being installed (bsc#1231166) * target/i386: Expose IBPB-BRTYPE and SBPB CPUID bits to the guest (bsc#1228079) * [openSUSE] block: Move qcow2 invalidation query-block op_blocker * scsi: megasas: Internal cdbs have 16-byte length (bsc#1233530) * Update version to 8.2.8 * Full changelog here: https://lore.kernel.org/qemu- devel/1b7d3242-abe9-408a-bd77-85162e0d0de4 at tls.msk.ru/ * Some backports: usb-hub: Fix handling port power control messages hw/audio/hda: fix memory leak on audio setup (bsc#1232728) hw/misc/mos6522: Fix bad class definition of the MOS6522 device contrib/plugins: add compat for g_memdup2 target/i386: fix hang when using slow path for ptw_setl tcg: Allow top bit of SIMD_DATA_BITS to be set in simd_desc() linux-user/arm: Select vdso for be8 and be32 modes linux-user/arm: Reduce vdso alignment to 4k linux-user: Tolerate CONFIG_LSM_MMAP_MIN_ADDR accel/tcg: Fix user-only probe_access_internal plugin check target/arm: Drop user-only special case in sve_stN_r linux-user: Fix setreuid and setregid to use direct syscalls target/i386: Fix legacy page table walk 9pfs: fix crash on 'Treaddir' request hw/nvme: fix handling of over-committed queues migration: Ensure vmstate_save() sets errp target/arm: Fix SVE SDOT/UDOT/USDOT (4-way, indexed) target/ppc: Fix mtDPDES targeting SMT siblings target/ppc: Set ctx->opcode for decode_insn32() target/riscv: Fix vcompress with rvv_ta_all_1s target/riscv/kvm: clarify how 'riscv-aia' default works target/riscv/kvm: set 'aia_mode' to default in error path hw/intc/riscv_aplic: Check and update pending when write sourcecfg hw/intc/riscv_aplic: Fix in_clrip[x] read emulation target/riscv: Set vtype.vill on CPU reset ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-287=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-debuginfo-8.2.9-1.1 * qemu-block-rbd-8.2.9-1.1 * qemu-ksm-8.2.9-1.1 * qemu-block-rbd-debuginfo-8.2.9-1.1 * qemu-hw-usb-redirect-8.2.9-1.1 * qemu-debugsource-8.2.9-1.1 * qemu-block-curl-debuginfo-8.2.9-1.1 * qemu-ui-spice-core-8.2.9-1.1 * qemu-ui-opengl-debuginfo-8.2.9-1.1 * qemu-block-curl-8.2.9-1.1 * qemu-img-8.2.9-1.1 * qemu-block-iscsi-8.2.9-1.1 * qemu-tools-8.2.9-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.9-1.1 * qemu-block-ssh-debuginfo-8.2.9-1.1 * qemu-block-ssh-8.2.9-1.1 * qemu-guest-agent-8.2.9-1.1 * qemu-tools-debuginfo-8.2.9-1.1 * qemu-hw-display-qxl-debuginfo-8.2.9-1.1 * qemu-ui-spice-core-debuginfo-8.2.9-1.1 * qemu-audio-spice-8.2.9-1.1 * qemu-audio-spice-debuginfo-8.2.9-1.1 * qemu-hw-usb-host-8.2.9-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.9-1.1 * qemu-ui-opengl-8.2.9-1.1 * qemu-guest-agent-debuginfo-8.2.9-1.1 * qemu-pr-helper-8.2.9-1.1 * qemu-pr-helper-debuginfo-8.2.9-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.9-1.1 * qemu-hw-display-qxl-8.2.9-1.1 * qemu-hw-display-virtio-gpu-8.2.9-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.9-1.1 * qemu-hw-display-virtio-vga-8.2.9-1.1 * qemu-hw-usb-host-debuginfo-8.2.9-1.1 * qemu-8.2.9-1.1 * qemu-chardev-spice-8.2.9-1.1 * qemu-img-debuginfo-8.2.9-1.1 * qemu-chardev-spice-debuginfo-8.2.9-1.1 * qemu-block-iscsi-debuginfo-8.2.9-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.9-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-accel-tcg-x86-debuginfo-8.2.9-1.1 * qemu-x86-debuginfo-8.2.9-1.1 * qemu-x86-8.2.9-1.1 * qemu-accel-tcg-x86-8.2.9-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-lang-8.2.9-1.1 * qemu-vgabios-8.2.91.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.9-1.1 * qemu-seabios-8.2.91.16.3_3_ga95067eb-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-debuginfo-8.2.9-1.1 * qemu-s390x-8.2.9-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-debuginfo-8.2.9-1.1 * qemu-arm-8.2.9-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221812 * https://bugzilla.suse.com/show_bug.cgi?id=1228079 * https://bugzilla.suse.com/show_bug.cgi?id=1228343 * https://bugzilla.suse.com/show_bug.cgi?id=1230978 * https://bugzilla.suse.com/show_bug.cgi?id=1231166 * https://bugzilla.suse.com/show_bug.cgi?id=1232283 * https://bugzilla.suse.com/show_bug.cgi?id=1232728 * https://bugzilla.suse.com/show_bug.cgi?id=1233530 * https://bugzilla.suse.com/show_bug.cgi?id=1236709 * https://bugzilla.suse.com/show_bug.cgi?id=1237603 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:31 -0000 Subject: SUSE-SU-2025:20197-1: moderate: Security update for git Message-ID: <174902475138.12703.6341005326373635022@smelt2.prg2.suse.org> # Security update for git Announcement ID: SUSE-SU-2025:20197-1 Release Date: 2025-04-22T14:06:49Z Rating: moderate References: * bsc#1235600 * bsc#1235601 Cross-References: * CVE-2024-50349 * CVE-2024-52006 CVSS scores: * CVE-2024-50349 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-50349 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-52006 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-52006 ( NVD ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for git fixes the following issues: * CVE-2024-50349: Passwords for trusted sites could be sent to untrusted sites (bsc#1235600). * CVE-2024-52006: Carriage Returns via the credential protocol to credential helpers (bsc#1235601). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-290=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * git-core-debuginfo-2.45.1-2.1 * git-debugsource-2.45.1-2.1 * perl-Git-2.45.1-2.1 * git-core-2.45.1-2.1 * git-debuginfo-2.45.1-2.1 * git-2.45.1-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50349.html * https://www.suse.com/security/cve/CVE-2024-52006.html * https://bugzilla.suse.com/show_bug.cgi?id=1235600 * https://bugzilla.suse.com/show_bug.cgi?id=1235601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:41 -0000 Subject: SUSE-RU-2025:20195-1: important: Recommended update for python-azure-agent Message-ID: <174902476132.12703.11543426844310885593@smelt2.prg2.suse.org> # Recommended update for python-azure-agent Announcement ID: SUSE-RU-2025:20195-1 Release Date: 2025-04-22T09:43:24Z Rating: important References: * bsc#1203164 * bsc#1222620 * bsc#1227600 * bsc#1235140 * jsc#PED-1298 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature and has four fixes can now be installed. ## Description: This update for python-azure-agent fixes the following issues: * Update to version 2.12.04 (bsc#1235140) * Remove the patch handeled by config file specialization sub-packages * The waagent script is executable and we set the proper interpreter using the macro for multibuild python. Do prefix the execution in the service file wit the interpreter * Fix install_requires list syntax * Update spec file * Remove conditions for distros no longer maintained * Simplify build and install conditionals using macros * Enable GA versioning * Cgroups api refactor for v2 * Fix JIT for FIPS 140-3 * reset network service unit file if python version changes * Recognize SLE-Micro as a SLE based distribution * Add distutils/version.py to azurelinuxagent * Use legacycrypt instead of crypt on Python greater than 3.13 * Fix osutil/default route_add to pass string array. * Fix argument to GoalState.init * Add lock around access to fast_track.json * Add DistroVersion class to compare distro versions * LogCollector should skip and log warning for files that don't exist * check for unexpected process in agent cgroups before cgroups enabled * [Redo with correct source/target]: Remove check for "ibXX" interface format and rework mac-address regex to expand support * Fix Ubuntu version codename for 24.04 * Update test certificate data * move setupslice after cgroupsv2 check, remove unit file for log collector and remove fiirewall daemon-reload * Address pylint warning deprecated-method * Run pylint on Python 3.11 * Run unit tests with pytest on Python greater than 3.10 * Log logcollector cgroups if process is found in unexpected slice * remove secret and use cert for aad app in e2e pipeline * suppress pylint warn contextmanager-generator-missing-cleanup * Switching to SNI based authentication for aad app * updated PR template * Avoiding mocked exception from being lost on test when using python 3.12: complete mocked info * Add more useful logging statement for agent unit properties * Remove wireserver fallback for imds calls * Remove unused import * Add support for Azure Linux 3 * Fix pytest warnings * Allow use of node 16 * Send controller/cgroup path telemetry * From 2.13.0.2 * Add support for nftables (+ refactoring of firewall code) * Create walinuxagent nftable atomically * Features in progress (Verify extension signature/Policy Enforcement) * Parse encodedSignature property from EGS * Add Regorus policy engine framework * Remove Regorus and platform check for policy enforcement * Telemetry (update logcollector telemetry with common properties) * Handle non-boolean when parsing extension manifests * Fix unicode type check when parsing extension manifests * Telemetry: high-priority events * Telemetry: report apparent dead code * Cleanup: remove AMA extension services cgroups tracking code * Accommodate the new behavior in OpenSSL 3.2.2 when given an empty input * From 2.11.1.12 * Remove multi config extension status only on extension delete * From 2.111.1.4 * General Improvements * Improvements in telemetry for firewall settings * From 2.10.0.8 * GA versioning * Disabled GA versioning * Add regular expression to match logs from very old agents * Remove empty "distro" module * Enable Python 2.7 for unit tests * Add check for noexec on Permission denied errors * Reorganize file structure of unit tests * Report useful message when extension processing is disabled * Add log and telemetry event for extension disabled * Cleanup common directory * Fix agent memory usage check * enable rhel/centos agent-cgroups * Add support for EC certificates * Add Cpu Arch in local logs and telemetry events * Clarify support status of installing from source. * Gathering Guest ProxyAgent Log Files * Remove debug info from waagent.status.json * Handle errors when adding logs to the archive * Update supported Ubuntu versions * Fix pylint warning * Add information about HTTP proxies * update the proxy agenet log folder for logcollector * Add config parameter to wait for cloud-init (Extensions.WaitForCloudInit) [Added in 2.10.0.8] * Adding AutoUpdate.UpdateToLatestVersion new flag support [Added in 2.10.0.8] * Check certificates only if certificates are included in goal state * Redact access tokens from extension's output * Fix name of single IB device when provisioning RDMA * Port NSBSD system to the latest version of waagent * fix daemon version * fix version checking in setup.py * fix(ubuntu): Point to correct dhcp lease files * Download certs on FT GS after check_certificates only when missing from disk * Add support for EC certificates [Added in 2.10.0.5] * Fix for "local variable _COLLECT_NOEXEC_ERRORS referenced before assignment" [Added in 2.10.0.5] * Cache daemon version [Added in 2.10.0.5] * undo get daemon version change [Added in 2.10.0.5] * fix self-update frequency to spread over 24 hrs for regular type and 4 hrs for hotfix [Added in 2.10.0.5] * ignore dependencies from extensions that do not have settings [Added in 2.10.0.6] * Do not reset the mode of a extension's log directory [Added in 2.10.0.8] * skip cgroup monitoring if log collector doesn't start by the agent. [Added in 2.10.0.8] * NM should not be restarted during hostname publish if NM_CONTROLLED=y [Added in 2.10.0.8] * Daemon should remove stale published_hostname file and log useful warning [Added in 2.10.0.8] * Revert changes to publish_hostname in RedhatOSModernUtil [Added in 2.10.0.8] * Recover primary nic if down after publishing hostname in RedhatOSUtil [Added in 2.10.0.8] * fix a few typos in the spec file and use proper macros where applicable * remove python3 requires * Restart the agent (bsc#1227600) * The agent service gets restarted in post but may fail due to a missing config file. config files were split into their own package previously. When we detect that we have to restore a config file we also need to restart the agent again. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-289=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python-azure-agent-2.12.0.4-1.1 * python-azure-agent-config-micro-2.12.0.4-1.1 * python311-pyasn1-0.5.0-2.9 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1203164 * https://bugzilla.suse.com/show_bug.cgi?id=1222620 * https://bugzilla.suse.com/show_bug.cgi?id=1227600 * https://bugzilla.suse.com/show_bug.cgi?id=1235140 * https://jira.suse.com/browse/PED-1298 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:36 -0000 Subject: SUSE-SU-2025:20196-1: important: Security update for helm Message-ID: <174902475650.12703.16346983767360719935@smelt2.prg2.suse.org> # Security update for helm Announcement ID: SUSE-SU-2025:20196-1 Release Date: 2025-04-22T14:06:49Z Rating: important References: * bsc#1219969 * bsc#1220207 * bsc#1234482 * bsc#1235318 * bsc#1238688 Cross-References: * CVE-2024-25620 * CVE-2024-26147 * CVE-2024-45337 * CVE-2024-45338 * CVE-2025-22870 CVSS scores: * CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-25620 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45338 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45338 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45338 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for helm fixes the following issues: * Update to version 3.17.2 (bsc#1238688, CVE-2025-22870): * Updating to 0.37.0 for x/net * build(deps): bump the k8s-io group with 7 updates * Update to version 3.17.1: * merge null child chart objects * build(deps): bump the k8s-io group with 7 updates * fix: check group for resource info match * Update to 3.17.0 (bsc#1235318, CVE-2024-45338): Full changelog: https://github.com/helm/helm/releases/tag/v3.17.0 * Notable Changes * Allow pulling and installation by OCI digest * Annotations and dependencies are now in chart metadata output * New --take-ownership flag for install and upgrade commands * SDK: Authorizer and registry authorizer are now configurable * Removed the Kubernetes configuration file permissions check * Added username/password to helm push and dependency build/update subcommands * Added toYamlPretty template function * Update to version 3.16.4 (bsc#1234482, CVE-2024-45337): * Bump golang.org/x/crypto from 0.30.0 to 0.31.0 * Bump the k8s-io group with 7 updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-291=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * helm-debuginfo-3.17.2-1.1 * helm-3.17.2-1.1 * SUSE Linux Micro 6.0 (noarch) * helm-bash-completion-3.17.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25620.html * https://www.suse.com/security/cve/CVE-2024-26147.html * https://www.suse.com/security/cve/CVE-2024-45337.html * https://www.suse.com/security/cve/CVE-2024-45338.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1219969 * https://bugzilla.suse.com/show_bug.cgi?id=1220207 * https://bugzilla.suse.com/show_bug.cgi?id=1234482 * https://bugzilla.suse.com/show_bug.cgi?id=1235318 * https://bugzilla.suse.com/show_bug.cgi?id=1238688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:26 -0000 Subject: SUSE-SU-2025:20198-1: important: Security update for podman Message-ID: <174902474614.12703.422813741278293410@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20198-1 Release Date: 2025-04-22T14:29:25Z Rating: important References: * bsc#1239330 Cross-References: * CVE-2024-6104 * CVE-2025-22869 * CVE-2025-27144 CVSS scores: * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239330). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-292=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-4.9.5-4.1 * podman-remote-4.9.5-4.1 * podman-debuginfo-4.9.5-4.1 * podman-remote-debuginfo-4.9.5-4.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1239330 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:12:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:12:51 -0000 Subject: SUSE-FU-2025:20193-1: moderate: Feature update for Public Cloud packages Message-ID: <174902477150.12703.11188165823683928891@smelt2.prg2.suse.org> # Feature update for Public Cloud packages Announcement ID: SUSE-FU-2025:20193-1 Release Date: 2025-04-22T03:32:11Z Rating: moderate References: * jsc#SMO-553 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for Public Cloud packages fixes the following issues: google-guest-agent: * Implementation of google-guest-agent at version 20250116.00 (jsc#SMO-553) google-guest-configs: * Implementation of google-guest-configs at version 20241205.00 (jsc#SMO-553) google-guest-oslogin: * Implementation of google-guest-oslogin at version 20231116.00 (jsc#SMO-553) google-osconfig-agent: * Implementation of google-osconfig-agent at version 20250115.01 (jsc#SMO-553) growpart-rootgrow: * Implementation of growpart-rootgrow at version 1.0.7 (jsc#SMO-553) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-288=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * google-guest-oslogin-20231116.00-1.2 * google-guest-oslogin-debugsource-20231116.00-1.2 * google-guest-oslogin-debuginfo-20231116.00-1.2 * google-osconfig-agent-20250115.01-1.1 * google-guest-agent-20250116.00-1.1 * SUSE Linux Micro 6.0 (noarch) * google-guest-configs-20241205.00-1.1 * growpart-rootgrow-1.0.7-1.1 ## References: * https://jira.suse.com/browse/SMO-553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:18:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:18:40 -0000 Subject: SUSE-SU-2025:20192-1: important: Security update for the Linux Kernel Message-ID: <174902512086.21522.11657378373680904060@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20192-1 Release Date: 2025-04-17T14:34:26Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224013 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1224757 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1228659 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231910 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234074 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237874 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237882 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238052 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238565 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238746 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238970 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238990 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239066 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239684 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239986 * bsc#1239994 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240575 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240806 * bsc#1240808 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240978 * bsc#1240979 * bsc#1241038 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12309 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-27415 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58071 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21729 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21755 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21806 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21836 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21981 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-2312 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 347 vulnerabilities, contains nine features and has 104 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). * CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: fix potential error return (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-14=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-14=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-6.4.0-28.1 * kernel-source-6.4.0-28.1 * kernel-macros-6.4.0-28.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-28.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debuginfo-6.4.0-28.1 * kernel-default-debugsource-6.4.0-28.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-default-1-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-1-3.1 * kernel-default-livepatch-6.4.0-28.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-28.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debugsource-6.4.0-28.1 * kernel-kvmsmall-debuginfo-6.4.0-28.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-28.1.21.6 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-default-6.4.0-28.1 * kernel-64kb-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-28.1 * kernel-64kb-devel-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-obs-build-6.4.0-28.1 * kernel-default-debugsource-6.4.0-28.1 * kernel-syms-6.4.0-28.1 * kernel-default-devel-6.4.0-28.1 * kernel-obs-build-debugsource-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:18:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:18:56 -0000 Subject: SUSE-SU-2025:20191-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <174902513614.21522.7649154059674400038@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20191-1 Release Date: 2025-04-17T10:19:01Z Rating: important References: * bsc#1149841 * bsc#1196281 * bsc#1230998 * bsc#1231993 * bsc#1233679 * bsc#1235218 * bsc#1235452 * bsc#1235916 * bsc#1236783 * bsc#904970 * bsc#907150 * bsc#920615 * bsc#920633 * bsc#930408 Cross-References: * CVE-2024-45016 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56600 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities and has seven fixes can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-56600: Fixed net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-57882: Fixed mptcp: fix TCP options overflow (bsc#1235916) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-10=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-11-rt-debuginfo-3-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-3-1.2 * kernel-livepatch-6_4_0-11-rt-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1149841 * https://bugzilla.suse.com/show_bug.cgi?id=1196281 * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 * https://bugzilla.suse.com/show_bug.cgi?id=904970 * https://bugzilla.suse.com/show_bug.cgi?id=907150 * https://bugzilla.suse.com/show_bug.cgi?id=920615 * https://bugzilla.suse.com/show_bug.cgi?id=920633 * https://bugzilla.suse.com/show_bug.cgi?id=930408 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:19:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:19:05 -0000 Subject: SUSE-SU-2025:20192-1: important: Security update for the Linux Kernel Message-ID: <174902514549.12703.8029383381739778700@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20192-1 Release Date: 2025-04-17T14:34:26Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224013 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1224757 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1228659 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231910 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234074 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237874 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237882 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238052 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238565 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238746 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238970 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238990 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239066 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239684 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239986 * bsc#1239994 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240575 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240806 * bsc#1240808 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240978 * bsc#1240979 * bsc#1241038 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12309 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-27415 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58071 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21729 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21755 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21806 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21836 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21981 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-2312 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 347 vulnerabilities, contains nine features and has 104 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-27415: netfilter: br_netfilter: skip conntrack input hook for promisc packets (bsc#1224757). * CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: fix potential error return (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-14=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-14=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-6.4.0-28.1 * kernel-macros-6.4.0-28.1 * kernel-devel-6.4.0-28.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-28.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-28.1 * kernel-default-debuginfo-6.4.0-28.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-default-livepatch-6.4.0-28.1 * kernel-livepatch-MICRO-6-0_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-1-3.1 * kernel-livepatch-6_4_0-28-default-1-3.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-28.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-28.1 * kernel-kvmsmall-debugsource-6.4.0-28.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-28.1.21.6 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-default-6.4.0-28.1 * kernel-64kb-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-devel-6.4.0-28.1 * kernel-64kb-debugsource-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-default-devel-6.4.0-28.1 * kernel-obs-build-debugsource-6.4.0-28.1 * kernel-default-debugsource-6.4.0-28.1 * kernel-syms-6.4.0-28.1 * kernel-obs-build-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:19:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:19:22 -0000 Subject: SUSE-SU-2025:20191-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <174902516272.12703.1962872967965288399@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20191-1 Release Date: 2025-04-17T10:19:01Z Rating: important References: * bsc#1149841 * bsc#1196281 * bsc#1230998 * bsc#1231993 * bsc#1233679 * bsc#1235218 * bsc#1235452 * bsc#1235916 * bsc#1236783 * bsc#904970 * bsc#907150 * bsc#920615 * bsc#920633 * bsc#930408 Cross-References: * CVE-2024-45016 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56600 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities and has seven fixes can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-56600: Fixed net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-57882: Fixed mptcp: fix TCP options overflow (bsc#1235916) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-10=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-11-rt-3-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-3-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1149841 * https://bugzilla.suse.com/show_bug.cgi?id=1196281 * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 * https://bugzilla.suse.com/show_bug.cgi?id=904970 * https://bugzilla.suse.com/show_bug.cgi?id=907150 * https://bugzilla.suse.com/show_bug.cgi?id=920615 * https://bugzilla.suse.com/show_bug.cgi?id=920633 * https://bugzilla.suse.com/show_bug.cgi?id=930408 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:23:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:23:41 -0000 Subject: SUSE-SU-2025:20190-1: important: Security update for the Linux Kernel Message-ID: <174902542155.21522.16612338863286013902@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20190-1 Release Date: 2025-04-17T10:19:00Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 272 vulnerabilities, contains eight features and has 91 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * add nf_tables for iptables non-legacy network handling. * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-8=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-8=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-28.1 * kernel-source-rt-6.4.0-28.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-28.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-1-3.1 * kernel-livepatch-6_4_0-28-rt-1-3.1 * kernel-rt-debuginfo-6.4.0-28.1 * kernel-rt-debugsource-6.4.0-28.1 * kernel-rt-livepatch-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-debugsource-6.4.0-28.1 * kernel-rt-devel-6.4.0-28.1 * kernel-rt-devel-debuginfo-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:23:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:23:51 -0000 Subject: SUSE-SU-2025:20189-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <174902543103.21522.2252433864278532324@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20189-1 Release Date: 2025-04-17T10:19:00Z Rating: important References: * bsc#1230998 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-7=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_3-debugsource-3-1.2 * kernel-livepatch-6_4_0-20-default-3-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:23:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:23:58 -0000 Subject: SUSE-SU-2025:20188-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174902543825.21522.9390103331422798612@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20188-1 Release Date: 2025-04-17T10:19:00Z Rating: important References: * bsc#1230998 * bsc#1231196 * bsc#1231204 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-46815 * CVE-2024-46818 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves eight vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-46818: Fixed drm/amd/display: check gpio_id before used as array index (bsc#1231204) * CVE-2024-46815: Fixed drm/amd/display: check num_valid_sets before accessing reader_wm_sets[] (bsc#1231196) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-6=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_2-debugsource-3-1.1 * kernel-livepatch-6_4_0-19-default-3-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231196 * https://bugzilla.suse.com/show_bug.cgi?id=1231204 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:02 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:02 -0000 Subject: SUSE-SU-2025:20187-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174902544255.21522.17759998389554521077@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20187-1 Release Date: 2025-04-17T09:25:13Z Rating: important References: * bsc#1235218 * bsc#1235916 Cross-References: * CVE-2024-56600 * CVE-2024-57882 CVSS scores: * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-56600: net: inet6: Fixed dangling sk pointer in inet6_create() (bsc#1235218). * CVE-2024-57882: mptcp: Fixed TCP options overflow (bsc#1235916). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-13=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-2-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-2-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-2-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:10 -0000 Subject: SUSE-SU-2025:20186-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174902545014.21522.9251868978345252866@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20186-1 Release Date: 2025-04-17T09:24:53Z Rating: important References: * bsc#1230998 * bsc#1231196 * bsc#1231204 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-46815 * CVE-2024-46818 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves eight vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-46818: Fixed drm/amd/display: check gpio_id before used as array index (bsc#1231204) * CVE-2024-46815: Fixed drm/amd/display: check num_valid_sets before accessing reader_wm_sets[] (bsc#1231196) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-5=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-10-rt-debuginfo-3-1.1 * kernel-livepatch-6_4_0-10-rt-3-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231196 * https://bugzilla.suse.com/show_bug.cgi?id=1231204 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:14 -0000 Subject: SUSE-SU-2025:20190-1: important: Security update for the Linux Kernel Message-ID: <174902545465.12703.7169349867407731247@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20190-1 Release Date: 2025-04-17T10:19:00Z Rating: important References: * bsc#1012628 * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1219367 * bsc#1221651 * bsc#1222649 * bsc#1222672 * bsc#1222803 * bsc#1223047 * bsc#1224049 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1225981 * bsc#1226871 * bsc#1227858 * bsc#1227937 * bsc#1228521 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230235 * bsc#1230438 * bsc#1230439 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231088 * bsc#1231293 * bsc#1231432 * bsc#1231912 * bsc#1231920 * bsc#1231949 * bsc#1232159 * bsc#1232198 * bsc#1232201 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232508 * bsc#1232520 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1232919 * bsc#1233028 * bsc#1233033 * bsc#1233060 * bsc#1233109 * bsc#1233221 * bsc#1233248 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233522 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234070 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234853 * bsc#1234857 * bsc#1234891 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235244 * bsc#1235435 * bsc#1235436 * bsc#1235441 * bsc#1235455 * bsc#1235485 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235592 * bsc#1235599 * bsc#1235609 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235874 * bsc#1235914 * bsc#1235932 * bsc#1235933 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236113 * bsc#1236114 * bsc#1236115 * bsc#1236122 * bsc#1236123 * bsc#1236133 * bsc#1236138 * bsc#1236199 * bsc#1236200 * bsc#1236203 * bsc#1236205 * bsc#1236206 * bsc#1236333 * bsc#1236573 * bsc#1236575 * bsc#1236576 * bsc#1236591 * bsc#1236661 * bsc#1236677 * bsc#1236680 * bsc#1236681 * bsc#1236682 * bsc#1236683 * bsc#1236684 * bsc#1236685 * bsc#1236689 * bsc#1236692 * bsc#1236694 * bsc#1236698 * bsc#1236700 * bsc#1236702 * bsc#1236752 * bsc#1236757 * bsc#1236758 * bsc#1236759 * bsc#1236760 * bsc#1236761 * bsc#1236821 * bsc#1236822 * bsc#1236896 * bsc#1236897 * bsc#1236952 * bsc#1236967 * bsc#1236994 * bsc#1237007 * bsc#1237017 * bsc#1237025 * bsc#1237028 * bsc#1237029 * bsc#1237045 * bsc#1237126 * bsc#1237132 * bsc#1237139 * bsc#1237155 * bsc#1237158 * bsc#1237159 * bsc#1237164 * bsc#1237232 * bsc#1237234 * bsc#1237313 * bsc#1237325 * bsc#1237356 * bsc#1237415 * bsc#1237452 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237563 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238570 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238739 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12094 * jsc#PED-12251 * jsc#PED-12416 * jsc#PED-348 * jsc#PED-7619 Cross-References: * CVE-2023-52831 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26708 * CVE-2024-26810 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-40980 * CVE-2024-41005 * CVE-2024-41055 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-44974 * CVE-2024-45009 * CVE-2024-45010 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46858 * CVE-2024-47408 * CVE-2024-47701 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49884 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49950 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50056 * CVE-2024-50073 * CVE-2024-50085 * CVE-2024-50115 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50142 * CVE-2024-50152 * CVE-2024-50185 * CVE-2024-50251 * CVE-2024-50258 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-50304 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53123 * CVE-2024-53140 * CVE-2024-53147 * CVE-2024-53163 * CVE-2024-53173 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56579 * CVE-2024-56592 * CVE-2024-56605 * CVE-2024-56633 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56647 * CVE-2024-56658 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56720 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57882 * CVE-2024-57889 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57948 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21636 * CVE-2025-21637 * CVE-2025-21638 * CVE-2025-21639 * CVE-2025-21640 * CVE-2025-21647 * CVE-2025-21659 * CVE-2025-21665 * CVE-2025-21666 * CVE-2025-21667 * CVE-2025-21668 * CVE-2025-21669 * CVE-2025-21670 * CVE-2025-21671 * CVE-2025-21673 * CVE-2025-21675 * CVE-2025-21678 * CVE-2025-21680 * CVE-2025-21681 * CVE-2025-21684 * CVE-2025-21687 * CVE-2025-21688 * CVE-2025-21689 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21693 * CVE-2025-21697 * CVE-2025-21699 * CVE-2025-21700 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52924 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52925 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44974 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53147 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56579 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56592 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56658 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57889 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21665 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21668 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21669 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21673 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21681 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21687 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 272 vulnerabilities, contains eight features and has 91 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-26708: mptcp: fix inconsistent state on fastopen race (bsc#1222672). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp (bsc#1230235). * CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req (bsc#1230438). * CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available (bsc#1230439). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028). * CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption (bsc#1233109). * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248). * CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53147: exfat: fix out-of-bounds access of directory entries (bsc#1234857). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244). * CVE-2024-56633: selftests/bpf: Add apply_bytes test to test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435). * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data (bsc#1235592). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy (bsc#1236113). * CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy (bsc#1236114). * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115). * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122). * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684). * CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680). * CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681). * CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682). * CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683). * CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685). * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689). * CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694). * CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236700). * CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702). * CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls (bsc#1237045). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read() (git-fixes). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V (stable-fixes). * ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes). * ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED (stable-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Add error check for snd_ctl_rename_id() in snd_hda_create_dig_out_ctls() (git-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes). * ALSA: seq: Make dependency on UMP clearer (git-fixes). * ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT (stable- fixes). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * APEI: GHES: Have GHES honor the panic= setting (stable-fixes). * ASoC: Intel: avs: Abstract IPC handling (stable-fixes). * ASoC: Intel: avs: Do not readq() u32 registers (git-fixes). * ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V (stable-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes). * ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (git- fixes). * ASoC: amd: Add ACPI dependency to fix build error (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (stable-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * Fix memory-hotplug regression (bsc#1237504) * Grab mm lock before grabbing pt lock (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: Wacom: Add PCI Wacom device support (stable-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-steam: Add Deck IMU support (stable-fixes). * HID: hid-steam: Add gamepad-only mode switched to by holding options (stable-fixes). * HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes). * HID: hid-steam: Clean up locking (stable-fixes). * HID: hid-steam: Disable watchdog instead of using a heartbeat (stable- fixes). * HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git- fixes). * HID: hid-steam: Fix cleanup in probe() (git-fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: hid-steam: Make sure rumble work is canceled on removal (stable-fixes). * HID: hid-steam: Move hidraw input (un)registering to work (git-fixes). * HID: hid-steam: Update list of identifiers from SDL (stable-fixes). * HID: hid-steam: remove pointless error message (stable-fixes). * HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: multitouch: Add NULL check in mt_input_configured (git-fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: allocate keycode for phone linking (stable-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is cleared (git-fixes). * KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes). * KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset() (jsc#PED-348 git-fixes). * KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes). * KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git- fixes). * KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes). * KVM: arm64: Flush hyp bss section after initialization of variables in bss (git-fixes). * KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state (git-fixes) * KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes). * KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes). * KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled (jsc#PED-348 git-fixes). * KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes bsc#1237155). * KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE (git-fixes). * KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes). * KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX (git-fixes). * KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes). * KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes). * KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git- fixes). * KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git- fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Unconditionally set irr_pending when updating APICv state (jsc#PED-348). * KVM: x86: Zero out PV features cache when the CPUID leaf is not present (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: Use downstream bridges for distributing resources (bsc#1237325). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: hookup irq_get_affinity callback (bsc#1236896). * PCI: imx6: Simplify clock handling by using clk_bulk*() function (git- fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/efa: Reset device on probe failure (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/rxe: Improve newline in printing messages (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable- fixes). * USB: Fix the issue of task recovery failure caused by USB status when S4 wakes up (git-fixes). * USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes). * USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes). * USB: hub: Ignore non-compliant devices with too many configs or interfaces (stable-fixes). * USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes). * USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add MeiG Smart SLM828 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FN990B compositions (stable-fixes). * USB: serial: option: drop MeiG Smart defines (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * Update "drm/mgag200: Added support for the new device G200eH5" (jsc#PED-12094) * Use gcc-13 for build on SLE16 (jsc#PED-10028). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acct: block access to kernel internal filesystems (git-fixes). * acct: perform last write from workqueue (git-fixes). * add nf_tables for iptables non-legacy network handling. * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64: Handle .ARM.attributes section in linker scripts (git-fixes) * arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata-sff: Ensure that we cannot write outside the allocated buffer (stable-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Drop unmanaged ELP metric worker (git-fixes). * batman-adv: Ignore neighbor throughput metrics in error case (stable-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * batman-adv: fix panic during interface removal (git-fixes). * bio-integrity: do not restrict the size of integrity metadata (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Fix class @block_class's subsystem refcount leakage (bsc#1237558). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git- fixes). * blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long (git- fixes). * blk-mq: add number of queue calc helper (bsc#1236897). * blk-mq: create correct map for fallback case (bsc#1236896). * blk-mq: do not count completed flush data request as inflight in case of quiesce (git-fixes). * blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896). * blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1236897). * blk-mq: move cpuhp callback registering out of q->sysfs_lock (git-fixes). * blk-mq: register cpuhp callback after hctx is added to xarray table (git- fixes). * blk-mq: use hk cpus only when isolcpus=managed_irq is enabled (bsc#1236897). * blk_iocost: remove some duplicate irq disable/enables (git-fixes). * block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes). * block: Clear zone limits for a non-zoned stacked queue (git-fixes). * block: Fix elevator_get_default() checking for NULL q->tag_set (git-fixes). * block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes). * block: Fix page refcounts for unaligned buffers in __bio_release_pages() (git-fixes). * block: Provide bdev_open_* functions (git-fixes). * block: Remove special-casing of compound pages (git-fixes). * block: Set memalloc_noio to false on device_add_disk() error path (git- fixes). * block: add a disk_has_partscan helper (git-fixes). * block: add a partscan sysfs attribute for disks (git-fixes). * block: add check of 'minors' and 'first_minor' in device_add_disk() (git- fixes). * block: avoid to reuse `hctx` not removed from cpuhp callback list (git- fixes). * block: change rq_integrity_vec to respect the iterator (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: copy back bounce buffer to user-space correctly in case of split (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: ensure we hold a queue reference when using queue limits (git-fixes). * block: fix and simplify blkdevparts= cmdline parsing (git-fixes). * block: fix bio_split_rw_at to take zone_write_granularity into account (git- fixes). * block: fix integer overflow in BLKSECDISCARD (git-fixes). * block: fix missing dispatching request when queue is started or unquiesced (git-fixes). * block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git- fixes). * block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding (git-fixes). * block: fix sanity checks in blk_rq_map_user_bvec (git-fixes). * block: propagate partition scanning errors to the BLKRRPART ioctl (git- fixes). * block: remove the blk_flush_integrity call in blk_integrity_unregister (git- fixes). * block: retry call probe after request_module in blk_request_module (git- fixes). * block: return unsigned int from bdev_io_min (git-fixes). * block: sed-opal: avoid possible wrong address reference in read_sed_opal_key() (git-fixes). * block: support to account io_ticks precisely (git-fixes). * block: use the right type for stub rq_integrity_vec() (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes). * bnxt_en: Refactor bnxt_ptp_init() (git-fixes). * bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1237232). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1237232). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: c_can: fix unbalanced runtime PM disable in error path (git-fixes). * can: ctucanfd: handle skb allocation failure (git-fixes). * can: etas_es58x: fix potential NULL pointer dereference on udev->serial (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: j1939: j1939_sk_send_loop(): fix unable to send messages with data length zero (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-img: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes). * clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git- fixes). * clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes). * clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes). * clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes). * clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg (git-fixes). * clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes). * clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable() (git-fixes). * clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Set gcc version (jsc#PED-12251). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562). * cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes). * cpufreq: imx6q: do not warn for disabling a non-existing frequency (git- fixes). * cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes). * cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes). * cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes). * cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes). * cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes). * cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes). * cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes). * cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes). * cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes). * cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is not available (git-fixes). * cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks (git-fixes). * cpufreq: s3c64xx: Fix compilation warning (stable-fixes). * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for aead icv error (git-fixes). * crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: hisilicon/sec2 - optimize the error return process (stable-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: Avoid removal of uninserted tid (git-fixes). * cxgb4: use port number to set mac addr (git-fixes). * devlink: avoid potential loop in devlink_rel_nested_in_notify_work() (bsc#1237234). * dlm: fix srcu_read_lock() return type to int (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * doc/README.SUSE: Point to the updated version of LKMPG * doc: update managed_irq documentation (bsc#1236897). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor (stable-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/pm: Mark MM activity as unsupported (stable-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable- fixes). * drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: only flush the validate MES contex (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable- fixes). * drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes). * drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes). * drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/guc: Debug print LRC state entries only if the context is pinned (git-fixes). * drm/i915/pmu: Fix zero delta busyness issue (git-fixes). * drm/i915/selftests: avoid using uninitialized context (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes). * drm/i915: Fix page cleanup on DMA remap failure (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094) * drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes). * drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/msm: Avoid rounding up to one jiffy (git-fixes). * drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/rockchip: move output interface related definition to rockchip_drm_drv.h (stable-fixes). * drm/rockchip: vop2: Fix the windows switch between different layers (git- fixes). * drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes). * drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes). * drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable- fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/virtio: New fence for every plane update (stable-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * efi: Avoid cold plugged memory for placing the kernel (stable-fixes). * efi: libstub: Use '-std=gnu11' to fix build with GCC 15 (stable-fixes). * eth: gve: use appropriate helper to set xdp_features (git-fixes). * exfat: convert to ctime accessor functions (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix file being changed by unaligned direct write (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: fix zero the unwritten part for dio read (git-fixes). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * futex: Do not include process MM in futex key on no-MMU (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes). * gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes). * gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git- fixes). * gpio: pca953x: Improve interrupt support (git-fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: stmpe: Check return value of stmpe_reg_read in stmpe_gpio_irq_sync_unlock (git-fixes). * gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes). * gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * hfs: Sanity check the root record (git-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * iavf: allow changing VLAN state without calling PF (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: Skip PTP HW writes during PTP reset procedure (git-fixes). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1237415). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415). * ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git- fixes). * ice: fix incorrect PHY settings for 100 GB/s (git-fixes). * ice: fix max values for dpll pin phase adjust (git-fixes). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415). * ice: gather page_count()'s of each frag right before XDP prog call (git- fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: put Rx buffers after being done with current frame (git-fixes). * ice: stop storing XDP verdict within ice_rx_buf (git-fixes). * ice: use internal pf id instead of function number (git-fixes). * idpf: add read memory barrier when checking descriptor done bit (git-fixes). * idpf: call set_real_num_queues in idpf_open (bsc#1236661). * idpf: convert workqueues to unbound (git-fixes). * idpf: fix VF dynamic interrupt ctl register initialization (git-fixes). * idpf: fix handling rsc packet with a single segment (git-fixes). * igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes). * igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes). * igc: return early when failing to read EECD register (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: fix bus type (bsc#1236896). * kabi: fix group_cpus_evenly (bsc#1236897). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kbuild: userprogs: fix bitsize and target detection on clang (git-fixes). * kernel-source: Also replace bin/env * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897). * lib/group_cpus: let group_cpu_evenly return number initialized masks (bsc#1236897). * lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: stackinit: hide never-taken branch from compiler (stable-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes). * lockdep: fix deadlock issue between lockdep and rcu (git-fixes). * locking/lockdep: Avoid creating new name string literals in lockdep_set_subclass() (git-fixes). * locking/rwsem: Add __always_inline annotation to __down_write_common() and inlined callers (git-fixes). * loop: do not set QUEUE_FLAG_NOMERGES (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: convert comma to semicolon (git-fixes). * mdacon: rework dependency list (git-fixes). * media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes). * media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes). * media: firewire: firedtv-avc.c: replace BUG with proper, error return (git- fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: ov08x40: Fix hblank out of range issue (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes). * media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a camera (stable-fixes). * media: uvcvideo: Implement dual stream quirk to fix loss of usb packets (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable- fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes (mm/compaction)). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes). * mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mptcp: export local_address (git-fixes) * mptcp: fix NL PM announced address accounting (git-fixes) * mptcp: fix data races on local_id (git-fixes) * mptcp: fix inconsistent state on fastopen race (bsc#1222672). * mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes) * mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes) * mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes) * mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git- fixes) * mptcp: pm: deny endp with signal + subflow + port (git-fixes) * mptcp: pm: do not ignore 'subflow' if 'signal' flag is also set (git-fixes) * mptcp: pm: do not try to create sf if alloc failed (git-fixes) * mptcp: pm: fullmesh: select the right ID later (git-fixes) * mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes) * mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes) * mptcp: pm: re-using ID of unused flushed subflows (git-fixes) * mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes) * mptcp: pm: re-using ID of unused removed subflows (git-fixes) * mptcp: pm: reduce indentation blocks (git-fixes) * mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes) * mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes) * mptcp: unify pm get_local_id interfaces (git-fixes) * mptcp: unify pm set_flags interfaces (git-fixes) * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes). * mtd: rawnand: cadence: fix incorrect device in dma_unmap_single (git-fixes). * mtd: rawnand: cadence: fix unchecked dereference (git-fixes). * mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes). * nbd: Fix signal handling (git-fixes). * nbd: Improve the documentation of the locking assumptions (git-fixes). * nbd: do not allow reconnect after disconnect (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/mlx5: Correct TASR typo into TSAR (git-fixes). * net/mlx5: Fix RDMA TX steering prio (git-fixes). * net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981). * net/mlx5: SF, Fix add port error handling (git-fixes). * net/mlx5: Verify support for scheduling element and TSAR type (git-fixes). * net/mlx5e: Always start IPsec sequence number from 1 (git-fixes). * net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes). * net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: add dev_net_rcu() helper (bsc#1239994). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: rose: lock the socket in rose_bind() (git-fixes). * net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes). * net: smc: fix spurious error message from __sock_release() (bsc#1237126). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: iosm: Fix hibernation by re-binding the driver around it (stable- fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nouveau/svm: fix missing folio unlock + put after make_device_exclusive_range() (git-fixes). * null_blk: Do not allow runt zone with zone capacity smaller then zone size (git-fixes). * null_blk: Fix missing mutex_destroy() at module removal (git-fixes). * null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git- fixes). * null_blk: Print correct max open zones limit in null_init_zoned_dev() (git- fixes). * null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes). * null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes). * null_blk: fix validation of block size (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix incorrect CPU endianness conversion causing mount failure (bsc#1236138). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * padata: Clean up in padata_do_multithreaded() (bsc#1237563). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * padata: fix sysfs store callback check (git-fixes). * partitions: ldm: remove the initial kernel-doc notation (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452). * platform/x86/intel-uncore-freq: Increase minor number support (bsc#1237452). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1237452). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Ignore minor version change (bsc#1237452). * platform/x86: acer-wmi: Ignore AC events (stable-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: int3472: Check for adev == NULL (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: da9150-fg: fix potential overflow (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199). * powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline (bsc#1215199). * powerpc/code-patching: Disable KASAN report during patching via temporary mm (bsc#1215199). * powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode (ltc#210895 bsc#1235933 ltc#210896 bsc#1235932). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967 ltc#210988). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * r8169: enable SG/TSO on selected chip versions per default (bsc#1235874). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings (git-fixes). * rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes). * rbd: do not move requests to the running list on errors (git-fixes). * rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes). * regmap-irq: Add missing kfree() (git-fixes). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes bsc#1236205). * s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158). * s390/iucv: fix receive buffer virtual vs physical address confusion (git- fixes bsc#1236200). * s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails (bsc#1236752). * s390/pci: Ignore RID for isolated VFs (bsc#1236752). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/pci: Sort PCI functions prior to creating virtual busses (bsc#1236752). * s390/pci: Use topology ID for multi-function devices (bsc#1236752). * s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/topology: Improve topology detection (bsc#1236591). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes bsc#1236203). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * scripts/gdb: fix aarch64 userspace detection in get_current_task (stable- fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: myrb: Remove dead code (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues (bsc#1236896). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * scsi: use block layer helpers to calculate num of queues (bsc#1236897). * selftest: hugetlb_dio: fix test naming (git-fixes). * selftest: mm: Test if hugepage does not get leaked during __bio_release_pages() (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/futex: pass _GNU_SOURCE without a value to the compiler (git- fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes). * selftests: hugetlb_dio: check for initial conditions to skip in the start (git-fixes). * selftests: hugetlb_dio: fixup check for initial conditions to skip in the start (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: connect: -f: no reconnect (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250: Fix fifo underflow on flush (git-fixes). * serial: sc16is7xx: use device_property APIs when configuring irda mode (stable-fixes). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix corruption in cifs_extend_writeback (bsc#1235609). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes). * soc: qcom: socinfo: move SMEM item struct and defines to a header (git- fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes). * spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families (stable-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: sn-f-ospi: Fix division by zero (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: fix annoying "mkdir -p ..." logs when building tools in parallel (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tty: xilinx_uartps: split sysrq handling (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: fix error code for unsupported command (git-fixes). * ublk: fix ublk_ch_mmap() for 64K page size (git-fixes). * ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes). * ublk: move zone report data out of request pdu (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdc-acm: Check control transfer buffer size before access (git-fixes). * usb: cdc-acm: Fix handling of oversized fragments (git-fixes). * usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove() and in the error path of .probe() (git-fixes). * usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes). * usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes). * usb: dwc3: Fix timeout issue during controller enter/exit from halt state (git-fixes). * usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: core: flush gadget workqueue after device removal (git-fixes). * usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind retries (git-fixes). * usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device (git-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: roles: set switch registered flag early on (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Fix NULL pointer dereference on certain command aborts (git- fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet: ipheth: document scope of NCM implementation (stable-fixes). * util_macros.h: fix/rework find_closest() macros (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vfio/pci: Lock external INTx masking ops (bsc#1222803). * vhost/net: Set num_buffers for virtio 1.0 (git-fixes). * virtio-mem: check if the config changed before fake offlining memory (git- fixes). * virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git- fixes). * virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) (git-fixes). * virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes). * virtio: blk/scsi: replace blk_mq_virtio_map_queues with blk_mq_map_hw_queues (bsc#1236896). * virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1236897). * virtio: hookup irq_get_affinity callback (bsc#1236896). * virtio_blk: reverse request order in virtio_queue_rqs (git-fixes). * vsock/virtio: cancel close work in the destructor (git-fixes) * vsock: Keep the binding until socket destruction (git-fixes) * vsock: reset socket state when de-assigning the transport (git-fixes) * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath12k: fix handling of 6 GHz rules (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcmfmac: Check the return value of of_property_read_string_index() (stable-fixes). * wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable- fixes). * wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (stable-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: avoid memory leak (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes). * wifi: mt76: mt7915: fix omac index assignment after hardware reset (git- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes). * wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes). * wifi: rtw89: add crystal_cap check to avoid setting as overflow value (stable-fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/asm: Make serialize() always_inline (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes). * x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Carve out INVLPG inline asm for use by others (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (git-fixes). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: dbgtty: remove kfifo_out() wrapper (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-8=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-8=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-28.1 * kernel-source-rt-6.4.0-28.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-28.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-28-rt-1-3.1 * kernel-rt-debugsource-6.4.0-28.1 * kernel-rt-debuginfo-6.4.0-28.1 * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-1-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-1-3.1 * kernel-rt-livepatch-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-28.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-debugsource-6.4.0-28.1 * kernel-rt-devel-debuginfo-6.4.0-28.1 * kernel-rt-devel-6.4.0-28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26708.html * https://www.suse.com/security/cve/CVE-2024-26810.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-40980.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41055.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-44974.html * https://www.suse.com/security/cve/CVE-2024-45009.html * https://www.suse.com/security/cve/CVE-2024-45010.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46858.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50085.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50142.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50185.html * https://www.suse.com/security/cve/CVE-2024-50251.html * https://www.suse.com/security/cve/CVE-2024-50258.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-50304.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53123.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53147.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56579.html * https://www.suse.com/security/cve/CVE-2024-56592.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56647.html * https://www.suse.com/security/cve/CVE-2024-56658.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56720.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://www.suse.com/security/cve/CVE-2024-57889.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21636.html * https://www.suse.com/security/cve/CVE-2025-21637.html * https://www.suse.com/security/cve/CVE-2025-21638.html * https://www.suse.com/security/cve/CVE-2025-21639.html * https://www.suse.com/security/cve/CVE-2025-21640.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21665.html * https://www.suse.com/security/cve/CVE-2025-21666.html * https://www.suse.com/security/cve/CVE-2025-21667.html * https://www.suse.com/security/cve/CVE-2025-21668.html * https://www.suse.com/security/cve/CVE-2025-21669.html * https://www.suse.com/security/cve/CVE-2025-21670.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21673.html * https://www.suse.com/security/cve/CVE-2025-21675.html * https://www.suse.com/security/cve/CVE-2025-21678.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://www.suse.com/security/cve/CVE-2025-21681.html * https://www.suse.com/security/cve/CVE-2025-21684.html * https://www.suse.com/security/cve/CVE-2025-21687.html * https://www.suse.com/security/cve/CVE-2025-21688.html * https://www.suse.com/security/cve/CVE-2025-21689.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21697.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219367 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222672 * https://bugzilla.suse.com/show_bug.cgi?id=1222803 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225981 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1227937 * https://bugzilla.suse.com/show_bug.cgi?id=1228521 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230235 * https://bugzilla.suse.com/show_bug.cgi?id=1230438 * https://bugzilla.suse.com/show_bug.cgi?id=1230439 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231088 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232508 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233028 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233109 * https://bugzilla.suse.com/show_bug.cgi?id=1233221 * https://bugzilla.suse.com/show_bug.cgi?id=1233248 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233522 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234070 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234857 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235244 * https://bugzilla.suse.com/show_bug.cgi?id=1235435 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235441 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235592 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235609 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235874 * https://bugzilla.suse.com/show_bug.cgi?id=1235914 * https://bugzilla.suse.com/show_bug.cgi?id=1235932 * https://bugzilla.suse.com/show_bug.cgi?id=1235933 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236113 * https://bugzilla.suse.com/show_bug.cgi?id=1236114 * https://bugzilla.suse.com/show_bug.cgi?id=1236115 * https://bugzilla.suse.com/show_bug.cgi?id=1236122 * https://bugzilla.suse.com/show_bug.cgi?id=1236123 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236199 * https://bugzilla.suse.com/show_bug.cgi?id=1236200 * https://bugzilla.suse.com/show_bug.cgi?id=1236203 * https://bugzilla.suse.com/show_bug.cgi?id=1236205 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236573 * https://bugzilla.suse.com/show_bug.cgi?id=1236575 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236591 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236680 * https://bugzilla.suse.com/show_bug.cgi?id=1236681 * https://bugzilla.suse.com/show_bug.cgi?id=1236682 * https://bugzilla.suse.com/show_bug.cgi?id=1236683 * https://bugzilla.suse.com/show_bug.cgi?id=1236684 * https://bugzilla.suse.com/show_bug.cgi?id=1236685 * https://bugzilla.suse.com/show_bug.cgi?id=1236689 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236694 * https://bugzilla.suse.com/show_bug.cgi?id=1236698 * https://bugzilla.suse.com/show_bug.cgi?id=1236700 * https://bugzilla.suse.com/show_bug.cgi?id=1236702 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236759 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1236896 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1236952 * https://bugzilla.suse.com/show_bug.cgi?id=1236967 * https://bugzilla.suse.com/show_bug.cgi?id=1236994 * https://bugzilla.suse.com/show_bug.cgi?id=1237007 * https://bugzilla.suse.com/show_bug.cgi?id=1237017 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237045 * https://bugzilla.suse.com/show_bug.cgi?id=1237126 * https://bugzilla.suse.com/show_bug.cgi?id=1237132 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237155 * https://bugzilla.suse.com/show_bug.cgi?id=1237158 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237232 * https://bugzilla.suse.com/show_bug.cgi?id=1237234 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237325 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237415 * https://bugzilla.suse.com/show_bug.cgi?id=1237452 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12094 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:16 -0000 Subject: SUSE-RU-2025:20185-1: important: Recommended update for salt Message-ID: <174902545672.21522.4996729356188396771@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20185-1 Release Date: 2025-04-14T09:32:05Z Rating: important References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 Affected Products: * SUSE Linux Micro 6.0 An update that has seven fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fixed aptpkg 'NoneType object has no attribute split' error * Detect openEuler as RedHat family OS * Ensure the correct crypt module is loaded * Implemented multiple inventory for ansible.targets * Made x509 module compatible with M2Crypto 0.44.0 * Removed deprecated code from x509.certificate_managed test mode * Move logrotate config to /usr/etc/logrotate.d where possible * Added DEB822 apt repository format support * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Fixed issue of using update-alternatives with alts (#105) * Fixed virt_query outputter and added support for block devices * Made _auth calls visible with master stats * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Enhanced batch async and fixed some detected issues * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944) (bsc#1234881) (bsc#1220905) * Adapt to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Fixed issues running on Python 3.12 and 3.13 * Enhancements of Salt packaging: * Use update-alternatives for all salt scripts * Use flexible dependencies for the subpackages * Made salt-minion to require flavored zypp-plugin * Made zyppnotify to use update-alternatives * Dropped unused yumnotify plugin * Added dependency to python3-dnf-plugins-core for RHEL based ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-286=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-master-3006.0-10.1 * salt-minion-3006.0-10.1 * salt-3006.0-10.1 * salt-transactional-update-3006.0-10.1 * python311-salt-3006.0-10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:20 -0000 Subject: SUSE-SU-2025:20184-1: important: Security update for elemental-operator Message-ID: <174902546086.21522.9789657762205784186@smelt2.prg2.suse.org> # Security update for elemental-operator Announcement ID: SUSE-SU-2025:20184-1 Release Date: 2025-04-11T10:56:08Z Rating: important References: * bsc#1238700 * bsc#1239335 Cross-References: * CVE-2025-22869 * CVE-2025-22870 CVSS scores: * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for elemental-operator fixes the following issues: * Updated to version 1.6.8: * Deactivated e2e workflow * Updated header year * CVE-2025-22870: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700) * CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange (bsc#1239335) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-284=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-support-1.6.8-1.1 * elemental-register-1.6.8-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1238700 * https://bugzilla.suse.com/show_bug.cgi?id=1239335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:22 -0000 Subject: SUSE-RU-2025:20183-1: moderate: Recommended update for timezone Message-ID: <174902546244.21522.417701030474212967@smelt2.prg2.suse.org> # Recommended update for timezone Announcement ID: SUSE-RU-2025:20183-1 Release Date: 2025-04-08T08:49:04Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for timezone fixes the following issues: Update to 2025b: * New zone for Ays?n Region in Chile (America/Coyhaique) which moves from -04/-03 to -03 Update to 2025a: * Paraguay adopts permanent -03 starting spring 2024 * Improve pre-1991 data for the Philippines * Etc/Unknown is now reserved Update to 2024b: * Improve historical data for Mexico, Mongolia, and Portugal. * System V names are now obsolescent. * The main data form now uses %z. * The code now conforms to RFC 8536 for early timestamps. * Support POSIX.1-2024, which removes asctime_r and ctime_r. * Assume POSIX.2-1992 or later for shell scripts. * SUPPORT_C89 now defaults to 1. Update to 2024a: * Kazakhstan unifies on UTC+5. This affects Asia/Almaty and Asia/Qostanay which together represent the eastern portion of the country that will transition from UTC+6 on 2024-03-01 at 00:00 to join the western portion. (Thanks to Zhanbolat Raimbekov.) * Palestine springs forward a week later than previously predicted in 2024 and 2025. (Thanks to Heba Hamad.) Change spring-forward predictions to the second Saturday after Ramadan, not the first; this also affects other predictions starting in 2039. * Asia/Ho_Chi_Minh's 1955-07-01 transition occurred at 01:00 not 00:00. (Thanks to ?o?n Tr?n C?ng Danh.) * From 1947 through 1949, Toronto's transitions occurred at 02:00 not 00:00. (Thanks to Chris Walton.) * In 1911 Miquelon adopted standard time on June 15, not May 15. * The FROM and TO columns of Rule lines can no longer be "minimum" or an abbreviation of "minimum", because TZif files do not support DST rules that extend into the indefinite past - although these rules were supported when TZif files had only 32-bit data, this stopped working when 64-bit TZif files were introduced in 1995. This should not be a problem for realistic data, since DST was first used in the 20th century. As a transition aid, FROM columns like "minimum" are now diagnosed and then treated as if they were the year 1900; this should suffice for TZif files on old systems with only 32-bit time_t, and it is more compatible with bugs in 2023c-and-earlier localtime.c. (Problem reported by Yoshito Umaoka.) * localtime and related functions no longer mishandle some timestamps that occur about 400 years after a switch to a time zone with a DST schedule. In 2023d data this problem was visible for some timestamps in November 2422, November 2822, etc. in America/Ciudad_Juarez. (Problem reported by Gilmore Davidson.) * strftime %s now uses tm_gmtoff if available. (Problem and draft patch reported by Dag-Erling Sm?rgrav.) * The strftime man page documents which struct tm members affect which conversion specs, and that tzset is called. (Problems reported by Robert Elz and Steve Summit.) Update to 2023d: * Ittoqqortoormiit, Greenland changes time zones on 2024-03-31. * Vostok, Antarctica changed time zones on 2023-12-18. * Casey, Antarctica changed time zones five times since 2020. * Code and data fixes for Palestine timestamps starting in 2072. * A new data file zonenow.tab for timestamps starting now. * Fix predictions for DST transitions in Palestine in 2072-2075, correcting a typo introduced in 2023a. * Vostok, Antarctica changed to +05 on 2023-12-18. It had been at +07 (not +06) for years. * Change data for Casey, Antarctica to agree with timeanddate.com, by adding five time zone changes since 2020. Casey is now at +08 instead of +11. * Much of Greenland, represented by America/Nuuk, changed its standard time from -03 to -02 on 2023-03-25, not on 2023-10-28. * localtime.c no longer mishandles TZif files that contain a single transition into a DST regime. Previously, it incorrectly assumed DST was in effect before the transition too. * tzselect no longer creates temporary files. * tzselect no longer mishandles the following: * Spaces and most other special characters in BUGEMAIL, PACKAGE, TZDIR, and VERSION. * TZ strings when using mawk 1.4.3, which mishandles regular expressions of the form /X{2,}/. * ISO 6709 coordinates when using an awk that lacks the GNU extension of newlines in -v option-arguments. * Non UTF-8 locales when using an iconv command that lacks the GNU //TRANSLIT extension. * zic no longer mishandles data for Palestine after the year 2075. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-283=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * timezone-debugsource-2025b-1.1 * timezone-2025b-1.1 * timezone-debuginfo-2025b-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:23 -0000 Subject: SUSE-SU-2025:20189-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <174902546378.12703.2922892155293714069@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20189-1 Release Date: 2025-04-17T10:19:00Z Rating: important References: * bsc#1230998 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-7=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-20-default-3-1.2 * kernel-livepatch-MICRO-6-0_Update_3-debugsource-3-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:24 -0000 Subject: SUSE-RU-2025:20182-1: moderate: Recommended update for suse-build-key Message-ID: <174902546490.21522.3151603374371206693@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2025:20182-1 Release Date: 2025-04-08T08:49:04Z Rating: moderate References: * bsc#1236779 * bsc#1237294 * jsc#PED-12321 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature and has two fixes can now be installed. ## Description: This update for suse-build-key fixes the following issues: * changed RPM/repo signing keys to use SHA256 UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321) * gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc * gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc * suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-282=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * suse-build-key-12.0-5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236779 * https://bugzilla.suse.com/show_bug.cgi?id=1237294 * https://jira.suse.com/browse/PED-12321 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:32 -0000 Subject: SUSE-SU-2025:20188-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174902547210.12703.10225682886093430738@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20188-1 Release Date: 2025-04-17T10:19:00Z Rating: important References: * bsc#1230998 * bsc#1231196 * bsc#1231204 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-46815 * CVE-2024-46818 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves eight vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-46818: Fixed drm/amd/display: check gpio_id before used as array index (bsc#1231204) * CVE-2024-46815: Fixed drm/amd/display: check num_valid_sets before accessing reader_wm_sets[] (bsc#1231196) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-6=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-3-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-3-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231196 * https://bugzilla.suse.com/show_bug.cgi?id=1231204 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:33 -0000 Subject: SUSE-RU-2025:20181-1: important: Recommended update for cloud-init Message-ID: <174902547376.21522.13971653379552786028@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20181-1 Release Date: 2025-04-08T08:38:21Z Rating: important References: * bsc#1212476 * bsc#1219680 * bsc#1227237 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for cloud-init fixes the following issues: * Wait for udev once if we cannot find the expected MAC (bsc#1227237) * Remove dependency on /usr/bin/python3 via using the macros (bsc#1212476) * Brute force approach to skip renames if the device is already present ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-281=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cloud-init-23.3-8.1 * cloud-init-config-suse-23.3-8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212476 * https://bugzilla.suse.com/show_bug.cgi?id=1219680 * https://bugzilla.suse.com/show_bug.cgi?id=1227237 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:36 -0000 Subject: SUSE-SU-2025:20187-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174902547642.12703.5886236937258900359@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20187-1 Release Date: 2025-04-17T09:25:13Z Rating: important References: * bsc#1235218 * bsc#1235916 Cross-References: * CVE-2024-56600 * CVE-2024-57882 CVSS scores: * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-56600: net: inet6: Fixed dangling sk pointer in inet6_create() (bsc#1235218). * CVE-2024-57882: mptcp: Fixed TCP options overflow (bsc#1235916). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-13=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-2-1.2 * kernel-livepatch-6_4_0-24-default-2-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-2-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:36 -0000 Subject: SUSE-SU-2025:20180-1: moderate: Security update for procps Message-ID: <174902547631.21522.7864354963537129650@smelt2.prg2.suse.org> # Security update for procps Announcement ID: SUSE-SU-2025:20180-1 Release Date: 2025-04-08T07:59:48Z Rating: moderate References: * bsc#1236842 Cross-References: * CVE-2023-4016 CVSS scores: * CVE-2023-4016 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-4016 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for procps fixes the following issues: * Fixed regression introduced with the CVE-2023-4016 fix. The ps command segfaults when pid argument has a leading space (bsc#1236842). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-279=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * procps-debugsource-3.3.17-5.1 * libprocps8-debuginfo-3.3.17-5.1 * libprocps8-3.3.17-5.1 * procps-debuginfo-3.3.17-5.1 * procps-3.3.17-5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4016.html * https://bugzilla.suse.com/show_bug.cgi?id=1236842 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:40 -0000 Subject: SUSE-SU-2025:20179-1: important: Security update for skopeo Message-ID: <174902548048.21522.4688021160667803934@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20179-1 Release Date: 2025-04-07T09:35:26Z Rating: important References: * bsc#1227056 * bsc#1236483 * bsc#1237613 * bsc#1238685 Cross-References: * CVE-2023-45288 * CVE-2024-6104 * CVE-2025-22870 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for skopeo fixes the following issues: * CVE-2025-22870: golang.org/x/net/proxy: proxy bypass using IPv6 zone IDs (bsc#1238685) * CVE-2025-27144: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go- jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237613) * CVE-2024-6104: hashicorp/go-retryablehttp: url might write sensitive information to log file (bsc#1227056) * CVE-2023-45288: golang.org/x/net/http2: close connections when receiving too many headers (bsc#1236483) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-278=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * skopeo-1.14.4-3.1 * skopeo-debuginfo-1.14.4-3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227056 * https://bugzilla.suse.com/show_bug.cgi?id=1236483 * https://bugzilla.suse.com/show_bug.cgi?id=1237613 * https://bugzilla.suse.com/show_bug.cgi?id=1238685 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:43 -0000 Subject: SUSE-SU-2025:20186-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174902548330.12703.13863857088292629328@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20186-1 Release Date: 2025-04-17T09:24:53Z Rating: important References: * bsc#1230998 * bsc#1231196 * bsc#1231204 * bsc#1231993 * bsc#1233679 * bsc#1235452 * bsc#1235916 * bsc#1236783 Cross-References: * CVE-2024-45016 * CVE-2024-46815 * CVE-2024-46818 * CVE-2024-47684 * CVE-2024-50302 * CVE-2024-53104 * CVE-2024-56648 * CVE-2024-57882 CVSS scores: * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57882 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves eight vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-57882: Fixed mptcp: fix TCP options overflow. (bsc#1235916) * CVE-2024-46818: Fixed drm/amd/display: check gpio_id before used as array index (bsc#1231204) * CVE-2024-46815: Fixed drm/amd/display: check num_valid_sets before accessing reader_wm_sets[] (bsc#1231196) * CVE-2024-56648: Fixed net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452) * CVE-2024-50302: Fixed HID: core: zero-initialize the report buffer (bsc#1233679) * CVE-2024-53104: Fixed media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783) * CVE-2024-45016: Fixed netem: fix return value if duplicate enqueue fails (bsc#1230998) * CVE-2024-47684: Fixed tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-5=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-3-1.1 * kernel-livepatch-6_4_0-10-rt-3-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-57882.html * https://bugzilla.suse.com/show_bug.cgi?id=1230998 * https://bugzilla.suse.com/show_bug.cgi?id=1231196 * https://bugzilla.suse.com/show_bug.cgi?id=1231204 * https://bugzilla.suse.com/show_bug.cgi?id=1231993 * https://bugzilla.suse.com/show_bug.cgi?id=1233679 * https://bugzilla.suse.com/show_bug.cgi?id=1235452 * https://bugzilla.suse.com/show_bug.cgi?id=1235916 * https://bugzilla.suse.com/show_bug.cgi?id=1236783 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:41 -0000 Subject: SUSE-RU-2025:20178-1: moderate: Recommended update for tpm2-openssl Message-ID: <174902548170.21522.16674258052866294021@smelt2.prg2.suse.org> # Recommended update for tpm2-openssl Announcement ID: SUSE-RU-2025:20178-1 Release Date: 2025-04-07T09:27:56Z Rating: moderate References: * jsc#PED-11054 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for tpm2-openssl fixes the following issues: This update adds tpm2-openssl to SL Micro 6.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-277=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * tpm2-openssl-debuginfo-1.3.0-1.1 * tpm2-openssl-debugsource-1.3.0-1.1 * tpm2-openssl-1.3.0-1.1 ## References: * https://jira.suse.com/browse/PED-11054 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:45 -0000 Subject: SUSE-SU-2025:20177-1: important: Security update for libxml2 Message-ID: <174902548514.21522.1290028700211017309@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20177-1 Release Date: 2025-04-04T13:07:29Z Rating: important References: * bsc#1237363 * bsc#1237370 * bsc#1237418 Cross-References: * CVE-2024-56171 * CVE-2025-24928 * CVE-2025-27113 CVSS scores: * CVE-2024-56171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-24928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-24928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-27113 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27113 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-56171: Fixed use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c (bsc#1237363). * CVE-2025-24928: Fixed stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370). * CVE-2025-27113: Fixed NULL Pointer Dereference in xmlPatMatch (bsc#1237418). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-272=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxml2-2-2.11.6-5.1 * libxml2-tools-2.11.6-5.1 * libxml2-2-debuginfo-2.11.6-5.1 * libxml2-debugsource-2.11.6-5.1 * libxml2-tools-debuginfo-2.11.6-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56171.html * https://www.suse.com/security/cve/CVE-2025-24928.html * https://www.suse.com/security/cve/CVE-2025-27113.html * https://bugzilla.suse.com/show_bug.cgi?id=1237363 * https://bugzilla.suse.com/show_bug.cgi?id=1237370 * https://bugzilla.suse.com/show_bug.cgi?id=1237418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:46 -0000 Subject: SUSE-RU-2025:20176-1: important: Recommended update for openscap Message-ID: <174902548691.21522.5493614212232471650@smelt2.prg2.suse.org> # Recommended update for openscap Announcement ID: SUSE-RU-2025:20176-1 Release Date: 2025-04-03T12:52:09Z Rating: important References: * jsc#SMO-388 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for openscap fixes the following issues: This update ships openscap utilities to SL Miro 6.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-271=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxmlsec1-1-debuginfo-1.2.41-1.1 * libxmlsec1-1-1.2.41-1.1 * libxmlsec1-openssl1-debuginfo-1.2.41-1.1 * openscap-utils-1.4.1-1.1 * openscap-debugsource-1.4.1-1.1 * openscap-debuginfo-1.4.1-1.1 * libopenscap33-1.4.1-1.1 * libopenscap33-debuginfo-1.4.1-1.1 * xmlsec1-debugsource-1.2.41-1.1 * openscap-utils-debuginfo-1.4.1-1.1 * libltdl7-2.4.7-3.1 * libtool-debugsource-2.4.7-3.1 * openscap-1.4.1-1.1 * libltdl7-debuginfo-2.4.7-3.1 * libxmlsec1-openssl1-1.2.41-1.1 ## References: * https://jira.suse.com/browse/SMO-388 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:49 -0000 Subject: SUSE-RU-2025:20185-1: important: Recommended update for salt Message-ID: <174902548991.12703.3179694271828318378@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20185-1 Release Date: 2025-04-14T09:32:05Z Rating: important References: * bsc#1215484 * bsc#1220905 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 Affected Products: * SUSE Linux Micro 6.0 An update that has seven fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fixed aptpkg 'NoneType object has no attribute split' error * Detect openEuler as RedHat family OS * Ensure the correct crypt module is loaded * Implemented multiple inventory for ansible.targets * Made x509 module compatible with M2Crypto 0.44.0 * Removed deprecated code from x509.certificate_managed test mode * Move logrotate config to /usr/etc/logrotate.d where possible * Added DEB822 apt repository format support * Made Salt-SSH work with all SSH passwords (bsc#1215484) * Fixed issue of using update-alternatives with alts (#105) * Fixed virt_query outputter and added support for block devices * Made _auth calls visible with master stats * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Enhanced batch async and fixed some detected issues * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944) (bsc#1234881) (bsc#1220905) * Adapt to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Fixed issues running on Python 3.12 and 3.13 * Enhancements of Salt packaging: * Use update-alternatives for all salt scripts * Use flexible dependencies for the subpackages * Made salt-minion to require flavored zypp-plugin * Made zyppnotify to use update-alternatives * Dropped unused yumnotify plugin * Added dependency to python3-dnf-plugins-core for RHEL based ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-286=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-master-3006.0-10.1 * python311-salt-3006.0-10.1 * salt-minion-3006.0-10.1 * salt-3006.0-10.1 * salt-transactional-update-3006.0-10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:50 -0000 Subject: SUSE-RU-2025:20175-1: moderate: Recommended update for container-selinux Message-ID: <174902549081.21522.11747598033136858807@smelt2.prg2.suse.org> # Recommended update for container-selinux Announcement ID: SUSE-RU-2025:20175-1 Release Date: 2025-04-03T07:50:44Z Rating: moderate References: * bsc#1221720 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for container-selinux fixes the following issues: * Update to version 2.236.0: * Allow super privileged containers to use RealtimeKit for scheduling * Add container_ro_file_t to the podman artifact store * Update to version 2.235.0: * Bump to v2.235.0 * container_log{reader,writer}_t: allow watch file * RPM: Update gating config * Enable aarch64 testing * TMT: simplify podman tests * feat: support /var/lib/crio * Update to version 2.234.2: * TMT: enable epel idomatically * Packit: switch back to fedora-all * RPM: Bump Epoch to 4 * rpm: ship manpage * Add proper labeling for RamaLama * Packit: remove rhel / epel jobs * packit: remove unused file * Add BuildRequires selinux-policy-%{selinuxtype} to enable building for SLFO. Might be removed in the future again when 1231252 is fixed. * Update to version 2.233.0: * container_engine_t: small change to allow non root exec in a container * RPM: explicitly list ghosted paths and skip mode verification * container-selinux install on non selinux-policy-targeted systems (#332) * set container_log_t type for /var/log/kube-apiserver * Allow kubelet_t to create a sock file kubelet_var_lib_t * dontaudit spc_t to mmap_zero * Packit: update targets (#330) * container_engine_t: another round of small improvements (#327) * Allow container_device_plugin_t to use the network (#325) * RPM: cleanup changelog (#324) * TMT: Simplify tests * Update to version 2.232.1: * Bump to v2.232.1 * TMT: fix srpm download syntax on rawhide * Bump to 2.232.0 * Packit: remove `update_release` key from downstream jobs (#313) * Update container-selinux.8 man page * Add ownership of /usr/share/udica (#312) * Packit/TMT: upstream maintenance of downstream gating tests * extend container_engine_t again * Allow spc_t to use localectl * Allow spc_t to use timedatectl * introduce container_use_xserver_devices boolean to allow GPU access * Update to version 2.231.0: * Allow container domains to communicate with spc_t unix_stream_sockets * Move to %posttrans to ensure selinux-policy got updated before the commands run (bsc#1221720) * Manual update to version 2.230.0+git4.a8e389d to include this commit that is needed for the main selinux-policy update to work: * Rename all /var/run file context entries to /run * Update to version 2.230.0: * Move to tar_scm based packaging: added _service and _servicedata * Allow containers to unmount file systems * Add buildah as a container_runtime_exec_t label * Additional rules for container_user_t * improve container_engine_t * Update to version 2.228: * Allow container domains to watch fifo_files * container_engine_t: improve for podman in kubernetes case * Allow spc_t to transition to install_t domain * Default to allowing containers to use dri devices * Allow access to BPF Filesystems * Fix kubernetes transition rule * Label kubensenter as well as kubenswrapper * Allow container domains to execute container_runtime_tmpfs_t files * Allow container domains to ptrace themselves * Allow container domains to use container_runtime_tmpfs_t as an entrypoint * Add boolean to allow containers to use dri devices * Give containers access to pod resources endpoint * Label kubenswrapper kubelet_exec_t * Update to version 2.222: * Allow containers to read/write inherited dri devices * Update to version 2.221: * Allow containers to shutdown sockets inherited from container runtimes * Allow spc_t to use execmod libraries on container file systems * Add boolean to allow containers to read all cert files * More MLS Policy allow rules * Allow container runtimes using pasta bind icmp_socket to port_t * Fix spc_t transitions from container_runtime_domain * Update to version 2.215.0: * Add some MLS rules to policy * Allow container runtime to dyntransition to spc_t * Tighten controls on confined users * Add labels for /var/lib/shared * Cleanup entrypoint definitions * Allow container_device_plugin_t access to debugfs * Allow containers which use devices to map them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-270=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * container-selinux-2.236.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221720 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:52 -0000 Subject: SUSE-SU-2025:20184-1: important: Security update for elemental-operator Message-ID: <174902549261.12703.15975255622317335399@smelt2.prg2.suse.org> # Security update for elemental-operator Announcement ID: SUSE-SU-2025:20184-1 Release Date: 2025-04-11T10:56:08Z Rating: important References: * bsc#1238700 * bsc#1239335 Cross-References: * CVE-2025-22869 * CVE-2025-22870 CVSS scores: * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for elemental-operator fixes the following issues: * Updated to version 1.6.8: * Deactivated e2e workflow * Updated header year * CVE-2025-22870: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700) * CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange (bsc#1239335) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-284=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-register-1.6.8-1.1 * elemental-support-1.6.8-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1238700 * https://bugzilla.suse.com/show_bug.cgi?id=1239335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:53 -0000 Subject: SUSE-RU-2025:20174-1: moderate: Recommended update for mozilla-nss Message-ID: <174902549357.21522.5885367155873367839@smelt2.prg2.suse.org> # Recommended update for mozilla-nss Announcement ID: SUSE-RU-2025:20174-1 Release Date: 2025-04-02T14:18:25Z Rating: moderate References: * bsc#1222834 * bsc#1224113 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for mozilla-nss fixes the following issues: * FIPS: Do not pass in bad targetKeyLength parameters when checking for FIPS approval after keygen. This was causing false rejections. * FIPS: Approve RSA signature verification mechanisms with PKCS padding and legacy moduli (bsc#1222834). * FIPS: enforce approved curves with the CKK_EC_MONTGOMERY key type (bsc#1224113). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-269=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoftokn3-debuginfo-3.101.2-2.1 * mozilla-nss-3.101.2-2.1 * mozilla-nss-debuginfo-3.101.2-2.1 * libfreebl3-debuginfo-3.101.2-2.1 * mozilla-nss-tools-3.101.2-2.1 * mozilla-nss-tools-debuginfo-3.101.2-2.1 * mozilla-nss-certs-3.101.2-2.1 * libfreebl3-3.101.2-2.1 * mozilla-nss-certs-debuginfo-3.101.2-2.1 * mozilla-nss-debugsource-3.101.2-2.1 * libsoftokn3-3.101.2-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222834 * https://bugzilla.suse.com/show_bug.cgi?id=1224113 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:54 -0000 Subject: SUSE-RU-2025:20183-1: moderate: Recommended update for timezone Message-ID: <174902549417.12703.12129832452856536706@smelt2.prg2.suse.org> # Recommended update for timezone Announcement ID: SUSE-RU-2025:20183-1 Release Date: 2025-04-08T08:49:04Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for timezone fixes the following issues: Update to 2025b: * New zone for Ays?n Region in Chile (America/Coyhaique) which moves from -04/-03 to -03 Update to 2025a: * Paraguay adopts permanent -03 starting spring 2024 * Improve pre-1991 data for the Philippines * Etc/Unknown is now reserved Update to 2024b: * Improve historical data for Mexico, Mongolia, and Portugal. * System V names are now obsolescent. * The main data form now uses %z. * The code now conforms to RFC 8536 for early timestamps. * Support POSIX.1-2024, which removes asctime_r and ctime_r. * Assume POSIX.2-1992 or later for shell scripts. * SUPPORT_C89 now defaults to 1. Update to 2024a: * Kazakhstan unifies on UTC+5. This affects Asia/Almaty and Asia/Qostanay which together represent the eastern portion of the country that will transition from UTC+6 on 2024-03-01 at 00:00 to join the western portion. (Thanks to Zhanbolat Raimbekov.) * Palestine springs forward a week later than previously predicted in 2024 and 2025. (Thanks to Heba Hamad.) Change spring-forward predictions to the second Saturday after Ramadan, not the first; this also affects other predictions starting in 2039. * Asia/Ho_Chi_Minh's 1955-07-01 transition occurred at 01:00 not 00:00. (Thanks to ?o?n Tr?n C?ng Danh.) * From 1947 through 1949, Toronto's transitions occurred at 02:00 not 00:00. (Thanks to Chris Walton.) * In 1911 Miquelon adopted standard time on June 15, not May 15. * The FROM and TO columns of Rule lines can no longer be "minimum" or an abbreviation of "minimum", because TZif files do not support DST rules that extend into the indefinite past - although these rules were supported when TZif files had only 32-bit data, this stopped working when 64-bit TZif files were introduced in 1995. This should not be a problem for realistic data, since DST was first used in the 20th century. As a transition aid, FROM columns like "minimum" are now diagnosed and then treated as if they were the year 1900; this should suffice for TZif files on old systems with only 32-bit time_t, and it is more compatible with bugs in 2023c-and-earlier localtime.c. (Problem reported by Yoshito Umaoka.) * localtime and related functions no longer mishandle some timestamps that occur about 400 years after a switch to a time zone with a DST schedule. In 2023d data this problem was visible for some timestamps in November 2422, November 2822, etc. in America/Ciudad_Juarez. (Problem reported by Gilmore Davidson.) * strftime %s now uses tm_gmtoff if available. (Problem and draft patch reported by Dag-Erling Sm?rgrav.) * The strftime man page documents which struct tm members affect which conversion specs, and that tzset is called. (Problems reported by Robert Elz and Steve Summit.) Update to 2023d: * Ittoqqortoormiit, Greenland changes time zones on 2024-03-31. * Vostok, Antarctica changed time zones on 2023-12-18. * Casey, Antarctica changed time zones five times since 2020. * Code and data fixes for Palestine timestamps starting in 2072. * A new data file zonenow.tab for timestamps starting now. * Fix predictions for DST transitions in Palestine in 2072-2075, correcting a typo introduced in 2023a. * Vostok, Antarctica changed to +05 on 2023-12-18. It had been at +07 (not +06) for years. * Change data for Casey, Antarctica to agree with timeanddate.com, by adding five time zone changes since 2020. Casey is now at +08 instead of +11. * Much of Greenland, represented by America/Nuuk, changed its standard time from -03 to -02 on 2023-03-25, not on 2023-10-28. * localtime.c no longer mishandles TZif files that contain a single transition into a DST regime. Previously, it incorrectly assumed DST was in effect before the transition too. * tzselect no longer creates temporary files. * tzselect no longer mishandles the following: * Spaces and most other special characters in BUGEMAIL, PACKAGE, TZDIR, and VERSION. * TZ strings when using mawk 1.4.3, which mishandles regular expressions of the form /X{2,}/. * ISO 6709 coordinates when using an awk that lacks the GNU extension of newlines in -v option-arguments. * Non UTF-8 locales when using an iconv command that lacks the GNU //TRANSLIT extension. * zic no longer mishandles data for Palestine after the year 2075. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-283=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * timezone-debugsource-2025b-1.1 * timezone-2025b-1.1 * timezone-debuginfo-2025b-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:24:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:24:57 -0000 Subject: SUSE-RU-2025:20182-1: moderate: Recommended update for suse-build-key Message-ID: <174902549793.12703.9677436263346861206@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2025:20182-1 Release Date: 2025-04-08T08:49:04Z Rating: moderate References: * bsc#1236779 * bsc#1237294 * jsc#PED-12321 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature and has two fixes can now be installed. ## Description: This update for suse-build-key fixes the following issues: * changed RPM/repo signing keys to use SHA256 UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321) * gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc * gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc * suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-282=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * suse-build-key-12.0-5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236779 * https://bugzilla.suse.com/show_bug.cgi?id=1237294 * https://jira.suse.com/browse/PED-12321 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:05 -0000 Subject: SUSE-RU-2025:20173-1: moderate: Recommended update for google-guest-configs Message-ID: <174902550517.21522.3008278831843472793@smelt2.prg2.suse.org> # Recommended update for google-guest-configs Announcement ID: SUSE-RU-2025:20173-1 Release Date: 2025-04-02T11:32:22Z Rating: moderate References: * bsc#1221146 * bsc#1221900 * bsc#1221901 * bsc#1231775 * bsc#1231776 * bsc#1233625 * bsc#1233626 * bsc#1234254 * bsc#1234255 * bsc#1234289 * bsc#1234293 Affected Products: * SUSE Linux Micro 6.0 An update that has 11 fixes can now be installed. ## Description: This update for google-guest-configs fixes the following issues: * Follow up to (bsc#1234289, bsc#1234293). Avoid duplicate entries for the metadata server in /etc/hosts * Update to version 20241205.00 (bsc#1234254, bsc#1234255) * Update google_set_multiqueue to configure vCPU ranges based on VM platform * from version 20241204.00 * Restore google_set_multiqueue changes for A3Ultra * Depend on networkd-dispatcher in Ubuntu * Include components to set hostname and /etc/hosts entries (bsc#1234289, bsc#1234293) * Add sysconfig and sysconfig-network to BuildRequires * Install google_set_hostname into %{_bindir} * Install google_up.sh into %{_sysconfdir}/sysconfig/network/scripts/ * Add code to add and remove POST_UP_SCRIPT="compat:suse:google_up.sh" to /etc/sysconfig/network/ifcfg-eth0 in %post and %postun sections * Update to version 20241121.00 (bsc#1233625, bsc#1233626) * Temporarily revert google_set_multiqueue changes for release * from version 20241115.00 * Remove IDPF devices from renaming rules * from version 20241112.00 * Revert "Revert 3 commits:" * from version 20241108.00 * Revert 3 commits: * from version 20241107.00 * gce-nic-naming: Exit 1 so that udev ignores the rule on error * from version 20241106.00 * Remove Apt IPv4 only config for Debian and Ubuntu * from version 20241031.00 * Add GCE intent based NIC naming tools * from version 20241025.00 * Update google_set_multiqueue to skip set_irq if NIC is not a gvnic device * Add new binary gce-nic-naming to %{_bindir} in %files section * Update to version 20241021.00 (bsc#1231775, bsc#1231776) * Add GCE-specific config for systemd-resolved * from version 20241015.00 * Update google_set_multiqueue to enable on A3Ultra family * from version 20241013.00 * Update OWNERS * from version 20241010.00 * Depend on jq in enterprise linux * from version 20241008.00 * Always use IP from primary NIC in the networkd-dispatcher routable hook * Update to version 20240925.00 * Call google_set_hostname on openSUSE and when the agent is configured to manage hostname and FQDN, let it * from version 20240924.00 * Include systemd-networkd hook in Ubuntu packaging * from version 20240905.00 * Update packaging as of Ubuntu devel packaging * from version 20240830.00 * Fix the name for A3 Edge VMs * Update to version 20240725.00 * Fix: hostnamectl command * Update to version 20240607.00 * Update is_a3_platform to include A3-edge shape * Update to version 20240514.00 * Add systemd-networkd hostname hook * from version 20240501.00 * Add hostname hook for NetworkManager without dhclient compat script * Update to version 20240307.00 (bsc#1221146, bsc#1221900, bsc#1221901) * Support dot in NVMe device ids * from version 20240304.00 * google_set_hostname: Extract rsyslog service name with a regexp for valid systemd unit names * from version 20240228.00 * Remove quintonamore from OWNERS * from version 20240119.00 * Setup smp affinity for IRQs and XPS on A3+ VMs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-268=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * google-guest-configs-20241205.00-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221146 * https://bugzilla.suse.com/show_bug.cgi?id=1221900 * https://bugzilla.suse.com/show_bug.cgi?id=1221901 * https://bugzilla.suse.com/show_bug.cgi?id=1231775 * https://bugzilla.suse.com/show_bug.cgi?id=1231776 * https://bugzilla.suse.com/show_bug.cgi?id=1233625 * https://bugzilla.suse.com/show_bug.cgi?id=1233626 * https://bugzilla.suse.com/show_bug.cgi?id=1234254 * https://bugzilla.suse.com/show_bug.cgi?id=1234255 * https://bugzilla.suse.com/show_bug.cgi?id=1234289 * https://bugzilla.suse.com/show_bug.cgi?id=1234293 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:06 -0000 Subject: SUSE-RU-2025:20181-1: important: Recommended update for cloud-init Message-ID: <174902550662.12703.1989667808831434949@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20181-1 Release Date: 2025-04-08T08:38:21Z Rating: important References: * bsc#1212476 * bsc#1219680 * bsc#1227237 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for cloud-init fixes the following issues: * Wait for udev once if we cannot find the expected MAC (bsc#1227237) * Remove dependency on /usr/bin/python3 via using the macros (bsc#1212476) * Brute force approach to skip renames if the device is already present ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-281=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cloud-init-config-suse-23.3-8.1 * cloud-init-23.3-8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212476 * https://bugzilla.suse.com/show_bug.cgi?id=1219680 * https://bugzilla.suse.com/show_bug.cgi?id=1227237 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:08 -0000 Subject: SUSE-SU-2025:20180-1: moderate: Security update for procps Message-ID: <174902550899.12703.14251820127201007460@smelt2.prg2.suse.org> # Security update for procps Announcement ID: SUSE-SU-2025:20180-1 Release Date: 2025-04-08T07:59:48Z Rating: moderate References: * bsc#1236842 Cross-References: * CVE-2023-4016 CVSS scores: * CVE-2023-4016 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-4016 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for procps fixes the following issues: * Fixed regression introduced with the CVE-2023-4016 fix. The ps command segfaults when pid argument has a leading space (bsc#1236842). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-279=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * procps-debuginfo-3.3.17-5.1 * libprocps8-3.3.17-5.1 * procps-debugsource-3.3.17-5.1 * procps-3.3.17-5.1 * libprocps8-debuginfo-3.3.17-5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4016.html * https://bugzilla.suse.com/show_bug.cgi?id=1236842 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:14 -0000 Subject: SUSE-SU-2025:20179-1: important: Security update for skopeo Message-ID: <174902551429.12703.5283962813870914473@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20179-1 Release Date: 2025-04-07T09:35:26Z Rating: important References: * bsc#1227056 * bsc#1236483 * bsc#1237613 * bsc#1238685 Cross-References: * CVE-2023-45288 * CVE-2024-6104 * CVE-2025-22870 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for skopeo fixes the following issues: * CVE-2025-22870: golang.org/x/net/proxy: proxy bypass using IPv6 zone IDs (bsc#1238685) * CVE-2025-27144: gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go- jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237613) * CVE-2024-6104: hashicorp/go-retryablehttp: url might write sensitive information to log file (bsc#1227056) * CVE-2023-45288: golang.org/x/net/http2: close connections when receiving too many headers (bsc#1236483) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-278=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * skopeo-1.14.4-3.1 * skopeo-debuginfo-1.14.4-3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227056 * https://bugzilla.suse.com/show_bug.cgi?id=1236483 * https://bugzilla.suse.com/show_bug.cgi?id=1237613 * https://bugzilla.suse.com/show_bug.cgi?id=1238685 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:15 -0000 Subject: SUSE-RU-2025:20178-1: moderate: Recommended update for tpm2-openssl Message-ID: <174902551553.12703.2516968648483272589@smelt2.prg2.suse.org> # Recommended update for tpm2-openssl Announcement ID: SUSE-RU-2025:20178-1 Release Date: 2025-04-07T09:27:56Z Rating: moderate References: * jsc#PED-11054 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for tpm2-openssl fixes the following issues: This update adds tpm2-openssl to SL Micro 6.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-277=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * tpm2-openssl-1.3.0-1.1 * tpm2-openssl-debuginfo-1.3.0-1.1 * tpm2-openssl-debugsource-1.3.0-1.1 ## References: * https://jira.suse.com/browse/PED-11054 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:17 -0000 Subject: SUSE-RU-2025:20172-1: important: Recommended update for python-kiwi Message-ID: <174902551740.21522.3751314812529214729@smelt2.prg2.suse.org> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2025:20172-1 Release Date: 2025-04-01T10:26:32Z Rating: important References: * bsc#1214824 * bsc#1221469 * bsc#1221790 * bsc#1223374 * bsc#1224389 * bsc#1228118 * bsc#1228729 * bsc#1228741 * bsc#1229257 * bsc#1235448 * bsc#1237772 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has 11 fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Bump version: 10.2.11 to 10.2.12 * Fix profile env variable name regression In the effort of adapting to the latest snapper in Issue #2697 we overlooked the after effect of a different variable name in the profile environment with regards to $kiwi_btrfs_root_is_snapshot and $kiwi_btrfs_root_is_snapper_snapshot. Image builds that references the former variable name would be broken by the change. This commit makes sure no regression is introduced by providing both variants (bsc#1237772). * Fix grub mkimage call for the ppc platform The list of modules used to create a grub platform image for ppc was the same list as used for the x86 bios platform. This commit fixes this and also cleans up the inconsistency and misleading names used for creating platform specific output. * Bump version: 10.2.10 to 10.2.11 * Update box plugin documentation Add chapter about new container build feature. The box plugin can now also run the build in containers * The ubuntu 20.04 github runner is closing down Make sure to move to another runner for workloads which still uses ubuntu 20.04 * Bump version: 10.2.9 to 10.2.10 * Poetry build sdist timestamps set to epoch 0 Newer versions of poetry set the timestamp for all source files to epoch 0. Such sources are not accepted by e.g Debian FTP servers and in general I don't like when tools changes their behavior just like that. This commit forces an older version of poetry for the purpose of creating the sdist tarball which then gets published on pypi. The argumentation for reproducible builds by forcing source files to a certain timestamp doesn't fly for me. I'm open for any better solution though. * Bump version: 10.2.8 to 10.2.9 * Classify missing chkstat as debug message chkstat is a distribution specific tool. If it is present we use it, if not we don't but it's not worth a warning. * Allow to run setfiles multi threaded Use option -T0 for newer setfiles version. * Add rd.kiwi.dialog.timeout option Allow to configure the timeout value for dialogs displayed by the kiwi dracut code. By default the timeout is set to 60 seconds. With the special value "off" the dialog will never timeout. * Make sure copy actions does not drop context Use shutil.copy2 to copy files preserving their attributes in the grub BootLoader space. * Improve unit test for archive target_dir Add a test case with absolute path in the target_dir to make sure we never unpack the archive to the host system. * Fixed profiled overlay imports When building an image for profile: SOME and providing an overlay directory named SOME/... kiwi will sync the contents of this overlay directory to the root tree. However it took the toplevel name SOME/ into account which is unwanted because only the sub data structure should be synced into the new root tree. This * Bump version: 10.2.7 to 10.2.8 * Use multipath child instead of parent device On multipath systems we need to find underlying child device instead of using parent device. This prevents listing all parent devices for a multipath device * Increase size for agama integration test build Agama needs more space to build now * Fixed agama integration test rubygem-byebug and rubygem-agama-yast seems to no longer exist * Update TW integration tests Package nscd was dropped from TW * Fix documentation regarding URI styles In reference to commit 760a65558f9e2e91d3eaa3a2f9503ff596984b48 the support for iso:// URI types was dropped some time ago. However, the documentation was not properly updated. This commit fixes it * Fix return value of grub helper methods The grub helper methods to find grub tools returns a None value if the tool cannot be found. This None value could be used later in a Command call where it will be used in a join() command to log the resulting commandline. This join() call then fails and raises an unhandled error causing a stack trace in the application. This commit fixes it * Added disk validation for duplicate installs Installing the same image to different storage disks on the same machine creates device conflicts with unexpected side effects. This commit adds a validation based on the PTUUID of the disk image to check if another device on the system has the same ID and if yes, does not allow to install the image again including a message which device takes the same identifier. This references bsc#1228741 * Fixed documentation for signing key attribute The source locator name for local files was incorrect * Bump version: 10.2.6 to 10.2.7 * Update documentation Added a new troubleshooting chapter as subsection to the Build Host Constraints named Package Manager Behavior. It serves the purpose to describe options for the customer to change the default package manager behavior which we from the kiwi side do not influence intentionally. This is a followup change to bsc#1235448 * Drop still present tox artifacts There were still some left over tox files and the documentation contribution chapter was also wrong at several places * Add support for reading optional pkgmgr env file If there is a file .kiwi.package_manager.env in the root of the image tree it will be read and put into the caller environment for the selected package and repository manager. There are features in e.g zypper which can only be used via env variables (bsc#1235448). * Auto convert unit test XML data to schema v8.3 * Rename btrfs_root_is_snapshot Rename btrfs_root_is_snapshot to btrfs_root_is_snapper_snapshot. This happens in preparation for the changes suggested in #2697 where we want to get rid of snapper specific btrfs code which will be available in snapper natively soon. To make sure a btrfs layout specific to snapper(and SUSE), the implicitly used attribute named btrfs_root_is_snapshot now becomes explicit and its new name will indicate that snapper sits behind it. Along with the rename a XSLT stylesheet to automatically convert the old name into the new name for schema v8.3 will be performed. * Bump version: 10.2.5 to 10.2.6 * Fixed donate button target * Added LUKS reencryption support Added rd.kiwi.oem.luks.reencrypt boot option consumed by the kiwi-repart dracut module. For OEM LUKS2 encrypted disk images. If set, reencrypts the disk prior an eventual resize and therefore creates a new key pool and master key. The reencryption is advisable if the image binary is not protected. With access to the image binary it's possible to extract the luks header which then allows to decrypt the data unless it was reencrypted. The reencryption process only runs if the checksum of the luks header still matches the one from the original disk image. Be aware that the reencryption will ask for the passphrase if the image has been built with an initial luks passphrase. * Fixed arm/tumbleweed/test-image-rpi No ruby required for this integration test build * Plain zipl loader needs boot partition If the rootfs is something zipl cannot read, we need an extra boot partition using a supported filesystem * Fixed IBM-Cloud-Standard profile The test-image-MicroOS integration test builds an IBM-Cloud-Standard profile as encrypted variant with a random key that is not protected by an encrypted boot image. This doesn't make sense. Thus the encryption setup for the IBM cloud standard build got removed. Use the IBM-Cloud-Secure-Execution profile to test encrypted secure linux builds * Fixed test-image-qcow-openstack rsh package was dropped from TW * Fix genprotimg for s390 builds A recent change on genprotimg now forbids to use --cert in combination with --no-verify, even though this was allowed before. * Fix documentation for repo, package gpg settings In contrast to the documentation, kiwi sets default values for any gpg setting if not explicitly specified differently. We want to avoid to inherit a behavior from how the distribution packages the package manager. This commit fixes the documentation to be in line with the implementation * Drop insecure and unsupported md5 digest Decommission the Checksum.md5() method and move all places in code to sha256(). The md5 digest is considered insecure and has also been removed from hashlib as a supported digest. * Fix config functions action The action failed on the setup of the runtime because the upgrade of pip failed. * Bump version: 10.2.4 to 10.2.5 * Changed systemfiles provider Instead of providing a static list of filenames, provide a list of package names. It is expected that the pilot of flake-pilot resolves this list against the local package database to build up the filelist for provisioning * Bump version: 10.2.3 to 10.2.4 * Update system files setup for containers The attribute provide_system_files creates a meta file in the root tree named 'systemfiles'. The contents of this file were produced by just a dump of the package database so far. For a more generic use of this data some adaptions were needed. First we allow to skip packages matching a pattern from being part of the system files. Next we do not put ghost and doc files into account. And last we handle library files in a different file named 'systemfiles.libs' where we do not add symlink targets if the target path is also part of the package. The consumer of this information is flake-pilot which syncs that library system files from the host via --copy-links. This allows a more generic use with regards to versioned libraries e.g. libc * Drop /dev/pts from bind mount locations This has created havoc in the Fedora build environments by fully unmounting /dev/pts and breaking the builders for subsquent tasks. This is a partial revert of commit daf1323c5ded7e4e7783205f5e30457b40eb322f. * Don't take ghost files into account When creating the system files information do not take ghost files and artifact files into account * Bump version: 10.2.2 to 10.2.3 * Update STYLEROOT to SUSE 2022 * Fix broken links in the documentation * Fix legacy_bios_mode detection The code in this method does not work correctly if the firmware is set to 'bios'. In bios only mode the method returned a false value which is incorrect as it should return a true value in this case. Without this patch ISO images will fail to boot because no loader gets configured. * Added /dev/pts to bind mount locations During runtime several kernel filesystems are bind mounted into the image root system such that programs expecting it can work. /dev/pts was not needed so far but seems to be a good addition to the list to make tools like sudo to work properly when called e.g. from a config.sh script. * xorriso: respect efiparttable and gpt_hybrid_mbr This should make the xorriso-based ISO build path respect the 'efiparttable' and 'gpt_hybrid_mbr' settings when building a UEFI-compatible image, making it write a GPT disk label by default instead of an MBR (msdos) one. If it's building an image that is not UEFI-compatible it will always write an MBR label, regardless of this setting. If 'gpt_hybrid_mbr' is set, xorriso will write an Ubuntu-style MBR/GPT hybrid partition table, where the MBR partition table includes a partition with type 00 and the bootable flag, as well as the partition with type ee required by the UEFI spec. This mildly violates the UEFI spec but may make the image bootable on native BIOS or CSM firmwares which refuse to boot from a disk with no partition marked 'bootable' in the MBR. If 'gpt_hybrid_mbr' is not set, xorriso will write a strictly UEFI-spec compliant label, with just the 'protective MBR' required by the UEFI spec (no bootable partition) and the correct GPT partition table. Note this is somewhat different from what gpt_hybrid_mbr does for disk images. Also, we now pass -compliance no_emul_toc when building ISOs, as recommended by upstream in https://lists.gnu.org/archive/html/bug- xorriso/2024-11/msg00012.html This tool is generally always going to be building ISOs intended for write-once use, not multi-session use (and which are rarely, these days, written to physical discs at all anyway). * Added provide/require system files for containers Added the attributes provide_system_files and require_system_files to control the provider and requester of system files in container image builds. systemfiles is a metadata file which contains all files from the package database at call time. It is used in flake-pilot to provision the systemfiles data from the host into the container instance. One possible use case for this data is a flake registration which uses a base container that is derived from a runtime container but all data from the runtime should be provisioned from the host. Using this feature tightly couples the flake to the host OS distribution and version. * Bump version: 10.2.1 to 10.2.2 * Fix scope issue Increase livetime of the the compressor instances to the livetime of RootImportOCI. They create temporary files which are referenced later and need to live longer than the block they got created in * Bump version: 10.2.0 to 10.2.1 * Fixed use of fscreateoptions for iso type The information for fscreateoptions was not passed along to the tooling if a custom filesystem attribute was specified. * Allow to derive from multiple containers Add support for multi inheritance to the derived_from attribute In the order of a comma seperated list of docker source URI's a base tree is created. This was possible only with one container so far and Fixes #2680 as well as jira#OBS-354 * Bump version: 10.1.18 to 10.2.0 * Add selinux test build to TW Also update derived docker integration test to latest Leap * kiwi/schema: Fix allowed value type for ISO publisher and application ID According to the spec, this should be constrained to 128 characters but also allow quite a few other special characters (as well as spaces). We didn't allow spaces in application ID, but allowed too much for Publisher. Now we set up both correctly. * Fix setup of kiwi environment variables Some kiwi env vars are initialized with an empty value and not overwritten if another value is provided. For the selected variables an empty value setting is not allowed because the schema also enforces the value to be set at least once. In addition a helpful option named --print-kiwi-env was added to the 'image info' command which allows to print the environment variables and their values. * Add random key support for LUKS encryption Allow to pass luks="random". In random mode use the generated keyfile as the only key to decrypt. This is only secure if the generated initrd also gets protected e.g. through encryption like it is done with the secure linux execution on zSystems * Added development group in pyproject setup generateDS and other tools are needed and were forgotten to be added when we deleted the tox dependency * Added containers integration with OBS When building in the Open Build Service (OBS) there is no way to create outgoing connections from the build workers. To allow the containers section to fetch containers from the SUSE registry we need to apply an OCI URI translation into a local path. The actual OCI container image is expected to be provided by the obs backend on the worker. Along with this commit also an integration test named test- image-disk-containers is provided (jira#OBS-351). * Fix rendering of SUSE docs The SUSE documentation is produced through a conversion of the ReST source into docbook. The name kiwi is reserved in the index and needs to be referenced as kiwi-ng when used as command. * Remove tox dependency tox was used as sort of a make target to run unit tests and more in a python virtualenv. However, since we switched everything to poetry it's no longer needed to let tox create the python virtual environments. This commit moves the tox targets into the Makefile and adapts the github workflow files accordingly. In addition the scripts container based tests were re-activated and fixed such that they succeed again. * Fix make build target Move the actions done by the tox target into the build target and call them there in a clean and easy to spot sequence. There is no need to call tox to prepare for the package submission, instead the checks and poetry runs to prepare for the package target should be called directly as part of the build target. In the future we might get rid of tox completely. * Bump version: 10.1.17 to 10.1.18 * Fixed zipl caller environment zipl gets confused with an active sysfs mount inside the root tree at call time of zipl. This commit umounts the /sys bind mount in the image tree prior calling zipl * Fix s390 test-image-disk build Add missing kernel links used by suse tools * Bump version: 10.1.16 to 10.1.17 * Fix coloring of build_status.sh flags Depending on the place of the status flag the color setup might fail. This commit fixes it * Add pytest-container as optional dependency The pyproject.toml listed pytest-container as dependency but it is used only to run the container based integration tests for the shell helper methods. For building the package this dependency should not be pulled in * Fix networking in erofs integration test The network setup was systemd- networkd based but the provided network config was not for systemd * Bump version: 10.1.15 to 10.1.16 * Fix erofs requires in spec erofs-utils for SUSE only exists in Tumbleweed. The former conditon would also add the requirement for ALP and SLFO which is wrong. This commit fixes it * Add vagrantconfig rule for vagrant format If the format="vagrant" attribute is set, a vagrantconfig section becomes mandatory. This commit enforces this rule on the schema. * Bump version: 10.1.14 to 10.1.15 * Fixed sphinx_rtd_theme setup Delete obsolete display_version attribute * Evaluate eficsm everywhere Fixed _supports_bios_modules() to take an eventually provided eficsm setup into account. The grub config still searches for i386 grub modules even if eficsm="false" is set. * Fixed debian bootstrap script calls Run scripts as commands with their native shebang and not through bash. Not all debian package scripts uses bash, some of them uses sh which can be a link to dash or other interpreters. * Update TW integration tests The package x86info was dropped from TW * Turn DiskFormat into an ordinary class * it does not need to be an abstract base class * use f-strings where applicable instead of format() * change return type of _custom_args_for_format from list to tuple * Add new containers section Allow to specify references to OCI containers in the image description During the kiwi process the containers are fetched into a temporary location and a systemd service is configured to one time load the containers into the local registry at first boot of the system. * Bump version: 10.1.13 to 10.1.14 * Revert "Install usrmerge for Debian integration test" This reverts commit 95ac861741f14c4f35611c16328384c18e53dcfb. Solution needs to be provided in code * Install usrmerge for Debian integration test * Support older apt versions for bootstrap * Run package scripts in apt bootstrap phase The bootstrap procedure based on apt only runs a manual collection of package scripts. This commit refactors the code that unpacks the bootstrap packages to a python implementation and adds a method to run the bootstrap scripts from all packages resolved by apt. * Bump version: 10.1.12 to 10.1.13 * Fix bundle extension for vagrant type When bundling result files that uses a vagrant type, kiwi creates them with the extension .vagrant.virtualbox.box or .vagrant.libvirt.box. The bundler code renames them using only the .box suffix which is too short as it is missing the subformat information. This commit fixes it and keeps this information in the result bundle file name. * Use simple quotas (squota) for volumes * Add quota attribute to volume section Allow to set quota per volume for the btrfs filesystem * Fix globbing with exclude with regex This fixes a collection of bugs when producing erofs images. On one hand, this ensures that an exclude of `/sys` doesn't accidentally match `/lib/libsystemd.so`, only `/sys/whatever`. On the other hand, this ensures that `/dev/*` does match `/dev/vda` and not just `/dev///////////`. This fixes libsystemd.so getting dropped in Kiwi- built FEX images. * Honour custom exclude for filesystem builds All other call sites honour the custom exclude file, it's just this one that needs to be fixed. This unblocks use of Kiwi for generating FEX rootfs. * test: storage: update clone_device tests with new block size * storage: clone_device: increase dd block size Increasing the block size used for dd reduces the time needed to clone a device. * Bump version: 10.1.11 to 10.1.12 * Add missing erofscompression validation In the filesystem builder I forgot to evaluate the erofscompression attribute. * Include PI and comments in XSL stylesheets So far comments and processing instructions (PI) were ignored when applying the XSL stylesheets. This commit updates all stylesheets to take them into account * Bump version: 10.1.10 to 10.1.11 * doc: Add login information test build test images * Bump version: 10.1.9 to 10.1.10 * bootloader: Fix up ppc64 bootinfo again To make the code look pretty extra newline is inserted at the start of bootinfo file. This appears to break boot on Power9 PowerVM LPARs. * Add support for erofs erofs is an alternative readonly filesystem that can be used as alternative to squashfs. * Fixed enclave integration test The SELinux policy of Fedora Rawhide when running completely in an initrd is not suitable to let the system boot up. Thus the current solution is to boot in permissive mode. A better solution for the future would probably be a selinux policy for enclaves * limit eif_build requires to fedora greater than or equal to 42 * Bump version: 10.1.8 to 10.1.9 * Added sshd to nitro-enclave integration test * Fixed container sync options Do not exclude/filter any security/xattr capabilities. * Update container integration test Add getcap to check on filesystem capabilities * Add new build type provides for enclave Add a provides tag (read by the open buildservice) for the new enclave builder. Also add a recommends to eif_builder in the systemdeps-core meta package * Update enclave documentation Fixup repo setup in the build documentation * Bump version: 10.1.7 to 10.1.8 * Fixed enclave documentation * Update test-image-nitro-enclave package list Fixup package list to match Fedora rawhide * Move test-image-nitro-enclave to rawhide * Fix ppc64 chrp bootinfo generation * Fixed documentation header Fixed double H1 headers from the boxbuild tweaks chapter. * Bump version: 10.1.6 to 10.1.7 * Move EXEC log message to the right place The log information of the command execution was not printed directly before the actual command invocation. There are other actions after the log information (e.g Path.which) which itself produce log information prior the real subprocess execution. This is very misleading when reading the log file and fixed in this commit. * Add support for architectures in deb source file When apt resolves packages on a multiarch repo it can happen that dependencies for packages from other architectures are pulled into the solver process but are not provided by any repository. To overcome this behavior the repository can be setup to serve packages only for a specified architecture or list of architectures. This is related to OSInside/kiwi-descriptions#102 * Bump version: 10.1.5 to 10.1.6 * add allowExtraConfig and exportFlags to ovftool options Add allowExtraConfig and exportFlags to ovftool options * Bump version: 10.1.4 to 10.1.5 * create EFI/BOOT only if UEFI boot is intended * Fix boot support for ISO media on ppc64 add CHRP boot support for ppc64 and add xorriso option to avoid file name reduction to MS-DOS compatible 8.3 format * Fix initrd permissions kiwi stored the initrd for ISO images as 600 which might be too restrictive. This commit makes sure the initrd is stored as 644 and Fixes bsc#1229257 * Fixed ramdisk size setup For setting up the brd rd_size option kiwi creates 99-brd.conf used at load time of the kernel brd driver. The location for the conf file is set to /etc/modprobe.d/ However, in newer versions the location has changed to /usr/lib/modprobe.d/ and /etc/modprobe.d is no longer expected to exist. This commit makes sure /etc/modprobe.d is created if not present. * Bump version: 10.1.3 to 10.1.4 * Add note about guestOS values for vmware ovftools. * Add note about guestOS values for vmware platform. * Fixed resize of dos table type on s390 On s390, parted is used to detect the partition table type. In contrast to blkid the name for DOS tables is reported as 'msdos' and not 'dos' which impacts several conditions in the kiwi initrd code which checks for 'dos'. This commit fixes the get_partition_table_type() method to return a consistent table name for DOS tables (bsc#1228729) * Revert "remove dependency on /usr/bin/python" This reverts commit 15b450188483b567ca10bb459bf50ed90e905bb7. The change provided here entirely broke kiwi in OBS. With this patch applied every image build in OBS fails with the following message: 'line 1: /usr/sbin/kiwi: No such file or directory' * Bump version: 10.1.2 to 10.1.3 * Fix bundle extension for archive types When bundling result files that uses an archive type like tbz or docker, kiwi creates them with the extension tar.xz/tar.gz The bundler code only uses the extension from the last tuple in a "." split which is wrong for "tar." filenames. This commit adds an exception to the prefix rule for this output filenames and Fixes * Fix ImageSystem mount procedure The mount() method did not take custom partitions into account. This commit fixes it. * remove dependency on /usr/bin/python * Add support for isomd5sum for tagging iso files The isomd5sum tool suite is used and available on all supported distributions except SUSE distributions, and is necessary to produce conformant ISOs for most Linux distributions. This change adds support for isomd5sum tool suite for kiwi, though it does not extend the kiwi-live dracut module to use it. The upstream dracut dmsquash-live module must be used instead. * kiwi/builder/live: Log the correct value for Application ID Since it is now possible to set a custom application ID, we want to see this when it is being used for the image. * kiwi/builder/live: Clean up leftover dracut configuration file The existence of this file breaks installers on live media that sync the full filesystem to disk and are not aware of this configuration before generating the target system initramfs. * Allow string versions and test "word" versions There are descriptions out in the wild that use "non-numeric" versions in their descriptions, particularly without separators for splitting. This change switches all of this to strings rather than assuming numbers and gracefully handles the single word case. * Add documentation for boxbuild tweaks * Fixed wrong log level on --logfile When using --logfile, the log generated there matches the stdout log (which without --debug, does not include any debug info). This is in contrast to the automatically generated one in the output directory, which always does and also not following the way how it is documented. * Fixed arch flag for namedCollection The arch flag in a namedCollection was not taken into account. This commit fixes this and also makes sure the result information is sorted and unique like we have it for the package lists. * Fix handling of zipl.conf in plain zipl bootloader When using the plain zipl bootloader kiwi created a /etc/zipl.conf file. However, this file was only useful during image build as it points to a loop target device and geometry but does not represent a proper config file to be used in the running system. In addition the different distributors provides their own version and layout of the zipl.conf to be used inside of the system and with their respective tools. Thus this commit changes the way how kiwi operates in a way that the zipl.conf used in the initial image only exists during the image build process. An eventual present /etc/zipl.conf will not be touched by kiwi. * Bump version: 10.1.1 to 10.1.2 * Improve error reporting for remote deployment Add new method called show_log_and_quit which displays the written error log file as a file box to the user * Update test-image-orthos integration test Update the test such that you can also build it locally. Change the remote installation target to be a ramdisk for easy testing of remote deployments * Setup default minimum volume size per filesystem The former method provided a static value but there are huge differences for the minimum size requirement of a filesystem. For example extX is fine with 30MB whereas XFS requires 300MB. This commit adds a more dynamic default value based on the used filesystem. * Increase default volume size So far 30MB was set as default volume size which is by far too small for a number of filesystems, e.g btrfs and also XFS. This commit increases the default volume size such that all modern filesystems builds if the default volume size is used. * Update test-image-raid Apart from testing raid this integration test also tests a certain LVM volume setup. The test has been updated to use the btrfs filesystem because it has the most strict size requirements. * Use shutil.which for Path.which Both methods were only used in one place each and it makes much more sense to use the pathlib builtin methods instead * Replace Path.create implementation with pathlib builtin * Bump version: 10.1.0 to 10.1.1 * Mandatory package scripts for Debian bootstrap Make sure to run some mandatory package pre/post scripts such that settings like /etc/passwd, a root user, etc.. exists. This action can also be done in post_bootstrap.sh but I think it's better to do this in the core code * Bump version: 10.0.28 to 10.1.0 * kiwi no longer uses debootstrap For building Debian based images we used debootstrap to bootstrap an empty root until apt-get could be used to complete the job. This has now changed such hat apt-get is also used for bootstrapping a new system. The concept and also potential alternatives to the way kiwi bootstraps Debian based systems can be found here: * https://osinside.github.io/kiwi/working_with_images/build_without_debianbootstrap.html Due to the drop of debootstrap it might happen that package lists of existing image descriptions needs to be extended with packages that were formerly pulled in by debootstrap but did not get properly pulled in with the new apt based bootstrap. As reference please check out the integration tests from here: * https://github.com/OSInside/kiwi/tree/main/build-tests/x86/ubuntu * https://github.com/OSInside/kiwi/tree/main/build-tests/x86/debian * Bump version: 10.0.27 to 10.0.28 * Update documentation * kiwi no longer uses debootstrap * Fix test_process_result_bundle_as_rpm * Fix Debian/Ubuntu integration tests Remove package hacks for debootstrap, explicitly add required packages and or configurations. * Drop types-pkg_resources Got removed from PyPI * Fix test_process_result_bundle_as_rpm os.path.basename was called on a MagicMock object which sometimes confused pytest * CI: Add testing against Python 3.13 Python 3.13 is shipping in Fedora Linux for Fedora Linux 41, so we should ensure kiwi is tested against it. The testing setup is based on the latest development version of 3.13 as it is not yet released. * Fix kiwi-repart restrictions The kiwi repart dracut module reads a profile file and if it does not exists it dies in the initrd. However, that profile file is not mandatory for the main resize functionality. Thus this commit turns this into a warning message. In addition the module-setup for 90kiwi- repart makes sure to include the required and optional profile files (bsc#1228118). * Do not exclude the .profile env file by default kiwi's initrd modules read a .profile file which gets included into the initrd produced at build time. To allow rebuild of a host-only initrd from the booted system this information should be present such that it is possible to re-use kiwi initrd code. * Get rid of debootstrap Replace debootstrap with an apt-get based pre- download of packages followed by a dpkg-deb extraction. * Bump version: 10.0.26 to 10.0.27 * Fix dracut-interactive with systemd 256 With systemd 256, /usr (and thus also /bin/) is read-only in the initrd. Move dracut-interactive and its .service into /run instead. * Bump version: 10.0.25 to 10.0.26 * Revise scripts_testing.rst * Revise schema_extensions.rst * Pass kernel cmdline to agama In the agama integration test make sure to pass along the kernel boot parameters to allow controlling the behavior of agama better * Add file directive to incorporate custom files Usually custom files are managed by placing them as overlay files or archives. However, overlay files must be structured inside of a root/ subdirectory and archive files are binary data. It is therefore not straight forward to just reference one or more files as source files to the image description to be placed into the image. * Bump version: 10.0.24 to 10.0.25 * Fix mocking of test_process_result_bundle_as_rpm * Fixed logging behavior of Compress::get_format The get_format() method allows to check which compression format a given input stream has. This is done by calling the supported compression tools in a row and let them check if they can deal with the provided data or not. As a result error messages are logged for streams that some tool doesn't understand. However, those error messages are no errors and only the result of the checking. This information in the kiwi log file is confusing and several users already complained when they see information like: EXEC: Failed with stderr: /usr/bin/xz: ...: File format not recognized This commit changes how the compression tooling is called in a way that no exception is raised (which leads to the above error message) but the result returncode is used to decide on the success or error of the respective compression tooling. * Allow to set custom ISO Application ID The application ID was used as identifier in the legacy initrd code from former kiwi versions. Because of this there is still the compat layer which sets an App ID as MBR identifier string unless the new application_id overwrites it. * Bump version: 10.0.23 to 10.0.24 * Added integration test for SUSE agama installer This integration test builds a self-install ISO image which drops the SUSE Agama installer into a ramdisk for performing an interactive installation procedure to test Agama * Add --set-type-attr and --set-release-version Allow to set/overwrite type section attributes via the cmdline. Allow to set/add the release-version element via the cmdline. * Update integration test for eficsm Update the type of the Secure profile of the live image integration test as well as the type of the simple-disk test to make use of the eficsm="false" attribute to switch off CSM mode and test an EFI only layout. * Add new eficsm type attribute Allow to produce EFI/UEFI images without hybrid CSM capabilities. * kiwi_plugin_architecture.rst * Revise kiwi_from_python.rst * Wait for loop device detach to complete Detaching a loop device via 'losetup -d' is an async operation. Once the command returns the loop can still be associated with the block special. Therefore this commit waits until the block device got released or a timeout is hit. * Update requires for kiwi-systemdeps-disk-images On Tumbleweed several changes caused tools like strings or the codepage for mtools to be missing in a standard installation. For building disk images especially EFI capable ones with vendor information kiwi needs the above tool. This commit adds the packages providing them on Tumbleweed to the meta systemdeps for disk images. * Supplements are not understood by Debian/Ubuntu * Add new builder for enclaves Add new EnclaveBuilder class which allows to build initrd-only image types. The first enclave implementation covers aws- nitro images produced via the eif_build tooling. * Split out bash completion into a sub-package Per review of the SUSE packaging team we should split out the bash completion into its own sub- package to give users better control over the completion feature. * Bump version: 10.0.22 to 10.0.23 * package: Add fully qualified provides for python3-kiwi in spec On SUSE distributions, currently the expectation is that packages built against the Python interpreter should have fully qualified names in the form of pythonXY-. Additionally, all other Linux distributions prefer something similar in the form of pythonX.Y-. This ensures we have those names so that distribution dependency generation works as expected. * Add support for arch selector on volumes Multiple architecture names can be specified as comma separated list. * Add rd.kiwi.oem.force_resize boot option Forces the disk resize process on an OEM disk image. If set, no sanity check for unpartitioned/free space is performed and also an eventually configured configuration from the image description will not be taken into account (bsc#1224389). * Fixed leap integration tests For whatever reason procps is not longer pulled in by the core dependencies. Thus we have to explicitly request it * Fix potential race condition in loop detach The call to 'losetup -d' is in fact an async operation. Once the command returns the loop can still be associated with the former file because it gets lazy unbound and releases later. Prior re-use of the same loop device it is therefore required to wait until the kernel event queue is processed. * Fixed repository include to image with dnf When specifying a repository element with imageinclude="true", kiwi permanently adds the repo file inside of the image. The distribution standard path is used to store the repo file in this case. With dnf a package manager exists that is primarily used on Fedora and RHEL systems. Thus the standard path for the repo files is set to "/etc/yum.repos.d". However, dnf can also be used for other rpm based distributions e.g SUSE. On such a system the default path does not exist or is different because another package manager is the default. This commit makes sure that the expected path is created prior adding any repo files. * Bump version: 10.0.21 to 10.0.22 * Fixed selinux labels for boot files When kiwi calls the bootloader config and installation modules several files gets created as unlabeled_t because the labeling happened earlier. This commit ensures that setfiles gets called after BootLoaderConfig and/or BootLoaderInstall has done its job. * Add bash to package requirements If there are script evaluations that does not specify an interpreter, kiwi uses bash for it. The same applies for sub- process invocations using shell pipelines. Thus the bash shell is a required tool for kiwi under certain circumstances. * test-image-live: add shadow package * Fix displaying the image verification failure dialog Kiwi must wait for the previous dialog to finish before showing another one as it's the same systemd service behind it. * Allow to customize the path of the isoscan cowfile Added rd.live.cowfile.path option to specify the cowfile at any path below the isoscan-loop-mount. * Better error handling on grub vendor dir lookup The strings command is used to lookup the in-efi binary encoded vendor path. However, if the strings or bash command is not availabe on the build host, the command silently failed and moved into the standard (non vendored) EFI boot path. This can lead to a broken boot for those distros and image targets which requires a vendor directory and should lead to an error message instead of a successful image build. * Fixed profile variable settings for preferences It's allowed to have multiple preferences sections. If those sections provides the same value multiple times, e.g keytable, the last one in the row will win. The setup of the variables in .profile environment file for the preferences elements is not following this rule and used the first section not the last. This commit fixes the profile variables to match the actual setup * Revise users.rst * REvise systemdeps.rst * Revise shell_scripts.rst * Add initrd boot option rd.kiwi.allow_plymouth By default kiwi stops plymouth if present and active in the initrd. Setting rd.kiwi.allow_plymouth will keep plymouth active in the initrd including all effects that might have to the available consoles. This is related to bsc#1214824 * Drop use of obsolete tool isconsole isconsole was provided with the dropped kiwi-tools package. It was a simple C application that checked the capabilities of the current console. In the context of fbiterm it was just used to provide proper error messages which fbiterm on its own did not show. As also fbiterm is on its way to become obsolete and isconsole is already no longer present, it's ok to just drop that extra check and therefore keep the fbiterm mode functional if one manages to include fbiterm and its fonts into the initrd * Bump version: 10.0.20 to 10.0.21 * Add missing write_meta_data method to BLS base The standard bootloader interface class provided a method named write_meta_data which is expected to be implemented in the specialized bootloader implementation. For BLS bootloaders this method was missing in the BLS base class. write_meta_data can provide additional cmdline options for booting. If not covered some boot options might be missing. This patch fixes it * Fix TW integration test to build outside OBS * Make sure BootLoaderConfig fixes are effective The BootLoaderConfigGrub2 class has methods to fix the grub-mkconfig generated files. It does that by mounting the system and changing the respective files after the mkconfig call. However, after the change the class instance stays open in combination with BootLoaderInstallGrub2 instance which itself under certain circumstances also mounts the system to call grub-install. At the time grub- install is called it cannot be guaranteed that all changes has been written unless an explicit umount in the BootLoaderConfigGrub2 class instance happened. This commit address the potential race condition. * Bump version: 10.0.19 to 10.0.20 * Update rawhide integration test Use new arch attribute for testing in the repository element of the rawhide/test-image-live-disk integration test. * Add support for arch attr in repository element Allow to provide different repository sections per architecture * Add --list-profiles to image info Allow to list available profiles from the processed image description * Bump version: 10.0.18 to 10.0.19 * package: Always include patches and number all sources and patches This ensures that stuff is applied reliably and all sources and patches are included as expected. * Bump version: 10.0.17 to 10.0.18 * package: adjust openSUSE patch * Bump version: 10.0.16 to 10.0.17 * Fixed box plugin documentation The provided example was no longer correct according to changes on the image description referenced in the example * Add procps to Tumbleweed integration tests * Add procps to Tumbleweed integration tests * Fix sdist upstream tarball contents The .virtualenv.dev-requirements.txt file is referenced by tox.ini but not put into the sdist tarball and therefore missing in the pypi upstream data. * Drop use of obsolete pkg_resources As documented in https://setuptools.pypa.io/en/latest/pkg_resources.html the use of pkg_resources is obsolete and will cause issues. So happened on Debian unstable. * RepositoryDnf5: correct defaults, set system_cachedir The "defaults" in `use_default_location` here are the dnf4 defaults, not the dnf5 defaults, so let's update them. Also, for dnf5, we need to set `system_cachedir` instead of `cachedir` \- see https://dnf5.readthedocs.io/en/latest/misc/caching.7.html , `system_cachedir` is the cache location used when running as root, `cachedir` is the cache location used when running as a regular user. * Bump version: 10.0.15 to 10.0.16 * poetry build doesn't like symlinks The sdist tarball produced by poetry build does not include all files and skipped symlinks in test/data. This caused the unit test run to fail if called from within that sources * Fix spec file Require docopt-ng for Fedora 41+ * Bump version: 10.0.14 to 10.0.15 * REview runtime_configuration.rst * Review repository_setup.rst * Add support for stopsignal in containerconfig Allow to specify the stopsignal via the containerconfig element * Fix set_disk_password to be effective Since commit 8aa517eb7 it is necessary to call _mount_device_and_volumes() prior making any modifications to boot files. In addition handle potential errors from the grub.cfg modification better. * Update Makefile Make sure custom patches are part of the package sources * Bump version: 10.0.13 to 10.0.14 * doc: Document the bls option for the grub bootloader * Temporarily revert grub-bls default to false for SUSE distributions For the time being, SUSE distributions cannot handle KIWI's default to use BLS with GRUB2. Until they catch up, revert this for them only. * kiwi/bootloader: restore backward compatibility for grub2 with bls The change to introduce the bls parameter broke backward compatibility with all existing kiwi descriptions for distributions that default to BLS. This fixes that by allowing the unset state to be equivalent to enabling it. * Bump version: 10.0.12 to 10.0.13 * Overwrite compression setting only if randomized When building an encrypted image, the bundler never compressed the result. This overwrite from the runtime configuration and the default compression setting actually only makes sense when the image is randomized because only then a compression is for sure useless. * Make sure lsblk output is sorted by dev name lsblk without the sorting option can provide the list of devices in different order. This patch makes sure lsblk sorts the output by the device name (bsc#1223374). * Stop leaking plugins/{priorities,versionlock}.conf file with dnf4/5. This fixes the fedora issue https://bugzilla.redhat.com/show_bug.cgi?id=2270364 * Fix luks_randomize setting Make sure the value passed for luks_randomize in the description becomes effective. It was not possible to switch off luks_randomize because any "not" value was turned into a true value. The actual default should therefore only apply in case luks_randomize is not specified at all which means only a None value will turn into a true value for this setting. * Fix package removal with dnf5 * Add 'bls' parameter for the bootloader * Fix efifatimagesize attribute type The efifatimagesize attribute type value is set to "oem" but the documentation says that it is intended to be also used for creating ISO images. This causes a schema error when this attribute is set on a profile with type "iso" and blocks changing the EFI boot image size which is a problem if the image is bigger than 20M. This commit allows to specify the attribute also for the "iso" type ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-267=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-267=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-10.2.12-1.1 * dracut-kiwi-lib-10.2.12-1.1 * dracut-kiwi-oem-repart-10.2.12-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kiwi-systemdeps-core-10.2.12-1.1 * python3-kiwi-10.2.12-1.1 * kiwi-systemdeps-iso-media-10.2.12-1.1 * kiwi-systemdeps-bootloaders-10.2.12-1.1 * kiwi-systemdeps-filesystems-10.2.12-1.1 * kiwi-systemdeps-disk-images-10.2.12-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214824 * https://bugzilla.suse.com/show_bug.cgi?id=1221469 * https://bugzilla.suse.com/show_bug.cgi?id=1221790 * https://bugzilla.suse.com/show_bug.cgi?id=1223374 * https://bugzilla.suse.com/show_bug.cgi?id=1224389 * https://bugzilla.suse.com/show_bug.cgi?id=1228118 * https://bugzilla.suse.com/show_bug.cgi?id=1228729 * https://bugzilla.suse.com/show_bug.cgi?id=1228741 * https://bugzilla.suse.com/show_bug.cgi?id=1229257 * https://bugzilla.suse.com/show_bug.cgi?id=1235448 * https://bugzilla.suse.com/show_bug.cgi?id=1237772 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:19 -0000 Subject: SUSE-SU-2025:20177-1: important: Security update for libxml2 Message-ID: <174902551906.12703.2528960324828347541@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20177-1 Release Date: 2025-04-04T13:07:29Z Rating: important References: * bsc#1237363 * bsc#1237370 * bsc#1237418 Cross-References: * CVE-2024-56171 * CVE-2025-24928 * CVE-2025-27113 CVSS scores: * CVE-2024-56171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-24928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-24928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-24928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-27113 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27113 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27113 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-56171: Fixed use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c (bsc#1237363). * CVE-2025-24928: Fixed stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370). * CVE-2025-27113: Fixed NULL Pointer Dereference in xmlPatMatch (bsc#1237418). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-272=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxml2-2-debuginfo-2.11.6-5.1 * libxml2-tools-2.11.6-5.1 * libxml2-tools-debuginfo-2.11.6-5.1 * libxml2-2-2.11.6-5.1 * libxml2-debugsource-2.11.6-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56171.html * https://www.suse.com/security/cve/CVE-2025-24928.html * https://www.suse.com/security/cve/CVE-2025-27113.html * https://bugzilla.suse.com/show_bug.cgi?id=1237363 * https://bugzilla.suse.com/show_bug.cgi?id=1237370 * https://bugzilla.suse.com/show_bug.cgi?id=1237418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:20 -0000 Subject: SUSE-SU-2025:20171-1: important: Security update for libtasn1 Message-ID: <174902552082.21522.11379136573103103666@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2025:20171-1 Release Date: 2025-04-01T10:13:05Z Rating: important References: * bsc#1236878 Cross-References: * CVE-2024-12133 CVSS scores: * CVE-2024-12133 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-12133 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12133 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2024-12133: Fixed potential DoS in handling of numerous SEQUENCE OF or SET OF elements (bsc#1236878). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-266=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtasn1-6-debuginfo-4.19.0-4.1 * libtasn1-6-4.19.0-4.1 * libtasn1-debugsource-4.19.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12133.html * https://bugzilla.suse.com/show_bug.cgi?id=1236878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:20 -0000 Subject: SUSE-RU-2025:20176-1: important: Recommended update for openscap Message-ID: <174902552029.12703.14139674650632776945@smelt2.prg2.suse.org> # Recommended update for openscap Announcement ID: SUSE-RU-2025:20176-1 Release Date: 2025-04-03T12:52:09Z Rating: important References: * jsc#SMO-388 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for openscap fixes the following issues: This update ships openscap utilities to SL Miro 6.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-271=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxmlsec1-1-debuginfo-1.2.41-1.1 * openscap-debugsource-1.4.1-1.1 * libltdl7-2.4.7-3.1 * openscap-utils-1.4.1-1.1 * openscap-1.4.1-1.1 * libxmlsec1-1-1.2.41-1.1 * libltdl7-debuginfo-2.4.7-3.1 * openscap-utils-debuginfo-1.4.1-1.1 * libxmlsec1-openssl1-debuginfo-1.2.41-1.1 * libopenscap33-1.4.1-1.1 * openscap-debuginfo-1.4.1-1.1 * libtool-debugsource-2.4.7-3.1 * xmlsec1-debugsource-1.2.41-1.1 * libopenscap33-debuginfo-1.4.1-1.1 * libxmlsec1-openssl1-1.2.41-1.1 ## References: * https://jira.suse.com/browse/SMO-388 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:24 -0000 Subject: SUSE-RU-2025:20170-1: moderate: Recommended update for pcr-oracle Message-ID: <174902552421.21522.6830837780424606637@smelt2.prg2.suse.org> # Recommended update for pcr-oracle Announcement ID: SUSE-RU-2025:20170-1 Release Date: 2025-04-01T07:54:32Z Rating: moderate References: * bsc#1230316 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for pcr-oracle fixes the following issues: * Fixed the prediction of SbatLevelRT when Secure Boot is disabled (bsc#1230316) * Make PCR4 a hard requirement for SbatLevelRT prediction (bsc#1230316) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-265=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * pcr-oracle-0.4.6-3.1 * pcr-oracle-debugsource-0.4.6-3.1 * pcr-oracle-debuginfo-0.4.6-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:23 -0000 Subject: SUSE-RU-2025:20175-1: moderate: Recommended update for container-selinux Message-ID: <174902552320.12703.14819113001656370299@smelt2.prg2.suse.org> # Recommended update for container-selinux Announcement ID: SUSE-RU-2025:20175-1 Release Date: 2025-04-03T07:50:44Z Rating: moderate References: * bsc#1221720 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for container-selinux fixes the following issues: * Update to version 2.236.0: * Allow super privileged containers to use RealtimeKit for scheduling * Add container_ro_file_t to the podman artifact store * Update to version 2.235.0: * Bump to v2.235.0 * container_log{reader,writer}_t: allow watch file * RPM: Update gating config * Enable aarch64 testing * TMT: simplify podman tests * feat: support /var/lib/crio * Update to version 2.234.2: * TMT: enable epel idomatically * Packit: switch back to fedora-all * RPM: Bump Epoch to 4 * rpm: ship manpage * Add proper labeling for RamaLama * Packit: remove rhel / epel jobs * packit: remove unused file * Add BuildRequires selinux-policy-%{selinuxtype} to enable building for SLFO. Might be removed in the future again when 1231252 is fixed. * Update to version 2.233.0: * container_engine_t: small change to allow non root exec in a container * RPM: explicitly list ghosted paths and skip mode verification * container-selinux install on non selinux-policy-targeted systems (#332) * set container_log_t type for /var/log/kube-apiserver * Allow kubelet_t to create a sock file kubelet_var_lib_t * dontaudit spc_t to mmap_zero * Packit: update targets (#330) * container_engine_t: another round of small improvements (#327) * Allow container_device_plugin_t to use the network (#325) * RPM: cleanup changelog (#324) * TMT: Simplify tests * Update to version 2.232.1: * Bump to v2.232.1 * TMT: fix srpm download syntax on rawhide * Bump to 2.232.0 * Packit: remove `update_release` key from downstream jobs (#313) * Update container-selinux.8 man page * Add ownership of /usr/share/udica (#312) * Packit/TMT: upstream maintenance of downstream gating tests * extend container_engine_t again * Allow spc_t to use localectl * Allow spc_t to use timedatectl * introduce container_use_xserver_devices boolean to allow GPU access * Update to version 2.231.0: * Allow container domains to communicate with spc_t unix_stream_sockets * Move to %posttrans to ensure selinux-policy got updated before the commands run (bsc#1221720) * Manual update to version 2.230.0+git4.a8e389d to include this commit that is needed for the main selinux-policy update to work: * Rename all /var/run file context entries to /run * Update to version 2.230.0: * Move to tar_scm based packaging: added _service and _servicedata * Allow containers to unmount file systems * Add buildah as a container_runtime_exec_t label * Additional rules for container_user_t * improve container_engine_t * Update to version 2.228: * Allow container domains to watch fifo_files * container_engine_t: improve for podman in kubernetes case * Allow spc_t to transition to install_t domain * Default to allowing containers to use dri devices * Allow access to BPF Filesystems * Fix kubernetes transition rule * Label kubensenter as well as kubenswrapper * Allow container domains to execute container_runtime_tmpfs_t files * Allow container domains to ptrace themselves * Allow container domains to use container_runtime_tmpfs_t as an entrypoint * Add boolean to allow containers to use dri devices * Give containers access to pod resources endpoint * Label kubenswrapper kubelet_exec_t * Update to version 2.222: * Allow containers to read/write inherited dri devices * Update to version 2.221: * Allow containers to shutdown sockets inherited from container runtimes * Allow spc_t to use execmod libraries on container file systems * Add boolean to allow containers to read all cert files * More MLS Policy allow rules * Allow container runtimes using pasta bind icmp_socket to port_t * Fix spc_t transitions from container_runtime_domain * Update to version 2.215.0: * Add some MLS rules to policy * Allow container runtime to dyntransition to spc_t * Tighten controls on confined users * Add labels for /var/lib/shared * Cleanup entrypoint definitions * Allow container_device_plugin_t access to debugfs * Allow containers which use devices to map them ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-270=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * container-selinux-2.236.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221720 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:26 -0000 Subject: SUSE-RU-2025:20174-1: moderate: Recommended update for mozilla-nss Message-ID: <174902552608.12703.8790276160823323396@smelt2.prg2.suse.org> # Recommended update for mozilla-nss Announcement ID: SUSE-RU-2025:20174-1 Release Date: 2025-04-02T14:18:25Z Rating: moderate References: * bsc#1222834 * bsc#1224113 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for mozilla-nss fixes the following issues: * FIPS: Do not pass in bad targetKeyLength parameters when checking for FIPS approval after keygen. This was causing false rejections. * FIPS: Approve RSA signature verification mechanisms with PKCS padding and legacy moduli (bsc#1222834). * FIPS: enforce approved curves with the CKK_EC_MONTGOMERY key type (bsc#1224113). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-269=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.101.2-2.1 * mozilla-nss-tools-debuginfo-3.101.2-2.1 * mozilla-nss-certs-debuginfo-3.101.2-2.1 * libsoftokn3-debuginfo-3.101.2-2.1 * mozilla-nss-debugsource-3.101.2-2.1 * mozilla-nss-tools-3.101.2-2.1 * libfreebl3-3.101.2-2.1 * mozilla-nss-3.101.2-2.1 * libsoftokn3-3.101.2-2.1 * mozilla-nss-certs-3.101.2-2.1 * mozilla-nss-debuginfo-3.101.2-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222834 * https://bugzilla.suse.com/show_bug.cgi?id=1224113 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:30 -0000 Subject: SUSE-RU-2025:20169-1: moderate: Recommended update for net-snmp Message-ID: <174902553010.21522.11014971739271538520@smelt2.prg2.suse.org> # Recommended update for net-snmp Announcement ID: SUSE-RU-2025:20169-1 Release Date: 2025-03-31T15:50:37Z Rating: moderate References: * bsc#1206044 * bsc#1207697 * bsc#1214364 * bsc#1232030 Affected Products: * SUSE Linux Micro 6.0 An update that has four fixes can now be installed. ## Description: This update for net-snmp fixes the following issues: * Version update to 5.9.4 (bsc#1214364): * IMPORTANT: SNMP over TLS and/or DTLS are not functioning properly in this release with various versions of OpenSSL and will be fixed in a future release. * libsnmp: * Removed the unused SNMP_SWIPE_MEM() macro * Fixed issues with DISPLAY-HINT * Miscellanious improvements to the transports * Handle multiple oldEngineID configuration lines * Fixed issues with DNS names longer than 63 characters * agent: * Added a ignoremount configuration option for the HOST-MIB * Disallow SETs with a NULL varbind * Fixed the --enable-minimalist build * apps: * snmpset: allow SET with NULL varbind for testing * snmptrapd: improved MySQL logging code * general: * configure: removed `-Wno-deprecated` as it is no longer needed * miscellanious bug fixes * Other issues fixed: * Removed legacy MIBs used by Velocity Software (jira#PED-6416) * Re-add support for hostname netgroups (bsc#1207697) * Fixed Systemd services setting "ProtectHome=true" that caused home directory size and allocation to be listed incorrectly (bsc#1206044) * Ensure logrotate reloads the configuration instead of restarting the service to prevent downtime (bsc#1232030) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-264=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsnmp40-5.9.4-1.1 * snmp-mibs-5.9.4-1.1 * libsnmp40-debuginfo-5.9.4-1.1 * net-snmp-debugsource-5.9.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206044 * https://bugzilla.suse.com/show_bug.cgi?id=1207697 * https://bugzilla.suse.com/show_bug.cgi?id=1214364 * https://bugzilla.suse.com/show_bug.cgi?id=1232030 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:31 -0000 Subject: SUSE-RU-2025:20168-1: moderate: Recommended update for ignition Message-ID: <174902553114.21522.4108097436708300399@smelt2.prg2.suse.org> # Recommended update for ignition Announcement ID: SUSE-RU-2025:20168-1 Release Date: 2025-03-31T06:43:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for ignition fixes the following issues: * Drop "go clean" from the upstream build script: since we build in * Fix order of previous change - _first_ remount rw, _then_ create directory. * Apply (temporary) upstream patch from fedora-coreos-config for compatibility with systemd 256. * Update to version 2.19.0: * Support LUKS encryption using IBM CEX secure keys on s390x * providers: add "akamai" provider * Adding %check section * Build scripts are executable by themselves now, remove explicit Bash call * Update to version 2.18.0: * NEWS: update 2.18.0 * azure: retry HTTP requests on codes 404, 410, and 429 * docs: add missing scaleway link * providers: add scaleway * resource/url: customize local address (port) * stages/files: filter out non-existent paths before relabeling * docs/release-notes: tweak dracut module change * Bump minimum Go version to 1.20 * dracut: Don't include the ignition module by default * ci: cancel previous build on PR update * Sync repo templates * Update build(deps) * Increased required Go version * module-setup.sh: Use $dracutsysrootdir ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-263=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * ignition-debuginfo-2.19.0-1.1 * ignition-2.19.0-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:33 -0000 Subject: SUSE-RU-2025:20167-1: moderate: Recommended update for elemental-operator Message-ID: <174902553328.21522.11284806111132383696@smelt2.prg2.suse.org> # Recommended update for elemental-operator Announcement ID: SUSE-RU-2025:20167-1 Release Date: 2025-03-31T06:36:42Z Rating: moderate References: * bsc#1237498 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for elemental-operator fixes the following issues: * Update to version 1.6.7: * Bump default operator channel to Micro 6.1 images * [v1.6.x][BACKPORT] seedimage: clean-up service on image download deadline (bsc#1237498) * No need to install yq neither to create a GH release ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-262=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-register-1.6.7-1.1 * elemental-support-1.6.7-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237498 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:48 -0000 Subject: SUSE-RU-2025:20173-1: moderate: Recommended update for google-guest-configs Message-ID: <174902554836.12703.17282914177568109093@smelt2.prg2.suse.org> # Recommended update for google-guest-configs Announcement ID: SUSE-RU-2025:20173-1 Release Date: 2025-04-02T11:32:22Z Rating: moderate References: * bsc#1221146 * bsc#1221900 * bsc#1221901 * bsc#1231775 * bsc#1231776 * bsc#1233625 * bsc#1233626 * bsc#1234254 * bsc#1234255 * bsc#1234289 * bsc#1234293 Affected Products: * SUSE Linux Micro 6.0 An update that has 11 fixes can now be installed. ## Description: This update for google-guest-configs fixes the following issues: * Follow up to (bsc#1234289, bsc#1234293). Avoid duplicate entries for the metadata server in /etc/hosts * Update to version 20241205.00 (bsc#1234254, bsc#1234255) * Update google_set_multiqueue to configure vCPU ranges based on VM platform * from version 20241204.00 * Restore google_set_multiqueue changes for A3Ultra * Depend on networkd-dispatcher in Ubuntu * Include components to set hostname and /etc/hosts entries (bsc#1234289, bsc#1234293) * Add sysconfig and sysconfig-network to BuildRequires * Install google_set_hostname into %{_bindir} * Install google_up.sh into %{_sysconfdir}/sysconfig/network/scripts/ * Add code to add and remove POST_UP_SCRIPT="compat:suse:google_up.sh" to /etc/sysconfig/network/ifcfg-eth0 in %post and %postun sections * Update to version 20241121.00 (bsc#1233625, bsc#1233626) * Temporarily revert google_set_multiqueue changes for release * from version 20241115.00 * Remove IDPF devices from renaming rules * from version 20241112.00 * Revert "Revert 3 commits:" * from version 20241108.00 * Revert 3 commits: * from version 20241107.00 * gce-nic-naming: Exit 1 so that udev ignores the rule on error * from version 20241106.00 * Remove Apt IPv4 only config for Debian and Ubuntu * from version 20241031.00 * Add GCE intent based NIC naming tools * from version 20241025.00 * Update google_set_multiqueue to skip set_irq if NIC is not a gvnic device * Add new binary gce-nic-naming to %{_bindir} in %files section * Update to version 20241021.00 (bsc#1231775, bsc#1231776) * Add GCE-specific config for systemd-resolved * from version 20241015.00 * Update google_set_multiqueue to enable on A3Ultra family * from version 20241013.00 * Update OWNERS * from version 20241010.00 * Depend on jq in enterprise linux * from version 20241008.00 * Always use IP from primary NIC in the networkd-dispatcher routable hook * Update to version 20240925.00 * Call google_set_hostname on openSUSE and when the agent is configured to manage hostname and FQDN, let it * from version 20240924.00 * Include systemd-networkd hook in Ubuntu packaging * from version 20240905.00 * Update packaging as of Ubuntu devel packaging * from version 20240830.00 * Fix the name for A3 Edge VMs * Update to version 20240725.00 * Fix: hostnamectl command * Update to version 20240607.00 * Update is_a3_platform to include A3-edge shape * Update to version 20240514.00 * Add systemd-networkd hostname hook * from version 20240501.00 * Add hostname hook for NetworkManager without dhclient compat script * Update to version 20240307.00 (bsc#1221146, bsc#1221900, bsc#1221901) * Support dot in NVMe device ids * from version 20240304.00 * google_set_hostname: Extract rsyslog service name with a regexp for valid systemd unit names * from version 20240228.00 * Remove quintonamore from OWNERS * from version 20240119.00 * Setup smp affinity for IRQs and XPS on A3+ VMs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-268=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * google-guest-configs-20241205.00-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221146 * https://bugzilla.suse.com/show_bug.cgi?id=1221900 * https://bugzilla.suse.com/show_bug.cgi?id=1221901 * https://bugzilla.suse.com/show_bug.cgi?id=1231775 * https://bugzilla.suse.com/show_bug.cgi?id=1231776 * https://bugzilla.suse.com/show_bug.cgi?id=1233625 * https://bugzilla.suse.com/show_bug.cgi?id=1233626 * https://bugzilla.suse.com/show_bug.cgi?id=1234254 * https://bugzilla.suse.com/show_bug.cgi?id=1234255 * https://bugzilla.suse.com/show_bug.cgi?id=1234289 * https://bugzilla.suse.com/show_bug.cgi?id=1234293 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:25:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:25:58 -0000 Subject: SUSE-RU-2025:20172-1: important: Recommended update for python-kiwi Message-ID: <174902555823.12703.7951918818090252486@smelt2.prg2.suse.org> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2025:20172-1 Release Date: 2025-04-01T10:26:32Z Rating: important References: * bsc#1214824 * bsc#1221469 * bsc#1221790 * bsc#1223374 * bsc#1224389 * bsc#1228118 * bsc#1228729 * bsc#1228741 * bsc#1229257 * bsc#1235448 * bsc#1237772 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has 11 fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Bump version: 10.2.11 to 10.2.12 * Fix profile env variable name regression In the effort of adapting to the latest snapper in Issue #2697 we overlooked the after effect of a different variable name in the profile environment with regards to $kiwi_btrfs_root_is_snapshot and $kiwi_btrfs_root_is_snapper_snapshot. Image builds that references the former variable name would be broken by the change. This commit makes sure no regression is introduced by providing both variants (bsc#1237772). * Fix grub mkimage call for the ppc platform The list of modules used to create a grub platform image for ppc was the same list as used for the x86 bios platform. This commit fixes this and also cleans up the inconsistency and misleading names used for creating platform specific output. * Bump version: 10.2.10 to 10.2.11 * Update box plugin documentation Add chapter about new container build feature. The box plugin can now also run the build in containers * The ubuntu 20.04 github runner is closing down Make sure to move to another runner for workloads which still uses ubuntu 20.04 * Bump version: 10.2.9 to 10.2.10 * Poetry build sdist timestamps set to epoch 0 Newer versions of poetry set the timestamp for all source files to epoch 0. Such sources are not accepted by e.g Debian FTP servers and in general I don't like when tools changes their behavior just like that. This commit forces an older version of poetry for the purpose of creating the sdist tarball which then gets published on pypi. The argumentation for reproducible builds by forcing source files to a certain timestamp doesn't fly for me. I'm open for any better solution though. * Bump version: 10.2.8 to 10.2.9 * Classify missing chkstat as debug message chkstat is a distribution specific tool. If it is present we use it, if not we don't but it's not worth a warning. * Allow to run setfiles multi threaded Use option -T0 for newer setfiles version. * Add rd.kiwi.dialog.timeout option Allow to configure the timeout value for dialogs displayed by the kiwi dracut code. By default the timeout is set to 60 seconds. With the special value "off" the dialog will never timeout. * Make sure copy actions does not drop context Use shutil.copy2 to copy files preserving their attributes in the grub BootLoader space. * Improve unit test for archive target_dir Add a test case with absolute path in the target_dir to make sure we never unpack the archive to the host system. * Fixed profiled overlay imports When building an image for profile: SOME and providing an overlay directory named SOME/... kiwi will sync the contents of this overlay directory to the root tree. However it took the toplevel name SOME/ into account which is unwanted because only the sub data structure should be synced into the new root tree. This * Bump version: 10.2.7 to 10.2.8 * Use multipath child instead of parent device On multipath systems we need to find underlying child device instead of using parent device. This prevents listing all parent devices for a multipath device * Increase size for agama integration test build Agama needs more space to build now * Fixed agama integration test rubygem-byebug and rubygem-agama-yast seems to no longer exist * Update TW integration tests Package nscd was dropped from TW * Fix documentation regarding URI styles In reference to commit 760a65558f9e2e91d3eaa3a2f9503ff596984b48 the support for iso:// URI types was dropped some time ago. However, the documentation was not properly updated. This commit fixes it * Fix return value of grub helper methods The grub helper methods to find grub tools returns a None value if the tool cannot be found. This None value could be used later in a Command call where it will be used in a join() command to log the resulting commandline. This join() call then fails and raises an unhandled error causing a stack trace in the application. This commit fixes it * Added disk validation for duplicate installs Installing the same image to different storage disks on the same machine creates device conflicts with unexpected side effects. This commit adds a validation based on the PTUUID of the disk image to check if another device on the system has the same ID and if yes, does not allow to install the image again including a message which device takes the same identifier. This references bsc#1228741 * Fixed documentation for signing key attribute The source locator name for local files was incorrect * Bump version: 10.2.6 to 10.2.7 * Update documentation Added a new troubleshooting chapter as subsection to the Build Host Constraints named Package Manager Behavior. It serves the purpose to describe options for the customer to change the default package manager behavior which we from the kiwi side do not influence intentionally. This is a followup change to bsc#1235448 * Drop still present tox artifacts There were still some left over tox files and the documentation contribution chapter was also wrong at several places * Add support for reading optional pkgmgr env file If there is a file .kiwi.package_manager.env in the root of the image tree it will be read and put into the caller environment for the selected package and repository manager. There are features in e.g zypper which can only be used via env variables (bsc#1235448). * Auto convert unit test XML data to schema v8.3 * Rename btrfs_root_is_snapshot Rename btrfs_root_is_snapshot to btrfs_root_is_snapper_snapshot. This happens in preparation for the changes suggested in #2697 where we want to get rid of snapper specific btrfs code which will be available in snapper natively soon. To make sure a btrfs layout specific to snapper(and SUSE), the implicitly used attribute named btrfs_root_is_snapshot now becomes explicit and its new name will indicate that snapper sits behind it. Along with the rename a XSLT stylesheet to automatically convert the old name into the new name for schema v8.3 will be performed. * Bump version: 10.2.5 to 10.2.6 * Fixed donate button target * Added LUKS reencryption support Added rd.kiwi.oem.luks.reencrypt boot option consumed by the kiwi-repart dracut module. For OEM LUKS2 encrypted disk images. If set, reencrypts the disk prior an eventual resize and therefore creates a new key pool and master key. The reencryption is advisable if the image binary is not protected. With access to the image binary it's possible to extract the luks header which then allows to decrypt the data unless it was reencrypted. The reencryption process only runs if the checksum of the luks header still matches the one from the original disk image. Be aware that the reencryption will ask for the passphrase if the image has been built with an initial luks passphrase. * Fixed arm/tumbleweed/test-image-rpi No ruby required for this integration test build * Plain zipl loader needs boot partition If the rootfs is something zipl cannot read, we need an extra boot partition using a supported filesystem * Fixed IBM-Cloud-Standard profile The test-image-MicroOS integration test builds an IBM-Cloud-Standard profile as encrypted variant with a random key that is not protected by an encrypted boot image. This doesn't make sense. Thus the encryption setup for the IBM cloud standard build got removed. Use the IBM-Cloud-Secure-Execution profile to test encrypted secure linux builds * Fixed test-image-qcow-openstack rsh package was dropped from TW * Fix genprotimg for s390 builds A recent change on genprotimg now forbids to use --cert in combination with --no-verify, even though this was allowed before. * Fix documentation for repo, package gpg settings In contrast to the documentation, kiwi sets default values for any gpg setting if not explicitly specified differently. We want to avoid to inherit a behavior from how the distribution packages the package manager. This commit fixes the documentation to be in line with the implementation * Drop insecure and unsupported md5 digest Decommission the Checksum.md5() method and move all places in code to sha256(). The md5 digest is considered insecure and has also been removed from hashlib as a supported digest. * Fix config functions action The action failed on the setup of the runtime because the upgrade of pip failed. * Bump version: 10.2.4 to 10.2.5 * Changed systemfiles provider Instead of providing a static list of filenames, provide a list of package names. It is expected that the pilot of flake-pilot resolves this list against the local package database to build up the filelist for provisioning * Bump version: 10.2.3 to 10.2.4 * Update system files setup for containers The attribute provide_system_files creates a meta file in the root tree named 'systemfiles'. The contents of this file were produced by just a dump of the package database so far. For a more generic use of this data some adaptions were needed. First we allow to skip packages matching a pattern from being part of the system files. Next we do not put ghost and doc files into account. And last we handle library files in a different file named 'systemfiles.libs' where we do not add symlink targets if the target path is also part of the package. The consumer of this information is flake-pilot which syncs that library system files from the host via --copy-links. This allows a more generic use with regards to versioned libraries e.g. libc * Drop /dev/pts from bind mount locations This has created havoc in the Fedora build environments by fully unmounting /dev/pts and breaking the builders for subsquent tasks. This is a partial revert of commit daf1323c5ded7e4e7783205f5e30457b40eb322f. * Don't take ghost files into account When creating the system files information do not take ghost files and artifact files into account * Bump version: 10.2.2 to 10.2.3 * Update STYLEROOT to SUSE 2022 * Fix broken links in the documentation * Fix legacy_bios_mode detection The code in this method does not work correctly if the firmware is set to 'bios'. In bios only mode the method returned a false value which is incorrect as it should return a true value in this case. Without this patch ISO images will fail to boot because no loader gets configured. * Added /dev/pts to bind mount locations During runtime several kernel filesystems are bind mounted into the image root system such that programs expecting it can work. /dev/pts was not needed so far but seems to be a good addition to the list to make tools like sudo to work properly when called e.g. from a config.sh script. * xorriso: respect efiparttable and gpt_hybrid_mbr This should make the xorriso-based ISO build path respect the 'efiparttable' and 'gpt_hybrid_mbr' settings when building a UEFI-compatible image, making it write a GPT disk label by default instead of an MBR (msdos) one. If it's building an image that is not UEFI-compatible it will always write an MBR label, regardless of this setting. If 'gpt_hybrid_mbr' is set, xorriso will write an Ubuntu-style MBR/GPT hybrid partition table, where the MBR partition table includes a partition with type 00 and the bootable flag, as well as the partition with type ee required by the UEFI spec. This mildly violates the UEFI spec but may make the image bootable on native BIOS or CSM firmwares which refuse to boot from a disk with no partition marked 'bootable' in the MBR. If 'gpt_hybrid_mbr' is not set, xorriso will write a strictly UEFI-spec compliant label, with just the 'protective MBR' required by the UEFI spec (no bootable partition) and the correct GPT partition table. Note this is somewhat different from what gpt_hybrid_mbr does for disk images. Also, we now pass -compliance no_emul_toc when building ISOs, as recommended by upstream in https://lists.gnu.org/archive/html/bug- xorriso/2024-11/msg00012.html This tool is generally always going to be building ISOs intended for write-once use, not multi-session use (and which are rarely, these days, written to physical discs at all anyway). * Added provide/require system files for containers Added the attributes provide_system_files and require_system_files to control the provider and requester of system files in container image builds. systemfiles is a metadata file which contains all files from the package database at call time. It is used in flake-pilot to provision the systemfiles data from the host into the container instance. One possible use case for this data is a flake registration which uses a base container that is derived from a runtime container but all data from the runtime should be provisioned from the host. Using this feature tightly couples the flake to the host OS distribution and version. * Bump version: 10.2.1 to 10.2.2 * Fix scope issue Increase livetime of the the compressor instances to the livetime of RootImportOCI. They create temporary files which are referenced later and need to live longer than the block they got created in * Bump version: 10.2.0 to 10.2.1 * Fixed use of fscreateoptions for iso type The information for fscreateoptions was not passed along to the tooling if a custom filesystem attribute was specified. * Allow to derive from multiple containers Add support for multi inheritance to the derived_from attribute In the order of a comma seperated list of docker source URI's a base tree is created. This was possible only with one container so far and Fixes #2680 as well as jira#OBS-354 * Bump version: 10.1.18 to 10.2.0 * Add selinux test build to TW Also update derived docker integration test to latest Leap * kiwi/schema: Fix allowed value type for ISO publisher and application ID According to the spec, this should be constrained to 128 characters but also allow quite a few other special characters (as well as spaces). We didn't allow spaces in application ID, but allowed too much for Publisher. Now we set up both correctly. * Fix setup of kiwi environment variables Some kiwi env vars are initialized with an empty value and not overwritten if another value is provided. For the selected variables an empty value setting is not allowed because the schema also enforces the value to be set at least once. In addition a helpful option named --print-kiwi-env was added to the 'image info' command which allows to print the environment variables and their values. * Add random key support for LUKS encryption Allow to pass luks="random". In random mode use the generated keyfile as the only key to decrypt. This is only secure if the generated initrd also gets protected e.g. through encryption like it is done with the secure linux execution on zSystems * Added development group in pyproject setup generateDS and other tools are needed and were forgotten to be added when we deleted the tox dependency * Added containers integration with OBS When building in the Open Build Service (OBS) there is no way to create outgoing connections from the build workers. To allow the containers section to fetch containers from the SUSE registry we need to apply an OCI URI translation into a local path. The actual OCI container image is expected to be provided by the obs backend on the worker. Along with this commit also an integration test named test- image-disk-containers is provided (jira#OBS-351). * Fix rendering of SUSE docs The SUSE documentation is produced through a conversion of the ReST source into docbook. The name kiwi is reserved in the index and needs to be referenced as kiwi-ng when used as command. * Remove tox dependency tox was used as sort of a make target to run unit tests and more in a python virtualenv. However, since we switched everything to poetry it's no longer needed to let tox create the python virtual environments. This commit moves the tox targets into the Makefile and adapts the github workflow files accordingly. In addition the scripts container based tests were re-activated and fixed such that they succeed again. * Fix make build target Move the actions done by the tox target into the build target and call them there in a clean and easy to spot sequence. There is no need to call tox to prepare for the package submission, instead the checks and poetry runs to prepare for the package target should be called directly as part of the build target. In the future we might get rid of tox completely. * Bump version: 10.1.17 to 10.1.18 * Fixed zipl caller environment zipl gets confused with an active sysfs mount inside the root tree at call time of zipl. This commit umounts the /sys bind mount in the image tree prior calling zipl * Fix s390 test-image-disk build Add missing kernel links used by suse tools * Bump version: 10.1.16 to 10.1.17 * Fix coloring of build_status.sh flags Depending on the place of the status flag the color setup might fail. This commit fixes it * Add pytest-container as optional dependency The pyproject.toml listed pytest-container as dependency but it is used only to run the container based integration tests for the shell helper methods. For building the package this dependency should not be pulled in * Fix networking in erofs integration test The network setup was systemd- networkd based but the provided network config was not for systemd * Bump version: 10.1.15 to 10.1.16 * Fix erofs requires in spec erofs-utils for SUSE only exists in Tumbleweed. The former conditon would also add the requirement for ALP and SLFO which is wrong. This commit fixes it * Add vagrantconfig rule for vagrant format If the format="vagrant" attribute is set, a vagrantconfig section becomes mandatory. This commit enforces this rule on the schema. * Bump version: 10.1.14 to 10.1.15 * Fixed sphinx_rtd_theme setup Delete obsolete display_version attribute * Evaluate eficsm everywhere Fixed _supports_bios_modules() to take an eventually provided eficsm setup into account. The grub config still searches for i386 grub modules even if eficsm="false" is set. * Fixed debian bootstrap script calls Run scripts as commands with their native shebang and not through bash. Not all debian package scripts uses bash, some of them uses sh which can be a link to dash or other interpreters. * Update TW integration tests The package x86info was dropped from TW * Turn DiskFormat into an ordinary class * it does not need to be an abstract base class * use f-strings where applicable instead of format() * change return type of _custom_args_for_format from list to tuple * Add new containers section Allow to specify references to OCI containers in the image description During the kiwi process the containers are fetched into a temporary location and a systemd service is configured to one time load the containers into the local registry at first boot of the system. * Bump version: 10.1.13 to 10.1.14 * Revert "Install usrmerge for Debian integration test" This reverts commit 95ac861741f14c4f35611c16328384c18e53dcfb. Solution needs to be provided in code * Install usrmerge for Debian integration test * Support older apt versions for bootstrap * Run package scripts in apt bootstrap phase The bootstrap procedure based on apt only runs a manual collection of package scripts. This commit refactors the code that unpacks the bootstrap packages to a python implementation and adds a method to run the bootstrap scripts from all packages resolved by apt. * Bump version: 10.1.12 to 10.1.13 * Fix bundle extension for vagrant type When bundling result files that uses a vagrant type, kiwi creates them with the extension .vagrant.virtualbox.box or .vagrant.libvirt.box. The bundler code renames them using only the .box suffix which is too short as it is missing the subformat information. This commit fixes it and keeps this information in the result bundle file name. * Use simple quotas (squota) for volumes * Add quota attribute to volume section Allow to set quota per volume for the btrfs filesystem * Fix globbing with exclude with regex This fixes a collection of bugs when producing erofs images. On one hand, this ensures that an exclude of `/sys` doesn't accidentally match `/lib/libsystemd.so`, only `/sys/whatever`. On the other hand, this ensures that `/dev/*` does match `/dev/vda` and not just `/dev///////////`. This fixes libsystemd.so getting dropped in Kiwi- built FEX images. * Honour custom exclude for filesystem builds All other call sites honour the custom exclude file, it's just this one that needs to be fixed. This unblocks use of Kiwi for generating FEX rootfs. * test: storage: update clone_device tests with new block size * storage: clone_device: increase dd block size Increasing the block size used for dd reduces the time needed to clone a device. * Bump version: 10.1.11 to 10.1.12 * Add missing erofscompression validation In the filesystem builder I forgot to evaluate the erofscompression attribute. * Include PI and comments in XSL stylesheets So far comments and processing instructions (PI) were ignored when applying the XSL stylesheets. This commit updates all stylesheets to take them into account * Bump version: 10.1.10 to 10.1.11 * doc: Add login information test build test images * Bump version: 10.1.9 to 10.1.10 * bootloader: Fix up ppc64 bootinfo again To make the code look pretty extra newline is inserted at the start of bootinfo file. This appears to break boot on Power9 PowerVM LPARs. * Add support for erofs erofs is an alternative readonly filesystem that can be used as alternative to squashfs. * Fixed enclave integration test The SELinux policy of Fedora Rawhide when running completely in an initrd is not suitable to let the system boot up. Thus the current solution is to boot in permissive mode. A better solution for the future would probably be a selinux policy for enclaves * limit eif_build requires to fedora greater than or equal to 42 * Bump version: 10.1.8 to 10.1.9 * Added sshd to nitro-enclave integration test * Fixed container sync options Do not exclude/filter any security/xattr capabilities. * Update container integration test Add getcap to check on filesystem capabilities * Add new build type provides for enclave Add a provides tag (read by the open buildservice) for the new enclave builder. Also add a recommends to eif_builder in the systemdeps-core meta package * Update enclave documentation Fixup repo setup in the build documentation * Bump version: 10.1.7 to 10.1.8 * Fixed enclave documentation * Update test-image-nitro-enclave package list Fixup package list to match Fedora rawhide * Move test-image-nitro-enclave to rawhide * Fix ppc64 chrp bootinfo generation * Fixed documentation header Fixed double H1 headers from the boxbuild tweaks chapter. * Bump version: 10.1.6 to 10.1.7 * Move EXEC log message to the right place The log information of the command execution was not printed directly before the actual command invocation. There are other actions after the log information (e.g Path.which) which itself produce log information prior the real subprocess execution. This is very misleading when reading the log file and fixed in this commit. * Add support for architectures in deb source file When apt resolves packages on a multiarch repo it can happen that dependencies for packages from other architectures are pulled into the solver process but are not provided by any repository. To overcome this behavior the repository can be setup to serve packages only for a specified architecture or list of architectures. This is related to OSInside/kiwi-descriptions#102 * Bump version: 10.1.5 to 10.1.6 * add allowExtraConfig and exportFlags to ovftool options Add allowExtraConfig and exportFlags to ovftool options * Bump version: 10.1.4 to 10.1.5 * create EFI/BOOT only if UEFI boot is intended * Fix boot support for ISO media on ppc64 add CHRP boot support for ppc64 and add xorriso option to avoid file name reduction to MS-DOS compatible 8.3 format * Fix initrd permissions kiwi stored the initrd for ISO images as 600 which might be too restrictive. This commit makes sure the initrd is stored as 644 and Fixes bsc#1229257 * Fixed ramdisk size setup For setting up the brd rd_size option kiwi creates 99-brd.conf used at load time of the kernel brd driver. The location for the conf file is set to /etc/modprobe.d/ However, in newer versions the location has changed to /usr/lib/modprobe.d/ and /etc/modprobe.d is no longer expected to exist. This commit makes sure /etc/modprobe.d is created if not present. * Bump version: 10.1.3 to 10.1.4 * Add note about guestOS values for vmware ovftools. * Add note about guestOS values for vmware platform. * Fixed resize of dos table type on s390 On s390, parted is used to detect the partition table type. In contrast to blkid the name for DOS tables is reported as 'msdos' and not 'dos' which impacts several conditions in the kiwi initrd code which checks for 'dos'. This commit fixes the get_partition_table_type() method to return a consistent table name for DOS tables (bsc#1228729) * Revert "remove dependency on /usr/bin/python" This reverts commit 15b450188483b567ca10bb459bf50ed90e905bb7. The change provided here entirely broke kiwi in OBS. With this patch applied every image build in OBS fails with the following message: 'line 1: /usr/sbin/kiwi: No such file or directory' * Bump version: 10.1.2 to 10.1.3 * Fix bundle extension for archive types When bundling result files that uses an archive type like tbz or docker, kiwi creates them with the extension tar.xz/tar.gz The bundler code only uses the extension from the last tuple in a "." split which is wrong for "tar." filenames. This commit adds an exception to the prefix rule for this output filenames and Fixes * Fix ImageSystem mount procedure The mount() method did not take custom partitions into account. This commit fixes it. * remove dependency on /usr/bin/python * Add support for isomd5sum for tagging iso files The isomd5sum tool suite is used and available on all supported distributions except SUSE distributions, and is necessary to produce conformant ISOs for most Linux distributions. This change adds support for isomd5sum tool suite for kiwi, though it does not extend the kiwi-live dracut module to use it. The upstream dracut dmsquash-live module must be used instead. * kiwi/builder/live: Log the correct value for Application ID Since it is now possible to set a custom application ID, we want to see this when it is being used for the image. * kiwi/builder/live: Clean up leftover dracut configuration file The existence of this file breaks installers on live media that sync the full filesystem to disk and are not aware of this configuration before generating the target system initramfs. * Allow string versions and test "word" versions There are descriptions out in the wild that use "non-numeric" versions in their descriptions, particularly without separators for splitting. This change switches all of this to strings rather than assuming numbers and gracefully handles the single word case. * Add documentation for boxbuild tweaks * Fixed wrong log level on --logfile When using --logfile, the log generated there matches the stdout log (which without --debug, does not include any debug info). This is in contrast to the automatically generated one in the output directory, which always does and also not following the way how it is documented. * Fixed arch flag for namedCollection The arch flag in a namedCollection was not taken into account. This commit fixes this and also makes sure the result information is sorted and unique like we have it for the package lists. * Fix handling of zipl.conf in plain zipl bootloader When using the plain zipl bootloader kiwi created a /etc/zipl.conf file. However, this file was only useful during image build as it points to a loop target device and geometry but does not represent a proper config file to be used in the running system. In addition the different distributors provides their own version and layout of the zipl.conf to be used inside of the system and with their respective tools. Thus this commit changes the way how kiwi operates in a way that the zipl.conf used in the initial image only exists during the image build process. An eventual present /etc/zipl.conf will not be touched by kiwi. * Bump version: 10.1.1 to 10.1.2 * Improve error reporting for remote deployment Add new method called show_log_and_quit which displays the written error log file as a file box to the user * Update test-image-orthos integration test Update the test such that you can also build it locally. Change the remote installation target to be a ramdisk for easy testing of remote deployments * Setup default minimum volume size per filesystem The former method provided a static value but there are huge differences for the minimum size requirement of a filesystem. For example extX is fine with 30MB whereas XFS requires 300MB. This commit adds a more dynamic default value based on the used filesystem. * Increase default volume size So far 30MB was set as default volume size which is by far too small for a number of filesystems, e.g btrfs and also XFS. This commit increases the default volume size such that all modern filesystems builds if the default volume size is used. * Update test-image-raid Apart from testing raid this integration test also tests a certain LVM volume setup. The test has been updated to use the btrfs filesystem because it has the most strict size requirements. * Use shutil.which for Path.which Both methods were only used in one place each and it makes much more sense to use the pathlib builtin methods instead * Replace Path.create implementation with pathlib builtin * Bump version: 10.1.0 to 10.1.1 * Mandatory package scripts for Debian bootstrap Make sure to run some mandatory package pre/post scripts such that settings like /etc/passwd, a root user, etc.. exists. This action can also be done in post_bootstrap.sh but I think it's better to do this in the core code * Bump version: 10.0.28 to 10.1.0 * kiwi no longer uses debootstrap For building Debian based images we used debootstrap to bootstrap an empty root until apt-get could be used to complete the job. This has now changed such hat apt-get is also used for bootstrapping a new system. The concept and also potential alternatives to the way kiwi bootstraps Debian based systems can be found here: * https://osinside.github.io/kiwi/working_with_images/build_without_debianbootstrap.html Due to the drop of debootstrap it might happen that package lists of existing image descriptions needs to be extended with packages that were formerly pulled in by debootstrap but did not get properly pulled in with the new apt based bootstrap. As reference please check out the integration tests from here: * https://github.com/OSInside/kiwi/tree/main/build-tests/x86/ubuntu * https://github.com/OSInside/kiwi/tree/main/build-tests/x86/debian * Bump version: 10.0.27 to 10.0.28 * Update documentation * kiwi no longer uses debootstrap * Fix test_process_result_bundle_as_rpm * Fix Debian/Ubuntu integration tests Remove package hacks for debootstrap, explicitly add required packages and or configurations. * Drop types-pkg_resources Got removed from PyPI * Fix test_process_result_bundle_as_rpm os.path.basename was called on a MagicMock object which sometimes confused pytest * CI: Add testing against Python 3.13 Python 3.13 is shipping in Fedora Linux for Fedora Linux 41, so we should ensure kiwi is tested against it. The testing setup is based on the latest development version of 3.13 as it is not yet released. * Fix kiwi-repart restrictions The kiwi repart dracut module reads a profile file and if it does not exists it dies in the initrd. However, that profile file is not mandatory for the main resize functionality. Thus this commit turns this into a warning message. In addition the module-setup for 90kiwi- repart makes sure to include the required and optional profile files (bsc#1228118). * Do not exclude the .profile env file by default kiwi's initrd modules read a .profile file which gets included into the initrd produced at build time. To allow rebuild of a host-only initrd from the booted system this information should be present such that it is possible to re-use kiwi initrd code. * Get rid of debootstrap Replace debootstrap with an apt-get based pre- download of packages followed by a dpkg-deb extraction. * Bump version: 10.0.26 to 10.0.27 * Fix dracut-interactive with systemd 256 With systemd 256, /usr (and thus also /bin/) is read-only in the initrd. Move dracut-interactive and its .service into /run instead. * Bump version: 10.0.25 to 10.0.26 * Revise scripts_testing.rst * Revise schema_extensions.rst * Pass kernel cmdline to agama In the agama integration test make sure to pass along the kernel boot parameters to allow controlling the behavior of agama better * Add file directive to incorporate custom files Usually custom files are managed by placing them as overlay files or archives. However, overlay files must be structured inside of a root/ subdirectory and archive files are binary data. It is therefore not straight forward to just reference one or more files as source files to the image description to be placed into the image. * Bump version: 10.0.24 to 10.0.25 * Fix mocking of test_process_result_bundle_as_rpm * Fixed logging behavior of Compress::get_format The get_format() method allows to check which compression format a given input stream has. This is done by calling the supported compression tools in a row and let them check if they can deal with the provided data or not. As a result error messages are logged for streams that some tool doesn't understand. However, those error messages are no errors and only the result of the checking. This information in the kiwi log file is confusing and several users already complained when they see information like: EXEC: Failed with stderr: /usr/bin/xz: ...: File format not recognized This commit changes how the compression tooling is called in a way that no exception is raised (which leads to the above error message) but the result returncode is used to decide on the success or error of the respective compression tooling. * Allow to set custom ISO Application ID The application ID was used as identifier in the legacy initrd code from former kiwi versions. Because of this there is still the compat layer which sets an App ID as MBR identifier string unless the new application_id overwrites it. * Bump version: 10.0.23 to 10.0.24 * Added integration test for SUSE agama installer This integration test builds a self-install ISO image which drops the SUSE Agama installer into a ramdisk for performing an interactive installation procedure to test Agama * Add --set-type-attr and --set-release-version Allow to set/overwrite type section attributes via the cmdline. Allow to set/add the release-version element via the cmdline. * Update integration test for eficsm Update the type of the Secure profile of the live image integration test as well as the type of the simple-disk test to make use of the eficsm="false" attribute to switch off CSM mode and test an EFI only layout. * Add new eficsm type attribute Allow to produce EFI/UEFI images without hybrid CSM capabilities. * kiwi_plugin_architecture.rst * Revise kiwi_from_python.rst * Wait for loop device detach to complete Detaching a loop device via 'losetup -d' is an async operation. Once the command returns the loop can still be associated with the block special. Therefore this commit waits until the block device got released or a timeout is hit. * Update requires for kiwi-systemdeps-disk-images On Tumbleweed several changes caused tools like strings or the codepage for mtools to be missing in a standard installation. For building disk images especially EFI capable ones with vendor information kiwi needs the above tool. This commit adds the packages providing them on Tumbleweed to the meta systemdeps for disk images. * Supplements are not understood by Debian/Ubuntu * Add new builder for enclaves Add new EnclaveBuilder class which allows to build initrd-only image types. The first enclave implementation covers aws- nitro images produced via the eif_build tooling. * Split out bash completion into a sub-package Per review of the SUSE packaging team we should split out the bash completion into its own sub- package to give users better control over the completion feature. * Bump version: 10.0.22 to 10.0.23 * package: Add fully qualified provides for python3-kiwi in spec On SUSE distributions, currently the expectation is that packages built against the Python interpreter should have fully qualified names in the form of pythonXY-. Additionally, all other Linux distributions prefer something similar in the form of pythonX.Y-. This ensures we have those names so that distribution dependency generation works as expected. * Add support for arch selector on volumes Multiple architecture names can be specified as comma separated list. * Add rd.kiwi.oem.force_resize boot option Forces the disk resize process on an OEM disk image. If set, no sanity check for unpartitioned/free space is performed and also an eventually configured configuration from the image description will not be taken into account (bsc#1224389). * Fixed leap integration tests For whatever reason procps is not longer pulled in by the core dependencies. Thus we have to explicitly request it * Fix potential race condition in loop detach The call to 'losetup -d' is in fact an async operation. Once the command returns the loop can still be associated with the former file because it gets lazy unbound and releases later. Prior re-use of the same loop device it is therefore required to wait until the kernel event queue is processed. * Fixed repository include to image with dnf When specifying a repository element with imageinclude="true", kiwi permanently adds the repo file inside of the image. The distribution standard path is used to store the repo file in this case. With dnf a package manager exists that is primarily used on Fedora and RHEL systems. Thus the standard path for the repo files is set to "/etc/yum.repos.d". However, dnf can also be used for other rpm based distributions e.g SUSE. On such a system the default path does not exist or is different because another package manager is the default. This commit makes sure that the expected path is created prior adding any repo files. * Bump version: 10.0.21 to 10.0.22 * Fixed selinux labels for boot files When kiwi calls the bootloader config and installation modules several files gets created as unlabeled_t because the labeling happened earlier. This commit ensures that setfiles gets called after BootLoaderConfig and/or BootLoaderInstall has done its job. * Add bash to package requirements If there are script evaluations that does not specify an interpreter, kiwi uses bash for it. The same applies for sub- process invocations using shell pipelines. Thus the bash shell is a required tool for kiwi under certain circumstances. * test-image-live: add shadow package * Fix displaying the image verification failure dialog Kiwi must wait for the previous dialog to finish before showing another one as it's the same systemd service behind it. * Allow to customize the path of the isoscan cowfile Added rd.live.cowfile.path option to specify the cowfile at any path below the isoscan-loop-mount. * Better error handling on grub vendor dir lookup The strings command is used to lookup the in-efi binary encoded vendor path. However, if the strings or bash command is not availabe on the build host, the command silently failed and moved into the standard (non vendored) EFI boot path. This can lead to a broken boot for those distros and image targets which requires a vendor directory and should lead to an error message instead of a successful image build. * Fixed profile variable settings for preferences It's allowed to have multiple preferences sections. If those sections provides the same value multiple times, e.g keytable, the last one in the row will win. The setup of the variables in .profile environment file for the preferences elements is not following this rule and used the first section not the last. This commit fixes the profile variables to match the actual setup * Revise users.rst * REvise systemdeps.rst * Revise shell_scripts.rst * Add initrd boot option rd.kiwi.allow_plymouth By default kiwi stops plymouth if present and active in the initrd. Setting rd.kiwi.allow_plymouth will keep plymouth active in the initrd including all effects that might have to the available consoles. This is related to bsc#1214824 * Drop use of obsolete tool isconsole isconsole was provided with the dropped kiwi-tools package. It was a simple C application that checked the capabilities of the current console. In the context of fbiterm it was just used to provide proper error messages which fbiterm on its own did not show. As also fbiterm is on its way to become obsolete and isconsole is already no longer present, it's ok to just drop that extra check and therefore keep the fbiterm mode functional if one manages to include fbiterm and its fonts into the initrd * Bump version: 10.0.20 to 10.0.21 * Add missing write_meta_data method to BLS base The standard bootloader interface class provided a method named write_meta_data which is expected to be implemented in the specialized bootloader implementation. For BLS bootloaders this method was missing in the BLS base class. write_meta_data can provide additional cmdline options for booting. If not covered some boot options might be missing. This patch fixes it * Fix TW integration test to build outside OBS * Make sure BootLoaderConfig fixes are effective The BootLoaderConfigGrub2 class has methods to fix the grub-mkconfig generated files. It does that by mounting the system and changing the respective files after the mkconfig call. However, after the change the class instance stays open in combination with BootLoaderInstallGrub2 instance which itself under certain circumstances also mounts the system to call grub-install. At the time grub- install is called it cannot be guaranteed that all changes has been written unless an explicit umount in the BootLoaderConfigGrub2 class instance happened. This commit address the potential race condition. * Bump version: 10.0.19 to 10.0.20 * Update rawhide integration test Use new arch attribute for testing in the repository element of the rawhide/test-image-live-disk integration test. * Add support for arch attr in repository element Allow to provide different repository sections per architecture * Add --list-profiles to image info Allow to list available profiles from the processed image description * Bump version: 10.0.18 to 10.0.19 * package: Always include patches and number all sources and patches This ensures that stuff is applied reliably and all sources and patches are included as expected. * Bump version: 10.0.17 to 10.0.18 * package: adjust openSUSE patch * Bump version: 10.0.16 to 10.0.17 * Fixed box plugin documentation The provided example was no longer correct according to changes on the image description referenced in the example * Add procps to Tumbleweed integration tests * Add procps to Tumbleweed integration tests * Fix sdist upstream tarball contents The .virtualenv.dev-requirements.txt file is referenced by tox.ini but not put into the sdist tarball and therefore missing in the pypi upstream data. * Drop use of obsolete pkg_resources As documented in https://setuptools.pypa.io/en/latest/pkg_resources.html the use of pkg_resources is obsolete and will cause issues. So happened on Debian unstable. * RepositoryDnf5: correct defaults, set system_cachedir The "defaults" in `use_default_location` here are the dnf4 defaults, not the dnf5 defaults, so let's update them. Also, for dnf5, we need to set `system_cachedir` instead of `cachedir` \- see https://dnf5.readthedocs.io/en/latest/misc/caching.7.html , `system_cachedir` is the cache location used when running as root, `cachedir` is the cache location used when running as a regular user. * Bump version: 10.0.15 to 10.0.16 * poetry build doesn't like symlinks The sdist tarball produced by poetry build does not include all files and skipped symlinks in test/data. This caused the unit test run to fail if called from within that sources * Fix spec file Require docopt-ng for Fedora 41+ * Bump version: 10.0.14 to 10.0.15 * REview runtime_configuration.rst * Review repository_setup.rst * Add support for stopsignal in containerconfig Allow to specify the stopsignal via the containerconfig element * Fix set_disk_password to be effective Since commit 8aa517eb7 it is necessary to call _mount_device_and_volumes() prior making any modifications to boot files. In addition handle potential errors from the grub.cfg modification better. * Update Makefile Make sure custom patches are part of the package sources * Bump version: 10.0.13 to 10.0.14 * doc: Document the bls option for the grub bootloader * Temporarily revert grub-bls default to false for SUSE distributions For the time being, SUSE distributions cannot handle KIWI's default to use BLS with GRUB2. Until they catch up, revert this for them only. * kiwi/bootloader: restore backward compatibility for grub2 with bls The change to introduce the bls parameter broke backward compatibility with all existing kiwi descriptions for distributions that default to BLS. This fixes that by allowing the unset state to be equivalent to enabling it. * Bump version: 10.0.12 to 10.0.13 * Overwrite compression setting only if randomized When building an encrypted image, the bundler never compressed the result. This overwrite from the runtime configuration and the default compression setting actually only makes sense when the image is randomized because only then a compression is for sure useless. * Make sure lsblk output is sorted by dev name lsblk without the sorting option can provide the list of devices in different order. This patch makes sure lsblk sorts the output by the device name (bsc#1223374). * Stop leaking plugins/{priorities,versionlock}.conf file with dnf4/5. This fixes the fedora issue https://bugzilla.redhat.com/show_bug.cgi?id=2270364 * Fix luks_randomize setting Make sure the value passed for luks_randomize in the description becomes effective. It was not possible to switch off luks_randomize because any "not" value was turned into a true value. The actual default should therefore only apply in case luks_randomize is not specified at all which means only a None value will turn into a true value for this setting. * Fix package removal with dnf5 * Add 'bls' parameter for the bootloader * Fix efifatimagesize attribute type The efifatimagesize attribute type value is set to "oem" but the documentation says that it is intended to be also used for creating ISO images. This causes a schema error when this attribute is set on a profile with type "iso" and blocks changing the EFI boot image size which is a problem if the image is bigger than 20M. This commit allows to specify the attribute also for the "iso" type ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-267=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-267=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dracut-kiwi-oem-dump-10.2.12-1.1 * dracut-kiwi-oem-repart-10.2.12-1.1 * dracut-kiwi-lib-10.2.12-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * python3-kiwi-10.2.12-1.1 * kiwi-systemdeps-iso-media-10.2.12-1.1 * kiwi-systemdeps-bootloaders-10.2.12-1.1 * kiwi-systemdeps-filesystems-10.2.12-1.1 * kiwi-systemdeps-disk-images-10.2.12-1.1 * kiwi-systemdeps-core-10.2.12-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214824 * https://bugzilla.suse.com/show_bug.cgi?id=1221469 * https://bugzilla.suse.com/show_bug.cgi?id=1221790 * https://bugzilla.suse.com/show_bug.cgi?id=1223374 * https://bugzilla.suse.com/show_bug.cgi?id=1224389 * https://bugzilla.suse.com/show_bug.cgi?id=1228118 * https://bugzilla.suse.com/show_bug.cgi?id=1228729 * https://bugzilla.suse.com/show_bug.cgi?id=1228741 * https://bugzilla.suse.com/show_bug.cgi?id=1229257 * https://bugzilla.suse.com/show_bug.cgi?id=1235448 * https://bugzilla.suse.com/show_bug.cgi?id=1237772 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:26:02 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:26:02 -0000 Subject: SUSE-SU-2025:20171-1: important: Security update for libtasn1 Message-ID: <174902556214.12703.4081144178170534572@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2025:20171-1 Release Date: 2025-04-01T10:13:05Z Rating: important References: * bsc#1236878 Cross-References: * CVE-2024-12133 CVSS scores: * CVE-2024-12133 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-12133 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12133 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2024-12133: Fixed potential DoS in handling of numerous SEQUENCE OF or SET OF elements (bsc#1236878). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-266=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtasn1-debugsource-4.19.0-4.1 * libtasn1-6-4.19.0-4.1 * libtasn1-6-debuginfo-4.19.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12133.html * https://bugzilla.suse.com/show_bug.cgi?id=1236878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:26:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:26:05 -0000 Subject: SUSE-RU-2025:20170-1: moderate: Recommended update for pcr-oracle Message-ID: <174902556524.12703.5327449699030660850@smelt2.prg2.suse.org> # Recommended update for pcr-oracle Announcement ID: SUSE-RU-2025:20170-1 Release Date: 2025-04-01T07:54:32Z Rating: moderate References: * bsc#1230316 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for pcr-oracle fixes the following issues: * Fixed the prediction of SbatLevelRT when Secure Boot is disabled (bsc#1230316) * Make PCR4 a hard requirement for SbatLevelRT prediction (bsc#1230316) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-265=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * pcr-oracle-debuginfo-0.4.6-3.1 * pcr-oracle-debugsource-0.4.6-3.1 * pcr-oracle-0.4.6-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:26:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:26:11 -0000 Subject: SUSE-RU-2025:20169-1: moderate: Recommended update for net-snmp Message-ID: <174902557166.12703.16156766694208233488@smelt2.prg2.suse.org> # Recommended update for net-snmp Announcement ID: SUSE-RU-2025:20169-1 Release Date: 2025-03-31T15:50:37Z Rating: moderate References: * bsc#1206044 * bsc#1207697 * bsc#1214364 * bsc#1232030 Affected Products: * SUSE Linux Micro 6.0 An update that has four fixes can now be installed. ## Description: This update for net-snmp fixes the following issues: * Version update to 5.9.4 (bsc#1214364): * IMPORTANT: SNMP over TLS and/or DTLS are not functioning properly in this release with various versions of OpenSSL and will be fixed in a future release. * libsnmp: * Removed the unused SNMP_SWIPE_MEM() macro * Fixed issues with DISPLAY-HINT * Miscellanious improvements to the transports * Handle multiple oldEngineID configuration lines * Fixed issues with DNS names longer than 63 characters * agent: * Added a ignoremount configuration option for the HOST-MIB * Disallow SETs with a NULL varbind * Fixed the --enable-minimalist build * apps: * snmpset: allow SET with NULL varbind for testing * snmptrapd: improved MySQL logging code * general: * configure: removed `-Wno-deprecated` as it is no longer needed * miscellanious bug fixes * Other issues fixed: * Removed legacy MIBs used by Velocity Software (jira#PED-6416) * Re-add support for hostname netgroups (bsc#1207697) * Fixed Systemd services setting "ProtectHome=true" that caused home directory size and allocation to be listed incorrectly (bsc#1206044) * Ensure logrotate reloads the configuration instead of restarting the service to prevent downtime (bsc#1232030) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-264=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * snmp-mibs-5.9.4-1.1 * net-snmp-debugsource-5.9.4-1.1 * libsnmp40-debuginfo-5.9.4-1.1 * libsnmp40-5.9.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206044 * https://bugzilla.suse.com/show_bug.cgi?id=1207697 * https://bugzilla.suse.com/show_bug.cgi?id=1214364 * https://bugzilla.suse.com/show_bug.cgi?id=1232030 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:26:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:26:12 -0000 Subject: SUSE-RU-2025:20168-1: moderate: Recommended update for ignition Message-ID: <174902557274.12703.1394409227835001520@smelt2.prg2.suse.org> # Recommended update for ignition Announcement ID: SUSE-RU-2025:20168-1 Release Date: 2025-03-31T06:43:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for ignition fixes the following issues: * Drop "go clean" from the upstream build script: since we build in * Fix order of previous change - _first_ remount rw, _then_ create directory. * Apply (temporary) upstream patch from fedora-coreos-config for compatibility with systemd 256. * Update to version 2.19.0: * Support LUKS encryption using IBM CEX secure keys on s390x * providers: add "akamai" provider * Adding %check section * Build scripts are executable by themselves now, remove explicit Bash call * Update to version 2.18.0: * NEWS: update 2.18.0 * azure: retry HTTP requests on codes 404, 410, and 429 * docs: add missing scaleway link * providers: add scaleway * resource/url: customize local address (port) * stages/files: filter out non-existent paths before relabeling * docs/release-notes: tweak dracut module change * Bump minimum Go version to 1.20 * dracut: Don't include the ignition module by default * ci: cancel previous build on PR update * Sync repo templates * Update build(deps) * Increased required Go version * module-setup.sh: Use $dracutsysrootdir ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-263=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * ignition-debuginfo-2.19.0-1.1 * ignition-2.19.0-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:26:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:26:15 -0000 Subject: SUSE-RU-2025:20167-1: moderate: Recommended update for elemental-operator Message-ID: <174902557546.12703.17750564451802337354@smelt2.prg2.suse.org> # Recommended update for elemental-operator Announcement ID: SUSE-RU-2025:20167-1 Release Date: 2025-03-31T06:36:42Z Rating: moderate References: * bsc#1237498 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for elemental-operator fixes the following issues: * Update to version 1.6.7: * Bump default operator channel to Micro 6.1 images * [v1.6.x][BACKPORT] seedimage: clean-up service on image download deadline (bsc#1237498) * No need to install yq neither to create a GH release ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-262=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-register-1.6.7-1.1 * elemental-support-1.6.7-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237498 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:34:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:34:28 -0000 Subject: SUSE-SU-2025:20165-1: important: Security update for the Linux Kernel Message-ID: <174902606853.655.11819350790631335251@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20165-1 Release Date: 2025-03-27T14:32:47Z Rating: important References: * bsc#1012628 * bsc#1194869 * bsc#1214954 * bsc#1215199 * bsc#1216813 * bsc#1218470 * bsc#1220711 * bsc#1220773 * bsc#1224095 * bsc#1224726 * bsc#1225743 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230413 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-52923 * CVE-2024-26924 * CVE-2024-27397 * CVE-2024-35839 * CVE-2024-36476 * CVE-2024-36908 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 357 vulnerabilities, contains three features and has 130 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413) * Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413) * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413) * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-3=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-3=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-macros-6.4.0-25.1 * kernel-devel-6.4.0-25.1 * kernel-source-6.4.0-25.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-25.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-25.1 * kernel-default-debuginfo-6.4.0-25.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-default-livepatch-6.4.0-25.1 * kernel-livepatch-6_4_0-25-default-1-1.2 * kernel-livepatch-6_4_0-25-default-debuginfo-1-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-1-1.2 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-25.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-25.1 * kernel-kvmsmall-debugsource-6.4.0-25.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-default-6.4.0-25.1 * kernel-64kb-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-devel-6.4.0-25.1 * kernel-64kb-debugsource-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-obs-build-6.4.0-25.1 * kernel-syms-6.4.0-25.1 * kernel-default-devel-6.4.0-25.1 * kernel-default-debugsource-6.4.0-25.1 * kernel-obs-build-debugsource-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:38:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:38:50 -0000 Subject: SUSE-SU-2025:20164-1: important: Security update for the Linux Kernel Message-ID: <174902633019.655.2221777292753717989@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20164-1 Release Date: 2025-03-27T13:52:44Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode() and iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090) * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845) * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035) * supported.conf: mark ultravisor userspace access as supported (bsc#1232090) * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-1=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-1=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-6.4.0-24.1 * kernel-devel-6.4.0-24.1 * kernel-macros-6.4.0-24.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-24.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debuginfo-6.4.0-24.1 * kernel-default-debugsource-6.4.0-24.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-1-1.2 * kernel-default-livepatch-6.4.0-24.1 * kernel-livepatch-6_4_0-24-default-debuginfo-1-1.2 * kernel-livepatch-6_4_0-24-default-1-1.2 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-24.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-24.1 * kernel-kvmsmall-debugsource-6.4.0-24.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-24.1 * kernel-default-6.4.0-24.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-24.1 * kernel-64kb-devel-6.4.0-24.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-default-devel-6.4.0-24.1 * kernel-default-debugsource-6.4.0-24.1 * kernel-syms-6.4.0-24.1 * kernel-obs-build-debugsource-6.4.0-24.1 * kernel-obs-build-6.4.0-24.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:41:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:41:39 -0000 Subject: SUSE-SU-2025:20166-1: important: Security update for the Linux Kernel Message-ID: <174902649907.627.4869915304269334439@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20166-1 Release Date: 2025-03-28T07:51:47Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1181674 * bsc#1194869 * bsc#1207948 * bsc#1214954 * bsc#1215199 * bsc#1216702 * bsc#1216813 * bsc#1218470 * bsc#1219170 * bsc#1219596 * bsc#1220021 * bsc#1220328 * bsc#1220430 * bsc#1220711 * bsc#1220773 * bsc#1221044 * bsc#1221303 * bsc#1221858 * bsc#1222426 * bsc#1222608 * bsc#1222721 * bsc#1222775 * bsc#1222780 * bsc#1223020 * bsc#1223023 * bsc#1223024 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223061 * bsc#1223076 * bsc#1223113 * bsc#1223187 * bsc#1223285 * bsc#1223315 * bsc#1223591 * bsc#1223592 * bsc#1223633 * bsc#1223637 * bsc#1223641 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223654 * bsc#1223660 * bsc#1223661 * bsc#1223665 * bsc#1223666 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223696 * bsc#1223698 * bsc#1223705 * bsc#1223712 * bsc#1223718 * bsc#1223728 * bsc#1223739 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223757 * bsc#1223759 * bsc#1223761 * bsc#1223762 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223805 * bsc#1223827 * bsc#1223831 * bsc#1223834 * bsc#1223869 * bsc#1223874 * bsc#1224095 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224423 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224480 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224491 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224500 * bsc#1224501 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224513 * bsc#1224517 * bsc#1224519 * bsc#1224521 * bsc#1224524 * bsc#1224526 * bsc#1224537 * bsc#1224542 * bsc#1224546 * bsc#1224552 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224573 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224582 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224603 * bsc#1224605 * bsc#1224607 * bsc#1224609 * bsc#1224611 * bsc#1224613 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224620 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224637 * bsc#1224639 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224646 * bsc#1224647 * bsc#1224650 * bsc#1224651 * bsc#1224653 * bsc#1224654 * bsc#1224657 * bsc#1224660 * bsc#1224663 * bsc#1224665 * bsc#1224666 * bsc#1224671 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224719 * bsc#1224722 * bsc#1224723 * bsc#1224726 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224747 * bsc#1224749 * bsc#1224803 * bsc#1224804 * bsc#1225502 * bsc#1225579 * bsc#1225593 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225698 * bsc#1225699 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225728 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225743 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225769 * bsc#1225775 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229025 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-47233 * CVE-2023-52463 * CVE-2023-52472 * CVE-2023-52591 * CVE-2023-52653 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52673 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52882 * CVE-2023-52923 * CVE-2024-22099 * CVE-2024-26611 * CVE-2024-26742 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26786 * CVE-2024-26794 * CVE-2024-26846 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26861 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26881 * CVE-2024-26900 * CVE-2024-26903 * CVE-2024-26922 * CVE-2024-26924 * CVE-2024-26932 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26957 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26973 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27046 * CVE-2024-27057 * CVE-2024-27062 * CVE-2024-27067 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27397 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35806 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35839 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35875 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35883 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35891 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35907 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35963 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-36002 * CVE-2024-36009 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36476 * CVE-2024-36880 * CVE-2024-36885 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36906 * CVE-2024-36908 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36955 * CVE-2024-36959 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-5660 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52591 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26764 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 610 vulnerabilities, contains three features and has 128 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). Features added: * * Disable ceph (jsc#PED-7242) * * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Add already cherry-picked ids to AMDGPU patch * Align git commit ID abbreviation guidelines and checks (git-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * Move kABI workaround patch to correct folder * Move upstreamed DRM patch into sorted section * Move upstreamed NFS patch into sorted section * Move upstreamed TPM patch into sorted section * Move upstreamed lpfc patches into sorted section * Move upstreamed ppc patch into sorted section * Move upstreamed sound patch into sorted section * Move upstreamed sound patches into sorted section * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * README.BRANCH: Remove copy of branch name * Refresh patches.suse/ALSA-hda-realtek-Add-support-for-Samsung-Galaxy- Book.patch. * Refresh patches.suse/cpufreq-intel_pstate-Temporarily-boost-P-state- when-.patch. * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' This reverts commit 2ccfee6be929dd4ea49ef59a7ae686473aae40b6 CONFIG_ARM64_SME is enabled by default so some customers may rely on SME. We need further analysis to evaluate to what extent we are impacted and in case we'll disable SME support later. * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") Apparently, jsc#PED-7242 is only deprecate ceph for 15-SP6 and disable for 15-SP7. Revert the disabling. * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) Update arm64 default configuration file * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes). * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blacklist.conf: printk/sysctl: breaks kernel without pre-requisite patches (bsc#1229025) * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * series.conf: temporarily disable upstream patch patches.suse/ocfs2-fix- UBSAN-warning-in-ocfs2_verify_volume.patch (bsc#1236138) * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-4=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-4=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-rt-6.4.0-25.1 * kernel-devel-rt-6.4.0-25.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-25.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-livepatch-6.4.0-25.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-1-1.1 * kernel-rt-debuginfo-6.4.0-25.1 * kernel-livepatch-6_4_0-25-rt-1-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-1-1.1 * kernel-rt-debugsource-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-25.1 * kernel-rt-debugsource-6.4.0-25.1 * kernel-rt-devel-debuginfo-6.4.0-25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52463.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-5660.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:42:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:42:48 -0000 Subject: SUSE-SU-2025:20166-1: important: Security update for the Linux Kernel Message-ID: <174902656801.28531.2648713848641097942@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20166-1 Release Date: 2025-03-28T07:51:47Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1181674 * bsc#1194869 * bsc#1207948 * bsc#1214954 * bsc#1215199 * bsc#1216702 * bsc#1216813 * bsc#1218470 * bsc#1219170 * bsc#1219596 * bsc#1220021 * bsc#1220328 * bsc#1220430 * bsc#1220711 * bsc#1220773 * bsc#1221044 * bsc#1221303 * bsc#1221858 * bsc#1222426 * bsc#1222608 * bsc#1222721 * bsc#1222775 * bsc#1222780 * bsc#1223020 * bsc#1223023 * bsc#1223024 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223061 * bsc#1223076 * bsc#1223113 * bsc#1223187 * bsc#1223285 * bsc#1223315 * bsc#1223591 * bsc#1223592 * bsc#1223633 * bsc#1223637 * bsc#1223641 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223654 * bsc#1223660 * bsc#1223661 * bsc#1223665 * bsc#1223666 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223696 * bsc#1223698 * bsc#1223705 * bsc#1223712 * bsc#1223718 * bsc#1223728 * bsc#1223739 * bsc#1223741 * bsc#1223744 * bsc#1223747 * bsc#1223748 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223757 * bsc#1223759 * bsc#1223761 * bsc#1223762 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223805 * bsc#1223827 * bsc#1223831 * bsc#1223834 * bsc#1223869 * bsc#1223874 * bsc#1224095 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224423 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224479 * bsc#1224480 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224491 * bsc#1224492 * bsc#1224494 * bsc#1224495 * bsc#1224500 * bsc#1224501 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224513 * bsc#1224517 * bsc#1224519 * bsc#1224521 * bsc#1224524 * bsc#1224526 * bsc#1224537 * bsc#1224542 * bsc#1224546 * bsc#1224552 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224573 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224582 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224603 * bsc#1224605 * bsc#1224607 * bsc#1224609 * bsc#1224611 * bsc#1224613 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224620 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224637 * bsc#1224639 * bsc#1224640 * bsc#1224643 * bsc#1224644 * bsc#1224646 * bsc#1224647 * bsc#1224650 * bsc#1224651 * bsc#1224653 * bsc#1224654 * bsc#1224657 * bsc#1224660 * bsc#1224663 * bsc#1224665 * bsc#1224666 * bsc#1224671 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224719 * bsc#1224722 * bsc#1224723 * bsc#1224726 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224747 * bsc#1224749 * bsc#1224803 * bsc#1224804 * bsc#1225502 * bsc#1225579 * bsc#1225593 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225698 * bsc#1225699 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225715 * bsc#1225720 * bsc#1225722 * bsc#1225728 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225743 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225769 * bsc#1225775 * bsc#1225820 * bsc#1225897 * bsc#1226980 * bsc#1227445 * bsc#1228526 * bsc#1228592 * bsc#1229025 * bsc#1229809 * bsc#1229833 * bsc#1230205 * bsc#1230697 * bsc#1231016 * bsc#1231854 * bsc#1231909 * bsc#1231963 * bsc#1232087 * bsc#1232101 * bsc#1232158 * bsc#1232161 * bsc#1232193 * bsc#1232198 * bsc#1232201 * bsc#1232418 * bsc#1232419 * bsc#1232420 * bsc#1232421 * bsc#1232436 * bsc#1232882 * bsc#1233038 * bsc#1233055 * bsc#1233070 * bsc#1233096 * bsc#1233112 * bsc#1233200 * bsc#1233204 * bsc#1233239 * bsc#1233259 * bsc#1233260 * bsc#1233324 * bsc#1233328 * bsc#1233461 * bsc#1233467 * bsc#1233469 * bsc#1233488 * bsc#1233546 * bsc#1233558 * bsc#1233637 * bsc#1233638 * bsc#1233642 * bsc#1233772 * bsc#1233778 * bsc#1233837 * bsc#1234024 * bsc#1234069 * bsc#1234071 * bsc#1234073 * bsc#1234075 * bsc#1234076 * bsc#1234077 * bsc#1234079 * bsc#1234086 * bsc#1234139 * bsc#1234140 * bsc#1234141 * bsc#1234142 * bsc#1234143 * bsc#1234144 * bsc#1234145 * bsc#1234146 * bsc#1234147 * bsc#1234148 * bsc#1234149 * bsc#1234150 * bsc#1234153 * bsc#1234155 * bsc#1234156 * bsc#1234158 * bsc#1234159 * bsc#1234160 * bsc#1234161 * bsc#1234162 * bsc#1234163 * bsc#1234164 * bsc#1234165 * bsc#1234166 * bsc#1234167 * bsc#1234168 * bsc#1234169 * bsc#1234170 * bsc#1234171 * bsc#1234172 * bsc#1234173 * bsc#1234174 * bsc#1234175 * bsc#1234176 * bsc#1234177 * bsc#1234178 * bsc#1234179 * bsc#1234180 * bsc#1234181 * bsc#1234182 * bsc#1234183 * bsc#1234184 * bsc#1234185 * bsc#1234186 * bsc#1234187 * bsc#1234188 * bsc#1234189 * bsc#1234190 * bsc#1234191 * bsc#1234192 * bsc#1234193 * bsc#1234194 * bsc#1234195 * bsc#1234196 * bsc#1234197 * bsc#1234198 * bsc#1234199 * bsc#1234200 * bsc#1234201 * bsc#1234203 * bsc#1234204 * bsc#1234205 * bsc#1234207 * bsc#1234208 * bsc#1234209 * bsc#1234219 * bsc#1234220 * bsc#1234221 * bsc#1234237 * bsc#1234238 * bsc#1234239 * bsc#1234240 * bsc#1234241 * bsc#1234242 * bsc#1234243 * bsc#1234278 * bsc#1234279 * bsc#1234280 * bsc#1234281 * bsc#1234282 * bsc#1234294 * bsc#1234338 * bsc#1234357 * bsc#1234381 * bsc#1234454 * bsc#1234464 * bsc#1234605 * bsc#1234619 * bsc#1234635 * bsc#1234651 * bsc#1234652 * bsc#1234654 * bsc#1234655 * bsc#1234657 * bsc#1234658 * bsc#1234659 * bsc#1234668 * bsc#1234683 * bsc#1234690 * bsc#1234693 * bsc#1234725 * bsc#1234726 * bsc#1234810 * bsc#1234811 * bsc#1234825 * bsc#1234826 * bsc#1234827 * bsc#1234829 * bsc#1234832 * bsc#1234834 * bsc#1234843 * bsc#1234846 * bsc#1234848 * bsc#1234853 * bsc#1234855 * bsc#1234856 * bsc#1234863 * bsc#1234884 * bsc#1234887 * bsc#1234888 * bsc#1234889 * bsc#1234891 * bsc#1234893 * bsc#1234898 * bsc#1234899 * bsc#1234900 * bsc#1234901 * bsc#1234905 * bsc#1234906 * bsc#1234907 * bsc#1234909 * bsc#1234911 * bsc#1234912 * bsc#1234916 * bsc#1234918 * bsc#1234920 * bsc#1234921 * bsc#1234922 * bsc#1234923 * bsc#1234929 * bsc#1234930 * bsc#1234931 * bsc#1234934 * bsc#1234937 * bsc#1234947 * bsc#1234948 * bsc#1234950 * bsc#1234952 * bsc#1234957 * bsc#1234960 * bsc#1234962 * bsc#1234963 * bsc#1234968 * bsc#1234969 * bsc#1234970 * bsc#1234971 * bsc#1234973 * bsc#1234974 * bsc#1234989 * bsc#1234999 * bsc#1235000 * bsc#1235001 * bsc#1235002 * bsc#1235003 * bsc#1235004 * bsc#1235007 * bsc#1235009 * bsc#1235011 * bsc#1235016 * bsc#1235019 * bsc#1235031 * bsc#1235032 * bsc#1235033 * bsc#1235035 * bsc#1235037 * bsc#1235038 * bsc#1235039 * bsc#1235040 * bsc#1235042 * bsc#1235043 * bsc#1235045 * bsc#1235046 * bsc#1235050 * bsc#1235051 * bsc#1235053 * bsc#1235054 * bsc#1235056 * bsc#1235057 * bsc#1235059 * bsc#1235061 * bsc#1235065 * bsc#1235070 * bsc#1235073 * bsc#1235075 * bsc#1235100 * bsc#1235108 * bsc#1235112 * bsc#1235115 * bsc#1235117 * bsc#1235122 * bsc#1235123 * bsc#1235125 * bsc#1235128 * bsc#1235132 * bsc#1235133 * bsc#1235134 * bsc#1235138 * bsc#1235155 * bsc#1235160 * bsc#1235217 * bsc#1235219 * bsc#1235220 * bsc#1235222 * bsc#1235223 * bsc#1235224 * bsc#1235227 * bsc#1235230 * bsc#1235241 * bsc#1235246 * bsc#1235249 * bsc#1235251 * bsc#1235252 * bsc#1235389 * bsc#1235390 * bsc#1235391 * bsc#1235406 * bsc#1235409 * bsc#1235410 * bsc#1235412 * bsc#1235413 * bsc#1235415 * bsc#1235416 * bsc#1235417 * bsc#1235418 * bsc#1235423 * bsc#1235424 * bsc#1235425 * bsc#1235426 * bsc#1235427 * bsc#1235428 * bsc#1235429 * bsc#1235430 * bsc#1235433 * bsc#1235437 * bsc#1235439 * bsc#1235444 * bsc#1235445 * bsc#1235449 * bsc#1235451 * bsc#1235454 * bsc#1235458 * bsc#1235459 * bsc#1235464 * bsc#1235466 * bsc#1235473 * bsc#1235479 * bsc#1235480 * bsc#1235483 * bsc#1235486 * bsc#1235487 * bsc#1235488 * bsc#1235489 * bsc#1235491 * bsc#1235494 * bsc#1235495 * bsc#1235496 * bsc#1235497 * bsc#1235498 * bsc#1235500 * bsc#1235502 * bsc#1235503 * bsc#1235507 * bsc#1235519 * bsc#1235520 * bsc#1235521 * bsc#1235523 * bsc#1235526 * bsc#1235528 * bsc#1235532 * bsc#1235533 * bsc#1235534 * bsc#1235537 * bsc#1235538 * bsc#1235545 * bsc#1235550 * bsc#1235552 * bsc#1235555 * bsc#1235557 * bsc#1235563 * bsc#1235564 * bsc#1235565 * bsc#1235568 * bsc#1235570 * bsc#1235571 * bsc#1235577 * bsc#1235578 * bsc#1235582 * bsc#1235583 * bsc#1235584 * bsc#1235587 * bsc#1235611 * bsc#1235612 * bsc#1235616 * bsc#1235622 * bsc#1235627 * bsc#1235632 * bsc#1235635 * bsc#1235638 * bsc#1235641 * bsc#1235643 * bsc#1235645 * bsc#1235646 * bsc#1235647 * bsc#1235650 * bsc#1235653 * bsc#1235656 * bsc#1235657 * bsc#1235663 * bsc#1235686 * bsc#1235700 * bsc#1235705 * bsc#1235707 * bsc#1235708 * bsc#1235710 * bsc#1235714 * bsc#1235716 * bsc#1235720 * bsc#1235723 * bsc#1235727 * bsc#1235730 * bsc#1235737 * bsc#1235739 * bsc#1235745 * bsc#1235747 * bsc#1235750 * bsc#1235753 * bsc#1235759 * bsc#1235764 * bsc#1235768 * bsc#1235776 * bsc#1235777 * bsc#1235778 * bsc#1235779 * bsc#1235793 * bsc#1235798 * bsc#1235806 * bsc#1235808 * bsc#1235812 * bsc#1235814 * bsc#1235818 * bsc#1235842 * bsc#1235865 * bsc#1235894 * bsc#1235902 * bsc#1235903 * bsc#1235906 * bsc#1235918 * bsc#1235919 * bsc#1235920 * bsc#1235924 * bsc#1235940 * bsc#1235941 * bsc#1235946 * bsc#1235948 * bsc#1235952 * bsc#1235964 * bsc#1235965 * bsc#1235967 * bsc#1235969 * bsc#1235976 * bsc#1235977 * bsc#1236078 * bsc#1236080 * bsc#1236082 * bsc#1236088 * bsc#1236090 * bsc#1236091 * bsc#1236096 * bsc#1236097 * bsc#1236098 * bsc#1236101 * bsc#1236102 * bsc#1236104 * bsc#1236106 * bsc#1236120 * bsc#1236125 * bsc#1236127 * bsc#1236131 * bsc#1236138 * bsc#1236143 * bsc#1236144 * bsc#1236145 * bsc#1236160 * bsc#1236161 * bsc#1236163 * bsc#1236168 * bsc#1236178 * bsc#1236180 * bsc#1236181 * bsc#1236182 * bsc#1236190 * bsc#1236192 * bsc#1236198 * bsc#1236227 * bsc#1236245 * bsc#1236247 * bsc#1236248 * bsc#1236260 * bsc#1236262 * bsc#1236628 * bsc#1236688 * bsc#1236696 * bsc#1236703 * bsc#1236732 * bsc#1236733 * jsc#PED-10467 * jsc#PED-7242 * jsc#PED-8645 Cross-References: * CVE-2023-47233 * CVE-2023-52463 * CVE-2023-52472 * CVE-2023-52591 * CVE-2023-52653 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52673 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52882 * CVE-2023-52923 * CVE-2024-22099 * CVE-2024-26611 * CVE-2024-26742 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26786 * CVE-2024-26794 * CVE-2024-26846 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26861 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26881 * CVE-2024-26900 * CVE-2024-26903 * CVE-2024-26922 * CVE-2024-26924 * CVE-2024-26932 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26957 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26973 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27046 * CVE-2024-27057 * CVE-2024-27062 * CVE-2024-27067 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27397 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27405 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27416 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35806 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35839 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35875 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35883 * CVE-2024-35885 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35891 * CVE-2024-35901 * CVE-2024-35904 * CVE-2024-35907 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35963 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-36002 * CVE-2024-36009 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36014 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36032 * CVE-2024-36476 * CVE-2024-36880 * CVE-2024-36885 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36906 * CVE-2024-36908 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36955 * CVE-2024-36959 * CVE-2024-39282 * CVE-2024-39480 * CVE-2024-41042 * CVE-2024-43913 * CVE-2024-44934 * CVE-2024-44996 * CVE-2024-45828 * CVE-2024-46896 * CVE-2024-47141 * CVE-2024-47143 * CVE-2024-47678 * CVE-2024-47809 * CVE-2024-48873 * CVE-2024-48881 * CVE-2024-49569 * CVE-2024-49854 * CVE-2024-49884 * CVE-2024-49915 * CVE-2024-49948 * CVE-2024-49951 * CVE-2024-49978 * CVE-2024-49998 * CVE-2024-50016 * CVE-2024-50018 * CVE-2024-50039 * CVE-2024-50047 * CVE-2024-50051 * CVE-2024-50106 * CVE-2024-50143 * CVE-2024-50151 * CVE-2024-50154 * CVE-2024-50199 * CVE-2024-50202 * CVE-2024-50203 * CVE-2024-50211 * CVE-2024-50228 * CVE-2024-50256 * CVE-2024-50262 * CVE-2024-50272 * CVE-2024-50278 * CVE-2024-50280 * CVE-2024-50299 * CVE-2024-52332 * CVE-2024-53050 * CVE-2024-53064 * CVE-2024-53090 * CVE-2024-53091 * CVE-2024-53095 * CVE-2024-53099 * CVE-2024-53103 * CVE-2024-53105 * CVE-2024-53111 * CVE-2024-53113 * CVE-2024-53117 * CVE-2024-53118 * CVE-2024-53119 * CVE-2024-53120 * CVE-2024-53122 * CVE-2024-53125 * CVE-2024-53126 * CVE-2024-53127 * CVE-2024-53129 * CVE-2024-53130 * CVE-2024-53131 * CVE-2024-53133 * CVE-2024-53134 * CVE-2024-53136 * CVE-2024-53141 * CVE-2024-53142 * CVE-2024-53144 * CVE-2024-53146 * CVE-2024-53148 * CVE-2024-53150 * CVE-2024-53151 * CVE-2024-53154 * CVE-2024-53155 * CVE-2024-53156 * CVE-2024-53157 * CVE-2024-53158 * CVE-2024-53159 * CVE-2024-53160 * CVE-2024-53161 * CVE-2024-53162 * CVE-2024-53164 * CVE-2024-53166 * CVE-2024-53168 * CVE-2024-53169 * CVE-2024-53170 * CVE-2024-53171 * CVE-2024-53172 * CVE-2024-53173 * CVE-2024-53174 * CVE-2024-53175 * CVE-2024-53179 * CVE-2024-53180 * CVE-2024-53185 * CVE-2024-53187 * CVE-2024-53188 * CVE-2024-53190 * CVE-2024-53191 * CVE-2024-53194 * CVE-2024-53195 * CVE-2024-53196 * CVE-2024-53197 * CVE-2024-53198 * CVE-2024-53200 * CVE-2024-53201 * CVE-2024-53202 * CVE-2024-53203 * CVE-2024-53206 * CVE-2024-53207 * CVE-2024-53208 * CVE-2024-53209 * CVE-2024-53210 * CVE-2024-53213 * CVE-2024-53214 * CVE-2024-53215 * CVE-2024-53216 * CVE-2024-53217 * CVE-2024-53222 * CVE-2024-53224 * CVE-2024-53227 * CVE-2024-53229 * CVE-2024-53230 * CVE-2024-53231 * CVE-2024-53232 * CVE-2024-53233 * CVE-2024-53234 * CVE-2024-53236 * CVE-2024-53237 * CVE-2024-53239 * CVE-2024-53240 * CVE-2024-53241 * CVE-2024-53685 * CVE-2024-53690 * CVE-2024-54680 * CVE-2024-55639 * CVE-2024-55881 * CVE-2024-55916 * CVE-2024-56369 * CVE-2024-56372 * CVE-2024-56531 * CVE-2024-56532 * CVE-2024-56533 * CVE-2024-56536 * CVE-2024-56538 * CVE-2024-56539 * CVE-2024-56543 * CVE-2024-56546 * CVE-2024-56548 * CVE-2024-56549 * CVE-2024-56551 * CVE-2024-56557 * CVE-2024-56558 * CVE-2024-56562 * CVE-2024-56566 * CVE-2024-56567 * CVE-2024-56568 * CVE-2024-56569 * CVE-2024-56570 * CVE-2024-56571 * CVE-2024-56572 * CVE-2024-56573 * CVE-2024-56574 * CVE-2024-56575 * CVE-2024-56576 * CVE-2024-56577 * CVE-2024-56578 * CVE-2024-56582 * CVE-2024-56584 * CVE-2024-56587 * CVE-2024-56588 * CVE-2024-56589 * CVE-2024-56590 * CVE-2024-56593 * CVE-2024-56594 * CVE-2024-56595 * CVE-2024-56596 * CVE-2024-56597 * CVE-2024-56598 * CVE-2024-56599 * CVE-2024-5660 * CVE-2024-56600 * CVE-2024-56601 * CVE-2024-56602 * CVE-2024-56603 * CVE-2024-56604 * CVE-2024-56605 * CVE-2024-56606 * CVE-2024-56607 * CVE-2024-56608 * CVE-2024-56609 * CVE-2024-56610 * CVE-2024-56611 * CVE-2024-56614 * CVE-2024-56615 * CVE-2024-56616 * CVE-2024-56617 * CVE-2024-56619 * CVE-2024-56620 * CVE-2024-56622 * CVE-2024-56623 * CVE-2024-56625 * CVE-2024-56629 * CVE-2024-56630 * CVE-2024-56631 * CVE-2024-56632 * CVE-2024-56634 * CVE-2024-56635 * CVE-2024-56636 * CVE-2024-56637 * CVE-2024-56641 * CVE-2024-56642 * CVE-2024-56643 * CVE-2024-56644 * CVE-2024-56645 * CVE-2024-56648 * CVE-2024-56649 * CVE-2024-56650 * CVE-2024-56651 * CVE-2024-56654 * CVE-2024-56656 * CVE-2024-56659 * CVE-2024-56660 * CVE-2024-56661 * CVE-2024-56662 * CVE-2024-56663 * CVE-2024-56664 * CVE-2024-56665 * CVE-2024-56667 * CVE-2024-56670 * CVE-2024-56672 * CVE-2024-56675 * CVE-2024-56677 * CVE-2024-56678 * CVE-2024-56679 * CVE-2024-56681 * CVE-2024-56683 * CVE-2024-56687 * CVE-2024-56688 * CVE-2024-56690 * CVE-2024-56691 * CVE-2024-56693 * CVE-2024-56694 * CVE-2024-56698 * CVE-2024-56700 * CVE-2024-56701 * CVE-2024-56704 * CVE-2024-56705 * CVE-2024-56707 * CVE-2024-56708 * CVE-2024-56709 * CVE-2024-56712 * CVE-2024-56715 * CVE-2024-56716 * CVE-2024-56722 * CVE-2024-56723 * CVE-2024-56724 * CVE-2024-56725 * CVE-2024-56726 * CVE-2024-56727 * CVE-2024-56728 * CVE-2024-56729 * CVE-2024-56739 * CVE-2024-56741 * CVE-2024-56745 * CVE-2024-56746 * CVE-2024-56747 * CVE-2024-56748 * CVE-2024-56752 * CVE-2024-56754 * CVE-2024-56755 * CVE-2024-56756 * CVE-2024-56759 * CVE-2024-56760 * CVE-2024-56763 * CVE-2024-56765 * CVE-2024-56766 * CVE-2024-56767 * CVE-2024-56769 * CVE-2024-56774 * CVE-2024-56775 * CVE-2024-56776 * CVE-2024-56777 * CVE-2024-56778 * CVE-2024-56779 * CVE-2024-56780 * CVE-2024-56787 * CVE-2024-57791 * CVE-2024-57792 * CVE-2024-57793 * CVE-2024-57795 * CVE-2024-57798 * CVE-2024-57801 * CVE-2024-57802 * CVE-2024-57804 * CVE-2024-57809 * CVE-2024-57838 * CVE-2024-57849 * CVE-2024-57850 * CVE-2024-57857 * CVE-2024-57874 * CVE-2024-57876 * CVE-2024-57884 * CVE-2024-57887 * CVE-2024-57888 * CVE-2024-57890 * CVE-2024-57892 * CVE-2024-57893 * CVE-2024-57896 * CVE-2024-57897 * CVE-2024-57899 * CVE-2024-57903 * CVE-2024-57904 * CVE-2024-57906 * CVE-2024-57907 * CVE-2024-57908 * CVE-2024-57910 * CVE-2024-57911 * CVE-2024-57912 * CVE-2024-57913 * CVE-2024-57915 * CVE-2024-57916 * CVE-2024-57917 * CVE-2024-57922 * CVE-2024-57926 * CVE-2024-57929 * CVE-2024-57931 * CVE-2024-57932 * CVE-2024-57933 * CVE-2024-57935 * CVE-2024-57936 * CVE-2024-57938 * CVE-2024-57940 * CVE-2024-57946 * CVE-2024-8805 * CVE-2025-21632 * CVE-2025-21645 * CVE-2025-21646 * CVE-2025-21649 * CVE-2025-21650 * CVE-2025-21651 * CVE-2025-21652 * CVE-2025-21653 * CVE-2025-21655 * CVE-2025-21656 * CVE-2025-21662 * CVE-2025-21663 * CVE-2025-21664 * CVE-2025-21674 * CVE-2025-21676 * CVE-2025-21682 CVSS scores: * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52591 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26764 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36476 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39282 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43913 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46896 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49569 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53162 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53170 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53175 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53187 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53191 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53195 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53196 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53203 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53236 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53685 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55639 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-55881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56531 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56532 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56533 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56546 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56570 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56571 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-56572 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56573 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56584 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56594 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56596 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56597 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56598 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56607 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56609 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56610 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56619 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56620 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56623 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56630 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56631 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56636 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56644 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56654 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56662 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2024-56662 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56663 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-56664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56665 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56672 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56677 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56678 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56690 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56693 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56700 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56701 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56708 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56712 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56729 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56741 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56745 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56747 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56748 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56759 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56765 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56769 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57791 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57792 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57793 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H * CVE-2024-57795 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57802 ( SUSE ): 2.1 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57804 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-57809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57838 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57850 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57874 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-57876 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57884 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57887 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57890 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57893 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57897 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57899 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57906 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57906 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57907 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57907 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57908 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57910 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57912 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-57912 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-57913 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57915 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57917 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57917 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57929 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57932 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57935 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57936 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21632 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21650 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21651 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21652 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21653 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-21655 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21656 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-21662 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21664 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 610 vulnerabilities, contains three features and has 128 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). * CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726). * CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526). * CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809). * CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205). * CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705). * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854). * CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727). * CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161). * CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158). * CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101). * CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087). * CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419). * CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909). * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038). * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055). * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112). * CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324). * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200). * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239). * CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488). * CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-53090: afs: Fix lock recursion (bsc#1233637). * CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638). * CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772). * CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069). * CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086). * CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077). * CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079). * CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071). * CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073). * CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219). * CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220). * CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221) * CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810). * CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888). * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898). * CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893). * CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921). * CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901). * CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947). * CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957). * CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906). * CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923). * CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001). * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004). * CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003). * CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974). * CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011). * CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050). * CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045). * CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000). * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281). * CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282). * CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720). * CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737). * CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745). * CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753). * CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912). * CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033). * CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032). * CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031). * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128). * CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123). * CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241). * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217). * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230). * CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521). * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415). * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056). * CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487). * CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390). * CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391). * CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424). * CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426). * CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429). * CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227). * CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251). * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480). * CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519). * CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520). * CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523). * CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526). * CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132). * CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451). * CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430). * CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444). * CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439). * CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437). * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249). * CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489). * CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555). * CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498). * CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418). * CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412). * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584). * CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545). * CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564). * CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565). * CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612). * CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587). * CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578). * CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582). * CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583). * CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656). * CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503). * CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934). * CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627). * CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920). * CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645). * CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638). * CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653). * CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657). * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759). * CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768). * CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906). * CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940). * CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941). * CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779). * CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793). * CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798). * CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946). * CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948). * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964). * CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965). * CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967). * CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127). * CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096). * CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192). * CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190). * CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178). * CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182). * CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247). * CVE-2025-21632: x86/fpu: Ensure shadow stack is active before "getting" registers (bsc#1236106). * CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143). * CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144). * CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145). * CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160). * CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161). * CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163). * CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198). * CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260). * CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262). * CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688). * CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696). * CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703). Features added: * * Disable ceph (jsc#PED-7242) * * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) The following non-security bugs were fixed: * 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes). * ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294) * ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable- fixes). * ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable- fixes). * ACPI: PCC: Add PCC shared memory region command and status bitfields (stable-fixes). * ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467). * ACPI: fan: cleanup resources in the error path of .probe() (git-fixes). * ACPI: resource: Add Asus Vivobook X1504VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[] (stable-fixes). * ACPI: resource: Fix memory resource type union access (git-fixes). * ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable- fixes). * ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable- fixes). * ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable- fixes). * ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable- fixes). * ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes). * ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio (stable-fixes). * ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31 laptop (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes). * ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable- fixes). * ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes). * ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130 (bsc#1235686). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Check UMP support for midi_version change (git-fixes). * ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes). * ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes). * ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes). * ALSA: seq: ump: Use guard() for locking (stable-fixes). * ALSA: ump: Use guard() for locking (stable-fixes). * ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes). * ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes). * ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes). * ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: US16x08: Initialize array before use (git-fixes). * ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes). * ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable- fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: acp: Support microphone from Lenovo Go S (stable-fixes). * ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes). * ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes). * ASoC: amd: yc: Fix the wrong return value (git-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: hdmi-codec: reorder channel allocation list (stable-fixes). * ASoC: mediatek: disable buffer pre-allocation (stable-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes). * ASoC: rt722: add delay time to wait for the calibration procedure (stable- fixes). * ASoC: samsung: Add missing depends on I2C (git-fixes). * ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes). * ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes). * ASoC: wm8994: Add depends on MFD core (stable-fixes). * Add already cherry-picked ids to AMDGPU patch * Align git commit ID abbreviation guidelines and checks (git-fixes). * Bluetooth: Add support ITTIM PE50-M75C (stable-fixes). * Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable- fixes). * Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes). * Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection (git-fixes). * Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes). * Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes). * Bluetooth: MGMT: Fix Add Device to responding before completing (git-fixes). * Bluetooth: MGMT: Fix possible deadlocks (git-fixes). * Bluetooth: SCO: Add support for 16 bits transparent voice setting (git- fixes). * Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes). * Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable- fixes). * Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes). * Bluetooth: btusb: add callback function in btusb suspend/resume (stable- fixes). * Bluetooth: btusb: mediatek: add callback function in btusb_disconnect (stable-fixes). * Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes). * Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git- fixes). * Bluetooth: hci_sync: Fix not setting Random Address when required (git- fixes). * Bluetooth: iso: Fix recursive locking warning (git-fixes). * Delete XHCI patch for regression (bsc#1235550) * Disable ceph (jsc#PED-7242) * Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git- fixes). * Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git- fixes). * Drop downstream TPM fix patch (bsc#1233260 bsc#1233259 bsc#1232421) * Drop uvcvideo fix due to regression (bsc#1235894) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (git-fixes). * HID: fix generic desktop D-Pad controls (git-fixes). * HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes). * HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (git-fixes). * HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes). * HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes). * Input: atkbd - map F23 key to support default copilot shortcut (stable- fixes). * Input: bbnsm_pwrkey - add remove hook (git-fixes). * Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes). * Input: davinci-keyscan - remove leftover header (git-fixes). * Input: xpad - add QH Electronics VID/PID (stable-fixes). * Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable- fixes). * Input: xpad - add support for Nacon Pro Compact (stable-fixes). * Input: xpad - add support for wooting two he (arm) (stable-fixes). * Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable- fixes). * Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes). * KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635). * KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes bsc#1235776). * KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes bsc#1235777). * KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes bsc#1235778). * Move kABI workaround patch to correct folder * Move upstreamed DRM patch into sorted section * Move upstreamed NFS patch into sorted section * Move upstreamed TPM patch into sorted section * Move upstreamed lpfc patches into sorted section * Move upstreamed ppc patch into sorted section * Move upstreamed sound patch into sorted section * Move upstreamed sound patches into sorted section * NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes). * NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git- fixes). * NFSD: Async COPY result needs to return a write verifier (git-fixes). * NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git- fixes). * NFSD: Fix nfsd4_shutdown_copy() (git-fixes). * NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes). * NFSD: Prevent a potential integer overflow (git-fixes). * NFSD: Remove a never-true comparison (git-fixes). * NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes). * NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git- fixes). * NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes). * NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes). * Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes). * PCI/AER: Disable AER service on suspend (stable-fixes). * PCI/MSI: Handle lack of irqdomain gracefully (git-fixes). * PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes). * PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes). * PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes). * PCI: Add T_PERST_CLK_US macro (git-fixes). * PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git- fixes). * PCI: Detect and trust built-in Thunderbolt chips (stable-fixes). * PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes). * PCI: Use preserve_config in place of pci_flags (stable-fixes). * PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes). * PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes). * PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes). * PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes). * PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git- fixes). * PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar() (git-fixes). * PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy() (git-fixes). * PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git- fixes). * PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes). * PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git- fixes). * PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git- fixes). * PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes). * PCI: j721e: Add PCIe 4x lane selection support (stable-fixes). * PCI: j721e: Add per platform maximum lane settings (stable-fixes). * PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes). * PCI: j721e: Add suspend and resume support (git-fixes). * PCI: j721e: Use T_PERST_CLK_US macro (git-fixes). * PCI: microchip: Set inbound address translation for coherent or non-coherent mode (git-fixes). * PCI: qcom: Add support for IPQ9574 (stable-fixes). * PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() (git-fixes). * PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable- fixes). * PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes). * PM: hibernate: Add error handling for syscore_suspend() (git-fixes). * RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467). * RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes) * RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes) * RDMA/bnxt_re: Avoid initializing the software queue for user queues (git- fixes) * RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes) * RDMA/bnxt_re: Disable use of reserved wqes (git-fixes) * RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes) * RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes) * RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes) * RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes) * RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes) * RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes) * RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes) * RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes) * RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error (git- fixes) * RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes) * RDMA/bnxt_re: Remove always true dattr validity check (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes) * RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes) * RDMA/hns: Fix missing flush CQE for DWQE (git-fixes) * RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes) * RDMA/mlx4: Avoid false error about access to uninitialized gids array (git- fixes) * RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes) * RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git- fixes) * RDMA/mlx5: Fix implicit ODP use after free (git-fixes) * RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes) * RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes) * RDMA/rxe: Fix mismatched max_msg_sz (git-fixes) * RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (git-fixes) * RDMA/srp: Fix error handling in srp_add_port (git-fixes) * RDMA/uverbs: Prevent integer overflow issue (git-fixes) * README.BRANCH: Remove copy of branch name * Refresh patches.suse/ALSA-hda-realtek-Add-support-for-Samsung-Galaxy- Book.patch. * Refresh patches.suse/cpufreq-intel_pstate-Temporarily-boost-P-state- when-.patch. * Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad" (stable- fixes). * Revert "block/mq-deadline: use correct way to throttling write requests" (bsc#1234146). * Revert "btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)" * Revert "drm/i915/dpt: Make DPT object unshrinkable" (stable-fixes). * Revert "igb: Disable threaded IRQ for igb_msix_other" (git-fixes). * Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data" (git- fixes). * Revert "unicode: Do not special case ignorable code points" (stable-fixes). * Revert "usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null" (stable-fixes). * Revert 'arm64: Kconfig: Make SME depend on BROKEN for now' This reverts commit 2ccfee6be929dd4ea49ef59a7ae686473aae40b6 CONFIG_ARM64_SME is enabled by default so some customers may rely on SME. We need further analysis to evaluate to what extent we are impacted and in case we'll disable SME support later. * Revert 0dd78566990 ("Disable ceph (jsc#PED-7242)") Apparently, jsc#PED-7242 is only deprecate ceph for 15-SP6 and disable for 15-SP7. Revert the disabling. * SUNRPC: make sure cache entry active before cache_show (git-fixes). * SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes). * USB: core: Disable LPM only for non-suspended ports (git-fixes). * USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes). * USB: serial: option: add MediaTek T7XX compositions (stable-fixes). * USB: serial: option: add MeiG Smart SLM770A (stable-fixes). * USB: serial: option: add MeiG Smart SRM815 (stable-fixes). * USB: serial: option: add Neoway N723-EA support (stable-fixes). * USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable- fixes). * USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes). * USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes). * USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git- fixes). * USB: usblp: return error when setting unsupported protocol (git-fixes). * VFS: use system_unbound_wq for delayed_mntput (bsc#1234683). * VMCI: fix reference to ioctl-number.rst (git-fixes). * accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes). * accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes). * accel/habanalabs: fix debugfs files permissions (stable-fixes). * accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable- fixes). * acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes). * af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725). * afs: Automatically generate trace tag enums (git-fixes). * afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY (git-fixes). * afs: Fix cleanup of immediately failed async calls (git-fixes). * afs: Fix directory format encoding struct (git-fixes). * afs: Fix missing subdir edit when renamed between parent dirs (git-fixes). * afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call (git-fixes). * afs: Fix the maximum cell name length (git-fixes). * amdgpu/uvd: get ring reference from rq scheduler (git-fixes). * arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773). * arch: Remove cmpxchg_double (bsc#1220773). * arch: consolidate arch_irq_work_raise prototypes (git-fixes). * arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes) * arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605) * arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245) Update arm64 default configuration file * arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes). * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git- fixes) * arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes). * arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes) * arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git- fixes). * arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes) * arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes) * arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes) * ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable- fixes). * autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes). * batman-adv: Do not let TT changes list grows indefinitely (git-fixes). * batman-adv: Do not send uninitialized TT changes (git-fixes). * batman-adv: Remove uninitialized data in full table TT response (git-fixes). * blacklist.conf: printk/sysctl: breaks kernel without pre-requisite patches (bsc#1229025) * blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726). * blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139). * blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144). * blk-iocost: do not WARN if iocg was already offlined (bsc#1234147). * blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140). * block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149). * block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150). * block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160). * block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280). * block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279). * block/mq-deadline: Fix the tag reservation code (bsc#1234148). * block: Call .limit_depth() after .hctx has been set (bsc#1234148). * block: Fix where bio IO priority gets set (bsc#1234145). * block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142). * block: update the stable_writes flag in bdev_add (bsc#1234141). * bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes) * bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Set backplane link modes correctly for ethtool (git-fixes). * bpf, x86: Fix PROBE_MEM runtime load check (git-fixes). * bpf: verifier: prevent userspace memory access (git-fixes). * btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445). * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128) * btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445). * bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git- fixes). * can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes). * can: j1939: fix error in J1939 documentation (stable-fixes). * ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592). * checkpatch: always parse orig_commit in fixes tag (git-fixes). * checkpatch: check for missing Fixes tags (stable-fixes). * cleanup: Add conditional guard support (stable-fixes). * cleanup: Adjust scoped_guard() macros to avoid potential warning (stable- fixes). * cleanup: Remove address space of returned pointer (git-fixes). * clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git- fixes). * clocksource/drivers:sp804: Make user selectable (git-fixes). * counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes). * counter: ti-ecap-capture: Add check for clk_enable() (git-fixes). * cpufreq: ACPI: Fix max-frequency computation (git-fixes). * cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes). * cpufreq: amd-pstate: remove global header file (git-fixes). * cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Do not update global.turbo_disabled after initialization (bsc#1234619). * cpufreq: intel_pstate: Drop redundant locking from intel_pstate_driver_cleanup() (bsc#1234619). * cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619). * cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller (bsc#1234619). * cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations (bsc#1234619). * cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes). * cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE() (bsc#1234619). * cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo() (bsc#1234619). * cpufreq: intel_pstate: Refine computation of P-state for given frequency (bsc#1234619). * cpufreq: intel_pstate: Replace three global.turbo_disabled checks (bsc#1234619). * cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619). * cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619). * cpufreq: intel_pstate: Update the maximum CPU frequency consistently (bsc#1234619). * cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git- fixes). * cpufreq: intel_pstate: Use __ro_after_init for three variables (bsc#1234619). * cpufreq: intel_pstate: Wait for canceled delayed work to complete (bsc#1234619). * cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back (git-fixes). * cpuidle: Avoid potential overflow in integer multiplication (git-fixes). * cpupower: fix TSC MHz calculation (git-fixes). * crypto: caam - use JobR's space to access page 0 regs (git-fixes). * crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (git-fixes). * crypto: ecdsa - Avoid signed integer overflow on signature decoding (stable- fixes). * crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable- fixes). * crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes). * crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable- fixes). * crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async' (git-fixes). * crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git- fixes). * crypto: qat - disable IOV in adf_dev_stop() (git-fixes). * crypto: qce - fix goto jump in error path (git-fixes). * crypto: qce - fix priority to be less than ARMv8 CE (git-fixes). * crypto: qce - unregister previously registered algos in error path (git- fixes). * crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes). * cyrpto/b128ops: Remove struct u128 (bsc#1220773). * devcoredump: cleanup some comments (git-fixes). * devlink: Fix length of eswitch inline-mode (git-fixes). * dlm: fix possible lkb_resource null dereference (git-fixes). * dma-buf: fix dma_fence_array_signaled v4 (stable-fixes). * dma-debug: fix a possible deadlock on radix_lock (stable-fixes). * dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes). * dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git- fixes). * dmaengine: dw: Select only supported masters for ACPI devices (git-fixes). * dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357). * dmaengine: mv_xor: fix child node refcount handling in early exit (git- fixes). * dmaengine: tegra: Return correct DMA status when paused (git-fixes). * dmaengine: ti: edma: fix OF node reference leaks in edma_driver (git-fixes). * docs: media: update location of the media patches (stable-fixes). * docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git- fixes). * driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes). * driver core: class: Fix wild pointer dereferences in API class_dev_iter_next() (git-fixes). * driver core: fw_devlink: Improve logs for cycle detection (stable-fixes). * driver core: fw_devlink: Stop trying to optimize cycle detection logic (git- fixes). * drivers/card_reader/rtsx_usb: Restore interrupt based detection (git-fixes). * drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes). * drm/amd/display: Add HDR workaround for specific eDP (stable-fixes). * drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes). * drm/amd/display: Add check for granularity in dml ceil/floor helpers (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes). * drm/amd/display: Fix DSC-re-computing (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes). * drm/amd/display: Revert Avoid overflow assignment (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes). * drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable- fixes). * drm/amd/display: increase MAX_SURFACES to the value supported by hw (stable- fixes). * drm/amd/pm: Fix an error handling path in vega10_enable_se_edc_force_stall_config() (git-fixes). * drm/amd/pm: fix the high voltage issue after unload (stable-fixes). * drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes). * drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes). * drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes). * drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes). * drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes). * drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes). * drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes). * drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes). * drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes). * drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes). * drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes). * drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (git-fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes). * drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes). * drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: do not access invalid sched (git-fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: fix usage slab after free (stable-fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable- fixes). * drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes). * drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init (git-fixes). * drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes). * drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini() (git-fixes). * drm/amdkfd: Correct the migration DMA map direction (stable-fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/amdkfd: Use device based logging for errors (stable-fixes). * drm/amdkfd: Use the correct wptr size (stable-fixes). * drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes). * drm/amdkfd: pause autosuspend when creating pdd (stable-fixes). * drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes). * drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes). * drm/bridge: it6505: Enable module autoloading (stable-fixes). * drm/bridge: it6505: Fix inverted reset polarity (git-fixes). * drm/bridge: it6505: update usleep_range for RC circuit charge time (stable- fixes). * drm/display: Fix building with GCC 15 (stable-fixes). * drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes). * drm/dp_mst: Fix MST sideband message body length check (stable-fixes). * drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes). * drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes). * drm/etnaviv: Fix page property being used for non writecombine buffers (git- fixes). * drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes). * drm/i915/dg1: Fix power gate sequence (git-fixes). * drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes). * drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes). * drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes). * drm/mcde: Enable module autoloading (stable-fixes). * drm/mediatek: Add return value check when reading DPCD (git-fixes). * drm/mediatek: Add support for 180-degree rotation in the display driver (git-fixes). * drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes). * drm/mediatek: Fix mode valid issue for dp (git-fixes). * drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err (git-fixes). * drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git- fixes). * drm/mediatek: stop selecting foreign drivers (git-fixes). * drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable- fixes). * drm/msm/dp: set safe_to_exit_level before printing it (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes). * drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes). * drm/msm: Check return value of of_dma_configure() (git-fixes). * drm/msm: do not clean up priv->kms prematurely (git-fixes). * drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes). * drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git- fixes). * drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes). * drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes). * drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes). * drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes). * drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes). * drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes). * drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8 (git-fixes). * drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git- fixes). * drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes). * drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes). * drm/tidss: Clear the interrupt status for interrupts being disabled (git- fixes). * drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes). * drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes). * drm/v3d: Ensure job pointer is set to NULL after job completion (git-fixes). * drm/v3d: Stop active perfmon if it is being destroyed (git-fixes). * drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes). * drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes). * drm/vmwgfx: Add new keep_resv BO param (git-fixes). * drm: adv7511: Drop dsi single lane support (git-fixes). * drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes). * drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * erofs: avoid debugging output for (de)compressed data (git-fixes). * exfat: ensure that ctime is updated whenever the mtime is (git-fixes). * exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes). * exfat: fix the infinite loop in exfat_readdir() (git-fixes). * exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes). * ext4: add a new helper to check if es must be kept (bsc#1234170). * ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164). * ext4: add missed brelse in update_backups (bsc#1234171). * ext4: allow for the last group to be marked as trimmed (bsc#1234278). * ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191). * ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180). * ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193). * ext4: avoid overlapping preallocations due to overflow (bsc#1234162). * ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192). * ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187). * ext4: check the extent status again before inserting delalloc block (bsc#1234186). * ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190). * ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178). * ext4: correct best extent lstart adjustment logic (bsc#1234179). * ext4: correct grp validation in ext4_mb_good_group (bsc#1234163). * ext4: correct return value of ext4_convert_meta_bg (bsc#1234172). * ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178). * ext4: correct the start block of counting reserved clusters (bsc#1234169). * ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166). * ext4: do not trim the group with corrupted block bitmap (bsc#1234177). * ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170). * ext4: factor out a common helper to query extent map (bsc#1234186). * ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176). * ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188). * ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188). * ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188). * ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954). * ext4: fix potential unnitialized variable (bsc#1234183). * ext4: fix race between writepages and remount (bsc#1234168). * ext4: fix rec_len verify error (bsc#1234167). * ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170). * ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185). * ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178). * ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170). * ext4: make ext4_es_insert_extent() return void (bsc#1234170). * ext4: make ext4_es_remove_extent() return void (bsc#1234170). * ext4: make ext4_zeroout_es() return void (bsc#1234170). * ext4: make sure allocate pending entry not fail (bsc#1234170). * ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175). * ext4: move 'ix' sanity check to corrent position (bsc#1234174). * ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165). * ext4: nested locking for xattr inode (bsc#1234189). * ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194). * ext4: refactor ext4_da_map_blocks() (bsc#1234178). * ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173). * ext4: remove the redundant folio_wait_stable() (bsc#1234184). * ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182). * ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181). * ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170). * ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170). * ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170). * fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git- fixes). * filemap: Fix bounds checking in filemap_read() (bsc#1234209). * filemap: add a per-mapping stable writes flag (bsc#1234141). * firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes). * fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200). * fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207). * fsnotify: fix sending inotify event with unexpected filename (bsc#1234198). * genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git- fixes). * genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git- fixes). * genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes). * genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes). * genksyms: fix memory leak when the same symbol is added from source (git- fixes). * genksyms: fix memory leak when the same symbol is read from *.symref file (git-fixes). * gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes). * gpio: grgpio: Add NULL check in grgpio_probe (git-fixes). * gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes). * gpio: mxc: remove dead code after switch to DT-only (git-fixes). * gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes). * hfsplus: do not query the device logical block size multiple times (git- fixes). * hvc/xen: fix console unplug (git-fixes). * hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes). * hvc/xen: fix event channel handling for secondary consoles (git-fixes). * hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur (git-fixes). * hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes). * hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable- fixes). * hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes). * hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes). * hwmon: (tmp513) Do not use "proxy" headers (stable-fixes). * hwmon: (tmp513) Fix Current Register value interpretation (git-fixes). * hwmon: (tmp513) Fix division of negative numbers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes). * hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes). * hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes). * hwmon: (tmp513) Use SI constants from units.h (stable-fixes). * hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes). * i2c: core: fix reference leak in i2c_register_adapter() (git-fixes). * i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes). * i2c: i801: Add support for Intel Panther Lake (stable-fixes). * i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git- fixes). * i2c: microchip-core: actually use repeated sends (git-fixes). * i2c: microchip-core: fix "ghost" detections (git-fixes). * i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes). * i2c: pnx: Fix timeout in wait functions (git-fixes). * i2c: rcar: fix NACK handling when being a target (git-fixes). * i2c: riic: Always round-up when calculating bus period (git-fixes). * i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros (stable- fixes). * i40e: Fix handling changed priv flags (git-fixes). * i915/guc: Accumulate active runtime on gt reset (git-fixes). * i915/guc: Ensure busyness counter increases motonically (git-fixes). * i915/guc: Reset engine utilization buffer before registration (git-fixes). * ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980). * ice: Unbind the workqueue (bsc#1234989) * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes). * ice: fix PHY Clock Recovery availability check (git-fixes). * idpf: add support for SW triggered interrupts (bsc#1235507). * idpf: enable WB_ON_ITR (bsc#1235507). * idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507). * ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe() (git-fixes). * igb: Fix potential invalid memory access in igb_init_module() (git-fixes). * iio: adc: ad7124: Disable all channels at probe time (git-fixes). * iio: adc: ad_sigma_delta: Handle CS assertion as intended in ad_sd_read_reg_raw() (git-fixes). * iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes). * iio: adc: rockchip_saradc: fix information leak in triggered buffer (git- fixes). * iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes). * iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes). * iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer (git-fixes). * iio: gyro: fxas21002c: Fix missing data update in trigger handler (git- fixes). * iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment (git- fixes). * iio: imu: kmx61: fix information leak in triggered buffer (git-fixes). * iio: inkern: call iio_device_put() only on mapped devices (git-fixes). * iio: light: as73211: fix channel handling in only-color triggered buffer (git-fixes). * iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes). * iio: magnetometer: yas530: use signed integer type for clamp limits (git- fixes). * iio: pressure: zpa2326: fix information leak in triggered buffer (git- fixes). * iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale (git-fixes). * instrumentation: Wire up cmpxchg128() (bsc#1220773). * intel_th: core: fix kernel-doc warnings (git-fixes). * io_uring/rw: avoid punting to io-wq directly (git-fixes). * io_uring/tctx: work around xa_store() allocation error issue (git-fixes). * io_uring: Fix registered ring file refcount leak (git-fixes). * io_uring: always lock __io_cqring_overflow_flush (git-fixes). * io_uring: check if iowq is killed before queuing (git-fixes). * iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git- fixes). * ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes). * ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git- fixes). * irqchip/gic-v3: Force propagation of the active state with a read-back (stable-fixes). * irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base (stable-fixes). * irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes). * isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199). * ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes). * ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes). * jffs2: Fix rtime decompressor (git-fixes). * jffs2: Prevent rtime decompress memory corruption (git-fixes). * jffs2: fix use of uninitialized variable (git-fixes). * jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git- fixes). * jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes). * jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes). * jfs: fix shift-out-of-bounds in dbSplit (git-fixes). * jfs: xattr: check invalid xattr size more strictly (git-fixes). * kABI workaround for struct auto_pin_cfg_item change (git-fixes). * kABI workaround for struct drm_dp_mst_topology_mgr (git-fixes). * kabi/severities: make vcap_find_actionfield PASS (bsc#1220773) * kasan: make report_lock a raw spinlock (git-fixes). * kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST (git- fixes). * kdb: Fix buffer overflow during tab-complete (bsc#1234652). * kdb: Fix console handling when editing and tab-completing commands (bsc#1234655). * kdb: Merge identical case statements in kdb_read() (bsc#1234657). * kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658). * kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654). * kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654). * kdb: address -Wformat-security warnings (bsc#1234659). * kgdb: Flush console before entering kgdb on panic (bsc#1234651). * kheaders: Ignore silly-rename files (stable-fixes). * ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes). * ktest.pl: Check kernelrelease return in get_version (git-fixes). * ktest.pl: Fix typo "accesing" (git-fixes). * ktest.pl: Fix typo in comment (git-fixes). * ktest.pl: Remove unused declarations in run_bisect_test function (git- fixes). * ktest: force $buildonly = 1 for 'make_warnings_file' test type (stable- fixes). * landlock: Handle weird files (git-fixes). * latencytop: use correct kernel-doc format for func params (git-fixes). * leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes). * leds: lp8860: Write full EEPROM, not only half of it (git-fixes). * leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata() (git-fixes). * lib/inflate.c: remove dead code (git-fixes). * lib/stackdepot: print disabled message only if truly disabled (git-fixes). * linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes). * locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix). * loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143). * mac80211: fix user-power when emulating chanctx (stable-fixes). * mac802154: check local interfaces before deleting sdata list (stable-fixes). * mailbox: pcc: Add support for platform notification handling (stable-fixes). * mailbox: pcc: Support shared interrupt for multiple subspaces (stable- fixes). * mailbox: tegra-hsp: Clear mailbox before using message (git-fixes). * maple_tree: simplify split calculation (git-fixes). * media: camif-core: Add check for clk_enable() (git-fixes). * media: ccs: Clean up parsed CCS static data on parse failure (git-fixes). * media: ccs: Fix CCS static data parsing for large block sizes (git-fixes). * media: ccs: Fix cleanup order in ccs_probe() (git-fixes). * media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable- fixes). * media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git- fixes). * media: dvb-usb-v2: af9035: fix ISO C90 compilation error on af9035_i2c_master_xfer (git-fixes). * media: i2c: imx412: Add missing newline to prints (git-fixes). * media: i2c: ov9282: Correct the exposure offset (git-fixes). * media: imx-jpeg: Fix potential error pointer dereference in detach_pm() (git-fixes). * media: imx296: Add standby delay during probe (git-fixes). * media: lmedm04: Handle errors for lme2510_int_read (git-fixes). * media: marvell: Add check for clk_enable() (git-fixes). * media: mc: fix endpoint iteration (git-fixes). * media: mipi-csis: Add check for clk_enable() (git-fixes). * media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes). * media: ov5640: fix get_light_freq on auto (git-fixes). * media: rc: iguanair: handle timeouts (git-fixes). * media: rkisp1: Fix unused value issue (git-fixes). * media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes). * media: uvcvideo: Fix crash during unbind if gpio unit is in use (git-fixes). * media: uvcvideo: Fix double free in error path (git-fixes). * media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes). * media: uvcvideo: Only save async fh if success (git-fixes). * media: uvcvideo: Propagate buf->error to userspace (git-fixes). * media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes). * media: uvcvideo: Remove dangling pointers (git-fixes). * media: uvcvideo: Remove redundant NULL assignment (git-fixes). * media: uvcvideo: Support partial control reads (git-fixes). * memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git- fixes). * memory-failure: use a folio in me_huge_page() (git-fixes). * memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() (git-fixes). * mfd: da9052-spi: Change read-mask to write-mask (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes). * mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes). * misc: fastrpc: Deregister device nodes properly in error scenarios (git- fixes). * misc: fastrpc: Fix copy buffer page size (git-fixes). * misc: fastrpc: Fix registered buffer page address (git-fixes). * misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling (git-fixes). * misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set config (git-fixes). * misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git- fixes). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list (git-fixes). * mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204). * mm/memory-failure: cast index to loff_t before shifting it (git-fixes). * mm/memory-failure: check the mapcount of the precise page (git-fixes). * mm/memory-failure: fix crash in split_huge_page_to_list from soft_offline_page (git-fixes). * mm/memory-failure: pass the folio and the page to collect_procs() (git- fixes). * mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git- fixes). * mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes). * mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes). * mm/memory_hotplug: prevent accessing by index=-1 (git-fixes). * mm/memory_hotplug: use pfn math in place of direct struct page manipulation (git-fixes). * mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes). * mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git- fixes). * mm/migrate: putback split folios when numa hint migration fails (git-fixes). * mm/migrate: split source folio if it is on deferred split list (git-fixes). * mm/page_owner: remove free_ts from page_owner output (git-fixes). * mm/readahead: do not allow order-1 folio (bsc#1234205). * mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208). * mm/rodata_test: use READ_ONCE() to read const variable (git-fixes). * mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes). * mm: memory-failure: ensure moving HWPoison flag to the raw error pages (git- fixes). * mm: memory-failure: fetch compound head after extra page refcnt is held (git-fixes). * mm: memory-failure: fix potential page refcnt leak in memory_failure() (git- fixes). * mm: memory-failure: fix race window when trying to get hugetlb folio (git- fixes). * mm: memory-failure: remove unneeded PageHuge() check (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: core: Add SD card quirk for broken poweroff notification (stable- fixes). * mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes). * mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes). * mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes). * mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes). * mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git- fixes). * modpost: fix the missed iteration for the max bit in do_input() (git-fixes). * mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes). * mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes). * mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes). * mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes). * mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes). * mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes). * mtd: spinand: Remove write_enable_op() in markbad() (git-fixes). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes). * net/ipv6: release expired exception dst cached in socket (bsc#1216813). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Remove workaround to avoid syndrome for internal port (git- fixes). * net/mlx5e: clear xdp features on non-uplink representors (git-fixes). * net/qed: allow old cards not supporting "num_images" to work (git-fixes). * net/rose: prevent integer overflows in rose_setsockopt() (git-fixes). * net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes). * net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246). * net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset (git-fixes). * net: rose: fix timer races against user threads (git-fixes). * net: usb: qmi_wwan: add Quectel RG650V (stable-fixes). * net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes). * net: usb: rtl8150: enable basic endpoint checking (git-fixes). * net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() (git-fixes). * net: wwan: t7xx: Fix FSM command timeout issue (git-fixes). * netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454). * nfs: ignore SB_RDONLY when mounting nfs (git-fixes). * nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes). * nfsd: make sure exp active before svc_export_show (git-fixes). * nfsd: release svc_expkey/svc_export with rcu_work (git-fixes). * nfsd: restore callback functionality for NFSv4.0 (git-fixes). * nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git- fixes). * nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes). * nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes). * nilfs2: prevent use of deleted inode (git-fixes). * nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes). * nvme-rdma: unquiesce admin_q before destroy it (git-fixes). * nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes). * nvme-tcp: fix the memleak while create new ctrl failed (git-fixes). * nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes). * nvme: Add error path for xa_store in nvme_init_effects (git-fixes). * nvme: apple: fix device reference counting (git-fixes). * nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git- fixes). * nvme: fix metadata handling in nvme-passthrough (git-fixes). * nvmet-loop: avoid using mutex in IO hotpath (git-fixes). * nvmet: propagate npwg topology (git-fixes). * ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes). * ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes). * of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes). * of: Fix error path in of_parse_phandle_with_args_map() (git-fixes). * of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git- fixes). * of: address: Report error on resource bounds overflow (stable-fixes). * padata: add pd get/put refcnt helper (git-fixes). * padata: avoid UAF for reorder_work (git-fixes). * padata: fix UAF in padata_reorder (git-fixes). * parisc: Raise minimal GCC version (bsc#1220773). * parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix). * percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773). * percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix). * percpu: Wire up cmpxchg128 (bsc#1220773). * phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes). * phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git- fixes). * phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes). * phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git- fixes). * phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes). * phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes). * phy: rockchip: naneng-combphy: fix phy reset (git-fixes). * phy: usb: Toggle the PHY power during init (git-fixes). * pinctrl: amd: Take suspend type into consideration which pins are non-wake (git-fixes). * pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes). * pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes). * pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes). * pinctrl: samsung: fix fwnode refcount cleanup if platform_get_irq_optional() fails (git-fixes). * pinmux: Use sequential access to access desc->pinmux data (stable-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it (git-fixes). * platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897). * platform/x86/intel/tpmi: Add defines to get version information (bsc#1225897). * platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes). * platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes). * platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable- fixes). * platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes). * pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes). * power: ip5xxx_power: Fix return value on ADC read errors (git-fixes). * power: supply: gpio-charger: Fix set charge current limits (git-fixes). * powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108). * powerpc/iommu: Move pSeries specific functions to pseries/iommu.c (bsc#1220711 ltc#205755). * powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755). * powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755). * powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825). * pps: add an error check in parport_attach (git-fixes). * pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes). * printk: Add is_printk_legacy_deferred() (bsc#1236733). * printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733). * proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git- fixes). * pwm: stm32-lp: Add check for clk_enable() (git-fixes). * pwm: stm32: Add check for clk_enable() (git-fixes). * quota: Fix rcu annotations of inode dquot pointers (bsc#1234197). * quota: explicitly forbid quota files from being encrypted (bsc#1234196). * quota: flush quota_release_work upon quota writeback (bsc#1234195). * quota: simplify drop_dquot_ref() (bsc#1234197). * rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes) * rcu/tree: Defer setting of jiffies during stall reset (git-fixes) * rcu: Dump memory object info if callback function is invalid (git-fixes) * rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes) * rcuscale: Move rcu_scale_writer() (git-fixes) * rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes) * readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208). * regmap: Use correct format specifier for logging range errors (stable- fixes). * regulator: core: Add missing newline character (git-fixes). * regulator: of: Implement the unwind path of of_regulator_match() (git- fixes). * regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes). * remoteproc: core: Fix ida_free call while not allocated (git-fixes). * rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes). * rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes). * rtc: zynqmp: Fix optional clock name property (git-fixes). * s390/cio: Do not unregister the subchannel based on DNV (git-fixes). * s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773). * s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes). * s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes). * s390/facility: Disable compile time optimization for decompressor code (git- fixes). * s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes). * s390/pageattr: Implement missing kernel_page_present() (git-fixes). * s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646) * samples/landlock: Fix possible NULL dereference in parse_path() (git-fixes). * scatterlist: fix incorrect func name in kernel-doc (git-fixes). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat (bsc#1235865). * sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi (bsc#1235865). * sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)). * scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409). * scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409). * scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409). * scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409). * scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409). * scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409). * scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409). * scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409). * scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409). * scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409). * scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406). * scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406). * scsi: qla2xxx: Fix use after free on unload (bsc#1235406). * scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406). * scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406). * scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406). * scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406). * scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes). * scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git- fixes). * seccomp: Stub for !CONFIG_SECCOMP (stable-fixes). * selftest: media_tests: fix trivial UAF typo (git-fixes). * selftests/alsa: Fix circular dependency involving global-timer (stable- fixes). * selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes). * selftests/landlock: Fix error message (git-fixes). * selftests/mm/cow: modify the incorrect checking parameters (git-fixes). * selftests/powerpc: Fix argument order to timer_sub() (git-fixes). * selftests: harness: fix printing of mismatch values in __EXPECT() (git- fixes). * selftests: mptcp: avoid spurious errors on disconnect (git-fixes). * selftests: tc-testing: reduce rshift value (stable-fixes). * selftests: timers: clocksource-switch: Adapt progress to kselftest framework (git-fixes). * selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes). * serial: 8250: Adjust the timeout for FIFO mode (git-fixes). * serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes). * serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git- fixes). * serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes). * serial: 8250_fintek: Add support for F81216E (stable-fixes). * serial: Do not hold the port lock when setting rx-during-tx GPIO (git- fixes). * serial: amba-pl011: Fix RX stall when DMA is used (git-fixes). * serial: amba-pl011: Use port lock wrappers (stable-fixes). * serial: amba-pl011: fix build regression (git-fixes). * serial: do not use uninitialized value in uart_poll_init() (git-fixes). * serial: imx: only set receiver level if it is zero (git-fixes). * serial: imx: set receiver level before starting uart (git-fixes). * serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git- fixes). * serial: qcom-geni: disable interrupts during console writes (git-fixes). * serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git- fixes). * serial: qcom-geni: fix console corruption (git-fixes). * serial: qcom-geni: fix dma rx cancellation (git-fixes). * serial: qcom-geni: fix false console tx restart (git-fixes). * serial: qcom-geni: fix fifo polling timeout (git-fixes). * serial: qcom-geni: fix hard lockup on buffer flush (git-fixes). * serial: qcom-geni: fix polled console corruption (git-fixes). * serial: qcom-geni: fix polled console initialisation (git-fixes). * serial: qcom-geni: fix receiver enable (git-fixes). * serial: qcom-geni: fix shutdown race (git-fixes). * serial: qcom-geni: fix soft lockup on sw flow control and suspend (git- fixes). * serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes). * serial: qcom-geni: revert broken hibernation support (git-fixes). * serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is in use (git-fixes). * serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes). * serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git- fixes). * serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes). * series.conf: temporarily disable upstream patch patches.suse/ocfs2-fix- UBSAN-warning-in-ocfs2_verify_volume.patch (bsc#1236138) * slub: Replace cmpxchg_double() (bsc#1220773). * slub: Replace cmpxchg_double() - KABI fix (bsc#1220773). * smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642] * soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes). * soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes). * soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes). * soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes). * soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes). * soc: imx8m: Probe the SoC driver as platform driver (stable-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes). * soc: qcom: Add check devm_kasprintf() returned value (stable-fixes). * soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes). * soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git- fixes). * soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes). * soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes). * soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes). * sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes). * sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes). * spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes). * spi: zynq-qspi: Add check for clk_enable() (git-fixes). * srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes) * srcu: Only accelerate on enqueue time (git-fixes) * stackdepot: rename pool_index to pool_index_plus_1 (git-fixes). * stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes). * staging: iio: ad9832: Correct phase range check (git-fixes). * staging: iio: ad9834: Correct phase range check (git-fixes). * staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git- fixes). * staging: media: max96712: fix kernel oops when removing module (git-fixes). * sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes). * sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes). * sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes). * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * svcrdma: Address an integer overflow (git-fixes). * svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git- fixes). * swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes). * swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes). * thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes). * thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes). * thunderbolt: Add support for Intel Lunar Lake (stable-fixes). * thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes). * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433). * tools: Sync if_xdp.h uapi tooling header (git-fixes). * tools: hv: change permissions of NetworkManager configuration file (git- fixes). * tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421). * tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421). * tpm_tis_spi: Release chip select when flow control fails (bsc#1234338) * tty: serial: 8250: Fix another runtime PM usage counter underflow (git- fixes). * tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes). * types: Introduce [us]128 (bsc#1220773). * ubifs: Correct the total block count by deducting journal reservation (git- fixes). * ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git- fixes). * ubifs: skip dumping tnc tree when zroot is null (git-fixes). * udf: Fix lock ordering in udf_evict_inode() (bsc#1234238). * udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243). * udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239). * udf: refactor inode_bmap() to handle error (bsc#1234242). * udf: refactor udf_current_aext() to handle error (bsc#1234240). * udf: refactor udf_next_aext() to handle error (bsc#1234241). * udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237). * uio: Fix return value of poll (git-fixes). * uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git- fixes). * usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes). * usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes). * usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes). * usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes). * usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes). * usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable- fixes). * usb: dwc2: Fix HCD port connection race (git-fixes). * usb: dwc2: Fix HCD resume (git-fixes). * usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes). * usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes). * usb: dwc3-am62: Disable autosuspend during remove (git-fixes). * usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes). * usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes). * usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git- fixes). * usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes). * usb: dwc3: gadget: fix writing NYET threshold (git-fixes). * usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes). * usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes). * usb: fix reference leak in usb_new_device() (git-fixes). * usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git- fixes). * usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes). * usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes). * usb: gadget: f_tcm: Do not free command immediately (git-fixes). * usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes). * usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes). * usb: gadget: f_tcm: Translate error to sense (git-fixes). * usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes). * usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes). * usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null (git-fixes). * usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes). * usb: host: max3421-hcd: Correctly abort a USB request (git-fixes). * usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes). * usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes). * usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes). * usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control() (bsc#1235001) * usb: typec: tcpm/tcpci_maxim: fix error code in max_contaminant_read_resistance_kohm() (git-fixes). * usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE (git-fixes). * usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes). * usbnet: ipheth: break up NCM header size computation (git-fixes). * usbnet: ipheth: check that DPE points past NCM header (git-fixes). * usbnet: ipheth: fix DPE OoB read (git-fixes). * usbnet: ipheth: fix possible overflow in DPE length check (git-fixes). * usbnet: ipheth: refactor NCM datagram loop (git-fixes). * usbnet: ipheth: use static NDP16 location in URB (git-fixes). * vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes). * vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes). * vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes). * vdpa: solidrun: Fix UB bug with devres (git-fixes). * vfs: fix readahead(2) on block devices (bsc#1234201). * vmscan,migrate: fix page count imbalance on node stats when demoting pages (git-fixes). * watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler (stable-fixes). * watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset (stable-fixes). * watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes). * wifi: ath11k: Fix unexpected return buffer manager error for WCN6750/WCN6855 (git-fixes). * wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes). * wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable- fixes). * wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes). * wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes). * wifi: ath5k: add PCI ID for SX76X (git-fixes). * wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes). * wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes). * wifi: cfg80211: adjust allocation of colocated AP data (git-fixes). * wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes). * wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes). * wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes). * wifi: mac80211: Add non-atomic station iterator (stable-fixes). * wifi: mac80211: Fix common size calculation for ML element (git-fixes). * wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable- fixes). * wifi: mac80211: do not flush non-uploaded STAs (git-fixes). * wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable- fixes). * wifi: mac80211: fix mbss changed flags corruption on 32 bit systems (stable- fixes). * wifi: mac80211: fix station NSS capability initialization order (git-fixes). * wifi: mac80211: fix tid removal during mesh forwarding (git-fixes). * wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes). * wifi: mac80211: prohibit deactivating all links (git-fixes). * wifi: mac80211: wake the queues in case of failure in resume (stable-fixes). * wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO (git-fixes). * wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes). * wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916 (git-fixes). * wifi: mt76: mt7915: firmware restart on devices with a second pcie link (git-fixes). * wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7915: fix register mapping (git-fixes). * wifi: mt76: mt7921: fix using incorrect group cipher after disconnection (git-fixes). * wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes). * wifi: mt76: mt7996: add max mpdu len capability (git-fixes). * wifi: mt76: mt7996: fix HE Phy capability (git-fixes). * wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes). * wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes). * wifi: mt76: mt7996: fix ldpc setting (git-fixes). * wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git- fixes). * wifi: mt76: mt7996: fix register mapping (git-fixes). * wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git- fixes). * wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes). * wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes). * wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes). * wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes). * wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes). * wifi: rtlwifi: fix memory leaks and invalid access at probe error path (git- fixes). * wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git- fixes). * wifi: rtlwifi: remove unused check_buddy_priv (git-fixes). * wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step (git-fixes). * wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop (git-fixes). * wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes). * wifi: rtlwifi: wait for firmware loading before releasing memory (git- fixes). * wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes). * wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable- fixes). * wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes). * wifi: wcn36xx: fix channel survey memory allocation size (git-fixes). * wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes). * workqueue: Add rcu lock check at the end of work item execution (bsc#1236732). * workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416). * writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203). * x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773). * x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773). * x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes). * x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes). * xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes). * xfs: Propagate errors from xfs_reflink_cancel_cow_range in xfs_dax_write_iomap_end (git-fixes). * xfs: do not allocate COW extents when unsharing a hole (git-fixes). * xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes). * xfs: remove unknown compat feature check in superblock write validation (git-fixes). * xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes). * xfs: sb_spino_align is not verified (git-fixes). * xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes). * xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-4=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-4=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-rt-6.4.0-25.1 * kernel-devel-rt-6.4.0-25.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-25.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-25-rt-debuginfo-1-1.1 * kernel-rt-debuginfo-6.4.0-25.1 * kernel-rt-livepatch-6.4.0-25.1 * kernel-livepatch-6_4_0-25-rt-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-1-1.1 * kernel-rt-debugsource-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-25.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-25.1 * kernel-rt-debugsource-6.4.0-25.1 * kernel-rt-devel-debuginfo-6.4.0-25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52463.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35839.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36476.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36908.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-39282.html * https://www.suse.com/security/cve/CVE-2024-39480.html * https://www.suse.com/security/cve/CVE-2024-41042.html * https://www.suse.com/security/cve/CVE-2024-43913.html * https://www.suse.com/security/cve/CVE-2024-44934.html * https://www.suse.com/security/cve/CVE-2024-44996.html * https://www.suse.com/security/cve/CVE-2024-45828.html * https://www.suse.com/security/cve/CVE-2024-46896.html * https://www.suse.com/security/cve/CVE-2024-47141.html * https://www.suse.com/security/cve/CVE-2024-47143.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-47809.html * https://www.suse.com/security/cve/CVE-2024-48873.html * https://www.suse.com/security/cve/CVE-2024-48881.html * https://www.suse.com/security/cve/CVE-2024-49569.html * https://www.suse.com/security/cve/CVE-2024-49854.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49915.html * https://www.suse.com/security/cve/CVE-2024-49948.html * https://www.suse.com/security/cve/CVE-2024-49951.html * https://www.suse.com/security/cve/CVE-2024-49978.html * https://www.suse.com/security/cve/CVE-2024-49998.html * https://www.suse.com/security/cve/CVE-2024-50016.html * https://www.suse.com/security/cve/CVE-2024-50018.html * https://www.suse.com/security/cve/CVE-2024-50039.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50051.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50143.html * https://www.suse.com/security/cve/CVE-2024-50151.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50199.html * https://www.suse.com/security/cve/CVE-2024-50202.html * https://www.suse.com/security/cve/CVE-2024-50203.html * https://www.suse.com/security/cve/CVE-2024-50211.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50256.html * https://www.suse.com/security/cve/CVE-2024-50262.html * https://www.suse.com/security/cve/CVE-2024-50272.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50280.html * https://www.suse.com/security/cve/CVE-2024-50299.html * https://www.suse.com/security/cve/CVE-2024-52332.html * https://www.suse.com/security/cve/CVE-2024-53050.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-53090.html * https://www.suse.com/security/cve/CVE-2024-53091.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53099.html * https://www.suse.com/security/cve/CVE-2024-53103.html * https://www.suse.com/security/cve/CVE-2024-53105.html * https://www.suse.com/security/cve/CVE-2024-53111.html * https://www.suse.com/security/cve/CVE-2024-53113.html * https://www.suse.com/security/cve/CVE-2024-53117.html * https://www.suse.com/security/cve/CVE-2024-53118.html * https://www.suse.com/security/cve/CVE-2024-53119.html * https://www.suse.com/security/cve/CVE-2024-53120.html * https://www.suse.com/security/cve/CVE-2024-53122.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53126.html * https://www.suse.com/security/cve/CVE-2024-53127.html * https://www.suse.com/security/cve/CVE-2024-53129.html * https://www.suse.com/security/cve/CVE-2024-53130.html * https://www.suse.com/security/cve/CVE-2024-53131.html * https://www.suse.com/security/cve/CVE-2024-53133.html * https://www.suse.com/security/cve/CVE-2024-53134.html * https://www.suse.com/security/cve/CVE-2024-53136.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://www.suse.com/security/cve/CVE-2024-53144.html * https://www.suse.com/security/cve/CVE-2024-53146.html * https://www.suse.com/security/cve/CVE-2024-53148.html * https://www.suse.com/security/cve/CVE-2024-53150.html * https://www.suse.com/security/cve/CVE-2024-53151.html * https://www.suse.com/security/cve/CVE-2024-53154.html * https://www.suse.com/security/cve/CVE-2024-53155.html * https://www.suse.com/security/cve/CVE-2024-53156.html * https://www.suse.com/security/cve/CVE-2024-53157.html * https://www.suse.com/security/cve/CVE-2024-53158.html * https://www.suse.com/security/cve/CVE-2024-53159.html * https://www.suse.com/security/cve/CVE-2024-53160.html * https://www.suse.com/security/cve/CVE-2024-53161.html * https://www.suse.com/security/cve/CVE-2024-53162.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-53166.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-53169.html * https://www.suse.com/security/cve/CVE-2024-53170.html * https://www.suse.com/security/cve/CVE-2024-53171.html * https://www.suse.com/security/cve/CVE-2024-53172.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53174.html * https://www.suse.com/security/cve/CVE-2024-53175.html * https://www.suse.com/security/cve/CVE-2024-53179.html * https://www.suse.com/security/cve/CVE-2024-53180.html * https://www.suse.com/security/cve/CVE-2024-53185.html * https://www.suse.com/security/cve/CVE-2024-53187.html * https://www.suse.com/security/cve/CVE-2024-53188.html * https://www.suse.com/security/cve/CVE-2024-53190.html * https://www.suse.com/security/cve/CVE-2024-53191.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-53195.html * https://www.suse.com/security/cve/CVE-2024-53196.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-53198.html * https://www.suse.com/security/cve/CVE-2024-53200.html * https://www.suse.com/security/cve/CVE-2024-53201.html * https://www.suse.com/security/cve/CVE-2024-53202.html * https://www.suse.com/security/cve/CVE-2024-53203.html * https://www.suse.com/security/cve/CVE-2024-53206.html * https://www.suse.com/security/cve/CVE-2024-53207.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-53209.html * https://www.suse.com/security/cve/CVE-2024-53210.html * https://www.suse.com/security/cve/CVE-2024-53213.html * https://www.suse.com/security/cve/CVE-2024-53214.html * https://www.suse.com/security/cve/CVE-2024-53215.html * https://www.suse.com/security/cve/CVE-2024-53216.html * https://www.suse.com/security/cve/CVE-2024-53217.html * https://www.suse.com/security/cve/CVE-2024-53222.html * https://www.suse.com/security/cve/CVE-2024-53224.html * https://www.suse.com/security/cve/CVE-2024-53227.html * https://www.suse.com/security/cve/CVE-2024-53229.html * https://www.suse.com/security/cve/CVE-2024-53230.html * https://www.suse.com/security/cve/CVE-2024-53231.html * https://www.suse.com/security/cve/CVE-2024-53232.html * https://www.suse.com/security/cve/CVE-2024-53233.html * https://www.suse.com/security/cve/CVE-2024-53234.html * https://www.suse.com/security/cve/CVE-2024-53236.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-53240.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2024-53685.html * https://www.suse.com/security/cve/CVE-2024-53690.html * https://www.suse.com/security/cve/CVE-2024-54680.html * https://www.suse.com/security/cve/CVE-2024-55639.html * https://www.suse.com/security/cve/CVE-2024-55881.html * https://www.suse.com/security/cve/CVE-2024-55916.html * https://www.suse.com/security/cve/CVE-2024-56369.html * https://www.suse.com/security/cve/CVE-2024-56372.html * https://www.suse.com/security/cve/CVE-2024-56531.html * https://www.suse.com/security/cve/CVE-2024-56532.html * https://www.suse.com/security/cve/CVE-2024-56533.html * https://www.suse.com/security/cve/CVE-2024-56536.html * https://www.suse.com/security/cve/CVE-2024-56538.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56543.html * https://www.suse.com/security/cve/CVE-2024-56546.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56549.html * https://www.suse.com/security/cve/CVE-2024-56551.html * https://www.suse.com/security/cve/CVE-2024-56557.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56562.html * https://www.suse.com/security/cve/CVE-2024-56566.html * https://www.suse.com/security/cve/CVE-2024-56567.html * https://www.suse.com/security/cve/CVE-2024-56568.html * https://www.suse.com/security/cve/CVE-2024-56569.html * https://www.suse.com/security/cve/CVE-2024-56570.html * https://www.suse.com/security/cve/CVE-2024-56571.html * https://www.suse.com/security/cve/CVE-2024-56572.html * https://www.suse.com/security/cve/CVE-2024-56573.html * https://www.suse.com/security/cve/CVE-2024-56574.html * https://www.suse.com/security/cve/CVE-2024-56575.html * https://www.suse.com/security/cve/CVE-2024-56576.html * https://www.suse.com/security/cve/CVE-2024-56577.html * https://www.suse.com/security/cve/CVE-2024-56578.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56584.html * https://www.suse.com/security/cve/CVE-2024-56587.html * https://www.suse.com/security/cve/CVE-2024-56588.html * https://www.suse.com/security/cve/CVE-2024-56589.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2024-56593.html * https://www.suse.com/security/cve/CVE-2024-56594.html * https://www.suse.com/security/cve/CVE-2024-56595.html * https://www.suse.com/security/cve/CVE-2024-56596.html * https://www.suse.com/security/cve/CVE-2024-56597.html * https://www.suse.com/security/cve/CVE-2024-56598.html * https://www.suse.com/security/cve/CVE-2024-56599.html * https://www.suse.com/security/cve/CVE-2024-5660.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56602.html * https://www.suse.com/security/cve/CVE-2024-56603.html * https://www.suse.com/security/cve/CVE-2024-56604.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-56606.html * https://www.suse.com/security/cve/CVE-2024-56607.html * https://www.suse.com/security/cve/CVE-2024-56608.html * https://www.suse.com/security/cve/CVE-2024-56609.html * https://www.suse.com/security/cve/CVE-2024-56610.html * https://www.suse.com/security/cve/CVE-2024-56611.html * https://www.suse.com/security/cve/CVE-2024-56614.html * https://www.suse.com/security/cve/CVE-2024-56615.html * https://www.suse.com/security/cve/CVE-2024-56616.html * https://www.suse.com/security/cve/CVE-2024-56617.html * https://www.suse.com/security/cve/CVE-2024-56619.html * https://www.suse.com/security/cve/CVE-2024-56620.html * https://www.suse.com/security/cve/CVE-2024-56622.html * https://www.suse.com/security/cve/CVE-2024-56623.html * https://www.suse.com/security/cve/CVE-2024-56625.html * https://www.suse.com/security/cve/CVE-2024-56629.html * https://www.suse.com/security/cve/CVE-2024-56630.html * https://www.suse.com/security/cve/CVE-2024-56631.html * https://www.suse.com/security/cve/CVE-2024-56632.html * https://www.suse.com/security/cve/CVE-2024-56634.html * https://www.suse.com/security/cve/CVE-2024-56635.html * https://www.suse.com/security/cve/CVE-2024-56636.html * https://www.suse.com/security/cve/CVE-2024-56637.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56643.html * https://www.suse.com/security/cve/CVE-2024-56644.html * https://www.suse.com/security/cve/CVE-2024-56645.html * https://www.suse.com/security/cve/CVE-2024-56648.html * https://www.suse.com/security/cve/CVE-2024-56649.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-56654.html * https://www.suse.com/security/cve/CVE-2024-56656.html * https://www.suse.com/security/cve/CVE-2024-56659.html * https://www.suse.com/security/cve/CVE-2024-56660.html * https://www.suse.com/security/cve/CVE-2024-56661.html * https://www.suse.com/security/cve/CVE-2024-56662.html * https://www.suse.com/security/cve/CVE-2024-56663.html * https://www.suse.com/security/cve/CVE-2024-56664.html * https://www.suse.com/security/cve/CVE-2024-56665.html * https://www.suse.com/security/cve/CVE-2024-56667.html * https://www.suse.com/security/cve/CVE-2024-56670.html * https://www.suse.com/security/cve/CVE-2024-56672.html * https://www.suse.com/security/cve/CVE-2024-56675.html * https://www.suse.com/security/cve/CVE-2024-56677.html * https://www.suse.com/security/cve/CVE-2024-56678.html * https://www.suse.com/security/cve/CVE-2024-56679.html * https://www.suse.com/security/cve/CVE-2024-56681.html * https://www.suse.com/security/cve/CVE-2024-56683.html * https://www.suse.com/security/cve/CVE-2024-56687.html * https://www.suse.com/security/cve/CVE-2024-56688.html * https://www.suse.com/security/cve/CVE-2024-56690.html * https://www.suse.com/security/cve/CVE-2024-56691.html * https://www.suse.com/security/cve/CVE-2024-56693.html * https://www.suse.com/security/cve/CVE-2024-56694.html * https://www.suse.com/security/cve/CVE-2024-56698.html * https://www.suse.com/security/cve/CVE-2024-56700.html * https://www.suse.com/security/cve/CVE-2024-56701.html * https://www.suse.com/security/cve/CVE-2024-56704.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2024-56707.html * https://www.suse.com/security/cve/CVE-2024-56708.html * https://www.suse.com/security/cve/CVE-2024-56709.html * https://www.suse.com/security/cve/CVE-2024-56712.html * https://www.suse.com/security/cve/CVE-2024-56715.html * https://www.suse.com/security/cve/CVE-2024-56716.html * https://www.suse.com/security/cve/CVE-2024-56722.html * https://www.suse.com/security/cve/CVE-2024-56723.html * https://www.suse.com/security/cve/CVE-2024-56724.html * https://www.suse.com/security/cve/CVE-2024-56725.html * https://www.suse.com/security/cve/CVE-2024-56726.html * https://www.suse.com/security/cve/CVE-2024-56727.html * https://www.suse.com/security/cve/CVE-2024-56728.html * https://www.suse.com/security/cve/CVE-2024-56729.html * https://www.suse.com/security/cve/CVE-2024-56739.html * https://www.suse.com/security/cve/CVE-2024-56741.html * https://www.suse.com/security/cve/CVE-2024-56745.html * https://www.suse.com/security/cve/CVE-2024-56746.html * https://www.suse.com/security/cve/CVE-2024-56747.html * https://www.suse.com/security/cve/CVE-2024-56748.html * https://www.suse.com/security/cve/CVE-2024-56752.html * https://www.suse.com/security/cve/CVE-2024-56754.html * https://www.suse.com/security/cve/CVE-2024-56755.html * https://www.suse.com/security/cve/CVE-2024-56756.html * https://www.suse.com/security/cve/CVE-2024-56759.html * https://www.suse.com/security/cve/CVE-2024-56760.html * https://www.suse.com/security/cve/CVE-2024-56763.html * https://www.suse.com/security/cve/CVE-2024-56765.html * https://www.suse.com/security/cve/CVE-2024-56766.html * https://www.suse.com/security/cve/CVE-2024-56767.html * https://www.suse.com/security/cve/CVE-2024-56769.html * https://www.suse.com/security/cve/CVE-2024-56774.html * https://www.suse.com/security/cve/CVE-2024-56775.html * https://www.suse.com/security/cve/CVE-2024-56776.html * https://www.suse.com/security/cve/CVE-2024-56777.html * https://www.suse.com/security/cve/CVE-2024-56778.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2024-56780.html * https://www.suse.com/security/cve/CVE-2024-56787.html * https://www.suse.com/security/cve/CVE-2024-57791.html * https://www.suse.com/security/cve/CVE-2024-57792.html * https://www.suse.com/security/cve/CVE-2024-57793.html * https://www.suse.com/security/cve/CVE-2024-57795.html * https://www.suse.com/security/cve/CVE-2024-57798.html * https://www.suse.com/security/cve/CVE-2024-57801.html * https://www.suse.com/security/cve/CVE-2024-57802.html * https://www.suse.com/security/cve/CVE-2024-57804.html * https://www.suse.com/security/cve/CVE-2024-57809.html * https://www.suse.com/security/cve/CVE-2024-57838.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-57850.html * https://www.suse.com/security/cve/CVE-2024-57857.html * https://www.suse.com/security/cve/CVE-2024-57874.html * https://www.suse.com/security/cve/CVE-2024-57876.html * https://www.suse.com/security/cve/CVE-2024-57884.html * https://www.suse.com/security/cve/CVE-2024-57887.html * https://www.suse.com/security/cve/CVE-2024-57888.html * https://www.suse.com/security/cve/CVE-2024-57890.html * https://www.suse.com/security/cve/CVE-2024-57892.html * https://www.suse.com/security/cve/CVE-2024-57893.html * https://www.suse.com/security/cve/CVE-2024-57896.html * https://www.suse.com/security/cve/CVE-2024-57897.html * https://www.suse.com/security/cve/CVE-2024-57899.html * https://www.suse.com/security/cve/CVE-2024-57903.html * https://www.suse.com/security/cve/CVE-2024-57904.html * https://www.suse.com/security/cve/CVE-2024-57906.html * https://www.suse.com/security/cve/CVE-2024-57907.html * https://www.suse.com/security/cve/CVE-2024-57908.html * https://www.suse.com/security/cve/CVE-2024-57910.html * https://www.suse.com/security/cve/CVE-2024-57911.html * https://www.suse.com/security/cve/CVE-2024-57912.html * https://www.suse.com/security/cve/CVE-2024-57913.html * https://www.suse.com/security/cve/CVE-2024-57915.html * https://www.suse.com/security/cve/CVE-2024-57916.html * https://www.suse.com/security/cve/CVE-2024-57917.html * https://www.suse.com/security/cve/CVE-2024-57922.html * https://www.suse.com/security/cve/CVE-2024-57926.html * https://www.suse.com/security/cve/CVE-2024-57929.html * https://www.suse.com/security/cve/CVE-2024-57931.html * https://www.suse.com/security/cve/CVE-2024-57932.html * https://www.suse.com/security/cve/CVE-2024-57933.html * https://www.suse.com/security/cve/CVE-2024-57935.html * https://www.suse.com/security/cve/CVE-2024-57936.html * https://www.suse.com/security/cve/CVE-2024-57938.html * https://www.suse.com/security/cve/CVE-2024-57940.html * https://www.suse.com/security/cve/CVE-2024-57946.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://www.suse.com/security/cve/CVE-2025-21632.html * https://www.suse.com/security/cve/CVE-2025-21645.html * https://www.suse.com/security/cve/CVE-2025-21646.html * https://www.suse.com/security/cve/CVE-2025-21649.html * https://www.suse.com/security/cve/CVE-2025-21650.html * https://www.suse.com/security/cve/CVE-2025-21651.html * https://www.suse.com/security/cve/CVE-2025-21652.html * https://www.suse.com/security/cve/CVE-2025-21653.html * https://www.suse.com/security/cve/CVE-2025-21655.html * https://www.suse.com/security/cve/CVE-2025-21656.html * https://www.suse.com/security/cve/CVE-2025-21662.html * https://www.suse.com/security/cve/CVE-2025-21663.html * https://www.suse.com/security/cve/CVE-2025-21664.html * https://www.suse.com/security/cve/CVE-2025-21674.html * https://www.suse.com/security/cve/CVE-2025-21676.html * https://www.suse.com/security/cve/CVE-2025-21682.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220711 * https://bugzilla.suse.com/show_bug.cgi?id=1220773 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224726 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225743 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225897 * https://bugzilla.suse.com/show_bug.cgi?id=1226980 * https://bugzilla.suse.com/show_bug.cgi?id=1227445 * https://bugzilla.suse.com/show_bug.cgi?id=1228526 * https://bugzilla.suse.com/show_bug.cgi?id=1228592 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://bugzilla.suse.com/show_bug.cgi?id=1229809 * https://bugzilla.suse.com/show_bug.cgi?id=1229833 * https://bugzilla.suse.com/show_bug.cgi?id=1230205 * https://bugzilla.suse.com/show_bug.cgi?id=1230697 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1231909 * https://bugzilla.suse.com/show_bug.cgi?id=1231963 * https://bugzilla.suse.com/show_bug.cgi?id=1232087 * https://bugzilla.suse.com/show_bug.cgi?id=1232101 * https://bugzilla.suse.com/show_bug.cgi?id=1232158 * https://bugzilla.suse.com/show_bug.cgi?id=1232161 * https://bugzilla.suse.com/show_bug.cgi?id=1232193 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232419 * https://bugzilla.suse.com/show_bug.cgi?id=1232420 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233038 * https://bugzilla.suse.com/show_bug.cgi?id=1233055 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233096 * https://bugzilla.suse.com/show_bug.cgi?id=1233112 * https://bugzilla.suse.com/show_bug.cgi?id=1233200 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233239 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233324 * https://bugzilla.suse.com/show_bug.cgi?id=1233328 * https://bugzilla.suse.com/show_bug.cgi?id=1233461 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233469 * https://bugzilla.suse.com/show_bug.cgi?id=1233488 * https://bugzilla.suse.com/show_bug.cgi?id=1233546 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1233637 * https://bugzilla.suse.com/show_bug.cgi?id=1233638 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233772 * https://bugzilla.suse.com/show_bug.cgi?id=1233778 * https://bugzilla.suse.com/show_bug.cgi?id=1233837 * https://bugzilla.suse.com/show_bug.cgi?id=1234024 * https://bugzilla.suse.com/show_bug.cgi?id=1234069 * https://bugzilla.suse.com/show_bug.cgi?id=1234071 * https://bugzilla.suse.com/show_bug.cgi?id=1234073 * https://bugzilla.suse.com/show_bug.cgi?id=1234075 * https://bugzilla.suse.com/show_bug.cgi?id=1234076 * https://bugzilla.suse.com/show_bug.cgi?id=1234077 * https://bugzilla.suse.com/show_bug.cgi?id=1234079 * https://bugzilla.suse.com/show_bug.cgi?id=1234086 * https://bugzilla.suse.com/show_bug.cgi?id=1234139 * https://bugzilla.suse.com/show_bug.cgi?id=1234140 * https://bugzilla.suse.com/show_bug.cgi?id=1234141 * https://bugzilla.suse.com/show_bug.cgi?id=1234142 * https://bugzilla.suse.com/show_bug.cgi?id=1234143 * https://bugzilla.suse.com/show_bug.cgi?id=1234144 * https://bugzilla.suse.com/show_bug.cgi?id=1234145 * https://bugzilla.suse.com/show_bug.cgi?id=1234146 * https://bugzilla.suse.com/show_bug.cgi?id=1234147 * https://bugzilla.suse.com/show_bug.cgi?id=1234148 * https://bugzilla.suse.com/show_bug.cgi?id=1234149 * https://bugzilla.suse.com/show_bug.cgi?id=1234150 * https://bugzilla.suse.com/show_bug.cgi?id=1234153 * https://bugzilla.suse.com/show_bug.cgi?id=1234155 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234158 * https://bugzilla.suse.com/show_bug.cgi?id=1234159 * https://bugzilla.suse.com/show_bug.cgi?id=1234160 * https://bugzilla.suse.com/show_bug.cgi?id=1234161 * https://bugzilla.suse.com/show_bug.cgi?id=1234162 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1234164 * https://bugzilla.suse.com/show_bug.cgi?id=1234165 * https://bugzilla.suse.com/show_bug.cgi?id=1234166 * https://bugzilla.suse.com/show_bug.cgi?id=1234167 * https://bugzilla.suse.com/show_bug.cgi?id=1234168 * https://bugzilla.suse.com/show_bug.cgi?id=1234169 * https://bugzilla.suse.com/show_bug.cgi?id=1234170 * https://bugzilla.suse.com/show_bug.cgi?id=1234171 * https://bugzilla.suse.com/show_bug.cgi?id=1234172 * https://bugzilla.suse.com/show_bug.cgi?id=1234173 * https://bugzilla.suse.com/show_bug.cgi?id=1234174 * https://bugzilla.suse.com/show_bug.cgi?id=1234175 * https://bugzilla.suse.com/show_bug.cgi?id=1234176 * https://bugzilla.suse.com/show_bug.cgi?id=1234177 * https://bugzilla.suse.com/show_bug.cgi?id=1234178 * https://bugzilla.suse.com/show_bug.cgi?id=1234179 * https://bugzilla.suse.com/show_bug.cgi?id=1234180 * https://bugzilla.suse.com/show_bug.cgi?id=1234181 * https://bugzilla.suse.com/show_bug.cgi?id=1234182 * https://bugzilla.suse.com/show_bug.cgi?id=1234183 * https://bugzilla.suse.com/show_bug.cgi?id=1234184 * https://bugzilla.suse.com/show_bug.cgi?id=1234185 * https://bugzilla.suse.com/show_bug.cgi?id=1234186 * https://bugzilla.suse.com/show_bug.cgi?id=1234187 * https://bugzilla.suse.com/show_bug.cgi?id=1234188 * https://bugzilla.suse.com/show_bug.cgi?id=1234189 * https://bugzilla.suse.com/show_bug.cgi?id=1234190 * https://bugzilla.suse.com/show_bug.cgi?id=1234191 * https://bugzilla.suse.com/show_bug.cgi?id=1234192 * https://bugzilla.suse.com/show_bug.cgi?id=1234193 * https://bugzilla.suse.com/show_bug.cgi?id=1234194 * https://bugzilla.suse.com/show_bug.cgi?id=1234195 * https://bugzilla.suse.com/show_bug.cgi?id=1234196 * https://bugzilla.suse.com/show_bug.cgi?id=1234197 * https://bugzilla.suse.com/show_bug.cgi?id=1234198 * https://bugzilla.suse.com/show_bug.cgi?id=1234199 * https://bugzilla.suse.com/show_bug.cgi?id=1234200 * https://bugzilla.suse.com/show_bug.cgi?id=1234201 * https://bugzilla.suse.com/show_bug.cgi?id=1234203 * https://bugzilla.suse.com/show_bug.cgi?id=1234204 * https://bugzilla.suse.com/show_bug.cgi?id=1234205 * https://bugzilla.suse.com/show_bug.cgi?id=1234207 * https://bugzilla.suse.com/show_bug.cgi?id=1234208 * https://bugzilla.suse.com/show_bug.cgi?id=1234209 * https://bugzilla.suse.com/show_bug.cgi?id=1234219 * https://bugzilla.suse.com/show_bug.cgi?id=1234220 * https://bugzilla.suse.com/show_bug.cgi?id=1234221 * https://bugzilla.suse.com/show_bug.cgi?id=1234237 * https://bugzilla.suse.com/show_bug.cgi?id=1234238 * https://bugzilla.suse.com/show_bug.cgi?id=1234239 * https://bugzilla.suse.com/show_bug.cgi?id=1234240 * https://bugzilla.suse.com/show_bug.cgi?id=1234241 * https://bugzilla.suse.com/show_bug.cgi?id=1234242 * https://bugzilla.suse.com/show_bug.cgi?id=1234243 * https://bugzilla.suse.com/show_bug.cgi?id=1234278 * https://bugzilla.suse.com/show_bug.cgi?id=1234279 * https://bugzilla.suse.com/show_bug.cgi?id=1234280 * https://bugzilla.suse.com/show_bug.cgi?id=1234281 * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1234294 * https://bugzilla.suse.com/show_bug.cgi?id=1234338 * https://bugzilla.suse.com/show_bug.cgi?id=1234357 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1234605 * https://bugzilla.suse.com/show_bug.cgi?id=1234619 * https://bugzilla.suse.com/show_bug.cgi?id=1234635 * https://bugzilla.suse.com/show_bug.cgi?id=1234651 * https://bugzilla.suse.com/show_bug.cgi?id=1234652 * https://bugzilla.suse.com/show_bug.cgi?id=1234654 * https://bugzilla.suse.com/show_bug.cgi?id=1234655 * https://bugzilla.suse.com/show_bug.cgi?id=1234657 * https://bugzilla.suse.com/show_bug.cgi?id=1234658 * https://bugzilla.suse.com/show_bug.cgi?id=1234659 * https://bugzilla.suse.com/show_bug.cgi?id=1234668 * https://bugzilla.suse.com/show_bug.cgi?id=1234683 * https://bugzilla.suse.com/show_bug.cgi?id=1234690 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234725 * https://bugzilla.suse.com/show_bug.cgi?id=1234726 * https://bugzilla.suse.com/show_bug.cgi?id=1234810 * https://bugzilla.suse.com/show_bug.cgi?id=1234811 * https://bugzilla.suse.com/show_bug.cgi?id=1234825 * https://bugzilla.suse.com/show_bug.cgi?id=1234826 * https://bugzilla.suse.com/show_bug.cgi?id=1234827 * https://bugzilla.suse.com/show_bug.cgi?id=1234829 * https://bugzilla.suse.com/show_bug.cgi?id=1234832 * https://bugzilla.suse.com/show_bug.cgi?id=1234834 * https://bugzilla.suse.com/show_bug.cgi?id=1234843 * https://bugzilla.suse.com/show_bug.cgi?id=1234846 * https://bugzilla.suse.com/show_bug.cgi?id=1234848 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234855 * https://bugzilla.suse.com/show_bug.cgi?id=1234856 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1234884 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1234888 * https://bugzilla.suse.com/show_bug.cgi?id=1234889 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234893 * https://bugzilla.suse.com/show_bug.cgi?id=1234898 * https://bugzilla.suse.com/show_bug.cgi?id=1234899 * https://bugzilla.suse.com/show_bug.cgi?id=1234900 * https://bugzilla.suse.com/show_bug.cgi?id=1234901 * https://bugzilla.suse.com/show_bug.cgi?id=1234905 * https://bugzilla.suse.com/show_bug.cgi?id=1234906 * https://bugzilla.suse.com/show_bug.cgi?id=1234907 * https://bugzilla.suse.com/show_bug.cgi?id=1234909 * https://bugzilla.suse.com/show_bug.cgi?id=1234911 * https://bugzilla.suse.com/show_bug.cgi?id=1234912 * https://bugzilla.suse.com/show_bug.cgi?id=1234916 * https://bugzilla.suse.com/show_bug.cgi?id=1234918 * https://bugzilla.suse.com/show_bug.cgi?id=1234920 * https://bugzilla.suse.com/show_bug.cgi?id=1234921 * https://bugzilla.suse.com/show_bug.cgi?id=1234922 * https://bugzilla.suse.com/show_bug.cgi?id=1234923 * https://bugzilla.suse.com/show_bug.cgi?id=1234929 * https://bugzilla.suse.com/show_bug.cgi?id=1234930 * https://bugzilla.suse.com/show_bug.cgi?id=1234931 * https://bugzilla.suse.com/show_bug.cgi?id=1234934 * https://bugzilla.suse.com/show_bug.cgi?id=1234937 * https://bugzilla.suse.com/show_bug.cgi?id=1234947 * https://bugzilla.suse.com/show_bug.cgi?id=1234948 * https://bugzilla.suse.com/show_bug.cgi?id=1234950 * https://bugzilla.suse.com/show_bug.cgi?id=1234952 * https://bugzilla.suse.com/show_bug.cgi?id=1234957 * https://bugzilla.suse.com/show_bug.cgi?id=1234960 * https://bugzilla.suse.com/show_bug.cgi?id=1234962 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1234968 * https://bugzilla.suse.com/show_bug.cgi?id=1234969 * https://bugzilla.suse.com/show_bug.cgi?id=1234970 * https://bugzilla.suse.com/show_bug.cgi?id=1234971 * https://bugzilla.suse.com/show_bug.cgi?id=1234973 * https://bugzilla.suse.com/show_bug.cgi?id=1234974 * https://bugzilla.suse.com/show_bug.cgi?id=1234989 * https://bugzilla.suse.com/show_bug.cgi?id=1234999 * https://bugzilla.suse.com/show_bug.cgi?id=1235000 * https://bugzilla.suse.com/show_bug.cgi?id=1235001 * https://bugzilla.suse.com/show_bug.cgi?id=1235002 * https://bugzilla.suse.com/show_bug.cgi?id=1235003 * https://bugzilla.suse.com/show_bug.cgi?id=1235004 * https://bugzilla.suse.com/show_bug.cgi?id=1235007 * https://bugzilla.suse.com/show_bug.cgi?id=1235009 * https://bugzilla.suse.com/show_bug.cgi?id=1235011 * https://bugzilla.suse.com/show_bug.cgi?id=1235016 * https://bugzilla.suse.com/show_bug.cgi?id=1235019 * https://bugzilla.suse.com/show_bug.cgi?id=1235031 * https://bugzilla.suse.com/show_bug.cgi?id=1235032 * https://bugzilla.suse.com/show_bug.cgi?id=1235033 * https://bugzilla.suse.com/show_bug.cgi?id=1235035 * https://bugzilla.suse.com/show_bug.cgi?id=1235037 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1235039 * https://bugzilla.suse.com/show_bug.cgi?id=1235040 * https://bugzilla.suse.com/show_bug.cgi?id=1235042 * https://bugzilla.suse.com/show_bug.cgi?id=1235043 * https://bugzilla.suse.com/show_bug.cgi?id=1235045 * https://bugzilla.suse.com/show_bug.cgi?id=1235046 * https://bugzilla.suse.com/show_bug.cgi?id=1235050 * https://bugzilla.suse.com/show_bug.cgi?id=1235051 * https://bugzilla.suse.com/show_bug.cgi?id=1235053 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235056 * https://bugzilla.suse.com/show_bug.cgi?id=1235057 * https://bugzilla.suse.com/show_bug.cgi?id=1235059 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235065 * https://bugzilla.suse.com/show_bug.cgi?id=1235070 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235075 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235108 * https://bugzilla.suse.com/show_bug.cgi?id=1235112 * https://bugzilla.suse.com/show_bug.cgi?id=1235115 * https://bugzilla.suse.com/show_bug.cgi?id=1235117 * https://bugzilla.suse.com/show_bug.cgi?id=1235122 * https://bugzilla.suse.com/show_bug.cgi?id=1235123 * https://bugzilla.suse.com/show_bug.cgi?id=1235125 * https://bugzilla.suse.com/show_bug.cgi?id=1235128 * https://bugzilla.suse.com/show_bug.cgi?id=1235132 * https://bugzilla.suse.com/show_bug.cgi?id=1235133 * https://bugzilla.suse.com/show_bug.cgi?id=1235134 * https://bugzilla.suse.com/show_bug.cgi?id=1235138 * https://bugzilla.suse.com/show_bug.cgi?id=1235155 * https://bugzilla.suse.com/show_bug.cgi?id=1235160 * https://bugzilla.suse.com/show_bug.cgi?id=1235217 * https://bugzilla.suse.com/show_bug.cgi?id=1235219 * https://bugzilla.suse.com/show_bug.cgi?id=1235220 * https://bugzilla.suse.com/show_bug.cgi?id=1235222 * https://bugzilla.suse.com/show_bug.cgi?id=1235223 * https://bugzilla.suse.com/show_bug.cgi?id=1235224 * https://bugzilla.suse.com/show_bug.cgi?id=1235227 * https://bugzilla.suse.com/show_bug.cgi?id=1235230 * https://bugzilla.suse.com/show_bug.cgi?id=1235241 * https://bugzilla.suse.com/show_bug.cgi?id=1235246 * https://bugzilla.suse.com/show_bug.cgi?id=1235249 * https://bugzilla.suse.com/show_bug.cgi?id=1235251 * https://bugzilla.suse.com/show_bug.cgi?id=1235252 * https://bugzilla.suse.com/show_bug.cgi?id=1235389 * https://bugzilla.suse.com/show_bug.cgi?id=1235390 * https://bugzilla.suse.com/show_bug.cgi?id=1235391 * https://bugzilla.suse.com/show_bug.cgi?id=1235406 * https://bugzilla.suse.com/show_bug.cgi?id=1235409 * https://bugzilla.suse.com/show_bug.cgi?id=1235410 * https://bugzilla.suse.com/show_bug.cgi?id=1235412 * https://bugzilla.suse.com/show_bug.cgi?id=1235413 * https://bugzilla.suse.com/show_bug.cgi?id=1235415 * https://bugzilla.suse.com/show_bug.cgi?id=1235416 * https://bugzilla.suse.com/show_bug.cgi?id=1235417 * https://bugzilla.suse.com/show_bug.cgi?id=1235418 * https://bugzilla.suse.com/show_bug.cgi?id=1235423 * https://bugzilla.suse.com/show_bug.cgi?id=1235424 * https://bugzilla.suse.com/show_bug.cgi?id=1235425 * https://bugzilla.suse.com/show_bug.cgi?id=1235426 * https://bugzilla.suse.com/show_bug.cgi?id=1235427 * https://bugzilla.suse.com/show_bug.cgi?id=1235428 * https://bugzilla.suse.com/show_bug.cgi?id=1235429 * https://bugzilla.suse.com/show_bug.cgi?id=1235430 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235437 * https://bugzilla.suse.com/show_bug.cgi?id=1235439 * https://bugzilla.suse.com/show_bug.cgi?id=1235444 * https://bugzilla.suse.com/show_bug.cgi?id=1235445 * https://bugzilla.suse.com/show_bug.cgi?id=1235449 * https://bugzilla.suse.com/show_bug.cgi?id=1235451 * https://bugzilla.suse.com/show_bug.cgi?id=1235454 * https://bugzilla.suse.com/show_bug.cgi?id=1235458 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235466 * https://bugzilla.suse.com/show_bug.cgi?id=1235473 * https://bugzilla.suse.com/show_bug.cgi?id=1235479 * https://bugzilla.suse.com/show_bug.cgi?id=1235480 * https://bugzilla.suse.com/show_bug.cgi?id=1235483 * https://bugzilla.suse.com/show_bug.cgi?id=1235486 * https://bugzilla.suse.com/show_bug.cgi?id=1235487 * https://bugzilla.suse.com/show_bug.cgi?id=1235488 * https://bugzilla.suse.com/show_bug.cgi?id=1235489 * https://bugzilla.suse.com/show_bug.cgi?id=1235491 * https://bugzilla.suse.com/show_bug.cgi?id=1235494 * https://bugzilla.suse.com/show_bug.cgi?id=1235495 * https://bugzilla.suse.com/show_bug.cgi?id=1235496 * https://bugzilla.suse.com/show_bug.cgi?id=1235497 * https://bugzilla.suse.com/show_bug.cgi?id=1235498 * https://bugzilla.suse.com/show_bug.cgi?id=1235500 * https://bugzilla.suse.com/show_bug.cgi?id=1235502 * https://bugzilla.suse.com/show_bug.cgi?id=1235503 * https://bugzilla.suse.com/show_bug.cgi?id=1235507 * https://bugzilla.suse.com/show_bug.cgi?id=1235519 * https://bugzilla.suse.com/show_bug.cgi?id=1235520 * https://bugzilla.suse.com/show_bug.cgi?id=1235521 * https://bugzilla.suse.com/show_bug.cgi?id=1235523 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235532 * https://bugzilla.suse.com/show_bug.cgi?id=1235533 * https://bugzilla.suse.com/show_bug.cgi?id=1235534 * https://bugzilla.suse.com/show_bug.cgi?id=1235537 * https://bugzilla.suse.com/show_bug.cgi?id=1235538 * https://bugzilla.suse.com/show_bug.cgi?id=1235545 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235552 * https://bugzilla.suse.com/show_bug.cgi?id=1235555 * https://bugzilla.suse.com/show_bug.cgi?id=1235557 * https://bugzilla.suse.com/show_bug.cgi?id=1235563 * https://bugzilla.suse.com/show_bug.cgi?id=1235564 * https://bugzilla.suse.com/show_bug.cgi?id=1235565 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1235570 * https://bugzilla.suse.com/show_bug.cgi?id=1235571 * https://bugzilla.suse.com/show_bug.cgi?id=1235577 * https://bugzilla.suse.com/show_bug.cgi?id=1235578 * https://bugzilla.suse.com/show_bug.cgi?id=1235582 * https://bugzilla.suse.com/show_bug.cgi?id=1235583 * https://bugzilla.suse.com/show_bug.cgi?id=1235584 * https://bugzilla.suse.com/show_bug.cgi?id=1235587 * https://bugzilla.suse.com/show_bug.cgi?id=1235611 * https://bugzilla.suse.com/show_bug.cgi?id=1235612 * https://bugzilla.suse.com/show_bug.cgi?id=1235616 * https://bugzilla.suse.com/show_bug.cgi?id=1235622 * https://bugzilla.suse.com/show_bug.cgi?id=1235627 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1235635 * https://bugzilla.suse.com/show_bug.cgi?id=1235638 * https://bugzilla.suse.com/show_bug.cgi?id=1235641 * https://bugzilla.suse.com/show_bug.cgi?id=1235643 * https://bugzilla.suse.com/show_bug.cgi?id=1235645 * https://bugzilla.suse.com/show_bug.cgi?id=1235646 * https://bugzilla.suse.com/show_bug.cgi?id=1235647 * https://bugzilla.suse.com/show_bug.cgi?id=1235650 * https://bugzilla.suse.com/show_bug.cgi?id=1235653 * https://bugzilla.suse.com/show_bug.cgi?id=1235656 * https://bugzilla.suse.com/show_bug.cgi?id=1235657 * https://bugzilla.suse.com/show_bug.cgi?id=1235663 * https://bugzilla.suse.com/show_bug.cgi?id=1235686 * https://bugzilla.suse.com/show_bug.cgi?id=1235700 * https://bugzilla.suse.com/show_bug.cgi?id=1235705 * https://bugzilla.suse.com/show_bug.cgi?id=1235707 * https://bugzilla.suse.com/show_bug.cgi?id=1235708 * https://bugzilla.suse.com/show_bug.cgi?id=1235710 * https://bugzilla.suse.com/show_bug.cgi?id=1235714 * https://bugzilla.suse.com/show_bug.cgi?id=1235716 * https://bugzilla.suse.com/show_bug.cgi?id=1235720 * https://bugzilla.suse.com/show_bug.cgi?id=1235723 * https://bugzilla.suse.com/show_bug.cgi?id=1235727 * https://bugzilla.suse.com/show_bug.cgi?id=1235730 * https://bugzilla.suse.com/show_bug.cgi?id=1235737 * https://bugzilla.suse.com/show_bug.cgi?id=1235739 * https://bugzilla.suse.com/show_bug.cgi?id=1235745 * https://bugzilla.suse.com/show_bug.cgi?id=1235747 * https://bugzilla.suse.com/show_bug.cgi?id=1235750 * https://bugzilla.suse.com/show_bug.cgi?id=1235753 * https://bugzilla.suse.com/show_bug.cgi?id=1235759 * https://bugzilla.suse.com/show_bug.cgi?id=1235764 * https://bugzilla.suse.com/show_bug.cgi?id=1235768 * https://bugzilla.suse.com/show_bug.cgi?id=1235776 * https://bugzilla.suse.com/show_bug.cgi?id=1235777 * https://bugzilla.suse.com/show_bug.cgi?id=1235778 * https://bugzilla.suse.com/show_bug.cgi?id=1235779 * https://bugzilla.suse.com/show_bug.cgi?id=1235793 * https://bugzilla.suse.com/show_bug.cgi?id=1235798 * https://bugzilla.suse.com/show_bug.cgi?id=1235806 * https://bugzilla.suse.com/show_bug.cgi?id=1235808 * https://bugzilla.suse.com/show_bug.cgi?id=1235812 * https://bugzilla.suse.com/show_bug.cgi?id=1235814 * https://bugzilla.suse.com/show_bug.cgi?id=1235818 * https://bugzilla.suse.com/show_bug.cgi?id=1235842 * https://bugzilla.suse.com/show_bug.cgi?id=1235865 * https://bugzilla.suse.com/show_bug.cgi?id=1235894 * https://bugzilla.suse.com/show_bug.cgi?id=1235902 * https://bugzilla.suse.com/show_bug.cgi?id=1235903 * https://bugzilla.suse.com/show_bug.cgi?id=1235906 * https://bugzilla.suse.com/show_bug.cgi?id=1235918 * https://bugzilla.suse.com/show_bug.cgi?id=1235919 * https://bugzilla.suse.com/show_bug.cgi?id=1235920 * https://bugzilla.suse.com/show_bug.cgi?id=1235924 * https://bugzilla.suse.com/show_bug.cgi?id=1235940 * https://bugzilla.suse.com/show_bug.cgi?id=1235941 * https://bugzilla.suse.com/show_bug.cgi?id=1235946 * https://bugzilla.suse.com/show_bug.cgi?id=1235948 * https://bugzilla.suse.com/show_bug.cgi?id=1235952 * https://bugzilla.suse.com/show_bug.cgi?id=1235964 * https://bugzilla.suse.com/show_bug.cgi?id=1235965 * https://bugzilla.suse.com/show_bug.cgi?id=1235967 * https://bugzilla.suse.com/show_bug.cgi?id=1235969 * https://bugzilla.suse.com/show_bug.cgi?id=1235976 * https://bugzilla.suse.com/show_bug.cgi?id=1235977 * https://bugzilla.suse.com/show_bug.cgi?id=1236078 * https://bugzilla.suse.com/show_bug.cgi?id=1236080 * https://bugzilla.suse.com/show_bug.cgi?id=1236082 * https://bugzilla.suse.com/show_bug.cgi?id=1236088 * https://bugzilla.suse.com/show_bug.cgi?id=1236090 * https://bugzilla.suse.com/show_bug.cgi?id=1236091 * https://bugzilla.suse.com/show_bug.cgi?id=1236096 * https://bugzilla.suse.com/show_bug.cgi?id=1236097 * https://bugzilla.suse.com/show_bug.cgi?id=1236098 * https://bugzilla.suse.com/show_bug.cgi?id=1236101 * https://bugzilla.suse.com/show_bug.cgi?id=1236102 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236106 * https://bugzilla.suse.com/show_bug.cgi?id=1236120 * https://bugzilla.suse.com/show_bug.cgi?id=1236125 * https://bugzilla.suse.com/show_bug.cgi?id=1236127 * https://bugzilla.suse.com/show_bug.cgi?id=1236131 * https://bugzilla.suse.com/show_bug.cgi?id=1236138 * https://bugzilla.suse.com/show_bug.cgi?id=1236143 * https://bugzilla.suse.com/show_bug.cgi?id=1236144 * https://bugzilla.suse.com/show_bug.cgi?id=1236145 * https://bugzilla.suse.com/show_bug.cgi?id=1236160 * https://bugzilla.suse.com/show_bug.cgi?id=1236161 * https://bugzilla.suse.com/show_bug.cgi?id=1236163 * https://bugzilla.suse.com/show_bug.cgi?id=1236168 * https://bugzilla.suse.com/show_bug.cgi?id=1236178 * https://bugzilla.suse.com/show_bug.cgi?id=1236180 * https://bugzilla.suse.com/show_bug.cgi?id=1236181 * https://bugzilla.suse.com/show_bug.cgi?id=1236182 * https://bugzilla.suse.com/show_bug.cgi?id=1236190 * https://bugzilla.suse.com/show_bug.cgi?id=1236192 * https://bugzilla.suse.com/show_bug.cgi?id=1236198 * https://bugzilla.suse.com/show_bug.cgi?id=1236227 * https://bugzilla.suse.com/show_bug.cgi?id=1236245 * https://bugzilla.suse.com/show_bug.cgi?id=1236247 * https://bugzilla.suse.com/show_bug.cgi?id=1236248 * https://bugzilla.suse.com/show_bug.cgi?id=1236260 * https://bugzilla.suse.com/show_bug.cgi?id=1236262 * https://bugzilla.suse.com/show_bug.cgi?id=1236628 * https://bugzilla.suse.com/show_bug.cgi?id=1236688 * https://bugzilla.suse.com/show_bug.cgi?id=1236696 * https://bugzilla.suse.com/show_bug.cgi?id=1236703 * https://bugzilla.suse.com/show_bug.cgi?id=1236732 * https://bugzilla.suse.com/show_bug.cgi?id=1236733 * https://jira.suse.com/browse/PED-10467 * https://jira.suse.com/browse/PED-7242 * https://jira.suse.com/browse/PED-8645 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:42:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:42:56 -0000 Subject: SUSE-RU-2025:20162-1: important: Recommended update for supportutils Message-ID: <174902657631.28531.2854013465534124472@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2025:20162-1 Release Date: 2025-03-25T09:26:25Z Rating: important References: * bsc#1213291 * bsc#1220082 * bsc#1222021 * bsc#1222896 * bsc#1227127 * bsc#1228265 * bsc#1231396 * bsc#1231423 * bsc#1233726 * jsc#PED-11669 * jsc#PED-8211 * jsc#PED-8221 Affected Products: * SUSE Linux Micro 6.0 An update that contains three features and has nine fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.9 * Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291,jsc#PED-8221) * Supportconfig available in current distro (PED-7131) * Corrected display issues (bsc#1231396) * NFS takes too long, showmount times out (bsc#1231423) * Merged sle15 and master branches (bsc#1233726, jsc#PED-11669) * Changes to version 3.2.8 * Update supportconfig get pam.d sorted * yast_files: Exclude .zcat * Sanitize grub bootloader (bsc#1227127) * Sanitize regcodes * Improve product detection * Add read_values for s390x (bsc#1228265,) * hardware_info: Remove old alsa ver check * drbd_info: Fix incorrect escape of quotes * Changes in version 3.1.30 * Added -V key:value pair option (bsc#1222021,jsc#PED-8211) * Avoid getting duplicate kernel verifications in boot.text * Suppress file descriptor leak warnings from lvm commands (bsc#1220082) * Includes container log timestamps ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-261=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * supportutils-3.2.9-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213291 * https://bugzilla.suse.com/show_bug.cgi?id=1220082 * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1222896 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://bugzilla.suse.com/show_bug.cgi?id=1231396 * https://bugzilla.suse.com/show_bug.cgi?id=1231423 * https://bugzilla.suse.com/show_bug.cgi?id=1233726 * https://jira.suse.com/browse/PED-11669 * https://jira.suse.com/browse/PED-8211 * https://jira.suse.com/browse/PED-8221 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:42:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:42:58 -0000 Subject: SUSE-SU-2025:20161-1: moderate: Security update for libX11 Message-ID: <174902657829.28531.12228950645423978686@smelt2.prg2.suse.org> # Security update for libX11 Announcement ID: SUSE-SU-2025:20161-1 Release Date: 2025-03-25T09:13:44Z Rating: moderate References: * bsc#1237431 Cross-References: * CVE-2025-26597 CVSS scores: * CVE-2025-26597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-26597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libX11 fixes the following issues: * CVE-2025-26597: Fixed buffer overflow in XkbChangeTypesOfKey() (bsc#1237431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-260=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libX11-xcb1-debuginfo-1.8.7-3.1 * libX11-6-1.8.7-3.1 * libX11-debugsource-1.8.7-3.1 * libX11-6-debuginfo-1.8.7-3.1 * libX11-xcb1-1.8.7-3.1 * SUSE Linux Micro 6.0 (noarch) * libX11-data-1.8.7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26597.html * https://bugzilla.suse.com/show_bug.cgi?id=1237431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:04 -0000 Subject: SUSE-SU-2025:20160-1: important: Security update for openssh Message-ID: <174902658425.28531.6511913954543805587@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20160-1 Release Date: 2025-03-25T09:02:43Z Rating: important References: * bsc#1186673 * bsc#1213004 * bsc#1213008 * bsc#1221063 * bsc#1221928 * bsc#1222840 * bsc#1225904 * bsc#1227456 * bsc#1229010 * bsc#1229072 * bsc#1229449 * bsc#1236826 * bsc#1237040 * bsc#1237041 Cross-References: * CVE-2025-26465 * CVE-2025-26466 CVSS scores: * CVE-2025-26465 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-26466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has 12 fixes can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040). * CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041). Other bugfixes: * Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). * Add #include in some files added by the ldap patch to fix build with gcc14 (bsc#1225904). * Added missing struct initializer, added missing parameter (bsc#1222840). * Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by upstream (bsc#1221928). * Use %config(noreplace) for sshd_config. In any case, it's recommended to drop a file in sshd_config.d instead of editing sshd_config (bsc#1221063). * Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow (bsc#1229449). * Drop keycat binary that is not supported, except of the code that is used by other SELinux patches (bsc#1229072). * Fix RFC4256 implementation that keyboard-interactive authentication method can send instructions and sshd shows them to users (bsc#1229010). * Add attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1186673, bsc#1213004, bsc#1213008). * Remove empty line at the end of sshd-sle.pamd (bsc#1227456) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-259=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssh-server-config-rootlogin-9.6p1-3.1 * openssh-common-debuginfo-9.6p1-3.1 * openssh-fips-9.6p1-3.1 * openssh-debugsource-9.6p1-3.1 * openssh-debuginfo-9.6p1-3.1 * openssh-clients-9.6p1-3.1 * openssh-9.6p1-3.1 * openssh-clients-debuginfo-9.6p1-3.1 * openssh-server-9.6p1-3.1 * openssh-common-9.6p1-3.1 * openssh-server-debuginfo-9.6p1-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26465.html * https://www.suse.com/security/cve/CVE-2025-26466.html * https://bugzilla.suse.com/show_bug.cgi?id=1186673 * https://bugzilla.suse.com/show_bug.cgi?id=1213004 * https://bugzilla.suse.com/show_bug.cgi?id=1213008 * https://bugzilla.suse.com/show_bug.cgi?id=1221063 * https://bugzilla.suse.com/show_bug.cgi?id=1221928 * https://bugzilla.suse.com/show_bug.cgi?id=1222840 * https://bugzilla.suse.com/show_bug.cgi?id=1225904 * https://bugzilla.suse.com/show_bug.cgi?id=1227456 * https://bugzilla.suse.com/show_bug.cgi?id=1229010 * https://bugzilla.suse.com/show_bug.cgi?id=1229072 * https://bugzilla.suse.com/show_bug.cgi?id=1229449 * https://bugzilla.suse.com/show_bug.cgi?id=1236826 * https://bugzilla.suse.com/show_bug.cgi?id=1237040 * https://bugzilla.suse.com/show_bug.cgi?id=1237041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:06 -0000 Subject: SUSE-RU-2025:20159-1: moderate: Recommended update for transactional-update Message-ID: <174902658686.28531.3654080403589598060@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2025:20159-1 Release Date: 2025-03-25T02:36:04Z Rating: moderate References: * bsc#1230537 * bsc#1230901 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for transactional-update fixes the following issues: * Version update from 4.8.1 to 4.8.3: * Check return value of register command (bsc#1230901) * Allow specifying only low value with setup-kdump (bsc#1230537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-258=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * transactional-update-zypp-config-4.8.3-1.1 * dracut-transactional-update-4.8.3-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * tukitd-4.8.3-1.1 * tukitd-debuginfo-4.8.3-1.1 * tukit-4.8.3-1.1 * transactional-update-4.8.3-1.1 * libtukit4-4.8.3-1.1 * libtukit4-debuginfo-4.8.3-1.1 * tukit-debuginfo-4.8.3-1.1 * transactional-update-debuginfo-4.8.3-1.1 * transactional-update-debugsource-4.8.3-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230537 * https://bugzilla.suse.com/show_bug.cgi?id=1230901 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:08 -0000 Subject: SUSE-SU-2025:20158-1: important: Security update for ucode-intel Message-ID: <174902658859.28531.4717389292953956716@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20158-1 Release Date: 2025-03-24T12:15:39Z Rating: important References: * bsc#1237096 Cross-References: * CVE-2024-31068 * CVE-2024-36293 * CVE-2024-37020 * CVE-2024-39355 CVSS scores: * CVE-2024-31068 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-31068 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-31068 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31068 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36293 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-36293 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-37020 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-37020 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-39355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39355 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-39355 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-39355 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20250211 release (bsc#1237096) * Security updates for INTEL-SA-01166 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01166.html * CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware Logic for some Intel Processors may allow privileged user to potentially enable denial of service via local access. * Security updates for INTEL-SA-01213 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01213.html * CVE-2024-36293: A potential security vulnerability in some Intel Software Guard Extensions (Intel SGX) Platforms may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01139 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01139.html * not clear which CVEs are fixed here, and which are in UEFI BIOS updates. * Security updates for INTEL-SA-01228 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01228.html * CVE-2024-39355: A potential security vulnerability in some 13th and 14th Generation Intel Core Processors may allow denial of service. Intel is releasing microcode and UEFI reference code updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01194 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01194.html * CVE-2024-37020: A potential security vulnerability in the Intel Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors may allow denial of service. Intel is releasing software updates to mitigate this potential vulnerability. * Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details. * Update for functional issues. Refer to 13th/14th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details. * Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details. * Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details. * Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details. * Update for functional issues. Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details. * Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details. * Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details. * Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details. * Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details. * Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details ### New Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products SRF-SP C0 06-af-03/01 03000330 Xeon 6700-Series Processors with E-Cores ### Updated Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000037 00000038 Core Gen12 ADL H0 06-97-05/07 00000037 00000038 Core Gen12 ADL L0 06-9a-03/80 00000435 00000436 Core Gen12 ADL R0 06-9a-04/80 00000435 00000436 Core Gen12 ADL-N N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E AZB A0/R0 06-9a-04/40 00000007 00000009 Intel(R) Atom(R) C1100 CFL-H R0 06-9e-0d/22 00000100 00000102 Core Gen9 Mobile CFL-H/S/E3 U0 06-9e-0a/22 000000f8 000000fa Core Gen8 Desktop, Mobile, Xeon E EMR-SP A0 06-cf-01/87 21000283 21000291 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000283 21000291 Xeon Scalable Gen5 ICL-D B0 06-6c-01/10 010002b0 010002c0 Xeon D-17xx, D-27xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 0d0003f5 Xeon Scalable Gen3 RPL-E/HX/S B0 06-b7-01/32 0000012b 0000012c Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004123 00004124 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000037 00000038 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004123 00004124 Core Gen13 RPL-S H0 06-bf-05/07 00000037 00000038 Core Gen13/Gen14 RKL-S B0 06-a7-01/02 00000062 00000063 Core Gen11 SPR-HBM Bx 06-8f-08/10 2c000390 2c0003e0 Xeon Max SPR-SP E4/S2 06-8f-07/87 2b000603 2b000620 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b000603 2b000620 Xeon Scalable Gen4 TWL N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E ### New Disclosures Updated in Prior Releases Processor Stepping F-M-S/PI Old Ver New Ver Products CFL-H/S P0 06-9e-0c/22 000000f6 000000f8 Core Gen9 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-257=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20250211-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31068.html * https://www.suse.com/security/cve/CVE-2024-36293.html * https://www.suse.com/security/cve/CVE-2024-37020.html * https://www.suse.com/security/cve/CVE-2024-39355.html * https://bugzilla.suse.com/show_bug.cgi?id=1237096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:12 -0000 Subject: SUSE-SU-2025:20157-1: moderate: Security update for gnutls Message-ID: <174902659274.28531.4380667847680840124@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:20157-1 Release Date: 2025-03-24T09:53:37Z Rating: moderate References: * bsc#1236974 Cross-References: * CVE-2024-12243 CVSS scores: * CVE-2024-12243 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-12243 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-12243 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-12243: Fixed inefficient DER decoding in libtasn1 which could lead to a remote denial-of-service (bsc#1236974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-256=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gnutls-3.8.3-3.1 * gnutls-debuginfo-3.8.3-3.1 * gnutls-debugsource-3.8.3-3.1 * libgnutls30-3.8.3-3.1 * libgnutls30-debuginfo-3.8.3-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12243.html * https://bugzilla.suse.com/show_bug.cgi?id=1236974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:17 -0000 Subject: SUSE-SU-2025:20156-1: moderate: Security update for python-Jinja2 Message-ID: <174902659771.28531.5125964080109567439@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20156-1 Release Date: 2025-03-24T09:51:17Z Rating: moderate References: * bsc#1238879 Cross-References: * CVE-2025-27516 CVSS scores: * CVE-2025-27516 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-27516 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27516 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-255=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-Jinja2-3.1.2-8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27516.html * https://bugzilla.suse.com/show_bug.cgi?id=1238879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:20 -0000 Subject: SUSE-SU-2025:20155-1: important: Security update for protobuf Message-ID: <174902660086.28531.4582090556264236934@smelt2.prg2.suse.org> # Security update for protobuf Announcement ID: SUSE-SU-2025:20155-1 Release Date: 2025-03-20T10:44:07Z Rating: important References: * bsc#1223947 Cross-References: * CVE-2024-2410 CVSS scores: * CVE-2024-2410 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for protobuf fixes the following issues: * CVE-2024-2410: Fixed use after free when parsing JSON from a stream (bsc#1223947). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-254=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libprotobuf-lite23_4_0-debuginfo-23.4-9.1 * libprotobuf23_4_0-debuginfo-23.4-9.1 * libprotobuf23_4_0-23.4-9.1 * libprotobuf-lite23_4_0-23.4-9.1 * protobuf-debugsource-23.4-9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2410.html * https://bugzilla.suse.com/show_bug.cgi?id=1223947 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:32 -0000 Subject: SUSE-SU-2025:20154-1: important: Security update for python311 Message-ID: <174902661257.28531.12570405169180212462@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:20154-1 Release Date: 2025-03-19T11:45:10Z Rating: important References: * bsc#1174091 * bsc#1210638 * bsc#1219559 * bsc#1219666 * bsc#1221854 * bsc#1225660 * bsc#1226447 * bsc#1226448 * bsc#1227378 * bsc#1227999 * bsc#1228165 * bsc#1228780 * bsc#1229596 * bsc#1229704 * bsc#1230227 * bsc#1230906 * bsc#1231795 * bsc#1232241 * bsc#1236705 * bsc#1238450 * bsc#1239210 * bsc#831629 Cross-References: * CVE-2019-20907 * CVE-2019-9947 * CVE-2020-15523 * CVE-2020-15801 * CVE-2022-25236 * CVE-2023-27043 * CVE-2023-52425 * CVE-2023-6597 * CVE-2024-0397 * CVE-2024-0450 * CVE-2024-4030 * CVE-2024-4032 * CVE-2024-6232 * CVE-2024-6923 * CVE-2024-7592 * CVE-2024-8088 * CVE-2024-9287 * CVE-2025-0938 * CVE-2025-1795 CVSS scores: * CVE-2019-20907 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2019-20907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-9947 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2020-15523 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-15801 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6597 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0397 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0397 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-0450 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0450 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4030 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-6923 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9287 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9287 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0938 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-0938 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-1795 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves 19 vulnerabilities and has three fixes can now be installed. ## Description: This update for python311 fixes the following issues: * Skip PGO with %want_reproducible_builds (bsc#1239210) * CVE-2025-0938: Disallows square brackets ([ and ]) in domain names for parsed URLs (bsc#1236705). * Configure externally_managed with a bcond (bsc#1228165). * Update to 3.11.11: * Tools/Demos * gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15 and multissltests to use 3.0.15, 3.1.7, and 3.2.3. * Tests * gh-125041: Re-enable skipped tests for zlib on the s390x architecture: only skip checks of the compressed bytes, which can be different between zlib?s software implementation and the hardware-accelerated implementation. * Security * gh-126623: Upgrade libexpat to 2.6.4 * gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to consistently use the mapped IPv4 address value for deciding properties. Properties which have their behavior fixed are is_multicast, is_reserved, is_link_local, is_global, and is_unspecified. * Library * gh-124651: Properly quote template strings in venv activation scripts (bsc#1232241, CVE-2024-9287). * Remove -IVendor/ from python-config (bsc#1231795) * CVE-2024-9287: Properly quote path names provided when creating a virtual environment (bsc#1232241) * Drop .pyc files from docdir for reproducible builds (bsc#1230906). * Update to 3.11.10: * Security * gh-123678: Upgrade libexpat to 2.6.3 * gh-121957: Fixed missing audit events around interactive use of Python, now also properly firing for `python -i`, as well as for `python -m asyncio`. The event in question is `cpython.run_stdin`. * gh-122133: Authenticate the socket connection for the `socket.socketpair()` fallback on platforms where `AF_UNIX` is not available like Windows. Patch by Gregory P. Smith and Seth Larson . Reported by Ellie * gh-121285: Remove backtracking from tarfile header parsing for `hdrcharset`, PAX, and GNU sparse headers (bsc#1230227, CVE-2024-6232). * gh-118486: :func:`os.mkdir` on Windows now accepts _mode_ of `0o700` to restrict the new directory to the current user. This fixes CVE-2024-4030 affecting :func:`tempfile.mkdtemp` in scenarios where the base temporary directory is more permissive than the default. * gh-116741: Update bundled libexpat to 2.6.2 * Library * gh-123270: Applied a more surgical fix for malformed payloads in :class:`zipfile.Path` causing infinite loops (gh-122905) without breaking contents using legitimate characters (bsc#1229704, CVE-2024-8088). * gh-123067: Fix quadratic complexity in parsing `"`-quoted cookie values with backslashes by :mod:`http.cookies` (bsc#1229596, CVE-2024-7592). * gh-122905: :class:`zipfile.Path` objects now sanitize names from the zipfile. * gh-121650: :mod:`email` headers with embedded newlines are now quoted on output. The :mod:`~email.generator` will now refuse to serialize (write) headers that are unsafely folded or delimited; see :attr:`~email.policy.Policy.verify_generated_headers`. (Contributed by Bas Bloemsaat and Petr Viktorin in :gh:`121650`; CVE-2024-6923, bsc#1228780). * gh-119506: Fix :meth:`!io.TextIOWrapper.write` method breaks internal buffer when the method is called again during flushing internal buffer. * gh-118643: Fix an AttributeError in the :mod:`email` module when re-fold a long address list. Also fix more cases of incorrect encoding of the address separator in the address list. * gh-113171: Fixed various false positives and false negatives in * :attr:`ipaddress.IPv4Address.is_private` (see these docs for details) * :attr:`ipaddress.IPv4Address.is_global` * :attr:`ipaddress.IPv6Address.is_private` * :attr:`ipaddress.IPv6Address.is_global` Also in the corresponding :class:`ipaddress.IPv4Network` and :class:`ipaddress.IPv6Network` attributes. Fixes bsc#1226448 (CVE-2024-4032). * gh-102988: :func:`email.utils.getaddresses` and :func:`email.utils.parseaddr` now return `('', '')` 2-tuples in more situations where invalid email addresses are encountered instead of potentially inaccurate values. Add optional _strict_ parameter to these two functions: use `strict=False` to get the old behavior, accept malformed inputs. `getattr(email.utils, 'supports_strict_parsing', False)` can be use to check if the _strict_ paramater is available. Patch by Thomas Dwyer and Victor Stinner to improve the CVE-2023-27043 fix (bsc#1210638). * gh-67693: Fix :func:`urllib.parse.urlunparse` and :func:`urllib.parse.urlunsplit` for URIs with path starting with multiple slashes and no authority. Based on patch by Ashwin Ramaswami. * Core and Builtins * gh-112275: A deadlock involving `pystate.c`'s `HEAD_LOCK` in `posixmodule.c` at fork is now fixed. Patch by ChuBoning based on previous Python 3.12 fix by Victor Stinner. * gh-109120: Added handle of incorrect star expressions, e.g `f(3, *)`. Patch by Grigoryev Semyon * CVE-2024-8088: Prevent malformed payload to cause infinite loops in zipfile.Path (bsc#1229704). * Make pip and modern tools install directly in /usr/local when used by the user. (bsc#1225660). * CVE-2024-4032: Fix rearranging definition of private v global IP addresses (bsc#1226448). * Update to 3.11.9: * Security * gh-115398: Allow controlling Expat >=2.6.0 reparse deferral (CVE-2023-52425, bsc#1219559) by adding five new methods: xml.etree.ElementTree.XMLParser.flush() xml.etree.ElementTree.XMLPullParser.flush() xml.parsers.expat.xmlparser.GetReparseDeferralEnabled() xml.parsers.expat.xmlparser.SetReparseDeferralEnabled() xml.sax.expatreader.ExpatParser.flush() * gh-115399: Update bundled libexpat to 2.6.0 * gh-115243: Fix possible crashes in collections.deque.index() when the deque is concurrently modified. * gh-114572: ssl.SSLContext.cert_store_stats() and ssl.SSLContext.get_ca_certs() now correctly lock access to the certificate store, when the ssl.SSLContext is shared across multiple threads (bsc#1226447, CVE-2024-0397). * Core and Builtins * gh-116296: Fix possible refleak in object. **reduce** () internal error handling. * gh-116034: Fix location of the error on a failed assertion. * gh-115823: Properly calculate error ranges in the parser when raising SyntaxError exceptions caused by invalid byte sequences. Patch by Pablo Galindo * gh-112087: For an empty reverse iterator for list will be reduced to reversed(). Patch by Donghee Na. * gh-115011: Setters for members with an unsigned integer type now support the same range of valid values for objects that has a **index** () method as for int. * gh-96497: Fix incorrect resolution of mangled class variables used in assignment expressions in comprehensions. * Library * gh-117310: Fixed an unlikely early & extra Py_DECREF triggered crash in ssl when creating a new _ssl._SSLContext if CPython was built implausibly such that the default cipher list is empty or the SSL library it was linked against reports a failure from its C SSL_CTX_set_cipher_list() API. * gh-117178: Fix regression in lazy loading of self-referential modules, introduced in gh-114781. * gh-117084: Fix zipfile extraction for directory entries with the name containing backslashes on Windows. * gh-117110: Fix a bug that prevents subclasses of typing.Any to be instantiated with arguments. Patch by Chris Fu. * gh-90872: On Windows, subprocess.Popen.wait() no longer calls WaitForSingleObject() with a negative timeout: pass 0 ms if the timeout is negative. Patch by Victor Stinner. * gh-116957: configparser: Don?t leave ConfigParser values in an invalid state (stored as a list instead of a str) after an earlier read raised DuplicateSectionError or DuplicateOptionError. * gh-90095: Ignore empty lines and comments in .pdbrc * gh-116764: Restore support of None and other false values in urllib.parse functions parse_qs() and parse_qsl(). Also, they now raise a TypeError for non-zero integers and non-empty sequences. * gh-116811: In PathFinder.invalidate_caches, delegate to MetadataPathFinder.invalidate_caches. * gh-116600: Fix repr() for global Flag members. * gh-116484: Change automatically generated tkinter.Checkbutton widget names to avoid collisions with automatically generated tkinter.ttk.Checkbutton widget names within the same parent widget. * gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on opening named pipe. * gh-116143: Fix a race in pydoc _start_server, eliminating a window in which _start_server can return a thread that is ?serving? but without a docserver set. * gh-116325: typing: raise SyntaxError instead of AttributeError on forward references as empty strings. * gh-90535: Fix support of interval values > 1 in logging.TimedRotatingFileHandler for when='MIDNIGHT' and when='Wx'. * gh-115978: Disable preadv(), readv(), pwritev(), and writev() on WASI. * Under wasmtime for WASI 0.2, these functions don?t pass test_posix (https://github.com/bytecodealliance/wasmtime/issues/7830). * gh-88352: Fix the computation of the next rollover time in the logging.TimedRotatingFileHandler handler. computeRollover() now always returns a timestamp larger than the specified time and works correctly during the DST change. doRollover() no longer overwrite the already rolled over file, saving from data loss when run at midnight or during repeated time at the DST change. * gh-87115: Set **main**. **spec** to None when running a script with pdb * gh-76511: Fix UnicodeEncodeError in email.Message.as_string() that results when a message that claims to be in the ascii character set actually has non-ascii characters. Non-ascii characters are now replaced with the U+FFFD replacement character, like in the replace error handler. * gh-75988: Fixed unittest.mock.create_autospec() to pass the call through to the wrapped object to return the real result. * gh-115881: Fix issue where ast.parse() would incorrectly flag conditional context managers (such as with (x() if y else z()): ...) as invalid syntax if feature_version=(3, 8) was passed. This reverts changes to the grammar made as part of gh-94949. * gh-115886: Fix silent truncation of the name with an embedded null character in multiprocessing.shared_memory.SharedMemory. * gh-115809: Improve algorithm for computing which rolled-over log files to delete in logging.TimedRotatingFileHandler. It is now reliable for handlers without namer and with arbitrary deterministic namer that leaves the datetime part in the file name unmodified. * gh-74668: urllib.parse functions parse_qs() and parse_qsl() now support bytes arguments containing raw and percent-encoded non-ASCII data. * gh-67044: csv.writer() now always quotes or escapes '\r' and '\n', regardless of lineterminator value. * gh-115712: csv.writer() now quotes empty fields if delimiter is a space and skipinitialspace is true and raises exception if quoting is not possible. * gh-115618: Fix improper decreasing the reference count for None argument in property methods getter(), setter() and deleter(). * gh-115570: A DeprecationWarning is no longer omitted on access to the **doc** attributes of the deprecated typing.io and typing.re pseudo-modules. * gh-112006: Fix inspect.unwrap() for types with the **wrapper** data descriptor. * gh-101293: Support callables with the **call** () method and types with **new** () and **init** () methods set to class methods, static methods, bound methods, partial functions, and other types of methods and descriptors in inspect.Signature.from_callable(). * gh-115392: Fix a bug in doctest where incorrect line numbers would be reported for decorated functions. * gh-114563: Fix several format() bugs when using the C implementation of Decimal: * memory leak in some rare cases when using the z format option (coerce negative 0) * incorrect output when applying the z format option to type F (fixed-point with capital NAN / INF) * incorrect output when applying the # format option (alternate form) * gh-115197: urllib.request no longer resolves the hostname before checking it against the system?s proxy bypass list on macOS and Windows. * gh-115198: Fix support of Docutils >= 0.19 in distutils. * gh-115165: Most exceptions are now ignored when attempting to set the **orig_class** attribute on objects returned when calling typing generic aliases (including generic aliases created using typing.Annotated). Previously only AttributeError was ignored. Patch by Dave Shawley. * gh-115133: Fix tests for XMLPullParser with Expat 2.6.0. * gh-115059: io.BufferedRandom.read1() now flushes the underlying write buffer. * gh-79382: Trailing ** no longer allows to match files and non-existing paths in recursive glob(). * gh-114763: Protect modules loaded with importlib.util.LazyLoader from race conditions when multiple threads try to access attributes before the loading is complete. * gh-97959: Fix rendering class methods, bound methods, method and function aliases in pydoc. Class methods no longer have ?method of builtins.type instance? note. Corresponding notes are now added for class and unbound methods. Method and function aliases now have references to the module or the class where the origin was defined if it differs from the current. Bound methods are now listed in the static methods section. Methods of builtin classes are now supported as well as methods of Python classes. * gh-112281: Allow creating union of types for typing.Annotated with unhashable metadata. * gh-111775: Fix importlib.resources.simple.ResourceHandle.open() for text mode, added missed stream argument. * gh-90095: Make .pdbrc and -c work with any valid pdb commands. * gh-107155: Fix incorrect output of help(x) where x is a lambda function, which has an **annotations** dictionary attribute with a "return" key. * gh-105866: Fixed _get_slots bug which caused error when defining dataclasses with slots and a weakref_slot. * gh-60346: Fix ArgumentParser inconsistent with parse_known_args. * gh-100985: Update HTTPSConnection to consistently wrap IPv6 Addresses when using a proxy. * gh-100884: email: fix misfolding of comma in address-lists over multiple lines in combination with unicode encoding (bsc#1238450 CVE-2025-1795) * gh-95782: Fix io.BufferedReader.tell(), io.BufferedReader.seek(), _pyio.BufferedReader.tell(), io.BufferedRandom.tell(), io.BufferedRandom.seek() and _pyio.BufferedRandom.tell() being able to return negative offsets. * gh-96310: Fix a traceback in argparse when all options in a mutually exclusive group are suppressed. * gh-93205: Fixed a bug in logging.handlers.TimedRotatingFileHandler where multiple rotating handler instances pointing to files with the same name but different extensions would conflict and not delete the correct files. * bpo-44865: Add missing call to localization function in argparse. * bpo-43952: Fix multiprocessing.connection.Listener.accept() to accept empty bytes as authkey. Not accepting empty bytes as key causes it to hang indefinitely. * bpo-42125: linecache: get module name from **spec** if available. This allows getting source code for the **main** module when a custom loader is used. * gh-66543: Make mimetypes.guess_type() properly parsing of URLs with only a host name, URLs containing fragment or query, and filenames with only a UNC sharepoint on Windows. Based on patch by Dong-hee Na. * bpo-33775: Add ?default? and ?version? help text for localization in argparse. * Documentation * gh-115399: Document CVE-2023-52425 of Expat <2.6.0 under ?XML vulnerabilities?. * gh-115233: Fix an example for LoggerAdapter in the Logging Cookbook. * Tests * gh-83434: Disable JUnit XML output (--junit-xml=FILE command line option) in regrtest when hunting for reference leaks (-R option). Patch by Victor Stinner. * gh-117187: Fix XML tests for vanilla Expat <2.6.0. * gh-115979: Update test_importlib so that it passes under WASI SDK 21. * gh-116307: Added import helper isolated_modules as CleanImport does not remove modules imported during the context. * gh-115720: Leak tests (-R, --huntrleaks) now show a summary of the number of leaks found in each iteration. * gh-115122: Add --bisect option to regrtest test runner: run failed tests with test.bisect_cmd to identify failing tests. Patch by Victor Stinner. * gh-115596: Fix ProgramPriorityTests in test_os permanently changing the process priority. * gh-115198: Fix test_check_metadata_deprecate in distutils tests with a newer Docutils. * Build * gh-116313: Get WASI builds to work under wasmtime 18 w/ WASI 0.2/preview2 primitives. * gh-115167: Avoid vendoring vcruntime140_threads.dll when building with Visual Studio 2022 version 17.8. * Windows * gh-116773: Fix instances of <_overlapped.Overlapped object at 0xXXX> still has pending operation at deallocation, the process may crash. * gh-91227: Fix the asyncio ProactorEventLoop implementation so that sending a datagram to an address that is not listening does not prevent receiving any more datagrams. * gh-115554: The installer now has more strict rules about updating the Python Launcher for Windows. In general, most users only have a single launcher installed and will see no difference. When multiple launchers have been installed, the option to install the launcher is disabled until all but one have been removed. Downgrading the launcher (which was never allowed) is now more obviously blocked. * gh-115543: Python Launcher for Windows can now detect Python 3.13 when installed from the Microsoft Store, and will install Python 3.12 by default when PYLAUNCHER_ALLOW_INSTALL is set. * gh-115009: Update Windows installer to use SQLite 3.45.1. * IDLE * gh-88516: On macOS show a proxy icon in the title bar of editor windows to match platform behaviour. * Tools/Demos * gh-113516: Don?t set LDSHARED when building for WASI. * C API * gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows 64-bit platforms. * Add reference to CVE-2024-0450 (bsc#1221854) to changelog. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-253=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-3.11.11-1.1 * libpython3_11-1_0-debuginfo-3.11.11-1.1 * python311-curses-debuginfo-3.11.11-1.1 * python311-core-debugsource-3.11.11-1.1 * python311-curses-3.11.11-1.1 * python311-debugsource-3.11.11-1.1 * libpython3_11-1_0-3.11.11-1.1 * python311-base-3.11.11-1.1 * python311-debuginfo-3.11.11-1.1 * python311-base-debuginfo-3.11.11-1.1 ## References: * https://www.suse.com/security/cve/CVE-2019-20907.html * https://www.suse.com/security/cve/CVE-2019-9947.html * https://www.suse.com/security/cve/CVE-2020-15523.html * https://www.suse.com/security/cve/CVE-2020-15801.html * https://www.suse.com/security/cve/CVE-2022-25236.html * https://www.suse.com/security/cve/CVE-2023-27043.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2023-6597.html * https://www.suse.com/security/cve/CVE-2024-0397.html * https://www.suse.com/security/cve/CVE-2024-0450.html * https://www.suse.com/security/cve/CVE-2024-4030.html * https://www.suse.com/security/cve/CVE-2024-4032.html * https://www.suse.com/security/cve/CVE-2024-6232.html * https://www.suse.com/security/cve/CVE-2024-6923.html * https://www.suse.com/security/cve/CVE-2024-7592.html * https://www.suse.com/security/cve/CVE-2024-8088.html * https://www.suse.com/security/cve/CVE-2024-9287.html * https://www.suse.com/security/cve/CVE-2025-0938.html * https://www.suse.com/security/cve/CVE-2025-1795.html * https://bugzilla.suse.com/show_bug.cgi?id=1174091 * https://bugzilla.suse.com/show_bug.cgi?id=1210638 * https://bugzilla.suse.com/show_bug.cgi?id=1219559 * https://bugzilla.suse.com/show_bug.cgi?id=1219666 * https://bugzilla.suse.com/show_bug.cgi?id=1221854 * https://bugzilla.suse.com/show_bug.cgi?id=1225660 * https://bugzilla.suse.com/show_bug.cgi?id=1226447 * https://bugzilla.suse.com/show_bug.cgi?id=1226448 * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1227999 * https://bugzilla.suse.com/show_bug.cgi?id=1228165 * https://bugzilla.suse.com/show_bug.cgi?id=1228780 * https://bugzilla.suse.com/show_bug.cgi?id=1229596 * https://bugzilla.suse.com/show_bug.cgi?id=1229704 * https://bugzilla.suse.com/show_bug.cgi?id=1230227 * https://bugzilla.suse.com/show_bug.cgi?id=1230906 * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1232241 * https://bugzilla.suse.com/show_bug.cgi?id=1236705 * https://bugzilla.suse.com/show_bug.cgi?id=1238450 * https://bugzilla.suse.com/show_bug.cgi?id=1239210 * https://bugzilla.suse.com/show_bug.cgi?id=831629 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:34 -0000 Subject: SUSE-SU-2025:20163-1: important: Security update for the Linux Kernel Message-ID: <174902661460.655.17114880473609579802@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20163-1 Release Date: 2025-03-27T12:56:23Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown" (bsc#1228269). * Revert "ALSA: hda: Conditionally use snooping for AMD HDMI" (stable-fixes). * Revert "KEYS: encrypted: Add check for strsep" (git-fixes). * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "driver core: Fix uevent_show() vs driver detach race" (git-fixes). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path" (git-fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Revert "wifi: iwlwifi: remove retry loops in start" (git-fixes). * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090). * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845). * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * dwc2: Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342) * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: Drop the previous HD-audio TAS2781 fix (bsc#1230132) * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: Drop OCFS2 patch causing a regression (bsc#1233255) * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035). * supported.conf: mark ultravisor userspace access as supported (bsc#1232090). * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-2=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-2=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-rt-6.4.0-22.1 * kernel-devel-rt-6.4.0-22.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-22.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-debugsource-6.4.0-22.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-1-1.1 * kernel-rt-livepatch-6.4.0-22.1 * kernel-rt-debuginfo-6.4.0-22.1 * kernel-livepatch-6_4_0-22-rt-1-1.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-22.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-22.1 * kernel-rt-devel-debuginfo-6.4.0-22.1 * kernel-rt-debugsource-6.4.0-22.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:36 -0000 Subject: SUSE-SU-2025:20152-1: important: Security update for orc Message-ID: <174902661680.28531.1108365645536535569@smelt2.prg2.suse.org> # Security update for orc Announcement ID: SUSE-SU-2025:20152-1 Release Date: 2025-03-19T10:36:33Z Rating: important References: * bsc#1228184 Cross-References: * CVE-2024-40897 CVSS scores: * CVE-2024-40897 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40897 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for orc fixes the following issues: * CVE-2024-40897: Fixed a stack-based buffer overflow in the Orc compiler when formatting error messages for certain input files (bsc#1228184) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-252=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * orc-debugsource-0.4.34-3.1 * liborc-0_4-0-0.4.34-3.1 * liborc-0_4-0-debuginfo-0.4.34-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40897.html * https://bugzilla.suse.com/show_bug.cgi?id=1228184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:35 -0000 Subject: SUSE-SU-2025:20153-1: moderate: Security update for krb5 Message-ID: <174902661512.28531.17814809434994845254@smelt2.prg2.suse.org> # Security update for krb5 Announcement ID: SUSE-SU-2025:20153-1 Release Date: 2025-03-19T10:50:26Z Rating: moderate References: * bsc#1236619 Cross-References: * CVE-2025-24528 CVSS scores: * CVE-2025-24528 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-24528 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2025-24528: Prevent overflow when calculating ulog block size. An authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash (bsc#1236619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-251=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-251=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * krb5-debugsource-1.20.1-6.1 * krb5-1.20.1-6.1 * krb5-debuginfo-1.20.1-6.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * krb5-mini-debugsource-1.20.1-6.1 * krb5-mini-1.20.1-6.1 * krb5-mini-debuginfo-1.20.1-6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24528.html * https://bugzilla.suse.com/show_bug.cgi?id=1236619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:44 -0000 Subject: SUSE-RU-2025:20162-1: important: Recommended update for supportutils Message-ID: <174902662406.655.5897096227015192606@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2025:20162-1 Release Date: 2025-03-25T09:26:25Z Rating: important References: * bsc#1213291 * bsc#1220082 * bsc#1222021 * bsc#1222896 * bsc#1227127 * bsc#1228265 * bsc#1231396 * bsc#1231423 * bsc#1233726 * jsc#PED-11669 * jsc#PED-8211 * jsc#PED-8221 Affected Products: * SUSE Linux Micro 6.0 An update that contains three features and has nine fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.9 * Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291,jsc#PED-8221) * Supportconfig available in current distro (PED-7131) * Corrected display issues (bsc#1231396) * NFS takes too long, showmount times out (bsc#1231423) * Merged sle15 and master branches (bsc#1233726, jsc#PED-11669) * Changes to version 3.2.8 * Update supportconfig get pam.d sorted * yast_files: Exclude .zcat * Sanitize grub bootloader (bsc#1227127) * Sanitize regcodes * Improve product detection * Add read_values for s390x (bsc#1228265,) * hardware_info: Remove old alsa ver check * drbd_info: Fix incorrect escape of quotes * Changes in version 3.1.30 * Added -V key:value pair option (bsc#1222021,jsc#PED-8211) * Avoid getting duplicate kernel verifications in boot.text * Suppress file descriptor leak warnings from lvm commands (bsc#1220082) * Includes container log timestamps ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-261=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * supportutils-3.2.9-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213291 * https://bugzilla.suse.com/show_bug.cgi?id=1220082 * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1222896 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://bugzilla.suse.com/show_bug.cgi?id=1231396 * https://bugzilla.suse.com/show_bug.cgi?id=1231423 * https://bugzilla.suse.com/show_bug.cgi?id=1233726 * https://jira.suse.com/browse/PED-11669 * https://jira.suse.com/browse/PED-8211 * https://jira.suse.com/browse/PED-8221 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:42 -0000 Subject: SUSE-SU-2025:20151-1: moderate: Security update for tpm2.0-tools, tpm2-0-tss Message-ID: <174902662282.28531.7816281790340985041@smelt2.prg2.suse.org> # Security update for tpm2.0-tools, tpm2-0-tss Announcement ID: SUSE-SU-2025:20151-1 Release Date: 2025-03-18T10:58:11Z Rating: moderate References: * bsc#1223687 * bsc#1223689 * bsc#1223690 Cross-References: * CVE-2024-29038 * CVE-2024-29039 * CVE-2024-29040 CVSS scores: * CVE-2024-29038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-29039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-29040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for tpm2.0-tools, tpm2-0-tss fixes the following issues: tpm2-0-tss: Update to version 4.1: \+ Security \- CVE-2024-29040: arbitrary quote data may go undetected by Fapi_VerifyQuote (bsc#1223690) * Fixed * fapi: Fix length check on FAPI auth callbacks * mu: Correct error message for errors * tss2-rc: fix unknown laer handler dropping bits. * fapi: Fix deviation from CEL specification (template_value was used instead of template_data). * fapi: Fix json syntax error in FAPI profiles which was ignored by json-c. * build: fix build fail after make clean. * mu: Fix unneeded size check in TPM2B unmarshaling. * fapi: Fix missing parameter encryption. * build: Fix failed build with --disable-vendor. * fapi: Fix flush of persistent handles. * fapi: Fix test provisioning with template with self generated certificate disabled. * fapi: Fix error in Fapi_GetInfo it TPM supports SHA3 hash algs. * fapi: Revert pcr extension for EV_NO_ACTION events. * fapi: Fix strange error messages if nv, ext, or policy path does not exits. * fapi: Fix segfault caused by wrong allocation of pcr policy. * esys: Fix leak in Esys_EvictControl for persistent handles. * tss2-tcti: tcti-libtpms: fix test failure on big-endian platform. * esys: Add reference counting for Esys_TR_FromTPMPublic. * esys: Fix HMAC error if session bind key has an auth value with a trailing 0. * fapi: fix usage of self signed certificates in TPM. * fapi: Usage of self signed certificates. * fapi: A segfault after the error handling of non existing keys. * fapi: Fix several leaks. * fapi: Fix error handling for policy execution. * fapi: Fix usage of persistent handles (should not be flushed) * fapi: Fix test provisioning with template (skip test without self generated certificate). * fapi: Fix pcr extension for EV_NO_ACTION * test: Fix fapi-key-create-policy-signed-keyedhash with P_ECC384 profile * tcti_spi_helper_transmit: ensure FIFO is accessed only after TPM reports commandReady bit is set * fapi: Fix read large system eventlog (> UINT16_MAX). * esys tests: Fix layer check for TPM2_RC_COMMAND_CODE (for /dev/tpmrm0) * test: unit: tcti-libtpms: fix test failed at 32-bit platforms. * fapi: Fix possible null pointer dereferencing in Fapi_List. * sys: Fix size check in Tss2_Sys_GetCapability. * esys: Fix leak in Esys_TR_FromTPMPublic. * esys: fix unchecked return value in esys crypto. * fapi: Fix wrong usage of local variable in provisioning. * fapi: Fix memset 0 in ifapi_json_TPMS_POLICYNV_deserialize. * fapi: Fix possible out of bound array access in IMA parser. * tcti device: Fix possible unmarshalling from uninitialized variable. * fapi: Fix error checking authorization of signing key. * fapi: Fix cleanup of policy sessions. * fapi: Eventlog H-CRTM events and different localities. * fapi: Fix missing synchronization of quote and eventlog. * faii: Fix invalid free in Fapi_Quote with empty eventlog. * Added * tcti: LetsTrust-TPM2Go TCTI module spi-ltt2go. * mbedtls: add sha512 hmac. * fapi: Enable usage of external keys for Fapi_Encrypt. * fapi: Support download of AMD certificates. * tcti: Add USB TPM (FTDI MPSSE USB to SPI bridge) TCTI module. * fapi: The recreation of primaries (except EK) in the owner hierarchy instead the endorsement hierarchy is fixed. * rc: New TPM return codes added. * fapi: Further Nuvoton certificates added. * tpm_types/esys: Add support for Attestable TPM changes in latest TPM spec. * tcti: Add '/dev/tcm0' to default conf * fapi: New Nuvoton certificates added. * esys: Fix leak in Esys_TR_FromTPMPublic. * Removed * Testing on Ubuntu 18.04 as it's near EOL (May 2023). tpm2.0-tools: Update to version 5.7: \+ Security \- CVE-2024-29038: arbitrary quote data may go undetected by tpm2_checkquote (bsc#1223687) \- CVE-2024-29039: pcr selection value is not compared with the attest (bsc#1223689) \+ Fixed \- Fix eventlog test \- Fix issues with reading NV indexes \- Fix context save error on tpm2_create \- tpm2_sessionconfig: fix handling of --disable-continue session so that the subsequent command will not fail \- when attempting to context save a flushed session. \- detection of functions within libcrypto when CRYPTO_LIBS is set and system has install libcrypto. \- tpm2_send: fix EOF detection on input stream. \- tpm2_policy.c fix compilation error caused by format directive for size_t on 32 bit systems. \- tpm2_nvread: fix input handling no nv index. \- Auth file: Ensure 0-termination when reading auths from a file. \- configure.ac: fix bashisms. configure scripts need to be runnable with a POSIX-compliant /bin/sh. \- cirrus.yml fix tss compilation with libtpms for FreeBSD. \- tpm2_tool.c Fix missing include for basename to enable compilation on netbsd. \- options: fix TCTI handling to avoid failures for commands that should work with no options. \- tpm2_getekcertificate.c Fix leak. ek_uri was not freed if get_ek_server_address failed. \+ Added \- Add the possibility for autoflush (environment variable "TPM2TOOLS_AUTOFLUSH", or -R option) \+ Removed \- Testing on Ubuntu 18.04 as it's near EOL (May 2023).m2_policy.c fix compilation error caused by format directive for size_t on 32 bit systems. \- tpm2_nvread: fix input handling no nv index. * Update to version 5.6 * tpm2_eventlog: * add H-CRTM event support * add support of efivar versions less than 38 * Add support to check for efivar/efivar.h manually * Minor formatting fixes * tpm2_eventlog: add support for replay with different StartupLocality * Fix pcr extension for EV_NO_ACTION * Extend test of yaml string representation * Use helper for printing a string dump * Fix upper bound on unique data size * Fix YAML string formatting * tpm2_policy: * Add support for parsing forward seal TPM values * Use forward seal values in creating policies * Move dgst_size in evaluate_populate_pcr_digests() * Allow more than 8 PCRs for sealing * Move dgst_size in evaluate_populate_pcr_digests * Allow more than 8 PCRs for sealing * Make __wrap_Esys_PCR_Read() more dynamic to enable testing more PCRs * tpm2_encryptdecrypt: Fix pkcs7 padding stripping * tpm2_duplicate: * Support -a option for attributes * Add --key-algorithm option * tpm2_encodeobject: Use the correct -O option instead of -C * tpm2_unseal: Add qualifier static to enhance the privacy of unseal function * tpm2_sign: * Remove -m option which was added mistakenly * Revert sm2 sign and verifysignature * tpm2_createek: * Correct man page example * Fix usage of nonce * Fix integrating nonce * tpm2_clear: add more details about the action * tpm2_startauthsession: allow the file attribute for policy authorization. * tpm2_getekcertificate: Add AMD EK support * tpm2_ecdhzgen: Add public-key parameter * tpm2_nvreadpublic: Prevent free of unallocated pointers on failure * Bug-fixes: * The readthedocs build failed with module 'jinja2' has no attribute 'contextfilter' a requirement file was added to fix this problem * An error caused by the flags -flto -_FORTIFY_SOURCE=3 in kdfa implementation. This error can be avoided by switching off the optimization with pragma * Changed wrong function name of "Esys_Load" to "Esys_Load" * Function names beginning with Esys_ are wrongly written as Eys_ * Reading and writing a serialized persistent ESYS_TR handles * cirrus-ci update image-family to freebsd-13-2 from 13-1 * misc: * Change the default Python version to Python3 in the helper's code * Skip test which uses the sign operator for comparison in abrmd_policynv.sh * tools/tr_encode: Add a tool that can encode serialized ESYS_TR for persistent handles from the TPM2B_PUBLIC and the raw persistent TPM2_HANDLE * Add safe directory in config ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-250=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtss2-tcti-spidev0-4.1.0-1.1 * tpm2.0-tools-5.7-1.1 * libefivar1-debuginfo-38-3.1 * libtss2-tcti-device0-4.1.0-1.1 * tpm2-0-tss-4.1.0-1.1 * libtss2-esys0-4.1.0-1.1 * tpm2-0-tss-debugsource-4.1.0-1.1 * tpm2.0-tools-debuginfo-5.7-1.1 * libtss2-sys1-4.1.0-1.1 * tpm2.0-tools-debugsource-5.7-1.1 * libtss2-rc0-4.1.0-1.1 * libtss2-tctildr0-4.1.0-1.1 * libtss2-fapi-common-4.1.0-1.1 * libtss2-rc0-debuginfo-4.1.0-1.1 * libtss2-esys0-debuginfo-4.1.0-1.1 * libefivar1-38-3.1 * libtss2-fapi1-debuginfo-4.1.0-1.1 * libtss2-tcti-spidev0-debuginfo-4.1.0-1.1 * libtss2-tctildr0-debuginfo-4.1.0-1.1 * libtss2-fapi1-4.1.0-1.1 * libtss2-tcti-spi-helper0-4.1.0-1.1 * libtss2-mu0-4.1.0-1.1 * libtss2-tcti-spi-helper0-debuginfo-4.1.0-1.1 * libtss2-sys1-debuginfo-4.1.0-1.1 * libtss2-mu0-debuginfo-4.1.0-1.1 * efivar-debugsource-38-3.1 * libtss2-tcti-device0-debuginfo-4.1.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-29038.html * https://www.suse.com/security/cve/CVE-2024-29039.html * https://www.suse.com/security/cve/CVE-2024-29040.html * https://bugzilla.suse.com/show_bug.cgi?id=1223687 * https://bugzilla.suse.com/show_bug.cgi?id=1223689 * https://bugzilla.suse.com/show_bug.cgi?id=1223690 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:45 -0000 Subject: SUSE-RU-2025:20150-1: moderate: Recommended update for elemental-toolkit Message-ID: <174902662580.28531.11785453103361914475@smelt2.prg2.suse.org> # Recommended update for elemental-toolkit Announcement ID: SUSE-RU-2025:20150-1 Release Date: 2025-03-14T11:54:57Z Rating: moderate References: * bsc#1233289 * bsc#1233322 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Bump yip to v1.9.6 (bsc#1233322) * Make lint happy * Fixes squashfs images creation (bsc#1233289) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-245=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-toolkit-2.1.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233289 * https://bugzilla.suse.com/show_bug.cgi?id=1233322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:47 -0000 Subject: SUSE-SU-2025:20161-1: moderate: Security update for libX11 Message-ID: <174902662737.655.4433509131970421438@smelt2.prg2.suse.org> # Security update for libX11 Announcement ID: SUSE-SU-2025:20161-1 Release Date: 2025-03-25T09:13:44Z Rating: moderate References: * bsc#1237431 Cross-References: * CVE-2025-26597 CVSS scores: * CVE-2025-26597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-26597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libX11 fixes the following issues: * CVE-2025-26597: Fixed buffer overflow in XkbChangeTypesOfKey() (bsc#1237431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-260=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libX11-debugsource-1.8.7-3.1 * libX11-6-1.8.7-3.1 * libX11-6-debuginfo-1.8.7-3.1 * libX11-xcb1-1.8.7-3.1 * libX11-xcb1-debuginfo-1.8.7-3.1 * SUSE Linux Micro 6.0 (noarch) * libX11-data-1.8.7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26597.html * https://bugzilla.suse.com/show_bug.cgi?id=1237431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:48 -0000 Subject: SUSE-RU-2025:20149-1: moderate: Recommended update for findutils Message-ID: <174902662838.28531.5850361591211666850@smelt2.prg2.suse.org> # Recommended update for findutils Announcement ID: SUSE-RU-2025:20149-1 Release Date: 2025-03-14T11:49:40Z Rating: moderate References: * bsc#1231472 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for findutils fixes the following issues: * do not crash when file system loop was encountered (bsc#1231472) * added patches * modified patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-244=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * findutils-debugsource-4.9.0-4.1 * findutils-debuginfo-4.9.0-4.1 * findutils-4.9.0-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:52 -0000 Subject: SUSE-RU-2025:20147-1: moderate: Recommended update for dmidecode Message-ID: <174902663201.28531.3454419174874098605@smelt2.prg2.suse.org> # Recommended update for dmidecode Announcement ID: SUSE-RU-2025:20147-1 Release Date: 2025-03-14T06:31:02Z Rating: moderate References: * jsc#PED-8647 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for dmidecode fixes the following issues: * Update to version 3.6 (jsc#PED-8647): * Support for SMBIOS 3.6.0. This includes new memory device types, new processor upgrades, and Loongarch support. * Support for SMBIOS 3.7.0. This includes new port types, new processor upgrades, new slot characteristics and new fields for memory modules. * Added bash completion. * Decode HPE OEM records 197, 239 and 245. * Implement options --list-strings and --list-types. * Update HPE OEM records 203, 212, 216, 221, 233, 236, 238 and 242. * Update Redfish support. * Bug fixes: Fix enabled slot characteristics not being printed * Minor improvements: Print slot width on its own line Use standard strings for slot width * Update for HPE servers from upstream: * Decode PCI bus segment in HPE type 238 records. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-242=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * dmidecode-debuginfo-3.6-1.1 * dmidecode-debugsource-3.6-1.1 * dmidecode-3.6-1.1 ## References: * https://jira.suse.com/browse/PED-8647 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:50 -0000 Subject: SUSE-RU-2025:20148-1: moderate: Recommended update for aardvark-dns, netavark Message-ID: <174902663098.28531.14787823120113145981@smelt2.prg2.suse.org> # Recommended update for aardvark-dns, netavark Announcement ID: SUSE-RU-2025:20148-1 Release Date: 2025-03-14T08:39:17Z Rating: moderate References: * bsc#1224167 * bsc#1234660 * bsc#1236567 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for aardvark-dns, netavark fixes the following issues: * Update to version 1.12.2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-243=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * aardvark-dns-1.12.2-1.1 * netavark-1.12.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224167 * https://bugzilla.suse.com/show_bug.cgi?id=1234660 * https://bugzilla.suse.com/show_bug.cgi?id=1236567 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:52 -0000 Subject: SUSE-RU-2025:20146-1: important: Recommended update for lshw Message-ID: <174902663296.28531.17089358109025313435@smelt2.prg2.suse.org> # Recommended update for lshw Announcement ID: SUSE-RU-2025:20146-1 Release Date: 2025-03-13T09:59:24Z Rating: important References: * jsc#PED-9912 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for lshw fixes the following issues: * lshw: package update (jsc#9912) * update changelog * update data files * get rid of GTK deprecation warning * get rid of some snprintf warnings * add support for 100Gbit interfaces ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-241=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * lshw-debuginfo-B.02.20-1.1 * lshw-debugsource-B.02.20-1.1 * lshw-B.02.20-1.1 ## References: * https://jira.suse.com/browse/PED-9912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:53 -0000 Subject: SUSE-SU-2025:20160-1: important: Security update for openssh Message-ID: <174902663338.655.9695441284802488375@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20160-1 Release Date: 2025-03-25T09:02:43Z Rating: important References: * bsc#1186673 * bsc#1213004 * bsc#1213008 * bsc#1221063 * bsc#1221928 * bsc#1222840 * bsc#1225904 * bsc#1227456 * bsc#1229010 * bsc#1229072 * bsc#1229449 * bsc#1236826 * bsc#1237040 * bsc#1237041 Cross-References: * CVE-2025-26465 * CVE-2025-26466 CVSS scores: * CVE-2025-26465 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-26466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has 12 fixes can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040). * CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041). Other bugfixes: * Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). * Add #include in some files added by the ldap patch to fix build with gcc14 (bsc#1225904). * Added missing struct initializer, added missing parameter (bsc#1222840). * Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by upstream (bsc#1221928). * Use %config(noreplace) for sshd_config. In any case, it's recommended to drop a file in sshd_config.d instead of editing sshd_config (bsc#1221063). * Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow (bsc#1229449). * Drop keycat binary that is not supported, except of the code that is used by other SELinux patches (bsc#1229072). * Fix RFC4256 implementation that keyboard-interactive authentication method can send instructions and sshd shows them to users (bsc#1229010). * Add attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1186673, bsc#1213004, bsc#1213008). * Remove empty line at the end of sshd-sle.pamd (bsc#1227456) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-259=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssh-clients-9.6p1-3.1 * openssh-debugsource-9.6p1-3.1 * openssh-server-config-rootlogin-9.6p1-3.1 * openssh-server-9.6p1-3.1 * openssh-common-9.6p1-3.1 * openssh-debuginfo-9.6p1-3.1 * openssh-clients-debuginfo-9.6p1-3.1 * openssh-server-debuginfo-9.6p1-3.1 * openssh-fips-9.6p1-3.1 * openssh-common-debuginfo-9.6p1-3.1 * openssh-9.6p1-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26465.html * https://www.suse.com/security/cve/CVE-2025-26466.html * https://bugzilla.suse.com/show_bug.cgi?id=1186673 * https://bugzilla.suse.com/show_bug.cgi?id=1213004 * https://bugzilla.suse.com/show_bug.cgi?id=1213008 * https://bugzilla.suse.com/show_bug.cgi?id=1221063 * https://bugzilla.suse.com/show_bug.cgi?id=1221928 * https://bugzilla.suse.com/show_bug.cgi?id=1222840 * https://bugzilla.suse.com/show_bug.cgi?id=1225904 * https://bugzilla.suse.com/show_bug.cgi?id=1227456 * https://bugzilla.suse.com/show_bug.cgi?id=1229010 * https://bugzilla.suse.com/show_bug.cgi?id=1229072 * https://bugzilla.suse.com/show_bug.cgi?id=1229449 * https://bugzilla.suse.com/show_bug.cgi?id=1236826 * https://bugzilla.suse.com/show_bug.cgi?id=1237040 * https://bugzilla.suse.com/show_bug.cgi?id=1237041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:58 -0000 Subject: SUSE-RU-2025:20145-1: critical: Recommended update for dracut Message-ID: <174902663895.28531.17288245269636562906@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2025:20145-1 Release Date: 2025-03-13T09:52:35Z Rating: critical References: * bsc#1228086 * bsc#1230468 * bsc#1231792 * bsc#1232063 * bsc#1236982 * bsc#1237695 Affected Products: * SUSE Linux Micro 6.0 An update that has six fixes can now be installed. ## Description: This update for dracut fixes the following issues: * Update to version 059+suse.591.ge2ab3f62: * fix(iscsi): make sure services are shut down when switching root (bsc#1237695) * fix(iscsi): don't require network setup for qedi * fix(network-legacy): do not require pgrep when using wicked (bsc#1236982) * Update to version 059+suse.585.gc1e69422: Fixes for booting from iSCSI offload with bnx2i (bsc#1228086): * fix(iscsi): attempt iSCSI login before all interfaces are up * fix(iscsi): don't require network setup for bnx2i Other: * fix(dracut): rework timeout for devices added via --mount and --add-device (bsc#1231792) * Update to version 059+suse.578.gd47ce28c: * fix(dm): remove 59-persistent-storage-dm.rules (bsc#1232063) * Update to version 059+suse.575.g06a9ae1f: Fixes for NVMeoF boot (bsc#1230468): * fix(nvmf): install (only) required nvmf modules * fix(nvmf): require NVMeoF modules * fix(nvmf): move /etc/nvme/host{nqn,id} requirement to hostonly ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-240=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dracut-debuginfo-059+suse.591.ge2ab3f62-1.1 * dracut-debugsource-059+suse.591.ge2ab3f62-1.1 * dracut-fips-059+suse.591.ge2ab3f62-1.1 * dracut-059+suse.591.ge2ab3f62-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228086 * https://bugzilla.suse.com/show_bug.cgi?id=1230468 * https://bugzilla.suse.com/show_bug.cgi?id=1231792 * https://bugzilla.suse.com/show_bug.cgi?id=1232063 * https://bugzilla.suse.com/show_bug.cgi?id=1236982 * https://bugzilla.suse.com/show_bug.cgi?id=1237695 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:43:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:43:58 -0000 Subject: SUSE-RU-2025:20159-1: moderate: Recommended update for transactional-update Message-ID: <174902663875.655.13731951210704791597@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2025:20159-1 Release Date: 2025-03-25T02:36:04Z Rating: moderate References: * bsc#1230537 * bsc#1230901 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for transactional-update fixes the following issues: * Version update from 4.8.1 to 4.8.3: * Check return value of register command (bsc#1230901) * Allow specifying only low value with setup-kdump (bsc#1230537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-258=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * transactional-update-zypp-config-4.8.3-1.1 * dracut-transactional-update-4.8.3-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * transactional-update-debugsource-4.8.3-1.1 * tukit-debuginfo-4.8.3-1.1 * libtukit4-debuginfo-4.8.3-1.1 * tukit-4.8.3-1.1 * transactional-update-debuginfo-4.8.3-1.1 * tukitd-4.8.3-1.1 * libtukit4-4.8.3-1.1 * tukitd-debuginfo-4.8.3-1.1 * transactional-update-4.8.3-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230537 * https://bugzilla.suse.com/show_bug.cgi?id=1230901 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:46:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:46:35 -0000 Subject: SUSE-SU-2025:20164-1: important: Security update for the Linux Kernel Message-ID: <174902679531.627.13780048060127929821@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20164-1 Release Date: 2025-03-27T13:52:44Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode() and iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090) * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845) * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035) * supported.conf: mark ultravisor userspace access as supported (bsc#1232090) * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-1=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-1=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-macros-6.4.0-24.1 * kernel-source-6.4.0-24.1 * kernel-devel-6.4.0-24.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-24.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-24.1 * kernel-default-debuginfo-6.4.0-24.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-debuginfo-1-1.2 * kernel-livepatch-6_4_0-24-default-1-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-1-1.2 * kernel-default-livepatch-6.4.0-24.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-24.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debugsource-6.4.0-24.1 * kernel-kvmsmall-debuginfo-6.4.0-24.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-24.1.21.4 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-24.1 * kernel-default-6.4.0-24.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-24.1 * kernel-64kb-devel-6.4.0-24.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-default-devel-6.4.0-24.1 * kernel-syms-6.4.0-24.1 * kernel-default-debugsource-6.4.0-24.1 * kernel-obs-build-6.4.0-24.1 * kernel-obs-build-debugsource-6.4.0-24.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:01 -0000 Subject: SUSE-SU-2025:20158-1: important: Security update for ucode-intel Message-ID: <174902682142.655.17945205268219800549@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20158-1 Release Date: 2025-03-24T12:15:39Z Rating: important References: * bsc#1237096 Cross-References: * CVE-2024-31068 * CVE-2024-36293 * CVE-2024-37020 * CVE-2024-39355 CVSS scores: * CVE-2024-31068 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-31068 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-31068 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31068 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36293 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-36293 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-37020 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-37020 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-39355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39355 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-39355 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-39355 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20250211 release (bsc#1237096) * Security updates for INTEL-SA-01166 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01166.html * CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware Logic for some Intel Processors may allow privileged user to potentially enable denial of service via local access. * Security updates for INTEL-SA-01213 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01213.html * CVE-2024-36293: A potential security vulnerability in some Intel Software Guard Extensions (Intel SGX) Platforms may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01139 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01139.html * not clear which CVEs are fixed here, and which are in UEFI BIOS updates. * Security updates for INTEL-SA-01228 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01228.html * CVE-2024-39355: A potential security vulnerability in some 13th and 14th Generation Intel Core Processors may allow denial of service. Intel is releasing microcode and UEFI reference code updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01194 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01194.html * CVE-2024-37020: A potential security vulnerability in the Intel Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors may allow denial of service. Intel is releasing software updates to mitigate this potential vulnerability. * Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details. * Update for functional issues. Refer to 13th/14th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details. * Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details. * Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details. * Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details. * Update for functional issues. Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details. * Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details. * Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details. * Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details. * Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details. * Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details ### New Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products SRF-SP C0 06-af-03/01 03000330 Xeon 6700-Series Processors with E-Cores ### Updated Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000037 00000038 Core Gen12 ADL H0 06-97-05/07 00000037 00000038 Core Gen12 ADL L0 06-9a-03/80 00000435 00000436 Core Gen12 ADL R0 06-9a-04/80 00000435 00000436 Core Gen12 ADL-N N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E AZB A0/R0 06-9a-04/40 00000007 00000009 Intel(R) Atom(R) C1100 CFL-H R0 06-9e-0d/22 00000100 00000102 Core Gen9 Mobile CFL-H/S/E3 U0 06-9e-0a/22 000000f8 000000fa Core Gen8 Desktop, Mobile, Xeon E EMR-SP A0 06-cf-01/87 21000283 21000291 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000283 21000291 Xeon Scalable Gen5 ICL-D B0 06-6c-01/10 010002b0 010002c0 Xeon D-17xx, D-27xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 0d0003f5 Xeon Scalable Gen3 RPL-E/HX/S B0 06-b7-01/32 0000012b 0000012c Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004123 00004124 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000037 00000038 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004123 00004124 Core Gen13 RPL-S H0 06-bf-05/07 00000037 00000038 Core Gen13/Gen14 RKL-S B0 06-a7-01/02 00000062 00000063 Core Gen11 SPR-HBM Bx 06-8f-08/10 2c000390 2c0003e0 Xeon Max SPR-SP E4/S2 06-8f-07/87 2b000603 2b000620 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b000603 2b000620 Xeon Scalable Gen4 TWL N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E ### New Disclosures Updated in Prior Releases Processor Stepping F-M-S/PI Old Ver New Ver Products CFL-H/S P0 06-9e-0c/22 000000f6 000000f8 Core Gen9 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-257=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20250211-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31068.html * https://www.suse.com/security/cve/CVE-2024-36293.html * https://www.suse.com/security/cve/CVE-2024-37020.html * https://www.suse.com/security/cve/CVE-2024-39355.html * https://bugzilla.suse.com/show_bug.cgi?id=1237096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:04 -0000 Subject: SUSE-SU-2025:20144-1: moderate: Security update for curl Message-ID: <174902682432.655.15400584565328200291@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20144-1 Release Date: 2025-03-12T10:46:56Z Rating: moderate References: * bsc#1235151 * bsc#1236588 * bsc#1236590 Cross-References: * CVE-2025-0167 * CVE-2025-0725 CVSS scores: * CVE-2025-0167 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-0167 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-0167 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2025-0725 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-0725 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-0725 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for curl fixes the following issues: Security issues fixed: * CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590) * CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588) Other issues fixed: * Make sure the TLS handshake after a successful STARTTLS command is fully done before further sending/receiving on the connection. (bsc#1235151) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-239=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * curl-debuginfo-8.6.0-6.1 * libcurl4-8.6.0-6.1 * curl-debugsource-8.6.0-6.1 * libcurl4-debuginfo-8.6.0-6.1 * curl-8.6.0-6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0167.html * https://www.suse.com/security/cve/CVE-2025-0725.html * https://bugzilla.suse.com/show_bug.cgi?id=1235151 * https://bugzilla.suse.com/show_bug.cgi?id=1236588 * https://bugzilla.suse.com/show_bug.cgi?id=1236590 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:08 -0000 Subject: SUSE-SU-2025:20143-1: important: Security update for podman Message-ID: <174902682860.655.81505238781419989@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20143-1 Release Date: 2025-03-12T10:32:11Z Rating: important References: * bsc#1227052 * bsc#1236270 * bsc#1236507 * bsc#1237641 Cross-References: * CVE-2023-45288 * CVE-2024-11218 * CVE-2024-6104 * CVE-2024-9407 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-11218 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-11218 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-11218 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-27144: Fixed gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go- jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237641): * CVE-2024-11218: Fixed github.com/containers/buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (bsc#1236270): * CVE-2023-45288: Fixed golang.org/x/net/http2: close connections when receiving too many headers (bsc#1236507): * CVE-2024-6104: Fixed hashicorp/go-retryablehttp: url might write sensitive information to log file (bsc#1227052): ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-238=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-3.1 * podman-remote-4.9.5-3.1 * podman-remote-debuginfo-4.9.5-3.1 * podman-4.9.5-3.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-11218.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227052 * https://bugzilla.suse.com/show_bug.cgi?id=1236270 * https://bugzilla.suse.com/show_bug.cgi?id=1236507 * https://bugzilla.suse.com/show_bug.cgi?id=1237641 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:12 -0000 Subject: SUSE-RU-2025:20142-1: moderate: Recommended update for amazon-dracut-config Message-ID: <174902683291.655.7119463776962872483@smelt2.prg2.suse.org> # Recommended update for amazon-dracut-config Announcement ID: SUSE-RU-2025:20142-1 Release Date: 2025-03-11T14:15:18Z Rating: moderate References: * bsc#1232024 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for amazon-dracut-config fixes the following issues: * Initial release for amazon-dracut config on Micro 6.0: Already include the following fixes: * Update to 0.0.4: * Move dracut config files to usr/lib/ dir * Update to 0.0.3: * Add provides and conflicts on generic name dracut-instance-change-config * Update to 0.0.2: * Rename config for nvme for consistency * Add dracut build requirement * Initial release v0.0.1 (PED-11572) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-237=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * amazon-dracut-config-0.0.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232024 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:18 -0000 Subject: SUSE-RU-2025:20141-1: moderate: Recommended update for systemd Message-ID: <174902683805.655.962136197727697958@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20141-1 Release Date: 2025-03-11T09:56:02Z Rating: moderate References: * bsc#1220338 * bsc#1229228 * bsc#1231048 * bsc#1232227 * bsc#1232844 * bsc#1233752 * bsc#1234015 * bsc#1234313 * bsc#1234765 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has nine fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Fixed agetty fails to open credentials directory (bsc#1229228) * hwdb: comment out the entry for Logitech MX Keys for Mac * test: answer 2nd mdadm --create question for compat with new version * core/unit-serialize: fix serialization of markers * locale-setup: do not load locale from environemnt when /etc/locale.conf is unchanged * core: fix assert when AddDependencyUnitFiles is called with invalid parameter * Fix systemd-network recommending libidn2-devel (bsc#1234765) * tpm2-util: Also retry unsealing after policy_pcr returns PCR_CHANGED (bsc#1233752 bsc#1234313) * add a allow/denylist for reading sysfs attributes (bsc#1234015) * udev: add new builtin net_driver * udev-builtin-net_id: split-out pci_get_onboard_index() from dev_pci_onboard() * udev-builtin-net_id: split-out get_pci_slot_specifiers() * udev-builtin-net_id: introduce get_port_specifier() helper function * udev-builtin-net_id: split out get_dev_port() and make its failure critical * udev-builtin-net_id: split-out pci_get_hotplug_slot() and pci_get_hotplug_slot_from_address() * udev-builtin-net_id: return earlier when hotplug slot is not found * udev-builtin-net_id: skip non-directory entry earlier * udev-builtin-net_id: make names_xen() self-contained * udev-builtin-net_id: use sd_device_get_sysnum() to get index of netdevsim * udev-builtin-net_id: make names_netdevsim() self-contained * udev-builtin-net_id: make names_platform() self-contained * udev-builtin-net_id: make names_vio() self-contained * udev-builtin-net_id: make names_ccw() self-contained * udev-builtin-net_id: make dev_devicetree_onboard() self-contained * udev-builtin-net_id: make names_mac() self-contained * udev-builtin-net_id: split out get_ifname_prefix() * udev-builtin-net_id: swap arguments for streq() and friends * udev-builtin-net_id: drop unused value from NetNameType * drop efifar SystemdOptions (bsc#1220338) Upstream deprecated it and plan to drop it in the future. * pid1: make clear that $WATCHDOG_USEC is set for the shutdown binary, noone else (bsc#1232227) * udev: skipping empty udev rules file while collecting the stats (bsc#1232844) * Clean up some remnants from when homed was in the experimental sub-package (bsc#1231048) * restore some legacy symlinks Given that SLE16 will be based on SLFO, we have no choice but to continue supporting these compat symlinks. This compatibility code is no longer maintained in the Git repository though, as we primarily backport upstream commits these days. Additionally, the compat code rarely changes and often causes conflicts when merged into recent versions of systemd. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-230=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-230=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-container-debuginfo-254.23-1.1 * libsystemd0-debuginfo-254.23-1.1 * systemd-container-254.23-1.1 * systemd-experimental-debuginfo-254.23-1.1 * systemd-coredump-254.23-1.1 * systemd-portable-debuginfo-254.23-1.1 * udev-254.23-1.1 * systemd-254.23-1.1 * systemd-coredump-debuginfo-254.23-1.1 * systemd-debuginfo-254.23-1.1 * libudev1-debuginfo-254.23-1.1 * libsystemd0-254.23-1.1 * systemd-journal-remote-debuginfo-254.23-1.1 * systemd-portable-254.23-1.1 * systemd-debugsource-254.23-1.1 * libudev1-254.23-1.1 * udev-debuginfo-254.23-1.1 * systemd-experimental-254.23-1.1 * systemd-journal-remote-254.23-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-debugsource-254.23-1.1 * systemd-devel-254.23-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220338 * https://bugzilla.suse.com/show_bug.cgi?id=1229228 * https://bugzilla.suse.com/show_bug.cgi?id=1231048 * https://bugzilla.suse.com/show_bug.cgi?id=1232227 * https://bugzilla.suse.com/show_bug.cgi?id=1232844 * https://bugzilla.suse.com/show_bug.cgi?id=1233752 * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1234313 * https://bugzilla.suse.com/show_bug.cgi?id=1234765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:21 -0000 Subject: SUSE-RU-2025:20140-1: moderate: Recommended update for strace Message-ID: <174902684102.655.14207316051796000382@smelt2.prg2.suse.org> # Recommended update for strace Announcement ID: SUSE-RU-2025:20140-1 Release Date: 2025-03-10T13:40:34Z Rating: moderate References: * bsc#1228216 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for strace fixes the following issues: * Change the license to the correct LGPL-2.1-or-later (bsc#1228216). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-227=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * strace-6.7-2.1 * strace-debuginfo-6.7-2.1 * strace-debugsource-6.7-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228216 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:23 -0000 Subject: SUSE-RU-2025:20139-1: moderate: Recommended update for e2fsprogs Message-ID: <174902684314.655.2348516316939852546@smelt2.prg2.suse.org> # Recommended update for e2fsprogs Announcement ID: SUSE-RU-2025:20139-1 Release Date: 2025-03-10T13:39:05Z Rating: moderate References: * bsc#1223596 * bsc#1230145 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for e2fsprogs fixes the following issues: * resize2fs: Check number of group descriptors only if meta_bg is disabled (bsc#1230145) * EA Inode handling fixes * e2fsck: Add more checks for EA inode consistency (bsc#1223596) * e2fsck: Fix golden output of several tests (bsc#1223596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-229=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libext2fs2-debuginfo-1.47.0-3.1 * libext2fs2-1.47.0-3.1 * e2fsprogs-debuginfo-1.47.0-3.1 * e2fsprogs-1.47.0-3.1 * e2fsprogs-debugsource-1.47.0-3.1 * libcom_err2-1.47.0-3.1 * libcom_err2-debuginfo-1.47.0-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223596 * https://bugzilla.suse.com/show_bug.cgi?id=1230145 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:25 -0000 Subject: SUSE-RU-2025:20138-1: moderate: Recommended update for patterns-base Message-ID: <174902684596.655.11838316781097754678@smelt2.prg2.suse.org> # Recommended update for patterns-base Announcement ID: SUSE-RU-2025:20138-1 Release Date: 2025-03-10T13:37:11Z Rating: moderate References: * bsc#1232246 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for patterns-base fixes the following issues: * do not include busybox packages (bsc#1232246) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-228=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * patterns-base-hardware-6.0-2.1 * patterns-base-fips-6.0-2.1 * patterns-base-cockpit-6.0-2.1 * patterns-base-kvm_host-6.0-2.1 * patterns-base-base-6.0-2.1 * patterns-base-sssd-ldap-6.0-2.1 * patterns-base-selinux-6.0-2.1 * patterns-base-bootloader-6.0-2.1 * patterns-base-transactional-6.0-2.1 * patterns-base-salt_minion-6.0-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232246 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:29 -0000 Subject: SUSE-RU-2025:20137-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <174902684971.655.2297278601285663032@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:20137-1 Release Date: 2025-03-10T02:32:37Z Rating: moderate References: * bsc#1234444 * bsc#1235991 * bsc#1235992 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Update to version 1.0.0 (jsc#PCT-531) * API incompatibility: The check_payg_byos function no longer exits, it now returns a tuple of (flavor, exit_code). This makes the function reusable. * Update the build setup to work with the system interpreter of upcoming SLE releases. SLE 12 stays with the Python 3.4 interpreter and SLE 15 with the Python 3.6 interpreter. * Version 0.1.2 (bsc#1234444) * Improve detection of IPv4 and IPv6 network setup and use appropriate IP version for access the update servers * Improve reliability of flavor detection. Try an update server multiple times to get an answer, if we hit timeouts return the value flavor value from a cache file. * Version 0.1.1 (bsc#1235991, bsc#1235992) * Add time stamp to log * From version 0.1.0 * Doc improvements clarifying exit staus codes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-226=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * python-instance-billing-flavor-check-1.0.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234444 * https://bugzilla.suse.com/show_bug.cgi?id=1235991 * https://bugzilla.suse.com/show_bug.cgi?id=1235992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:33 -0000 Subject: SUSE-SU-2025:20136-1: important: Security update for pcr-oracle, shim Message-ID: <174902685379.655.10348944439424019422@smelt2.prg2.suse.org> # Security update for pcr-oracle, shim Announcement ID: SUSE-SU-2025:20136-1 Release Date: 2025-03-07T15:31:39Z Rating: important References: * bsc#1215098 * bsc#1215099 * bsc#1215100 * bsc#1215101 * bsc#1215102 * bsc#1215103 * bsc#1230316 Cross-References: * CVE-2023-40546 * CVE-2023-40547 * CVE-2023-40548 * CVE-2023-40549 * CVE-2023-40550 * CVE-2023-40551 CVSS scores: * CVE-2023-40546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40546 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40547 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40547 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2023-40547 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2023-40548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-40548 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-40548 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-40549 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40549 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40550 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-40550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-40550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-40551 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40551 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-40551 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities and has one fix can now be installed. ## Description: This update for pcr-oracle, shim fixes the following issues: pcr-oracle: * predict SbatLevelRT for the next boot (bsc#1230316) shim was updated to version 15.8: * Update shim-install to use the 'removable' way for encrypted SL-Micro images (bsc#1230316) * Always use the removable way for SL-Micro * Limit the removable option to encrypted SL-Micro Security issues fixed: * mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546) * avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547) * Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548) * Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549) * pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550) * pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-225=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * pcr-oracle-0.4.6-2.1 * pcr-oracle-debugsource-0.4.6-2.1 * shim-debuginfo-15.8-1.1 * pcr-oracle-debuginfo-0.4.6-2.1 * shim-debugsource-15.8-1.1 * shim-15.8-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40546.html * https://www.suse.com/security/cve/CVE-2023-40547.html * https://www.suse.com/security/cve/CVE-2023-40548.html * https://www.suse.com/security/cve/CVE-2023-40549.html * https://www.suse.com/security/cve/CVE-2023-40550.html * https://www.suse.com/security/cve/CVE-2023-40551.html * https://bugzilla.suse.com/show_bug.cgi?id=1215098 * https://bugzilla.suse.com/show_bug.cgi?id=1215099 * https://bugzilla.suse.com/show_bug.cgi?id=1215100 * https://bugzilla.suse.com/show_bug.cgi?id=1215101 * https://bugzilla.suse.com/show_bug.cgi?id=1215102 * https://bugzilla.suse.com/show_bug.cgi?id=1215103 * https://bugzilla.suse.com/show_bug.cgi?id=1230316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:38 -0000 Subject: SUSE-SU-2025:20135-1: important: Security update for glibc Message-ID: <174902685812.655.17132923901260298748@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20135-1 Release Date: 2025-03-05T16:31:27Z Rating: important References: * bsc#1233699 * bsc#1234665 * bsc#1236282 Cross-References: * CVE-2025-0395 CVSS scores: * CVE-2025-0395 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-0395 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0395 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2025-0395: Fixed buffer overflow in the assert() function (bsc#1236282). Other fixes: \- Fix underallocation of abort_msg_s struct \- Correctly determine livepatching support \- Remove nss-systemd from default nsswitch.conf (bsc#1233699) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-224=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * glibc-debugsource-2.38-8.1 * glibc-locale-base-2.38-8.1 * glibc-devel-debuginfo-2.38-8.1 * glibc-locale-base-debuginfo-2.38-8.1 * glibc-devel-2.38-8.1 * glibc-2.38-8.1 * glibc-debuginfo-2.38-8.1 * glibc-locale-2.38-8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0395.html * https://bugzilla.suse.com/show_bug.cgi?id=1233699 * https://bugzilla.suse.com/show_bug.cgi?id=1234665 * https://bugzilla.suse.com/show_bug.cgi?id=1236282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:42 -0000 Subject: SUSE-SU-2025:20134-1: important: Security update for gstreamer-plugins-base Message-ID: <174902686200.655.13335703398933860755@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2025:20134-1 Release Date: 2025-03-05T16:07:33Z Rating: important References: * bsc#1234415 * bsc#1234450 * bsc#1234453 * bsc#1234455 * bsc#1234456 * bsc#1234459 * bsc#1234460 Cross-References: * CVE-2024-47538 * CVE-2024-47541 * CVE-2024-47542 * CVE-2024-47600 * CVE-2024-47607 * CVE-2024-47615 * CVE-2024-47835 CVSS scores: * CVE-2024-47538 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47538 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47538 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47541 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47542 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47600 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47600 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47600 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47607 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47607 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47607 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47835 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47835 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-47538: Fixed stack-buffer overflow in vorbis_handle_identification_packet (bsc#1234415). * CVE-2024-47835: Fixed NULL-pointer dereference in LRC subtitle parser (bsc#1234450). * CVE-2024-47600: Fixed Out-of-bounds read in gst-discoverer-1.0 commandline tool (bsc#1234453). * CVE-2024-47607: Fixed Stack buffer-overflow in Opus decoder (bsc#1234455). * CVE-2024-47615: Fixed Out-of-bounds write in Ogg demuxer (bsc#1234456). * CVE-2024-47541: Fixed out-of-bounds write in SSA subtitle parser (bsc#1234459). * CVE-2024-47542: Fixed ID3v2 parser out-of-bounds read and NULL-pointer dereference (bsc#1234460). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-223=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gstreamer-plugins-base-debuginfo-1.22.9-2.1 * libgstaudio-1_0-0-1.22.9-2.1 * libgstallocators-1_0-0-1.22.9-2.1 * libgstpbutils-1_0-0-1.22.9-2.1 * libgstpbutils-1_0-0-debuginfo-1.22.9-2.1 * libgstallocators-1_0-0-debuginfo-1.22.9-2.1 * libgstvideo-1_0-0-debuginfo-1.22.9-2.1 * libgsttag-1_0-0-debuginfo-1.22.9-2.1 * libgstaudio-1_0-0-debuginfo-1.22.9-2.1 * libgstriff-1_0-0-debuginfo-1.22.9-2.1 * libgstgl-1_0-0-debuginfo-1.22.9-2.1 * libgstriff-1_0-0-1.22.9-2.1 * libgstvideo-1_0-0-1.22.9-2.1 * gstreamer-plugins-base-1.22.9-2.1 * libgsttag-1_0-0-1.22.9-2.1 * libgstapp-1_0-0-1.22.9-2.1 * libgstapp-1_0-0-debuginfo-1.22.9-2.1 * gstreamer-plugins-base-debugsource-1.22.9-2.1 * libgstgl-1_0-0-1.22.9-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47538.html * https://www.suse.com/security/cve/CVE-2024-47541.html * https://www.suse.com/security/cve/CVE-2024-47542.html * https://www.suse.com/security/cve/CVE-2024-47600.html * https://www.suse.com/security/cve/CVE-2024-47607.html * https://www.suse.com/security/cve/CVE-2024-47615.html * https://www.suse.com/security/cve/CVE-2024-47835.html * https://bugzilla.suse.com/show_bug.cgi?id=1234415 * https://bugzilla.suse.com/show_bug.cgi?id=1234450 * https://bugzilla.suse.com/show_bug.cgi?id=1234453 * https://bugzilla.suse.com/show_bug.cgi?id=1234455 * https://bugzilla.suse.com/show_bug.cgi?id=1234456 * https://bugzilla.suse.com/show_bug.cgi?id=1234459 * https://bugzilla.suse.com/show_bug.cgi?id=1234460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:46 -0000 Subject: SUSE-SU-2025:20133-1: important: Security update for pcp Message-ID: <174902686684.655.3337646891440090781@smelt2.prg2.suse.org> # Security update for pcp Announcement ID: SUSE-SU-2025:20133-1 Release Date: 2025-03-05T15:58:43Z Rating: important References: * bsc#1069468 * bsc#1217783 * bsc#1217826 * bsc#1222121 * bsc#1222815 * bsc#1230551 * bsc#1230552 Cross-References: * CVE-2023-6917 * CVE-2024-3019 * CVE-2024-45769 * CVE-2024-45770 CVSS scores: * CVE-2023-6917 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6917 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2023-6917 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-3019 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45769 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45770 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-45770 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45770 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has three fixes can now be installed. ## Description: This update for pcp fixes the following issues: * CVE-2024-45770: Fixed `pmpost` symlink attack allowing escalating `pcp` to `root` user (bsc#1230552). * CVE-2024-45769: Fixed `pmcd` heap corruption through metric pmstore operations (bsc#1230551). * CVE-2024-3019: Fixed exposure of the redis backend server allowing remote command execution via pmproxy (bsc#1222121). * CVE-2023-6917: Fixed Local privilege escalation from pcp user to root in /usr/libexec/pcp/lib/pmproxy (bsc#1217826). Other fixes: \- Updated to version 6.2.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-222=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libpcp3-6.2.0-1.1 * pcp-debugsource-6.2.0-1.1 * libpcp3-debuginfo-6.2.0-1.1 * libpcp_import1-6.2.0-1.1 * libpcp_import1-debuginfo-6.2.0-1.1 * SUSE Linux Micro 6.0 (noarch) * pcp-conf-6.2.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6917.html * https://www.suse.com/security/cve/CVE-2024-3019.html * https://www.suse.com/security/cve/CVE-2024-45769.html * https://www.suse.com/security/cve/CVE-2024-45770.html * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1217783 * https://bugzilla.suse.com/show_bug.cgi?id=1217826 * https://bugzilla.suse.com/show_bug.cgi?id=1222121 * https://bugzilla.suse.com/show_bug.cgi?id=1222815 * https://bugzilla.suse.com/show_bug.cgi?id=1230551 * https://bugzilla.suse.com/show_bug.cgi?id=1230552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:49 -0000 Subject: SUSE-SU-2025:20132-1: moderate: Security update for pam_u2f Message-ID: <174902686957.655.8384957247308574058@smelt2.prg2.suse.org> # Security update for pam_u2f Announcement ID: SUSE-SU-2025:20132-1 Release Date: 2025-03-04T08:28:30Z Rating: moderate References: * bsc#1233517 Cross-References: * CVE-2025-23013 CVSS scores: * CVE-2025-23013 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-23013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23013 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for pam_u2f fixes the following issues: * update to 1.3.2: * Relax authfile permission check to a warning instead of an error to prevent a breaking change locking existing users out of their systems. * update to 1.3.1: * CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517). * Changed return value when nouserok is enabled and the user has no credentials, PAM_IGNORE is used instead of PAM_SUCCESS. * Hardened checks of authfile permissions. * Hardened checks for nouserok. * Improved debug messages. * Improved documentation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-221=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam_u2f-1.3.2-1.1 * pam_u2f-debugsource-1.3.2-1.1 * pam_u2f-debuginfo-1.3.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23013.html * https://bugzilla.suse.com/show_bug.cgi?id=1233517 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:51 -0000 Subject: SUSE-SU-2025:20131-1: important: Security update for sssd Message-ID: <174902687151.655.17304203176084405091@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2025:20131-1 Release Date: 2025-02-28T13:04:03Z Rating: important References: * bsc#1223100 Cross-References: * CVE-2023-3758 CVSS scores: * CVE-2023-3758 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3758 ( NVD ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3758 ( NVD ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2023-3758: Fixed race condition during authorization leading to GPO policies functioning inconsistently (bsc#1223100). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-220=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * sssd-krb5-common-debuginfo-2.8.2-6.1 * sssd-krb5-debuginfo-2.8.2-6.1 * sssd-2.8.2-6.1 * sssd-ldap-debuginfo-2.8.2-6.1 * libsss_certmap0-debuginfo-2.8.2-6.1 * libsss_certmap0-2.8.2-6.1 * sssd-debuginfo-2.8.2-6.1 * sssd-krb5-2.8.2-6.1 * libsss_idmap0-2.8.2-6.1 * sssd-debugsource-2.8.2-6.1 * sssd-ad-2.8.2-6.1 * sssd-krb5-common-2.8.2-6.1 * libsss_nss_idmap0-debuginfo-2.8.2-6.1 * libsss_idmap0-debuginfo-2.8.2-6.1 * sssd-ldap-2.8.2-6.1 * libsss_nss_idmap0-2.8.2-6.1 * sssd-ad-debuginfo-2.8.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3758.html * https://bugzilla.suse.com/show_bug.cgi?id=1223100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:53 -0000 Subject: SUSE-SU-2025:20130-1: critical: Security update for pam_pkcs11 Message-ID: <174902687336.655.18164860231417946777@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:20130-1 Release Date: 2025-02-26T13:23:33Z Rating: critical References: * bsc#1236314 Cross-References: * CVE-2025-24531 CVSS scores: * CVE-2025-24531 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-24531 ( SUSE ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-24531: Fixed regression in version 0.6.12 returning PAM_IGNORE in many situations with possible authentication bypass (bsc#1236314). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-219=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam_pkcs11-debuginfo-0.6.12-2.1 * pam_pkcs11-0.6.12-2.1 * pam_pkcs11-debugsource-0.6.12-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24531.html * https://bugzilla.suse.com/show_bug.cgi?id=1236314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:47:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:47:58 -0000 Subject: SUSE-SU-2025:20129-1: important: Security update for kernel-firmware Message-ID: <174902687865.655.8493616213234251081@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2025:20129-1 Release Date: 2025-02-25T13:24:48Z Rating: important References: * bsc#1219458 * bsc#1229069 * bsc#1229272 * bsc#1230007 * bsc#1230596 * bsc#1234027 Cross-References: * CVE-2023-31315 CVSS scores: * CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has five fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update to version 20241128 (git commit ea71da6f0690): * i915: Update Xe2LPD DMC to v2.24 * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * iwlwifi: add Bz-gf FW for core89-91 release * amdgpu: update smu 13.0.10 firmware * amdgpu: update sdma 6.0.3 firmware * amdgpu: update psp 13.0.10 firmware * amdgpu: update gc 11.0.3 firmware * amdgpu: add smu 13.0.14 firmware * amdgpu: add sdma 4.4.5 firmware * amdgpu: add psp 13.0.14 firmware * amdgpu: add gc 9.4.4 firmware * amdgpu: update vcn 3.1.2 firmware * amdgpu: update psp 13.0.5 firmware * amdgpu: update psp 13.0.8 firmware * amdgpu: update vega20 firmware * amdgpu: update vega12 firmware * amdgpu: update psp 14.0.4 firmware * amdgpu: update gc 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update vcn 4.0.0 firmware * amdgpu: update smu 13.0.0 firmware * amdgpu: update psp 13.0.0 firmware * amdgpu: update gc 11.0.0 firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update psp 13.0.11 firmware * amdgpu: update gc 11.0.4 firmware * amdgpu: update vcn 4.0.2 firmware * amdgpu: update psp 13.0.4 firmware * amdgpu: update gc 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update vpe 6.1.1 firmware * amdgpu: update vcn 4.0.6 firmware * amdgpu: update psp 14.0.1 firmware * amdgpu: update gc 11.5.1 firmware * amdgpu: update vcn 4.0.5 firmware * amdgpu: update psp 14.0.0 firmware * amdgpu: update gc 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update arcturus firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update sdma 4.4.2 firmware * amdgpu: update psp 13.0.6 firmware * amdgpu: update gc 9.4.3 firmware * amdgpu: update vcn 4.0.4 firmware * amdgpu: update psp 13.0.7 firmware * amdgpu: update gc 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * Update to version 20241125 (git commit 508d770ee6f3): * ice: update ice DDP wireless_edge package to 1.3.20.0 * ice: update ice DDP comms package to 1.3.52.0 * ice: update ice DDP package to ice-1.3.41.0 * amdgpu: update DMCUB to v9.0.10.0 for DCN314 * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * Update to version 20241121 (git commit 48bb90cceb88): * linux-firmware: Update AMD cpu microcode * xe: Update GUC to v70.36.0 for BMG, LNL * i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL * Update to version 20241119 (git commit 60cdfe1831e8): * iwlwifi: add Bz-gf FW for core91-69 release * Update to version 20241113 (git commit 1727aceef4d2): * qcom: venus-5.4: add venus firmware file for qcs615 * qcom: update venus firmware file for SC7280 * QCA: Add 22 bluetooth firmware nvm files for QCA2066 * Update to version 20241112 (git commit c57a0a42468b): * mediatek MT7922: update bluetooth firmware to 20241106163512 * mediatek MT7921: update bluetooth firmware to 20241106151414 * linux-firmware: update firmware for MT7922 WiFi device * linux-firmware: update firmware for MT7921 WiFi device * qcom: Add QDU100 firmware image files. * qcom: Update aic100 firmware files * dedup-firmware.sh: fix infinite loop for --verbose * rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7 * cnm: update chips&media wave521c firmware. * mediatek MT7920: update bluetooth firmware to 20241104091246 * linux-firmware: update firmware for MT7920 WiFi device * copy-firmware.sh: Run check_whence.py only if in a git repo * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * rtw89: 8852a: update fw to v0.13.36.2 * rtw88: Add firmware v52.14.0 for RTL8812AU * i915: Update Xe2LPD DMC to v2.23 * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * linux-firmware: update firmware for MT7925 WiFi device * WHENCE: Add sof-tolg for mt8195 * linux-firmware: Update firmware file for Intel BlazarI core * qcom: Add link for QCS6490 GPU firmware * qcom: update gpu firmwares for qcs615 chipset * cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops * mediatek: Add sof-tolg for mt8195 * Update to version 20241029 (git commit 048795eef350): * ath11k: move WCN6750 firmware to the device-specific subdir * xe: Update LNL GSC to v104.0.0.1263 * i915: Update MTL/ARL GSC to v102.1.15.1926 * Update to version 20241028 (git commit 987607d681cb): * amdgpu: DMCUB updates for various AMDGPU ASICs * i915: Add Xe3LPD DMC * cnm: update chips&media wave521c firmware. * linux-firmware: Add firmware for Cirrus CS35L41 * linux-firmware: Update firmware file for Intel BlazarU core * Makefile: error out of 'install' if COPYOPTS is set * Update to version 20241018 (git commit 2f0464118f40): * check_whence.py: skip some validation if git ls-files fails * qcom: Add Audio firmware for X1E80100 CRD/QCPs * amdgpu: DMCUB updates forvarious AMDGPU ASICs * brcm: replace NVRAM for Jetson TX1 * rtlwifi: Update firmware for RTL8192FU to v7.3 * make: separate installation and de-duplication targets * check_whence.py: check the permissions * Remove execute bit from firmware files * configure: remove unused file * rtl_nic: add firmware rtl8125d-1 * Update to version 20241014 (git commit 99f9c7ed1f4a): * iwlwifi: add gl/Bz FW for core91-69 release * iwlwifi: update ty/So/Ma firmwares for core91-69 release * iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops * cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops * linux-firmware: update firmware for en8811h 2.5G ethernet phy * QCA: Add Bluetooth firmwares for WCN785x with UART transport * Update to version 20241011 (git commit 808cba847c70): * mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher * ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596) * ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1 * ath12k: QCN9274 hw2.0: add board-2.bin * copy-firmware.sh: rename variables in symlink hanlding * copy-firmware.sh: remove no longer reachable test -L * copy-firmware.sh: remove no longer reachable test -f * copy-firmware.sh: call ./check_whence.py before parsing the file * copy-firmware.sh: warn if the destination folder is not empty * copy-firmware.sh: add err() helper * copy-firmware.sh: fix indentation * copy-firmware.sh: reset and consistently handle destdir * Revert "copy-firmware: Support additional compressor options" * copy-firmware.sh: flesh out and fix dedup-firmware.sh * Style update yaml files * editorconfig: add initial config file * check_whence.py: annotate replacement strings as raw * check_whence.py: LC_ALL=C sort -u the filelist * check_whence.py: ban link-to-a-link * check_whence.py: use consistent naming * Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin * tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31 * Update to version 20241010 (git commit d4e688aa74a0): * rtlwifi: Add firmware v39.0 for RTL8192DU * Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer firmware in this package instead) * Update to version 20241004 (git commit bbb77872a8a7): * amdgpu: DMCUB DCN35 update * brcm: Add BCM4354 NVRAM for Jetson TX1 * brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram * Update to version 20241001 (git commit 51e5af813eaf): * linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920) * linux-firmware: add firmware for MT7920 * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update VCN 3.1.2 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update PSP 14.0.4 firmware * amdgpu: update GC 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update SMU 13.0.6 firmware * amdgpu: update SDMA 4.4.2 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * qcom: update gpu firmwares for qcm6490 chipset * mt76: mt7996: add firmware files for mt7992 chipset * mt76: mt7996: add firmware files for mt7996 chipset variants * qcom: add gpu firmwares for sa8775p chipset * rtw89: 8922a: add fw format-2 v0.35.42.1 * Update to version 20240913 (git commit bcbdd1670bc3): * amdgpu: update DMCUB to v0.0.233.0 DCN351 * copy-firmware: Handle links to uncompressed files * WHENCE: Fix battmgr.jsn entry type * Update to version 20240912 (git commit 47c72fee8fe3): * amdgpu: Add VPE 6.1.3 microcode * amdgpu: add SDMA 6.1.2 microcode * amdgpu: Add support for PSP 14.0.4 * amdgpu: add GC 11.5.2 microcode * qcom: qcm6490: add ADSP and CDSP firmware * linux-firmware: Update firmware file for Intel Bluetooth Magnetor core * linux-firmware: Update firmware file for Intel BlazarU core * linux-firmware: Update firmware file for Intel Bluetooth Solar core * Update to version 20240911 (git commit 59def907425d): * rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272) * Update to version 20240910 (git commit 2a7b69a3fa30): * realtek: rt1320: Add patch firmware of MCU * i915: Update MTL DMC v2.23 * cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops * Update to version 20240903 (git commit 96af55bd3d0b): * amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007) * iwlwifi: add Bz FW for core89-58 release * rtl_nic: add firmware rtl8126a-3 * linux-firmware: update firmware for MT7921 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7921) * Update to version 20240830 (git commit d6c600d46981): * amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351 * qcom: vpu: restore compatibility with kernels before 6.6 * Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w updates for bsc#1234027) * amdgpu: DMCUB updates forvarious AMDGPU ASICs * rtw89: 8922a: add fw format-1 v0.35.41.0 * linux-firmware: update firmware for MT7925 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * rtl_bt: Add firmware and config files for RTL8922A * rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part * rtl_bt: de-dupe identical config.bin files * rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin * linux-firmware: Update AMD SEV firmware * linux-firmware: update firmware for MT7996 * Revert "i915: Update MTL DMC v2.22" * ath12k: WCN7850 hw2.0: update board-2.bin * ath11k: WCN6855 hw2.0: update to WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41 * ath11k: WCN6855 hw2.0: update board-2.bin * ath11k: QCA2066 hw2.1: add to WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3 * ath11k: QCA2066 hw2.1: add board-2.bin * ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1 * qcom: vpu: add video firmware for sa8775p * amdgpu: DMCUB updates for various AMDGPU ASICs * Update to version 20240809 (git commit 36db650dae03): * qcom: update path for video firmware for vpu-1/2/3.0 * QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642 * rtw89: 8852c: add fw format-1 v0.27.97.0 * rtw89: 8852bt: add firmware 0.29.91.0 * amdgpu: Update ISP FW for isp v4.1.1 * mediatek: Update mt8195 SOF firmware * amdgpu: DMCUB updates for DCN314 * xe: First GuC release v70.29.2 for BMG * xe: Add GuC v70.29.2 for LNL * i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL * i915: Update MTL DMC v2.22 * i915: update MTL GSC to v102.0.10.1878 * xe: Add BMG HuC 8.2.10 * xe: Add GSC 104.0.0.1161 for LNL * xe: Add LNL HuC 9.4.13 * i915: update DG2 HuC to v7.10.16 * amdgpu: Update ISP FW for isp v4.1.1 * QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-218=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-firmware-serial-20241128-1.1 * kernel-firmware-amdgpu-20241128-1.1 * kernel-firmware-brcm-20241128-1.1 * kernel-firmware-dpaa2-20241128-1.1 * kernel-firmware-nvidia-20241128-1.1 * kernel-firmware-qlogic-20241128-1.1 * kernel-firmware-realtek-20241128-1.1 * kernel-firmware-ti-20241128-1.1 * kernel-firmware-chelsio-20241128-1.1 * kernel-firmware-liquidio-20241128-1.1 * kernel-firmware-mwifiex-20241128-1.1 * ucode-amd-20241128-1.1 * kernel-firmware-platform-20241128-1.1 * kernel-firmware-ath12k-20241128-1.1 * kernel-firmware-network-20241128-1.1 * kernel-firmware-marvell-20241128-1.1 * kernel-firmware-iwlwifi-20241128-1.1 * kernel-firmware-ath11k-20241128-1.1 * kernel-firmware-all-20241128-1.1 * kernel-firmware-mediatek-20241128-1.1 * kernel-firmware-nfp-20241128-1.1 * kernel-firmware-qcom-20241128-1.1 * kernel-firmware-usb-network-20241128-1.1 * kernel-firmware-bluetooth-20241128-1.1 * kernel-firmware-media-20241128-1.1 * kernel-firmware-sound-20241128-1.1 * kernel-firmware-intel-20241128-1.1 * kernel-firmware-atheros-20241128-1.1 * kernel-firmware-prestera-20241128-1.1 * kernel-firmware-ath10k-20241128-1.1 * kernel-firmware-radeon-20241128-1.1 * kernel-firmware-mellanox-20241128-1.1 * kernel-firmware-ueagle-20241128-1.1 * kernel-firmware-i915-20241128-1.1 * kernel-firmware-bnx2-20241128-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31315.html * https://bugzilla.suse.com/show_bug.cgi?id=1219458 * https://bugzilla.suse.com/show_bug.cgi?id=1229069 * https://bugzilla.suse.com/show_bug.cgi?id=1229272 * https://bugzilla.suse.com/show_bug.cgi?id=1230007 * https://bugzilla.suse.com/show_bug.cgi?id=1230596 * https://bugzilla.suse.com/show_bug.cgi?id=1234027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:06 -0000 Subject: SUSE-SU-2025:20128-1: important: Security update for vim Message-ID: <174902688683.655.8114111465031036311@smelt2.prg2.suse.org> # Security update for vim Announcement ID: SUSE-SU-2025:20128-1 Release Date: 2025-02-25T13:11:34Z Rating: important References: * bsc#1220763 * bsc#1229238 * bsc#1229685 * bsc#1229822 * bsc#1230078 * bsc#1231373 * bsc#1235695 * bsc#1236151 * bsc#1237137 Cross-References: * CVE-2024-43374 * CVE-2024-43790 * CVE-2024-43802 * CVE-2024-45306 * CVE-2024-47814 * CVE-2025-1215 * CVE-2025-22134 * CVE-2025-24014 CVSS scores: * CVE-2024-43374 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-43790 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-43790 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-43802 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-43802 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-45306 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45306 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-45306 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-45306 ( NVD ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-47814 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L * CVE-2024-47814 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2024-47814 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-1215 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1215 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1215 ( NVD ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1215 ( NVD ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2025-22134 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22134 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-22134 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-24014 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-24014 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-24014 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves eight vulnerabilities and has one fix can now be installed. ## Description: This update for vim fixes the following issues: vim was updated to 9.1.1101: * CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238) * CVE-2024-43790: Fixed Out of bounds read when performing a search command (bsc#1229685) * CVE-2024-43802: Fixed heap-buffer-overflow in ins_typebuf() (bsc#1229822) * CVE-2024-45306: Fixed heap-buffer-overflow in Vim (bsc#1230078) * CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373) * CVE-2025-1215: Fixed manipulation of the argument --log leads to memory corruption (bsc#1237137) * CVE-2025-22134: Fixed heap-buffer-overflow in Vim < 9.1.1003 (bsc#1235695) * CVE-2025-24014: Fixed segmentation fault in win_line() in Vim < 9.1.1043 (bsc#1236151) Update to 9.1.1101: * insexpand.c hard to read * tests: Test_log_nonexistent only works on Linux * Update base-syntax, improve variable matching * Vim9: import with extends may crash * leaking memory with completing multi lines * \--log with non-existent path causes a crash * if_perl: Perl 5.38 adds new symbols causing link failure * tests: matchparen plugin test wrongly named * Vim9: problem finding implemented method in type hierarchy * runtime(qf): Update syntax file, match second delimiter * tests: output of test ...win32_ctrl_z depends on python version * tests: fix expected return code for python 3.13 on Windows * tests: timeout might be a bit too small * tests: test_terminwscroll_topline2 unreliable * tests: No check when tests are run under Github actions * tests: plugin tests are named inconsistently * Vim9: import with extends may crash * completion doesn't work with multi lines * filetype: cmmt files are not recognized * Unable to persistently ignore events in a window and its buffers * improve syntax highlighting * setreg() doesn't correctly handle mbyte chars in blockwise mode * unexpected DCS responses may cause out of bounds reads * has('bsd') is true for GNU/Hurd * filetype: Mill files are not recognized * GUI late startup leads to uninitialized scrollbars * Add support for lz4 to tar & gzip plugin * Terminal ansi colors off by one after tgc reset * included syntax items do not understand contains=TOP * vim_strnchr() is strange and unnecessary * Vim9: len variable not used in compile_load() * runtime(vim): Update base-syntax, match :debuggreedy count prefix * Strange error when heredoc marker starts with "trim" * tests: test_compiler fails on Windows without Maven * 'diffopt' "linematch" cannot be used with {n} less than 10 * args missing after failing to redefine a function * Cannot control cursor positioning of getchar() * preinsert text completions not deleted with / * getchar() can't distinguish between C-I and Tab * tests: Test_termwinscroll_topline2 fails on MacOS * heap-use-after-free and stack-use-after-scope with :14verbose * no digraph for "Approaches the limit" * not possible to use plural forms with gettext() * too many strlen() calls in userfunc.c * terminal: E315 when dragging the terminal with the mouse * runtime(openPlugin): fix unclosed parenthesis in GetWordUnderCursor() * runtime(doc): Tweak documentation style a bit * tests: test_glvs fails when unarchiver not available * Vim always enables 'termguicolors' in a terminal * completion: input text deleted with preinsert when adding leader * translation(sr): Missing Serbian translation for the tutor * Superfluous cleanup steps in test_ins_complete.vim * runtime(netrw): correct wrong version check * Vim doesn't highlight to be inserted text when completing * runtime(netrw): upstream snapshot of v176 * runtime(dist/vim9): fix regressions in dist#vim9#Open * runtime(hyprlang): fix string recognition * make install fails because of a missing dependency * runtime(asm): add byte directives to syntax script * Vim doesn't work well with TERM=xterm-direct * runtime(filetype): commit 99181205c5f8284a3 breaks V lang detection * runtime: decouple Open and Launch commands and gx mapping from netrw * "nosort" enables fuzzy filtering even if "fuzzy" isn't in 'completeopt' * runtime(just): fix typo in syntax file * runtime(filetype): Improve Verilog detection by checking for modules definition * tests: off-by-one error in CheckCWD in test_debugger.vim * tests: no support for env variables when running Vim in terminal * too many strlen() calls in os_unix.c * insert-completed items are always sorted * crash after scrolling and pasting in silent Ex mode * Makefiles uses non-portable syntax * fuzzymatching doesn't prefer matching camelcase * filetype: N-Tripels and TriG files are not recognized * Vim9: Patch 9.1.1014 causes regressions * translation(sr): Update Serbian messages translation Update to 9.1.1043: * [security]: segfault in win_line() * update helptags * filetype: just files are not recognized * Update base-syntax, match ternary and falsy operators * Vim9: out-of-bound access when echoing an enum * Vim9: imported type cannot be used as func return type * runtime(kconfig): updated ftplugin and syntax script * runtime(doc): rename last t_BG reference to t_RB * Vim9: comments are outdated * tests: test_channel.py fails with IPv6 * runtime(vim): Update base-syntax, fix is/isnot operator matching * Vim9: confusing error when using abstract method via super * make install fails when using shadowdir * Vim9: memory leak with blob2str() * runtime(tex): add texEmphStyle to texMatchGroup in syntax script * runtime(netrw): upstream snapshot of v175 * Vim9: compiling abstract method fails without return * runtime(c): add new constexpr keyword to syntax file (C23) * tests: shaderslang was removed from test_filetype erroneously * link error when FEAT_SPELL not defined * Coverity complains about insecure data handling * runtime(sh): update syntax script * runtime(c): Add missing syntax test files * filetype: setting bash filetype is backwards incompatible * runtime(c): Update syntax and ftplugin files * the installer can be improved * too many strlen() calls in screen.c * no sanitize check when running linematch * filetype: swc configuration files are not recognized * runtime(netrw): change netrw maintainer * wrong return type of blob2str() * blob2str/str2blob() do not support list of strings * runtime(doc): fix typo in usr_02.txt * Coverity complains about dereferencing NULL pointer * linematch option value not completed * string might be used without a trailing NUL * no way to get current selected item in a async context * filetype: fd ignore files are not recognized * v9.1.0743 causes regression with diff mode * runtime(doc): fix base64 encode/decode examples * Vim9: Patch 9.1.1013 causes a few problems * Not possible to convert string2blob and blob2string * Coverity complains about dereferencing NULL value * Vim9: variable not found in transitive import * runtime(colors): Update colorschemes, include new unokai colorscheme * runtime(lyrics): support milliseconds in syntax script * runtime(vim): Split Vim legacy and Vim9 script indent tests * Vim9: class interface inheritance not correctly working * popupmenu internal error with some abbr in completion item * filetype: VisualCode setting file not recognized * diff feature can be improved * filetype: various ignore are not recognized * tests: Load screendump files with "git vimdumps" * PmenuMatch completion highlight can be combined * completion text is highlighted even with no pattern found * tests: a few termdebug tests are flaky * [security]: heap-buffer-overflow with visual mode * runtime(doc): add package- helptags for included packages * Vim9: unknown func error with interface declaring func var * runtime(filetype): don't detect string interpolation as angular * ComplMatchIns highlight hard to read on light background * runtime(vim): Update base-syntax, highlight literal string quote escape * runtime(editorconfig): set omnifunc to syntaxcomplete func * tests: ruby tests fail with Ruby 3.4 * Vim9: leaking finished exception * runtime(tiasm): use correct syntax name tiasm in syntax script * filetype: TI assembly files are not recognized * too many strlen() calls in drawscreen.c * runtime(xf86conf): add section name OutputClass to syntax script * ComplMatchIns may highlight wrong text * runtime(vim): Update base-syntax, improve ex-bang matching * runtime(doc): clarify buffer deletion on popup_close() * filetype: shaderslang files are not detected * Vim9: not able to use comment after opening curly brace Update to 9.1.0993: * 9.1.0993: New 'cmdheight' behavior may be surprising * runtime(sh): fix typo in Last Change header * 9.1.0992: Vim9: double-free after v9.1.0988 * 9.1.0991: v:stacktrace has wrong type in Vim9 script * runtime(sh): add PS0 to bashSpecialVariables in syntax script * runtime(vim): Remove trailing comma from match_words * runtime(zsh): sync syntax script with upstream repo * runtime(doc): Capitalise the mnemonic "Zero" for the 'z' flag of search() * 9.1.0990: Inconsistent behavior when changing cmdheight * 9.1.0989: Vim9: Whitespace after the final enum value causes a syntax error * runtime(java): Quietly opt out for unsupported markdown.vim versions * runtime(vim): fix failing vim syntax test * 9.1.0988: Vim9: no error when using uninitialized var in new() * runtime(doc): update index.txt * 9.1.0987: filetype: cake files are not recognized * 9.1.0986: filetype: 'jj' filetype is a bit imprecise * runtime(jj): Support diffs in jj syntax * runtime(vim): Update matchit pattern, no Vim9 short names * 9.1.0985: Vim9: some ex commands can be shortened * 9.1.0984: exception handling can be improved * runtime(doc): update doc for :horizontal * runtime(doc): update index.txt, windows.txt and version9.txt * runtime(doc): Tweak documentation about base64 function * runtime(chordpro): update syntax script * 9.1.0983: not able to get the displayed items in complete_info() * runtime(doc): use standard SGR format at :h xterm-true-color * 9.1.0982: TI linker files are not recognized * runtime(vim): update vim generator syntax script * 9.1.0981: tests: typo in test_filetype.vim * 9.1.0980: no support for base64 en-/decoding functions in Vim Script * syntax(sh): Improve the recognition of bracket expressions * runtime(doc): mention how NUL bytes are handled * 9.1.0979: VMS: type warning with $XDG_VIMRC_FILE * 9.1.0978: GUI tests sometimes fail when setting 'scroll' options * 9.1.0977: filetype: msbuild filetypes are not recognized * 9.1.0976: Vim9: missing return statement with throw * 9.1.0975: Vim9: interpolated string expr not working in object methods * 9.1.0974: typo in change of commit v9.1.0873 * 9.1.0973: too many strlen() calls in fileio.c * runtime(sh): set shellcheck as the compiler for supported shells * runtime(doc): Fix enum example syntax * 9.1.0972: filetype: TI linker map files are not recognized * runtime(vim): Improve syntax script generator for Vim Script * 9.1.0971: filetype: SLNX files are not recognized * 9.1.0970: VMS: build errors on VMS architecture * runtime(doc): Fix documentation typos * runtime(doc): update for new keyprotocol option value (after v9.1.0969) * 9.1.0969: ghostty not using kitty protocol by default * 9.1.0968: tests: GetFileNameChecks() isn't fully sorted by filetype name * runtime(doc): update version9.txt for bash filetype * runtime(netrw): update last change header for #16265 * runtime(doc): fix doc error in :r behaviour * 9.1.0967: SpotBugs compiler setup can be further improved * 9.1.0966: Vim9: :enum command can be shortened * runtime(compiler): include a basic bash syntax checker compiler * 9.1.0965: filetype: sh filetype set when detecting the use of bash * runtime(doc): clarify ARCH value for 32-bit in INSTALLpc.txt * 9.1.0963: fuzzy-matching does not prefer full match * 9.1.0962: filetype: bun.lock file is not recognized * runtime(vim): update indentation plugin for Vim script * runtime(doc): tweak documentation style in helphelp.txt * runtime(vim): Update base-syntax, allow parens in default arguments * runtime(doc): mention auto-format using clang-format for sound.c/sign.c * runtime(help): fix typo s/additional/arbitrary/ * runtime(help): Add better support for language annotation highlighting * 9.1.0961: filetype: TI gel files are not recognized * 9.1.0960: filetype: hy history files are not recognized * translation(fi): Fix typoes in Finish menu translation * 9.1.0959: Coverity complains about type conversion * runtime(vim): Use supported syntax in indent tests * 9.1.0958: filetype: supertux2 config files detected as lisp * 9.1.0956: completion may crash, completion highlight wrong with preview window * 9.1.0955: Vim9: vim9compile.c can be further improved * runtime(doc): move help tag E1182 * runtime(graphql): contribute vim-graphql to Vim core * 9.1.0954: popupmenu.c can be improved * 9.1.0953: filetype: APKBUILD files not correctly detected * 9.1.0952: Vim9: missing type checking for any type assignment * 9.1.0951: filetype: jshell files are not recognized * runtime(dockerfile): do not set commentstring in syntax script * 9.1.0950: filetype: fennelrc files are not recognized * runtime(netrw): do not double escape Vim special characters * git: ignore reformatting change of netrw plugin * runtime(netrw): more reformating #16248 * runtime(doc): Add a note about handling symbolic links in starting.txt * 9.1.0949: popups inconsistently shifted to the left * git: ignore reformatting change of netrw plugin * runtime(netrw): change indent size from 1 to 2 * 9.1.0948: Missing cmdline completion for :pbuffer * runtime(tutor): Reformat tutor1 * 9.1.0947: short-description * 9.1.0946: cross-compiling fails on osx-arm64 * 9.1.0945: ComplMatchIns highlight doesn't end after inserted text * translation(sv): re-include the change from #16240 * 9.1.0944: tests: test_registers fails when not run under X11 * 9.1.0943: Vim9: vim9compile.c can be further improved * runtime(doc): Update README and mention make check to verify * translation(sv): partly revert commit 98874dca6d0b60ccd6fc3a140b3ec * runtime(vim): update base-syntax after v9.1.0936 * 9.1.0942: a few typos were found * 9.1.0941: ComplMatchIns doesn't work after multibyte chars * runtime(doc): Fix style in fold.txt * translation(sv): Fix typo in Swedish translation * 9.1.0940: Wrong cursor shape with "gq" and 'indentexpr' executes :normal * runtime(doc): fix some small errors * 9.1.0939: make installtutor fails * 9.1.0938: exclusive selection not respected when re-selecting block mode * 9.1.0937: test_undolist() is flaky * 9.1.0936: cannot highlight completed text * 9.1.0935: SpotBugs compiler can be improved * 9.1.0934: hard to view an existing buffer in the preview window * runtime(doc): document how to minimize fold computation costs * 9.1.0933: Vim9: vim9compile.c can be further improved * 9.1.0932: new Italian tutor not installed * runtime(doc): fix a few minor errors from the last doc updates * translation(it): add Italian translation for the interactive tutor * runtime(doc): update the change.txt help file * runtime(help): Add Vim lang annotation support for codeblocks * 9.1.0931: ml_get error in terminal buffer * 9.1.0930: tests: test_terminal2 may hang in GUI mode * 9.1.0929: filetype: lalrpop files are not recognized * 9.1.0928: tests: test_popupwin fails because the filter command fails * editorconfig: set trim_trailing_whitespace = false for src/testdir/test*.vim * 9.1.0927: style issues in insexpand.c * 9.1.0926: filetype: Pixi lock files are not recognized * runtime(doc): Add a reference to |++opt| and |+cmd| at `:h :pedit` * runtime(doc): add a note about inclusive motions and exclusive selection * 9.1.0925: Vim9: expression compiled when not necessary * 9.1.0923: too many strlen() calls in filepath.c * 9.1.0923: wrong MIN macro in popupmenu.c * 9.1.0921: popupmenu logic is a bit convoluted * 9.1.0920: Vim9: compile_assignment() too long * 9.1.0919: filetype: some assembler files are not recognized * runtime(netrw): do not pollute search history with symlinks * 9.1.0918: tiny Vim crashes with fuzzy buffer completion * 9.1.0917: various vartabstop and shiftround bugs when shifting lines * runtime(typst): add definition lists to formatlistpat, update maintainer * 9.1.0916: messages.c is exceeding 80 columns * runtime(proto): include filetype plugin for protobuf * 9.1.0915: GVim: default font size a bit too small * 9.1.0914: Vim9: compile_assignment() is too long * 9.1.0913: no error check for neg values for 'messagesopt' * runtime(netrw): only check first arg of netrw_browsex_viewer for being executable * 9.1.0912: xxd: integer overflow with sparse files and -autoskip * 9.1.0911: Variable name for 'messagesopt' doesn't match short name * 9.1.0910: 'messagesopt' does not check max wait time * runtime(doc): update wrong Vietnamese localization tag * 9.1.0909: Vim9: crash when calling instance method Update to 9.1.0908: * 9.1.0908: not possible to configure :messages * 9.1.0907: printoptions:portrait does not change postscript Orientation * runtime(doc): Add vietnamese.txt to helps main TOC * 9.1.0906: filetype: Nvidia PTX files are not recognized * runtime(doc): updated version9.txt with changes from v9.1.0905 * 9.1.0905: Missing information in CompleteDone event * 9.1.0904: Vim9: copy-paste error in class_defining_member() * 9.1.0903: potential overflow in spell_soundfold_wsal() * runtime(netrw): do not detach when launching external programs in gvim * runtime(doc): make tag alignment more consistent in filetype.txt * runtime(doc): fix wrong syntax and style of vietnamese.txt * translation(it): update Italian manpage for vimtutor * runtime(lua): add optional lua function folding * Filelist: include translations for Chapter 2 tutor * translation(vi): Update Vietnamese translation * runtime(doc): include vietnamese.txt * runtime(tutor): fix another typo in tutor2 * runtime(doc): fix typo in vimtutor manpage * translation(it): update Italian manpage for vimtutor * translation(it): include Italian version of tutor chapter 2 * runtime(tutor): regenerated some translated tutor1 files * runtime(tutor): fix typo in Chapter 2 * 9.1.0902: filetype: Conda configuration files are not recognized * runtime(doc): Tweak documentation style a bit * runtime(tutor): update the tutor files and re-number the chapters * runtime(tutor): Update the makefiles for tutor1 and tutor2 files * 9.1.0901: MS-Windows: vimtutor batch script can be improved * runtime(doc): remove buffer-local completeopt todo item * 9.1.0900: Vim9: digraph_getlist() does not accept bool arg * runtime(typst): provide a formatlistpat in ftplugin * runtime(doc): Update documentation for "noselect" in 'completeopt' * 9.1.0899: default for 'backspace' can be set in C code * runtime(helptoc): reload cached g:helptoc.shell_prompt when starting toc * translation(ru): Updated messages translation * 9.1.0898: runtime(compiler): pytest compiler not included * 9.1.0897: filetype: pyrex files are not detected * runtime(compiler): update eslint compiler * 9.1.0896: completion list wrong after v9.1.0891 * runtime(doc): document changed default value for 'history' * 9.1.0895: default history value is too small * 9.1.0894: No test for what the spotbug compiler parses * 9.1.0893: No test that undofile format does not regress * translation(de): update German manpages * runtime(compiler): include spotbugs Java linter * 9.1.0892: the max value of 'tabheight' is limited by other tabpages * runtime(po): remove poDiffOld/New, add po-format flags to syntax file * 9.1.0891: building the completion list array is inefficient * patch 9.1.0890: %! item not allowed for 'rulerformat' * runtime(gzip): load undofile if there exists one * 9.1.0889: Possible unnecessary redraw after adding/deleting lines * 9.1.0888: leftcol property not available in getwininfo() * 9.1.0887: Wrong expression in sign.c * 9.1.0886: filetype: debian control file not detected * runtime(c3): include c3 filetype plugin * 9.1.0885: style of sign.c can be improved * 9.1.0884: gcc warns about uninitialized variable * runtime(apache): Update syntax directives for apache server 2.4.62 * translation(ru): updated vimtutor translation, update MAINTAINERS file * 9.1.0883: message history cleanup is missing some tests * runtime(doc): Expand docs on :! vs. :term * runtime(netrw): Fixing powershell execution issues on Windows * 9.1.0882: too many strlen() calls in insexpand.c * 9.1.0881: GUI: message dialog may not get focus * runtime(netrw): update netrw's decompress logic * runtime(apache): Update syntax keyword definition * runtime(misc): add Italian LICENSE and (top-level) README file * 9.1.0880: filetype: C3 files are not recognized * runtime(doc): add helptag for :HelpToc command * 9.1.0879: source is not consistently formatted * Add clang-format config file * runtime(compiler): fix escaping of arguments passed to :CompilerSet * 9.1.0878: termdebug: cannot enable DEBUG mode * 9.1.0877: tests: missing test for termdebug + decimal signs * 9.1.0876: filetype: openCL files are not recognized * 9.1.0875: filetype: hyprlang detection can be improved * 9.1.0874: filetype: karel files are not detected * 9.1.0873: filetype: Vivado files are not recognized * 9.1.0872: No test for W23 message * 9.1.0871: getcellpixels() can be further improved * 9.1.0870: too many strlen() calls in eval.c * 9.1.0869: Problem: curswant not set on gm in folded line * 9.1.0868: the warning about missing clipboard can be improved * runtime(doc): Makefile does not clean up all temporary files * 9.1.0867: ins_compl_add() has too many args * editorconfig: don't trim trailing whitespaces in runtime/doc * translation(am): Remove duplicate keys in desktop files * runtime(doc): update helptags * runtime(filetype): remove duplicated *.org file pattern * runtime(cfg): only consider leading // as starting a comment * 9.1.0866: filetype: LLVM IR files are not recognized * 9.1.0865: filetype: org files are not recognized * 9.1.0864: message history is fixed to 200 * 9.1.0863: getcellpixels() can be further improved * runtime(sh): better function support for bash/zsh in indent script * runtime(netrw): small fixes to netrw#BrowseX * 9.1.0862: 'wildmenu' not enabled by default in nocp mode * runtime(doc): update how to report issues for mac Vim * runtime(doc): mention option-backslash at :h CompilerSet * runtime(compiler): include a Java Maven compiler plugin * runtime(racket): update Racket runtime files * runtime(doc): improve indentation in examples for netrw-handler * runtime(doc): improve examples for netrw-handler functions * runtime(idris2): include filetype,indent+syntax plugins for (L)Idris2 + ipkg * runtime(doc): clarify the use of filters and external commands * 9.1.0861: Vim9: no runtime check for object member access of any var * runtime(compiler): update pylint linter * 9.1.0860: tests: mouse_shape tests use hard code sleep value * 9.1.0859: several problems with the GLVS plugin * 9.1.0858: Coverity complains about dead code * runtime(tar): Update tar.vim to support permissions * 9.1.0857: xxd: --- is incorrectly recognized as end-of-options * 9.1.0851: too many strlen() calls in getchar.c * 9.1.0850: Vim9: cannot access nested object inside objects * runtime(tex): extra Number highlighting causes issues * runtime(vim): Fix indent after :silent! function * 9.1.0849: there are a few typos in the source * runtime(netrw): directory symlink not resolved in tree view * runtime(doc): add a table of supported Operating Systems * runtime(tex): update Last Change header in syntax script * runtime(doc): fix typo in g:termdebug_config * runtime(vim): Update base-syntax, improve :normal highlighting * runtime(tex): add Number highlighting to syntax file * runtime(doc): Tweak documentation style a bit * 9.1.0848: if_lua: v:false/v:true are not evaluated to boolean * runtime(dune): use :setl instead of :set in ftplugin * runtime(termdebug): allow to use decimal signs * translation(it): Updated Italian vimtutor * runtime(compiler): improve cppcheck * git: git-blame-ignore-revs shown as an error on Github * 9.1.0847: tests: test_popupwin fails because of updated help file * 9.1.0846: debug symbols for xxd are not cleaned in Makefile * runtime(structurizr): Update structurizr syntax * runtime(8th): updated 8th syntax * runtime(doc): Add pi_tutor.txt to help TOC * runtime(compiler): add mypy and ruff compiler; update pylint linter * runtime(netrw): fix several bugs in netrw tree listing * runtime(netrw): prevent polluting the search history * 9.1.0845: vimtutor shell script can be improved * 9.1.0844: if_python: no way to pass local vars to python * 9.1.0843: too many strlen() calls in undo.c * runtime(doc): update default value for fillchars option * runtime(compiler): fix typo in cppcheck compiler plugin * runtime(doc): simplify vimtutor manpage a bit more * runtime(matchparen): Add matchparen_disable_cursor_hl config option * 9.1.0842: not checking for the sync() systemcall * 9.1.0841: tests: still preferring python2 over python3 * 9.1.0840: filetype: idris2 files are not recognized * 9.1.0839: filetype: leo files are not recognized * runtime(cook): include cook filetype plugin * runtime(debversions): Update Debian versions * patch 9.1.0838: vimtutor is bash-specific * runtime(doc): add help specific modeline to pi_tutor.txt * Filelist: vimtutor chapter 2 is missing in Filelist * 9.1.0837: cross-compiling has some issues * runtime(vimtutor): Add a second chapter * update to 9.1.0836 * 9.1.0836: The vimtutor can be improved * 9.1.0835: :setglobal doesn't work properly for 'ffu' and 'tsrfu' * 9.1.0834: tests: 2html test fails * 9.1.0833: CI: recent ASAN changes do not work for indent tests * 9.1.0832: :set doesn't work for 'cot' and 'bkc' after :setlocal * runtime(doc): update help-toc description * runtime(2html): Make links use color scheme colors in TOhtml * 9.1.0831: 'findexpr' can't be used as lambad or Funcref * Filelist: include helptoc package * runtime(doc): include a TOC Vim9 plugin * Filelist: ignore .git-blame-ignore-revs * 9.1.0830: using wrong highlight group for spaces for popupmenu * runtime(typst): synchronize updates from the upstream typst.vim * git: ignore reformatting commit for git-blame (after v9.1.0829) * 9.1.0829: Vim source code uses a mix of tabs and spaces * 9.1.0828: string_T struct could be used more often * 9.1.0827: CI: tests can be improved * runtime(doc): remove stray sentence in pi_netrw.txt * 9.1.0826: filetype: sway files are not recognized * runtime(doc): Include netrw-gp in TOC * runtime(doc): mention 'iskeyword' at :h charclass() * runtime(doc): update help tags * 9.1.0825: compile error for non-diff builds * runtime(netrw): fix E874 when browsing remote directory which contains `~` character * runtime(doc): update coding style documentation * runtime(debversions): Add plucky (25.04) as Ubuntu release name * 9.1.0824: too many strlen() calls in register.c * 9.1.0823: filetype: Zephyr overlay files not recognized * runtime(doc): Clean up minor formatting issues for builtin functions * runtime(netrw): make :Launch/Open autoloadable * runtime(netrw): fix regression with x mapping on Cygwin * runtime(netrw): fix filetype detection for remote files * 9.1.0822: topline might be changed in diff mode unexpectedly * CI: huge linux builds should also run syntax & indent tests * 9.1.0821: 'findexpr' completion doesn't set v:fname to cmdline argument * 9.1.0820: tests: Mac OS tests are too flaky * runtime(awk): Highlight more awk comments in syntax script * runtime(netrw): add missing change for s:redir() * 9.1.0819: tests: using findexpr and imported func not tested * runtime(netrw): improve netrw's open-handling further * runtime(netrw): fix syntax error in netrwPlugin.vim * runtime(netrw): simplify gx file handling * 9.1.0818: some global functions are only used in single files * 9.1.0817: termdebug: cannot evaluate expr in a popup * runtime(defaults): Detect putty terminal and switch to dark background * 9.1.0816: tests: not clear what tests cause asan failures * runtime(doc): Remove some completed items from todo.txt * 9.1.0815: "above" virtual text causes wrong 'colorcolumn' position * runtime(syntax-tests): tiny vim fails because of line-continuation * 9.1.0814: mapset() may remove unrelated mapping * 9.1.0813: no error handling with setglobal and number types * 9.1.0812: Coverity warns about dereferencing NULL ptr * 9.1.0811: :find expansion does not consider 'findexpr' * 9.1.0810: cannot easily adjust the |:find| command * 9.1.0809: filetype: petalinux config files not recognized * 9.1.0808: Terminal scrollback doesn't shrink when decreasing 'termwinscroll' * 9.1.0807: tests: having 'nolist' in modelines isn't always desired * 9.1.0806: tests: no error check when setting global 'briopt' * 9.1.0805: tests: minor issues in gen_opt_test.vim * 9.1.0804: tests: no error check when setting global 'cc' * 9.1.0803: tests: no error check when setting global 'isk' * 9.1.0802: tests: no error check when setting global 'fdm' to empty value * 9.1.0801: tests: no error check when setting global 'termwinkey' * 9.1.0800: tests: no error check when setting global 'termwinsize' * runtime(doc): :ownsyntax also resets 'spelloptions' * 9.1.0799: tests: gettwinvar()/gettabwinvar() tests are not comprehensive * runtime(doc): Fix wrong Mac default options * 9.1.0798: too many strlen() calls in cmdhist.c * 9.1.0797: testing of options can be further improved * 9.1.0796: filetype: libtool files are not recognized * (typst): add folding to typst ftplugin * runtime(netrw): deprecate and remove netrwFileHandlers#Invoke() * 9.1.0795: filetype: Vivado memory info file are not recognized * 9.1.0794: tests: tests may fail on Windows environment * runtime(doc): improve the :colorscheme documentation * 9.1.0793: xxd: -e does add one extra space * 9.1.0792: tests: Test_set_values() is not comprehensive enough * runtime(swayconfig): add flag for bindsym/bindcode to syntax script * 9.1.0791: tests: errors in gen_opt_test.vim are not shown * runtime(compiler): check for compile_commands in build dirs for cppcheck * 9.1.0790: Amiga: AmigaOS4 build should use default runtime (newlib) * runtime(help): Update help syntax * runtime(help): fix end of sentence highlight in code examples * runtime(jinja): Support jinja syntax as secondary filetype * 9.1.0789: tests: ':resize + 5' has invalid space after '+' * 9.1.0788: 27;u is not decoded to literal Escape in kitty/foot * 9.1.0787: cursor position changed when using hidden terminal * 9.1.0786: tests: quickfix update test does not test location list * runtime(doc): add some docs for file-watcher programs * CI: uploading failed screendumps still fails on Cirrus CI * 9.1.0785: cannot preserve error position when setting quickfix list * 9.1.0784: there are several problems with python 3.13 * 9.1.0783: 'spell' option setting has problems * 9.1.0782: tests: using wrong neomuttlog file name * runtime(doc): add preview flag to statusline example * 9.1.0781: tests: test_filetype fails * 9.1.0780: MS-Windows: incorrect Win32 error checking * 9.1.0779: filetype: neomuttlog files are not recognized * 9.1.0778: filetype: lf config files are not recognized * runtime(comment): fix commment toggle with mixed tabs & spaces * runtime(misc): Use consistent "Vim script" spelling * runtime(gleam): add ftplugin for gleam files * runtime(doc): link help-writing from write-local-help * 9.1.0777: filetype: Some upstream php files are not recognized * runtime(java): Define javaBlockStart and javaBlockOtherStart hl groups * runtime(doc): mention conversion rules for remote_expr() * runtime(tutor): Fix missing :s command in spanish translation section 4.4 * 9.1.0776: test_strftime may fail because of missing TZ data * translation(am): Add Armenian language translation * 9.1.0775: tests: not enough tests for setting options * 9.1.0774: "shellcmdline" doesn't work with getcompletion() * 9.1.0773: filetype: some Apache files are not recognized * 9.1.0772: some missing changes from v9.1.0771 * 9.1.0771: completion attribute hl_group is confusing * 9.1.0770: current command line completion is a bit limited * 9.1.0769: filetype: MLIR files are not recognized * 9.1.0768: MS-Windows: incorrect cursor position when restoring screen * runtime(nasm): Update nasm syntax script * 9.1.0767: A condition is always true in ex_getln.c * runtime(skill): Update syntax file to fix string escapes * runtime(help): highlight CTRL- correctly * runtime(doc): add missing usr_52 entry to toc * 9.1.0766: too many strlen() calls in ex_getln.c * runtime(doc): correct `vi` registers 1-9 documentation error * 9.1.0765: No test for patches 6.2.418 and 7.3.489 * runtime(spec): set comments and commentstring options * NSIS: Include libgcc_s_sjlj-1.dll again * runtime(doc): clarify the effect of 'startofline' option * 9.1.0764: [security]: use-after-free when closing a buffer * runtime(vim): Update base-syntax file, improve class, enum and interface highlighting * 9.1.0763: tests: cannot run single syntax tests * 9.1.0762: 'cedit', 'termwinkey' and 'wildchar' may not be parsed correctly * 9.1.0761: :cd completion fails on Windows with backslash in path * 9.1.0760: tests: no error reported, if gen_opt_test.vim fails * 9.1.0759: screenpos() may return invalid position * runtime(misc): unset compiler in various ftplugins * runtime(doc): update formatting and syntax * runtime(compiler): add cppcheck linter compiler plugin * runtime(doc): Fix style in documents * runtime(doc): Fix to two-space convention in user manual * runtime(comment): consider &tabstop in lines after whitespace indent * 9.1.0758: it's possible to set an invalid key to 'wildcharm' * runtime(java): Manage circularity for every :syn-included syntax file * 9.1.0757: tests: messages files contains ANSI escape sequences * 9.1.0756: missing change from patch v9.1.0754 * 9.1.0755: quickfix list does not handle hardlinks well * runtime(doc): 'filetype', 'syntax' and 'keymap' only allow alphanumeric + some characters * runtime(systemd): small fixes to &keywordprg in ftplugin * CI: macos-12 runner is being sunset, switch to 13 * 9.1.0754: fixed order of items in insert-mode completion menu * runtime(comment): commenting might be off by one column * 9.1.0753: Wrong display when typing in diff mode with 'smoothscroll' * 9.1.0752: can set 'cedit' to an invalid value * runtime(doc): add `usr` tag to usr_toc.txt * 9.1.0751: Error callback for term_start() not used * 9.1.0750: there are some Win9x legacy references * runtime(java): Recognise the CommonMark form (///) of Javadoc comments * 9.1.0749: filetype: http files not recognized * runtime(comment): fix syntax error * CI: uploading failed screendump tests does not work Cirrus * 9.1.0748: :keep* commmands are sometimes misidentified as :k * runtime(indent): allow matching negative numbers for gnu indent config file * runtime(comment): add gC mapping to (un)comment rest of line * 9.1.0747: various typos in repo found * 9.1.0746: tests: Test_halfpage_longline() fails on large terminals * runtime(doc): reformat gnat example * runtime(doc): reformat ada_standard_types section * 9.1.0745: filetype: bun and deno history files not recognized * runtime(glvs): Correct the tag name of glvs-autoinstal * runtime(doc): include short form for :earlier/:later * runtime(doc): remove completed TODO * 9.1.0744: filetype: notmuch configs are not recognised * 9.1.0743: diff mode does not handle overlapping diffs correctly * runtime(glvs): fix a few issues * runtime(doc): Fix typo in :help :command-modifiers * 9.1.0742: getcmdprompt() implementation can be improved * runtime(docs): update `:set?` command behavior table * runtime(doc): update vim90 to vim91 in docs * runtime(doc): fix typo in :h dos-colors * 9.1.0741: No way to get prompt for input()/confirm() * runtime(doc): fix typo in version9.txt nrformat -> nrformats * runtime(rmd,rrst): 'fex' option not properly restored * runtime(netrw): remove extraneous closing bracket * 9.1.0740: incorrect internal diff with empty file * 9.1.0739: [security]: use-after-free in ex_getln.c * runtime(filetype): tests: Test_filetype_detection() fails * runtime(dist): do not output a message if executable is not found * 9.1.0738: filetype: rapid files are not recognized * runtime(modconf): remove erroneous :endif in ftplugin * runtime(lyrics): support multiple timestamps in syntax script * runtime(java): Optionally recognise _module_ import declarations * runtime(vim): Update base-syntax, improve folding function matches * CI: upload failed screendump tests also for Cirrus * 9.1.0737: tests: screendump tests may require a bit more time * runtime(misc): simplify keywordprg in various ftplugins * runtime(java): Optionally recognise all primitive constants in _switch-case_ labels * runtime(zsh,sh): set and unset compiler in ftplugin * runtime(netrw): using inefficient highlight pattern for 'mf' * 9.1.0736: Unicode tables are outdated * 9.1.0735: filetype: salt files are not recognized * 9.1.0734: filetype: jinja files are not recognized * runtime(zathurarc): add double-click-follow to syntax script * translation(ru): Updated messages translation * translation(it): updated xxd man page * translation(ru): updated xxd man page * 9.1.0733: keyword completion does not work with fuzzy * 9.1.0732: xxd: cannot use -b and -i together * runtime(java): Highlight javaConceptKind modifiers with StorageClass * runtime(doc): reword and reformat how to use defaults.vim * 9.1.0731: inconsistent case sensitive extension matching * runtime(vim): Update base-syntax, match Vim9 bool/null literal args to :if/:while/:return * runtime(netrw): delete confirmation not strict enough * 9.1.0730: Crash with cursor-screenline and narrow window * 9.1.0729: Wrong cursor-screenline when resizing window * 9.1.0728: [security]: heap-use-after-free in garbage collection with location list user data * runtime(doc): clarify the effect of the timeout for search()-functions * runtime(idlang): update syntax script * runtime(spec): Recognize epoch when making spec changelog in ftplugin * runtime(spec): add file triggers to syntax script * 9.1.0727: too many strlen() calls in option.c * runtime(make): add compiler/make.vim to reset compiler plugin settings * runtime(java): Recognise all available standard doclet tags * 9.1.0726: not using correct python3 API with dynamic linking * runtime(dosini): Update syntax script, spellcheck comments only * runtime(doc): Revert outdated comment in completeopt's fuzzy documentation * 9.1.0725: filetype: swiftinterface files are not recognized * runtime(pandoc): Update compiler plugin to use actual 'spelllang' * runtime(groff): Add compiler plugin for groff * 9.1.0724: if_python: link error with python 3.13 and stable ABI * 9.1.0723: if_python: dynamic linking fails with python3 >= 3.13 * 9.1.0722: crash with large id in text_prop interface * 9.1.0721: tests: test_mksession does not consider XDG_CONFIG_HOME * runtime(glvs): update GetLatestVimScripts plugin * runtime(doc): Fix typo in :help :hide text * runtime(doc): buffers can be re-used * 9.1.0720: Wrong breakindentopt=list:-1 with multibyte or TABs * 9.1.0719: Resetting cell widths can make 'listchars' or 'fillchars' invalid * runtime(doc): Update version9.txt and mention $MYVIMDIR * Update to 9.1.0718: * v9.1.0718: hard to know the users personal Vim Runtime Directory * v9.1.0717: Unnecessary nextcmd NULL checks in parse_command_modifiers() Maintainers: fix typo in author name * v9.1.0716: resetting setcellwidth( doesn't update the screen runtime(hcl,terraform): Add runtime files for HCL and Terraform runtime(tmux): Update syntax script * v9.1.0715: Not correctly parsing color names (after v9.1.0709) * v9.1.0714: GuiEnter_Turkish test may fail * v9.1.0713: Newline causes E749 in Ex mode * v9.1.0712: missing dependency of Test_gettext_makefile * v9.1.0711: test_xxd may file when using different xxd * v9.1.0710: popup window may hide part of Command line runtime(vim): Update syntax, improve user-command matching * v9.1.0709: GUIEnter event not found in Turkish locale runtime(sudoers): improve recognized Runas_Spec and Tag_Spec items * v9.1.0708: Recursive window update does not account for reset skipcol runtime(nu): include filetype plugin * v9.1.0707: invalid cursor position may cause a crash * v9.1.0706: test_gettext fails when using shadow dir CI: Install locales-all package * v9.1.0705: Sorting of fuzzy filename completion is not stable translation(pt): update Portuguese/Brazilian menu translation runtime(vim): Update base-syntax, match bracket mark ranges runtime(doc): Update :help :command-complete list * v9.1.0704: inserting with a count is inefficient runtime(doc): use mkdir -p to save a command * v9.1.0703: crash with 2byte encoding and glob2regpat() runtime(hollywood): update syn highlight for If-Then statements and For-In-Loops * v9.1.0702: Patch 9.1.0700 broke CI * v9.1.0701: crash with NFA regex engine when searching for composing chars * v9.1.0700: crash with 2byte encoding and glob2regpat() * v9.1.0699: "dvgo" is not always an inclusive motion runtime(java): Provide support for syntax preview features * v9.1.0698: "Untitled" file not removed when running Test_crash1_3 alone * v9.1.0697: heap-buffer-overflow in ins_typebuf * v9.1.0696: installing runtime files fails when using SHADOWDIR runtime(doc): fix typo * v9.1.0695: test_crash leaves Untitled file around translation(br): Update Brazilian translation translation(pt): Update menu_pt_br * v9.1.0694: matchparen is slow on a long line * v9.1.0693: Configure doesn't show result when not using python3 stable abi * v9.1.0692: Wrong patlen value in ex_substitute() * v9.1.0691: stable-abi may cause segfault on Python 3.11 runtime(vim): Update base-syntax, match :loadkeymap after colon and bar runtime(mane): Improve ManBS mapping * v9.1.0690: cannot set special highlight kind in popupmenu translation(pt): Revert and fix wrong Portuguese menu translation files translation(pt): revert Portuguese menu translation translation(br): Update Brazilian translations runtime(vim): Update base-syntax, improve :let-heredoc highlighting * v9.1.0689: buffer-overflow in do_search( with 'rightleft' runtime(vim): Improve heredoc handling for all embedded scripts * v9.1.0688: dereferences NULL pointer in check_type_is_value() * v9.1.0687: Makefile may not install desktop files runtime(man): Fix ManBS runtime(java): Make the bundled &foldtext function optional runtime(netrw): Change line on `mx` if command output exists runtime(netrw): Fix `mf`-selected entry highlighting runtime(htmlangular): add html syntax highlighting translation(it): Fix filemode of Italian manpages runtime(doc): Update outdated man.vim plugin information runtime(zip): simplify condition to detect MS-Windows * v9.1.0686: zip-plugin has problems with special characters runtime(pandoc): escape quotes in &errorformat for pandoc translation(it): updated Italian manpage * v9.1.0685: too many strlen( calls in usercmd.c runtime(doc): fix grammar in :h :keeppatterns runtime(pandoc): refine pandoc compiler settings * v9.1.0684: completion is inserted on Enter with "noselect" translation(ru): update man pages * v9.1.0683: mode( returns wrong value with mapping runtime(doc): remove trailing whitespace in cmdline.txt * v9.1.0682: Segfault with uninitialized funcref * v9.1.0681: Analyzing failed screendumps is hard runtime(doc): more clarification for the :keeppatterns needed * v9.1.0680: VMS does not have defined uintptr_t runtime(doc): improve typedchar documentation for KeyInputPre autocmd runtime(dist): verify that executable is in $PATH translation(it): update Italian manpages runtime(doc): clarify the effect of :keeppatterns after * v9.1.0677 runtime(doc): update Makefile and make it portable between GNU and BSD * v9.1.0679: Rename from w_closing to w_locked is incomplete runtime(colors): update colorschemes runtime(vim): Update base-syntax, improve :let-heredoc highlighting runtime(doc): Updating the examples in the xxd manpage translation(ru): Updated uganda.rux runtime(yaml): do not re-indent when commenting out lines * v9.1.0678: use-after-free in alist_add() * v9.1.0677 :keepp does not retain the substitute pattern translation(ja): Update Japanese translations to latest release runtime(netrw): Drop committed trace lines runtime(netrw): Error popup not always used runtime(netrw): ErrorMsg( may throw E121 runtime(tutor): update Makefile and make it portable between GNU and BSD translation: improve the po/cleanup.vim script runtime(lang): update Makefile and make it portable between GNU and BSD * v9.1.0676: style issues with man pages * v9.1.0675: Patch v9.1.0674 causes problems runtime(dosbatch): Show %%i as an argument in syntax file runtime(dosbatch): Add syn-sync to syntax file runtime(sql, mysql): fix E169: Command too recursive with sql_type_default = "mysql" * v9.1.0674: compiling abstract method fails because of missing return runtime(javascript): fix a few issues with syntax higlighting runtime(mediawiki): fix typo in doc, test for b:did_ftplugin var runtime(termdebug): Fix wrong test for balloon feature runtime(doc): Remove mentioning of the voting feature runtime(doc): add help tags for json + markdown global variables * v9.1.0673: too recursive func calls when calling super-class method runtime(syntax-tests): Facilitate the viewing of rendered screendumps runtime(doc): fix a few style issues * v9.1.0672: marker folds may get corrupted on undo * v9.1.0671 Problem: crash with WinNewPre autocommand * v9.1.0670: po file encoding fails on *BSD during make translation(it): Update Italian translation translation: Stop using msgconv * v9.1.0669: stable python ABI not used by default Update .gitignore and .hgignore files * v9.1.0668: build-error with python3.12 and stable ABI translations: Update generated po files * v9.1.0667: Some other options reset curswant unnecessarily when set * v9.1.0666: assert_equal( doesn't show multibyte string correctly runtime(doc): clarify directory of Vim's executable vs CWD * v9.1.0665 :for loop runtime(proto): Add indent script for protobuf filetype * v9.1.0664: console vim did not switch back to main screen on exit runtime(zip): zip plugin does not work with Vim 9.0 * v9.1.0663: zip test still resets 'shellslash' option runtime(zip): use defer to restore old settings runtime(zip): add a generic Message function runtime(zip): increment base version of zip plugin runtime(zip): raise minimum Vim version to * v9.0 runtime(zip): refactor save and restore of options runtime(zip): remove test for fnameescape runtime(zip): use :echomsg instead of :echo runtime(zip): clean up and remove comments * v9.1.0662: filecopy( may return wrong value when readlink( fails * v9.1.0661: the zip plugin is not tested. runtime(zip): Fix for FreeBSD's unzip command runtime(doc): capitalize correctly * v9.1.0660: Shift-Insert does work on old conhost translation(it): update Italian manpage runtime(lua): add/subtract a 'shiftwidth' after '('/')' in indentexpr runtime(zip): escape '[' on Unix as well * v9.1.0659: MSVC Makefile is a bit hard to read runtime(doc): fix typo in syntax.txt runtime(doc): -x is only available when compiled with crypt feature * v9.1.0658: Coverity warns about dereferencing NULL pointer. runtime(colors): update Todo highlight in habamax colorscheme * v9.1.0657: MSVC build time can be optimized * v9.1.0656: MSVC Makefile CPU handling can be improved * v9.1.0655: goaccess config file not recognized CI: update clang compiler to version 20 runtime(netrw): honor `g:netrw_alt{o,v}` for `:{S,H,V}explore` * v9.1.0654: completion does not respect completeslash with fuzzy * v9.1.0653: Patch v9.1.0648 not completely right * v9.1.0652: too many strlen( calls in syntax.c * v9.1.0651 :append * v9.1.0650: Coverity warning in cstrncmp() * v9.1.0649: Wrong comment for "len" argument of call_simple_func() * v9.1.0648: [security] double-free in dialog_changed() * v9.1.0647: [security] use-after-free in tagstack_clear_entry runtime(doc): re-format tag example lines, mention ctags --list-kinds * v9.1.0646: imported function may not be found runtime(java): Document "g:java_space_errors" and "g:java_comment_strings" runtime(java): Cluster optional group definitions and their group links runtime(java): Tidy up the syntax file runtime(java): Tidy up the documentation for "ft-java-syntax" runtime(colors): update habamax scheme - tweak diff/search/todo colors runtime(nohlsearch): add missing loaded_hlsearch guard runtime(kivy): Updated maintainer info for syntax script Maintainers: Add maintainer for ondir ftplugin + syntax files runtime(netrw): removing trailing slash when copying files in same directory * v9.1.0645: wrong match when searching multi-byte char case-insensitive runtime(html): update syntax script to sync by 250 minlines by default * v9.1.0644: Unnecessary STRLEN( when applying mapping runtime(zip): Opening a remote zipfile don't work runtime(cuda): source c and cpp ftplugins * v9.1.0643: cursor may end up on invalid position * v9.1.0642: Check that mapping rhs starts with lhs fails if not simplified * v9.1.0641: OLE enabled in console version runtime(thrift): add ftplugin, indent and syntax scripts * v9.1.0640: Makefile can be improved * v9.1.0639: channel timeout may wrap around * v9.1.0638: E1510 may happen when formatting a message for smsg() * v9.1.0637: Style issues in MSVC Makefile * Update apparmor.vim to latest version (from AppArmor 4.0.2) * add support for "all" and "userns" rules, and new profile flags * Update to 9.1.0636: * 9.1.0636: filetype: ziggy files are not recognized * 9.1.0635: filetype: SuperHTML template files not recognized * 9.1.0634: Ctrl-P not working by default * 9.1.0633: Compilation warnings with `-Wunused-parameter` * 9.1.0632: MS-Windows: Compiler Warnings Add support for Files-Included in syntax script tweak documentation style a bit * 9.1.0631: wrong completion list displayed with non-existing dir + fuzzy completion * 9.1.0630: MS-Windows: build fails with VIMDLL and mzscheme * 9.1.0629: Rename of pum hl_group is incomplete * 9.1.0628: MinGW: coverage files are not cleaned up * 9.1.0627: MinGW: build-error when COVERAGE is enabled * 9.1.0626: Vim9: need more tests with null objects include initial filetype plugin * 9.1.0625: tests: test output all translated messages for all translations * 9.1.0624: ex command modifiers not found * 9.1.0623: Mingw: errors when trying to delete non-existing files * 9.1.0622: MS-Windows: mingw-build can be optimized * 9.1.0621: MS-Windows: startup code can be improved * 9.1.0620: Vim9: segfauls with null objects * 9.1.0619: tests: test_popup fails * 9.1.0618: cannot mark deprecated attributes in completion menu * 9.1.0617: Cursor moves beyond first line of folded end of buffer * 9.1.0616: filetype: Make syntax highlighting off for MS Makefiles * 9.1.0615: Unnecessary STRLEN() in make_percent_swname() Add single-line comment syntax Add syntax test for comments Update maintainer info * 9.1.0614: tests: screendump tests fail due to recent syntax changes * 9.1.0613: tests: termdebug test may fail and leave file around Update base- syntax, improve :set highlighting Optionally highlight the :: token for method references * 9.1.0612: filetype: deno.lock file not recognized Use delete() for deleting directory escape filename before trying to delete it * 9.1.0611: ambiguous mappings not correctly resolved with modifyOtherKeys correctly extract file from zip browser * 9.1.0610: filetype: OpenGL Shading Language files are not detected Fix endless recursion in netrw#Explore() * 9.1.0609: outdated comments in Makefile update syntax script Fix flow mapping key detection Remove orphaned YAML syntax dump files * 9.1.0608: Coverity warns about a few potential issues Update syntax script and remove syn sync * 9.1.0607: termdebug: uses inconsistent style * 9.1.0606: tests: generated files may cause failure in test_codestyle * 9.1.0605: internal error with fuzzy completion * 9.1.0604: popup_filter during Press Enter prompt seems to hang translation: Update Serbian messages translation * 9.1.0603: filetype: use correct extension for Dracula * 9.1.0602: filetype: Prolog detection can be improved fix more inconsistencies in assert function docs * 9.1.0601: Wrong cursor position with 'breakindent' when wide char doesn't fit Update base-syntax, improve :map highlighting * 9.1.0600: Unused function and unused error constants * 9.1.0599: Termdebug: still get E1023 when specifying arguments correct wrong comment options fix typo "a xterm" -> "an xterm" * 9.1.0598: fuzzy completion does not work with default completion * 9.1.0597: KeyInputPre cannot get the (unmapped typed) key * 9.1.0596: filetype: devscripts config files are not recognized gdb file/folder check is now performed only in CWD. quote filename arguments using double quotes update syntax to SDC-standard 2.1 minor updates. Cleanup :match and :loadkeymap syntax test files Update base-syntax, match types in Vim9 variable declarations * 9.1.0595: make errors out with the po Makefile * 9.1.0594: Unnecessary redraw when setting 'winfixbuf' using wrong highlight for UTF-8 include simple syntax plugin * 9.1.0593: filetype: Asymptote files are not recognized add recommended indent options to ftplugin add recommended indent options to ftplugin add recommended indent options to ftplugin * 9.1.0592: filetype: Mediawiki files are not recognized * 9.1.0591: filetype: *.wl files are not recognized * 9.1.0590: Vim9: crash when accessing getregionpos() return value 'cpoptions': Include "z" in the documented default * 9.1.0589: vi: d{motion} and cw work differently than expected update included colorschemes grammar fixes in options.txt * Update to 9.1.0588: * 9.1.0588: The maze program no longer compiles on newer clang runtime(typst): Add typst runtime files * 9.1.0587: tests: Test_gui_lowlevel_keyevent is still flaky * 9.1.0586: ocaml runtime files are outdated runtime(termdebug): fix a few issues * 9.1.0585: tests: test_cpoptions leaves swapfiles around * 9.1.0584: Warning about redeclaring f_id() non-static runtime(doc): Add hint how to load termdebug from vimrc runtime(doc): document global insert behavior * 9.1.0583: filetype: *.pdf_tex files are not recognized * 9.1.0582: Printed line doesn't overwrite colon when pressing Enter in Ex mode * 9.1.0581: Various lines are indented inconsistently * 9.1.0580: :lmap mapping for keypad key not applied when typed in Select mode * 9.1.0579: Ex command is still executed after giving E1247 * 9.1.0578: no tests for :Tohtml * 9.1.0577: Unnecessary checks for v:sizeoflong in test_put.vim * 9.1.0576: tests: still an issue with test_gettext_make * 9.1.0575: Wrong comments in alt_tabpage() * 9.1.0574: ex: wrong handling of commands after bar runtime(doc): add a note for netrw bug reports * 9.1.0573: ex: no implicit print for single addresses runtime(vim): make &indentexpr available from the outside * 9.1.0572: cannot specify tab page closing behaviour runtime(doc): remove obsolete Ex insert behavior * 9.1.0571: tests: Test_gui_lowlevel_keyevent is flaky runtime(logindefs): update syntax with new keywords * 9.1.0570: tests: test_gettext_make can be improved runtime(filetype): Fix Prolog file detection regex * 9.1.0569: fnamemodify() treats ".." and "../" differently runtime(mojo): include mojo ftplugin and indent script * 9.1.0568: Cannot expand paths from 'cdpath' setting * 9.1.0567: Cannot use relative paths as findfile() stop directories * 9.1.0566: Stop dir in findfile() doesn't work properly w/o trailing slash * 9.1.0565: Stop directory doesn't work properly in 'tags' * 9.1.0564: id() can be faster * 9.1.0563: Cannot process any Key event * 9.1.0562: tests: inconsistency in test_findfile.vim runtime(fstab): Add missing keywords to fstab syntax * 9.1.0561: netbeans: variable used un-initialized (Coverity) * 9.1.0560: bindtextdomain() does not indicate an error * 9.1.0559: translation of vim scripts can be improved * 9.1.0558: filetype: prolog detection can be improved * 9.1.0557: moving in the buffer list doesn't work as documented runtime(doc): fix inconsistencies in :h file-searching * 9.1.0556: :bwipe doesn't remove file from jumplist of other tabpages runtime(htmlangular): correct comment * 9.1.0555: filetype: angular ft detection is still problematic * 9.1.0554: :bw leaves jumplist and tagstack data around * 9.1.0553: filetype: *.mcmeta files are not recognized * 9.1.0552: No test for antlr4 filetype * 9.1.0551: filetype: htmlangular files are not properly detected * 9.1.0550: filetype: antlr4 files are not recognized * 9.1.0549: fuzzycollect regex based completion not working as expected runtime(doc): autocmd_add() accepts a list not a dict * 9.1.0548: it's not possible to get a unique id for some vars runtime(tmux): Update syntax script * 9.1.0547: No way to get the arity of a Vim function * 9.1.0546: vim-tiny fails on CTRL-X/CTRL-A runtime(hlsplaylist): include hlsplaylist ftplugin file runtime(doc): fix typo in :h ft-csv-syntax runtime(doc): Correct shell command to get $VIMRUNTIME into shell * 9.1.0545: MSVC conversion warning * 9.1.0544: filetype: ldapconf files are not recognized runtime(cmakecache): include cmakecache ftplugin file runtime(lex): include lex ftplugin file runtime(yacc): include yacc ftplugin file runtime(squirrel): include squirrel ftplugin file runtime(objcpp): include objcpp ftplugin file runtime(tf): include tf ftplugin file runtime(mysql): include mysql ftplugin file runtime(javacc): include javacc ftplugin file runtime(cabal): include cabal ftplugin file runtime(cuda): include CUDA ftplugin file runtime(editorconfig): include editorconfig ftplugin file runtime(kivy): update kivy syntax, include ftplugin runtime(syntax-tests): Stop generating redundant " ___ 99.dump" files * 9.1.0543: Behavior of CursorMovedC is strange runtime(vim): Update base- syntax, improve :match command highlighting * 9.1.0542: Vim9: confusing string() output for object functions * 9.1.0541: failing test with Vim configured without channel * 9.1.0540: Unused assignment in sign_define_cmd() runtime(doc): add page- scrolling keys to index.txt runtime(doc): add reference to xterm-focus-event from FocusGained/Lost * 9.1.0539: Not enough tests for what v9.1.0535 fixed runtime(doc): clarify how to re-init csv syntax file * 9.1.0538: not possible to assign priority when defining a sign * 9.1.0537: signed number detection for CTRL-X/A can be improved * 9.1.0536: filetype: zone files are not recognized * 9.1.0535: newline escape wrong in ex mode runtime(man): honor cmd modifiers before `g:ft_man_open_mode` runtime(man): use `nnoremap` to map to Ex commands * 9.1.0534: completion wrong with fuzzy when cycling back to original runtime(syntax-tests): Abort and report failed cursor progress runtime(syntax-tests): Introduce self tests for screen dumping runtime(syntax-tests): Clear and redraw the ruler line with the shell info runtime(syntax-tests): Allow for folded and wrapped lines in syntax test files * 9.1.0533: Vim9: need more tests for nested objects equality CI: Pre-v* 9.0.0110 versions generate bogus documentation tag entries runtime(doc): Remove wrong help tag CTRL-SHIFT-CR * 9.1.0532: filetype: Cedar files not recognized runtime(doc): document further keys that scroll page up/down * 9.1.0531: resource leak in mch_get_random() runtime(tutor): Fix wrong spanish translation runtime(netrw): fix remaining case of register clobber * 9.1.0530: xxd: MSVC warning about non-ASCII character * 9.1.0529: silent! causes following try/catch to not work runtime(rust): use shiftwidth() in indent script * 9.1.0528: spell completion message still wrong in translations * 9.1.0527: inconsistent parameter in Makefiles for Vim executable * 9.1.0526: Unwanted cursor movement with pagescroll at start of buffer runtime(doc): mention $XDG_CONFIG_HOME instead of $HOME/.config * 9.1.0525: Right release selects immediately when pum is truncated. * 9.1.0524: the recursive parameter in the *_equal functions can be removed runtime(termdebug): Add Deprecation warnings * 9.1.0523: Vim9: cannot downcast an object * 9.1.0522: Vim9: string(object) hangs for recursive references * 9.1.0521: if_py: _PyObject_CallFunction_SizeT is dropped in Python 3.13 * 9.1.0520: Vim9: incorrect type checking for modifying lists runtime(manpager): avoid readonly prompt * 9.1.0519: MS-Windows: libvterm compilation can be optimized * 9.1.0518: initialize the random buffer can be improved * 9.1.0517: MS-Windows: too long lines in Make_mvc.mak runtime(terraform): Add filetype plugin for terraform runtime(dockerfile): enable spellchecking of comments in syntax script runtime(doc): rename variable for pandoc markdown support runtime(doc): In builtin overview use {buf} as param for appendbufline/setbufline runtime(doc): clarify, that register 1- _9 will always be shifted runtime(netrw): save and restore register 0-_ 9, a and unnamed runtime(termdebug): Refactored StartDebug_term and EndDebug functions runtime(java): Compose "g:java_highlight_signature" and "g:java_highlight_functions" * 9.1.0516: need more tests for nested dicts and list comparision * 9.1.0515: Vim9: segfault in object_equal() * 9.1.0514: Vim9: issue with comparing objects recursively runtime(termdebug): Change some variables to Enums runtime(vim): Update base-syntax, fix function tail comments * 9.1.0513: Vim9: segfault with object comparison * Update to 9.1.0512: * Mode message for spell completion doesn't match allowed keys * CursorMovedC triggered wrongly with setcmdpos() * update runtime files * CI: test_gettext fails on MacOS14 + MSVC Win * not possible to translate Vim script messages * termdebug plugin can be further improved * add gomod filetype plugin * hard to detect cursor movement in the command line * Optionally highlight parameterised types * filetype: .envrc & .prettierignore not recognized * filetype: Faust files are not recognized * inner-tag textobject confused about ">" in attributes * cannot use fuzzy keyword completion * Remove the group exclusion list from @javaTop * wrong return type for execute() function * MS-Windows: too much legacy code * too complicated mapping restore in termdebug * simplify mapping * cannot switch buffer in a popup * MS-Windows: doesn't handle symlinks properly * getcmdcompltype() interferes with cmdline completion * termdebug can be further improved * update htmldjango detection * Improve Turkish documentation * include a simple csv filetype and syntax plugin * include the the simple nohlsearch package * matched text is highlighted case-sensitively * Matched text isn't highlighted in cmdline pum * Fix typos in several documents * clarify when text properties are cleared * improve the vim-shebang example * revert unintended formatting changes for termdebug * Add a config variable for commonly used compiler options * Wrong matched text highlighted in pum with 'rightleft' * bump length of character references in syntax script * properly check mapping variables using null_dict * fix KdlIndent and kdlComment in indent script * Test for patch 9.1.0489 doesn't fail without the fix * Fold multi-line comments with the syntax kind of &fdm * using wrong type for PlaceSign() * filetype: Vim-script files not detected by shebang line * revert unintended change to zip#Write() * add another tag for vim-shebang feature * Cmdline pum doesn't work properly with 'rightleft' * minor style problems with patch 9.1.0487 * default completion may break with fuzzy * Wrong padding for pum "kind" with 'rightleft' * Update base-syntax, match shebang lines * MS-Windows: handle files with spaces properly * Restore HTML syntax file tests * completed item not update on fuzzy completion * filetype: Snakemake files are not recognized * make TermDebugSendCommand() a global function again * close all buffers in the same way * Matched text shouldn't be highlighted in "kind" and "menu" * fix wrong helptag for :defer * Update base-syntax, match :sleep arg * include Georgian keymap * Sorting of completeopt+=fuzzy is not stable * correctly test for windows in NetrwGlob() * glob() on windows fails with [] in directory name * rewrite mkdir() doc and simplify {flags} meaning * glob() not sufficiently tested * update return type for job_info() * termdebug plugin needs more love * correct return types for job_start() and job_status() * Update base-syntax, match :catch and :throw args * Include element values in non-marker annotations * Vim9: term_getjob() throws an exception on error * fuzzy string matching executed when not needed * fuzzy_match_str_with_pos() does unnecessary list operations * restore description of "$" in col() and virtcol() * deduplicate getpos(), line(), col(), virtcol() * Update g:vimsyn_comment_strings dump file tests * Use string interpolation instead of string concat * potential deref of NULL pointer in fuzzy_match_str_with_pos * block_editing errors out when using * Update base-syntax, configurable comment string highlighting * fix typos in syntax.txt * Cannot see matched text in popup menu * Update base-syntax, match multiline continued comments * clarify documentation for "v" position at line() * cmod_split modifier is always reset in term_start() * remove line-continuation characters * use shiftwidth() instead of &tabstop in indent script * Remove orphaned screen dump files * include syntax, indent and ftplugin files * CI: Test_ColonEight() fails on github runners * add missing Enabled field in syntax script * basic svelte ftplugin file * term_start() does not clear vertical modifier * fix mousemodel restoration by comparing against null_string * Added definitions of Vim scripts and plugins * Exclude lambda expressions from _when_ _switch-case_ label clauses * Fix saved_mousemodel check * Inconsistencies between functions for option flags * Crash when using autocmd_get() after removing event inside autocmd * Fix small style issues * add return type info for Vim function descriptions * Update Italian Vim manpage * disable the q mapping * Change 'cms' for C++ to '// %s' * fix type mismatch error * Fix wrong email address * convert termdebug plugin to Vim9 script * Update to 9.1.0470: * tests Test_ColonEight_MultiByte() fails sporadically * Cannot have buffer-local value for 'completeopt' * GvimExt does not consult HKEY_CURRENT_USER * typos in some comments * runtime(vim): Update base-syntax, allow whitespace before :substitute pattern * Missing comments for fuzzy completion * runtime(man): update Vim manpage * runtime(comment): clarify the usage of 'commentstring' option value * runtime(doc): clarify how fuzzy 'completeopt' should work * runtime(netrw): prevent accidental data loss * missing filecopy() function * no whitespace padding in commentstring option in ftplugins * no fuzzy-matching support for insert-completion * eval5() and eval7 are too complex * too many strlen() calls in drawline.c * filetype lintstagedrc files are not recognized * Vim9 import autoload does not work with symlink * Coverity complains about division by zero * tests test_gui fails on Wayland * Left shift is incorrect with vartabstop and shiftwidth=0 * runtime(doc): clarify 'shortmess' flag "S" * MS-Windows compiler warning for size_t to int conversion * runtime(doc): include some vim9 script examples in the help * minor issues in test_filetype with rasi test * filetype rasi files are not recognized * runtime(java): Improve the matching of lambda expressions * Configure checks for libelf unnecessarily * No test for escaping '<' with shellescape() * check.vim complains about overlong comment lines * translation(it): Update Italian translation * evalc. code too complex * MS-Windows Compiler warnings * Update to 9.1.0448: * compiler warning in eval.c * remove remaining css code * Add ft_hare.txt to Reference Manual TOC * re-generate vim syntax from generator * fix syntax vim bug * completion may be wrong when deleting all chars * getregionpos() inconsistent for partly-selected multibyte char * fix highlighting nested and escaped quotes in string props * remove the indent plugin since it has too many issues * update Debian runtime files * Coverity warning after 9.1.0440 * Not enough tests for getregion() with multibyte chars * Can't use blockwise selection with width for getregion() * update outdated syntax files * fix floating_modifier highlight * hare runtime files outdated * getregionpos() can't properly indicate positions beyond eol * function get_lval() is too long * Cannot filter the history * Wrong Ex command executed when :g uses '?' as delimiter * support floating_modifier none; revert broken highlighting * Motif requires non-const char pointer for XPM data * Crash when using '?' as separator for :s * filetype: cygport files are not recognized * make errors trying to access autoload/zig * Wrong yanking with exclusive selection and ve=all * add missing help tags file * Ancient XPM preprocessor hack may cause build errors * include basic rescript ftplugin file * eval.c is too long * getregionpos() doesn't handle one char selection * check for gdb file/dir before using as buffer name * refactor zig ftplugin, remove auto format * Coverity complains about eval.c refactor * Tag guessing leaves wrong search history with very short names * some issues with termdebug mapping test * update matchit plugin to v1.20 * too many strlen() calls in search.c * set commentstring option * update vb indent plugin as vim9script * filetype: purescript files are not recognized * filetype: slint files are not recognized * basic nim ftplugin file for comments * Add Arduino ftplugin and indent files * include basic typst ftplugin file * include basic prisma ftplugin file * include basic v ftplugin for comment support * getregionpos() wrong with blockwise mode and multibyte * function echo_string_core() is too long * hyprlang files are not recognized * add basic dart ftplugin file * basic ftplugin file for graphql * mention comment plugin at :h 'commentstring' * set commentstring for sql files in ftplugin * :browse oldfiles prompts even with single entry * eval.c not sufficiently tested * clarify why E195 is returned * clarify temporary file clean up * fix :NoMatchParen not working * Cannot move to previous/next rare word * add basic ftplugin file for sshdconfig * if_py: find_module has been removed in Python 3.12.0a7 * some screen dump tests can be improved * Some functions are not tested * clarify instal instructions for comment package * Unable to leave long line with 'smoothscroll' and 'scrolloff' * fix typo in vim9script help file * Remove trailing spaces * clarify {special} argument for shellescape() update to 9.1.0413: * smoothscroll may cause infinite loop * add missing entries for the keys CTRL-W g and * update vi_diff.txt: add default value for 'flash' * typo in regexp_bt.c in DEBUG code * allow indented commands * Fix wrong define regex in ftplugin * Filter out non-Latin-1 characters for syntax tests * prefer scp over pscp * fix typo in usr_52.txt * too long functions in eval.c * warning about uninitialized variable * too many strlen() calls in the regexp engine * E16 fix, async keyword support for define * Stuck with long line and half-page scrolling * Divide by zero with getmousepos() and 'smoothscroll' * update and remove some invalid links * update translation of xxd manpage * Recursively delete directories by default with netrw delete command * Strive to remain compatible for at least Vim 7.0 * tests: xxd buffer overflow fails on 32-bit * Stop handpicking syntax groups for @javaTop * [security] xxd: buffer-overflow with specific flags * Vim9: not able to import file from start dir * filetype: mdd files detected as zsh filetype * filetype: zsh module files are not recognized * Remove hardcoded private.ppk logic from netrw * Vim9: confusing error message for unknown type * block_editing errors out when using del * add new items to scripts section in syntax plugin * Vim9: imported vars are not properly type checked * Wrong display with 'smoothscroll' when changing quickfix list * filetype: jj files are not recognized * getregionpos() may leak memory on error * The CODEOWNERS File is not useful * Remove and cleanup Win9x legacy from netrw * add MsgArea to 'highlight' option description * Cannot get a list of positions describing a region * Fix digit separator in syntax script for octals and floats * Update link to Wikipedia Vi page * clear $MANPAGER in ftplugin before shelling out * Fix typos in help documents * 'viewdir' not respecting $XDG_CONFIG_HOME * tests: Vim9 debug tests may be flaky * correct getscriptinfo() example * Vim9: could improve testing * test_sound fails on macos-12 * update Serbian menu * update Slovak menu * update Slovenian menu * update Portuguese menu * update Dutch menu * update Korean menu * update Icelandic menu * update Czech menu * update Afrikaans menu * update German menu * filetype: inko files are not recognized * filetype: templ files are not recognized * cursor() and getregion() don't handle v:maxcol well * Vim9: null value tests not sufficient * update Catalan menu * filetype: stylus files not recognized * update spanish menu localization * regenerate helptags * Vim9: crash with null_class and null_object * Add tags about lazyloading of menu * tests: vt420 terminfo entry may not be found * filetype: .out files recognized as tex files * filetype: Kbuild files are not recognized * cbuffer and similar commands don't accept a range * Improve the recognition of the "indent" method declarations * Fix a typo in usr_30.txt * remove undefined var s:save_cpoptions and add include setting * missing setlocal in indent plugin * Calculating line height for unnecessary amount of lines * improve syntax file performance * There are a few typos * Vim9: no comments allowed after class vars * CI: remove trailing white space in documentation * Formatting text wrong when 'breakindent' is set * Add oracular (24.10) as Ubuntu release name * Vim9: Trailing commands after class/enum keywords ignored * tests: 1-second delay after Test_BufEnter_botline() * update helptags for jq syntax * include syntax, ftplugin and compiler plugin * fix typo synconcealend -> synconcealed * include a simple comment toggling plugin * wrong botline in BufEnter * clarify syntax vs matching mechanism * fix undefined variable in indent plugin * ops.c code uses too many strlen() calls * Calling CLEAR_FIELD() on the same struct twice * Vim9: compile_def_function() still too long * Update Serbian messages * clarify the effect of setting the shell to powershell * Improve the recognition of the "style" method declarations * Vim9: problem when importing autoloaded scripts * compile_def_function is too long * filetype: ondir files are not recognized * Crash when typing many keys with D- modifier * tests: test_vim9_builtin is a bit slow * update documentation * change the download URL of "libsodium" * tests: test_winfixbuf is a bit slow * Add filetype, syntax and indent plugin for Astro * expanding rc config files does not work well * Vim9: vim9type.c is too complicated * Vim9: does not handle autoloaded variables well * minor spell fix in starting.txt * wrong drawing in GUI with setcellwidth() * Add include and suffixesadd * Page scrolling should place cursor at window boundaries * align command line table * minor fixes to starting.txt * fix comment definition in filetype plugin * filetype: flake.lock files are not recognized * runtime(uci): No support for uci file types * Support "g:ftplugin_java_source_path" with archived files * tests: Test_autoload_import_relative_compiled fails on Windows * Finding cmd modifiers and cmdline-specials is inefficient * No test that completing a partial mapping clears 'showcmd' * tests: test_vim9_dissamble may fail * Vim9: need static type for typealias * X11 does not ignore smooth scroll event * A few typos in test_xdg when testing gvimrc * Patch v9.1.0338 fixed sourcing a script with import * Problem: gvimrc not sourced from XDG_CONFIG_HOME * Cursor wrong after using setcellwidth() in terminal * 'showcmd' wrong for partial mapping with multibyte * tests: test_taglist fails when 'helplang' contains non-english * Problem: a few memory leaks are found * Problem: Error with matchaddpos() and empty list * tests: xdg test uses screen dumps * Vim9: import through symlinks not correctly handled * Missing entry for XDG vimrc file in :version * tests: typo in test_xdg * runtime(i3config/swayconfig): update syntax scripts * document pandoc compiler and enable configuring arguments * String interpolation fails for List type * No test for highlight behavior with 'ambiwidth' * tests: test_xdg fails on the appimage repo * tests: some assert_equal() calls have wrong order of args * make install does not install all files * runtime(doc): fix typos in starting.txt * Updated to version 9.1 with patch level 0330, fixes the following problems * Fixing bsc#1220763 - vim gets Segmentation fault after updating to version 9.1.0111-150500.20.9.1 For the complete list of changes see https://github.com/vim/vim/compare/v9.1.0111...v9.1.0330 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-217=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-217=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * vim-data-common-9.1.1101-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * vim-small-9.1.1101-1.1 * vim-small-debuginfo-9.1.1101-1.1 * vim-debugsource-9.1.1101-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * xxd-debuginfo-9.1.1101-1.1 * vim-debugsource-9.1.1101-1.1 * vim-9.1.1101-1.1 * xxd-9.1.1101-1.1 * vim-debuginfo-9.1.1101-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43374.html * https://www.suse.com/security/cve/CVE-2024-43790.html * https://www.suse.com/security/cve/CVE-2024-43802.html * https://www.suse.com/security/cve/CVE-2024-45306.html * https://www.suse.com/security/cve/CVE-2024-47814.html * https://www.suse.com/security/cve/CVE-2025-1215.html * https://www.suse.com/security/cve/CVE-2025-22134.html * https://www.suse.com/security/cve/CVE-2025-24014.html * https://bugzilla.suse.com/show_bug.cgi?id=1220763 * https://bugzilla.suse.com/show_bug.cgi?id=1229238 * https://bugzilla.suse.com/show_bug.cgi?id=1229685 * https://bugzilla.suse.com/show_bug.cgi?id=1229822 * https://bugzilla.suse.com/show_bug.cgi?id=1230078 * https://bugzilla.suse.com/show_bug.cgi?id=1231373 * https://bugzilla.suse.com/show_bug.cgi?id=1235695 * https://bugzilla.suse.com/show_bug.cgi?id=1236151 * https://bugzilla.suse.com/show_bug.cgi?id=1237137 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:08 -0000 Subject: SUSE-RU-2025:20127-1: moderate: Recommended update for python-PyJWT Message-ID: <174902688853.655.4732310191559437860@smelt2.prg2.suse.org> # Recommended update for python-PyJWT Announcement ID: SUSE-RU-2025:20127-1 Release Date: 2025-02-13T12:29:03Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for python-PyJWT fixes the following issues: Update to version 2.9.0 * Allow JWT issuer claim validation to accept a list of strings too by @mattpollak in #913 * Fix unnecessary string concatenation by @sirosen in #904 * Fix docs for `jwt.decode_complete` to include `strict_aud` option by @woodruffw in #923 * Fix docs step by @jpadilla in #950 * Fix: Remove an unused variable from example code block by @kenkoooo in #958 * Add support for Python 3.12 by @hugovk in #910 * Improve performance of `is_ssh_key` \+ add unit test by @bdraco in #940 * Allow `jwt.decode()` to accept a PyJWK object by @luhn in #886 * Make `algorithm_name` attribute available on PyJWK by @luhn in #886 * Raise `InvalidKeyError` on invalid PEM keys to be compatible with cryptography 42.x.x by @CollinEMac in #952 * Raise an exception when required cryptography dependency is missing by @tobloef in #963 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-214=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-PyJWT-2.9.0-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:09 -0000 Subject: SUSE-SU-2025:20126-1: moderate: Security update for unbound Message-ID: <174902688993.655.13553982489530549659@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2025:20126-1 Release Date: 2025-02-13T12:29:03Z Rating: moderate References: * bsc#1231284 Cross-References: * CVE-2024-8508 CVSS scores: * CVE-2024-8508 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-8508 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for unbound fixes the following issues: * Update to 1.22.0: Features: * Add iter-scrub-ns, iter-scrub-cname and max-global-quota configuration options. * Merge patch to fix for glue that is outside of zone, with `harden- unverified-glue`, from Karthik Umashankar (Microsoft). Enabling this option protects the Unbound resolver against bad glue, that is unverified out of zone glue, by resolving them. It uses the records as last resort if there is no other working glue. * Add redis-command-timeout: 20 and redis-connect-timeout: 200, that can set the timeout separately for commands and the connection set up to the redis server. If they are not specified, the redis-timeout value is used. * Log timestamps in ISO8601 format with timezone. This adds the option `log- time-iso: yes` that logs in ISO8601 format. * DNS over QUIC. This adds `quic-port: 853` and `quic-size: 8m` that enable dnsoverquic, and the counters `num.query.quic` and `mem.quic` in the statistics output. The feature needs to be enabled by compiling with libngtcp2, with `--with-libngtcp2=path` and libngtcp2 needs openssl+quic, pass that with `--with-ssl=path` to compile unbound as well. Bug Fixes: * unbound-control-setup hangs while testing for openssl presence starting from version 1.21.0. * Fix error: "memory exhausted" when defining more than 9994 local-zones. * Fix documentation for cache_fill_missing function. * Fix Loads of logs: "validation failure: key for validation . is marked as invalid because of a previous" for non-DNSSEC signed zone. * Fix that when rpz is applied the message does not get picked up by the validator. That stops validation failures for the message. * Fix that stub-zone and forward-zone clauses do not exhaust memory for long content. * Fix to print port number in logs for auth zone transfer activities. * b.root renumbering. * Add new IANA trust anchor. * Fix config file read for dnstap-sample-rate. * Fix alloc-size and calloc-transposed-args compiler warnings. * Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled (RFC9077). * Fix dns64 with prefetch that the prefetch is stored in cache. * Attempt to further fix doh_downstream_buffer_size.tdir flakiness. * More clear text for prefetch and minimal-responses in the unbound.conf man page. * Fix cache update when serve expired is used. Expired records are favored over resolution and validation failures when serve-expired is used. * Fix negative cache NSEC3 parameter compares for zero length NSEC3 salt. * Fix unbound-control-setup hangs sometimes depending on the openssl version. * Fix Cannot override tcp-upstream and tls- upstream with forward-tcp-upstream and forward-tls-upstream. * Fix to limit NSEC TTL for messages from cachedb. Fix to limit the prefetch ttl for messages after a CNAME with short TTL. * Fix to disable detection of quic configured ports when quic is not compiled in. * Fix harden-unverified-glue for AAAA cache_fill_missing lookups. * Fix contrib/aaaa-filter-iterator for change in call signature for cache_fill_missing. * Fix to display warning if quic-port is set but dnsoverquic is not enabled when compiled. * Fix dnsoverquic to extend the number of streams when one is closed. * Fix for dnstap with dnscrypt and dnstap without dnsoverquic. * Fix for dnsoverquic and dnstap to use the correct dnstap environment. * Update to 1.21.1: Security Fixes: * CVE-2024-8508: unbounded name compression could lead to denial of service. (bsc#1231284) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-213=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * unbound-anchor-debuginfo-1.22.0-1.1 * unbound-debugsource-1.22.0-1.1 * libunbound8-debuginfo-1.22.0-1.1 * libunbound8-1.22.0-1.1 * unbound-anchor-1.22.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8508.html * https://bugzilla.suse.com/show_bug.cgi?id=1231284 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:12 -0000 Subject: SUSE-RU-2025:20125-1: moderate: Recommended update for audit Message-ID: <174902689287.655.10091688943206762746@smelt2.prg2.suse.org> # Recommended update for audit Announcement ID: SUSE-RU-2025:20125-1 Release Date: 2025-02-13T12:07:02Z Rating: moderate References: * bsc#1215377 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for audit fixes the following issues: * Fix plugin termination when using systemd service units (bsc#1215377) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-212=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * audit-debuginfo-3.0.9-6.1 * system-group-audit-3.0.9-6.1 * audit-secondary-debugsource-3.0.9-6.1 * libauparse0-3.0.9-4.1 * audit-audispd-plugins-debuginfo-3.0.9-6.1 * python3-audit-debuginfo-3.0.9-6.1 * libaudit1-3.0.9-4.1 * libauparse0-debuginfo-3.0.9-4.1 * audit-3.0.9-6.1 * audit-debugsource-3.0.9-4.1 * audit-audispd-plugins-3.0.9-6.1 * python3-audit-3.0.9-6.1 * libaudit1-debuginfo-3.0.9-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215377 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:35 -0000 Subject: SUSE-SU-2025:20124-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <174902691561.655.14548979785530986083@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2025:20124-1 Release Date: 2025-02-13T08:40:08Z Rating: moderate References: * bsc#1228182 * bsc#1228690 * bsc#1229079 * bsc#1229104 * bsc#1231497 * bsc#1231568 * bsc#1231618 * bsc#1231759 * bsc#1232575 * bsc#1232769 * bsc#1232817 * bsc#1233202 * bsc#1233279 * bsc#1233630 * bsc#1233660 * bsc#1233667 * bsc#1234123 * jsc#MSQA-914 Cross-References: * CVE-2024-22037 CVSS scores: * CVE-2024-22037 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L * CVE-2024-22037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-22037 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-22037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability, contains one feature and has 16 fixes can now be installed. ## Description: This update fixes the following issues: salt: * Revert setting SELinux context for minion service (bsc#1233667) * Removed System V init support * Fix the condition of alternatives for Tumbleweed and Leap 16 * Build all python bindings for all flavors * Make minion reconnecting on changing master IP (bsc#1228182) * Handle logger exception when flushing already closed file * Include passlib as a recommended dependency * Make Salt Bundle more tolerant to long running jobs (bsc#1228690) uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0: * Security issues fixed: * CVE-2024-22037: Use podman secret to store the database credentials (bsc#1231497) * Other changes and bugs fixed: * Version 0.1.27-0 * Bump the default image tag to 5.0.3 * IsInstalled function fix * Run systemctl daemon-reload after changing the container image config (bsc#1233279) * Coco-replicas-upgrade * Persist search server indexes (bsc#1231759) * Sync deletes files during migration (bsc#1233660) * Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079) * Add --registry back to mgrpxy (bsc#1233202) * Only add java.hostname on migrated server if not present * Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104) * Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630) * Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123) * Version 0.1.26-0 * Ignore all zypper caches during migration (bsc#1232769) * Use the uyuni network for all podman containers (bsc#1232817) * Version 0.1.25-0 * Don't migrate enabled systemd services, recreate them (bsc#1232575) * Version 0.1.24-0 * Redact JSESSIONID and pxt-session-cookie values from logs and console output (bsc#1231568) venv-salt-minion: * Included D-Bus python module for SUSE distros (bsc#1231618) * Reverted setting SELinux context for minion service (bsc#1233667) * Make minion reconnecting on changing master IP (bsc#1228182) * Fixed post_start_cleanup.sh shebang to work on all systems * Handle logger exception when flushing already closed file * Made Salt Bundle more tolerant to long running jobs (bsc#1228690) * Modified: * include-rpm * filter-requires.sh ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-211=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-salt-3006.0-9.1 * salt-transactional-update-3006.0-9.1 * salt-minion-3006.0-9.1 * salt-3006.0-9.1 * salt-master-3006.0-9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22037.html * https://bugzilla.suse.com/show_bug.cgi?id=1228182 * https://bugzilla.suse.com/show_bug.cgi?id=1228690 * https://bugzilla.suse.com/show_bug.cgi?id=1229079 * https://bugzilla.suse.com/show_bug.cgi?id=1229104 * https://bugzilla.suse.com/show_bug.cgi?id=1231497 * https://bugzilla.suse.com/show_bug.cgi?id=1231568 * https://bugzilla.suse.com/show_bug.cgi?id=1231618 * https://bugzilla.suse.com/show_bug.cgi?id=1231759 * https://bugzilla.suse.com/show_bug.cgi?id=1232575 * https://bugzilla.suse.com/show_bug.cgi?id=1232769 * https://bugzilla.suse.com/show_bug.cgi?id=1232817 * https://bugzilla.suse.com/show_bug.cgi?id=1233202 * https://bugzilla.suse.com/show_bug.cgi?id=1233279 * https://bugzilla.suse.com/show_bug.cgi?id=1233630 * https://bugzilla.suse.com/show_bug.cgi?id=1233660 * https://bugzilla.suse.com/show_bug.cgi?id=1233667 * https://bugzilla.suse.com/show_bug.cgi?id=1234123 * https://jira.suse.com/browse/MSQA-914 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:41 -0000 Subject: SUSE-SU-2025:20123-1: moderate: Security update for cloud-regionsrv-client Message-ID: <174902692190.655.11358244894622927709@smelt2.prg2.suse.org> # Security update for cloud-regionsrv-client Announcement ID: SUSE-SU-2025:20123-1 Release Date: 2025-02-10T21:48:10Z Rating: moderate References: * bsc#1222985 * bsc#1227308 * bsc#1229137 * bsc#1229472 * bsc#1230615 * bsc#1232770 * bsc#1233333 * bsc#1234050 Affected Products: * SUSE Linux Micro 6.0 An update that has eight fixes can now be installed. ## Description: This update for cloud-regionsrv-client contains the following fixes: * Update to 10.3.11 (bsc#1234050) * Send registration code for the extensions, not only base product * Update to 10.3.9: (bsc#1234050) * Send registration code for the extensions, not only base product * Update to 10.3.8: (bsc#1233333) * Fix the package requirements for cloud-regionsrv-client * Follow changes to suseconnect error reporting from stdout to stderr * Update to 10.3.7: (bsc#1232770) * Fix the product triplet for LTSS, it is always SLES-LTSS, not $BASEPRODUCT- LTSS * Update to 10.3.6: (jsc#PCT-471, bsc#1230615) * Fix sudo setup ~ permissions cloudguestregistryauth ~ directory ownership /etc/sudoers.d * spec file ~ Remove traces of registry related entries on SLE 12 * Forward port ~ fix for sles12 disable registry ~ fix for sles12 no trans_update * Deregister non free extensions at registercloudguest --clean * Fix registry cleanup at registercloudguest --clean, don't remove files * Prevent duplicate search entries in registry setup * Update EC2 plugin to 1.0.5 * Switch to using the region endpoint from IMDS to determine the region instead of deriving the data from the availability zone * Update to 10.3.5: * Update spec file to build in all code streams and have proper dependencies. * Update to 10.3.4: * Modify the message when network access over a specific IP version does not work. This is an informational message and should not look like an error * Inform the user that LTSS registration takes a little longer * fix for sles12 no transactional update: * SLE 12 family has no products with transactional-update we do not need to look for this condition * From 10.3.3: (bsc#1229472) * Handle changes in process structure to properly identify the running zypper parent process and only check for 1 PID * From 10.3.2: * Remove rgnsrv-clnt-fix-docker-setup patch included upstream * From 10.3.1: (jsc#PCT-400) * Add support for LTSS registration * Add fix for sles12 disable registry issue: ~ No container support in SLE 12 * Add fix for docker setup: (bsc#1229137) * The entry for the update infrastructure registry mirror was written incorrectly causing docker daemon startup to fail. * Update to version 10.3.0: (bsc#1227308, bsc#1222985) * Add support for sidecar registry Podman and rootless Docker support to set up the necessary configuration for the container engines to run as defined * Add running command as root through sudoers file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-210=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-toml-0.10.2-5.118 * cloud-regionsrv-client-addon-azure-1.0.5-3.1 * cloud-regionsrv-client-generic-config-1.0.0-3.1 * cloud-regionsrv-client-plugin-azure-2.0.0-3.1 * cloud-regionsrv-client-10.3.11-3.1 * cloud-regionsrv-client-plugin-gce-1.0.0-3.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222985 * https://bugzilla.suse.com/show_bug.cgi?id=1227308 * https://bugzilla.suse.com/show_bug.cgi?id=1229137 * https://bugzilla.suse.com/show_bug.cgi?id=1229472 * https://bugzilla.suse.com/show_bug.cgi?id=1230615 * https://bugzilla.suse.com/show_bug.cgi?id=1232770 * https://bugzilla.suse.com/show_bug.cgi?id=1233333 * https://bugzilla.suse.com/show_bug.cgi?id=1234050 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:45 -0000 Subject: SUSE-SU-2025:20122-1: critical: Security update for rsync Message-ID: <174902692595.655.8595522663808465277@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2025:20122-1 Release Date: 2025-02-04T08:59:16Z Rating: critical References: * bsc#1234100 * bsc#1234101 * bsc#1234102 * bsc#1234103 * bsc#1234104 * bsc#1235475 Cross-References: * CVE-2024-12084 * CVE-2024-12085 * CVE-2024-12086 * CVE-2024-12087 * CVE-2024-12088 * CVE-2024-12747 CVSS scores: * CVE-2024-12084 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12084 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12084 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12085 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12085 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-12085 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-12086 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12086 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-12086 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2024-12087 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12087 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-12087 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-12088 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12747 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-12747 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-12747 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2024-12084: Fixed Heap Buffer Overflow in Checksum Parsing (bsc#1234100). * CVE-2024-12085: Fixed Info Leak via uninitialized Stack contents defeating ASLR (bsc#1234101). * CVE-2024-12086: Fixed server leaking arbitrary client files (bsc#1234102). * CVE-2024-12087: Fixed server use of symbolic links to make client write files outside of destination directory (bsc#1234103). * CVE-2024-12088: Fixed --safe-links bypass (bsc#1234104). * CVE-2024-12747: Fixed Race Condition in rsync Handling Symbolic Links (bsc#1235475). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-203=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * rsync-debuginfo-3.2.7-4.1 * rsync-3.2.7-4.1 * rsync-debugsource-3.2.7-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12084.html * https://www.suse.com/security/cve/CVE-2024-12085.html * https://www.suse.com/security/cve/CVE-2024-12086.html * https://www.suse.com/security/cve/CVE-2024-12087.html * https://www.suse.com/security/cve/CVE-2024-12088.html * https://www.suse.com/security/cve/CVE-2024-12747.html * https://bugzilla.suse.com/show_bug.cgi?id=1234100 * https://bugzilla.suse.com/show_bug.cgi?id=1234101 * https://bugzilla.suse.com/show_bug.cgi?id=1234102 * https://bugzilla.suse.com/show_bug.cgi?id=1234103 * https://bugzilla.suse.com/show_bug.cgi?id=1234104 * https://bugzilla.suse.com/show_bug.cgi?id=1235475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:47 -0000 Subject: SUSE-RU-2025:20121-1: moderate: Recommended update for ocl-icd Message-ID: <174902692727.655.8717243917720618267@smelt2.prg2.suse.org> # Recommended update for ocl-icd Announcement ID: SUSE-RU-2025:20121-1 Release Date: 2025-02-04T08:51:42Z Rating: moderate References: * jsc#PED-11441 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for ocl-icd fixes the following issues: Ship ocl-icd (libOpenCL1) in version 2.3.1. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-202=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libOpenCL1-debuginfo-2.3.1-1.1 * ocl-icd-debugsource-2.3.1-1.1 * libOpenCL1-2.3.1-1.1 ## References: * https://jira.suse.com/browse/PED-11441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:50 -0000 Subject: SUSE-RU-2025:20120-1: moderate: Recommended update for iptables Message-ID: <174902693086.655.6410059685119507841@smelt2.prg2.suse.org> # Recommended update for iptables Announcement ID: SUSE-RU-2025:20120-1 Release Date: 2025-02-03T09:24:25Z Rating: moderate References: * bsc#1234996 * bsc#1235088 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for iptables fixes the following issues: * Fixes checking existence of rules. Fixes issues with rule creation with podman/netavark. (bsc#1235088, bsc#1234996) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-190=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * iptables-debuginfo-1.8.9-4.1 * libip6tc2-1.8.9-4.1 * libxtables12-debuginfo-1.8.9-4.1 * xtables-plugins-1.8.9-4.1 * libxtables12-1.8.9-4.1 * libip4tc2-1.8.9-4.1 * iptables-debugsource-1.8.9-4.1 * libip4tc2-debuginfo-1.8.9-4.1 * iptables-1.8.9-4.1 * xtables-plugins-debuginfo-1.8.9-4.1 * libip6tc2-debuginfo-1.8.9-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234996 * https://bugzilla.suse.com/show_bug.cgi?id=1235088 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:56 -0000 Subject: SUSE-SU-2025:20119-1: moderate: Security update for python-dnspython Message-ID: <174902693634.655.10976786075839519156@smelt2.prg2.suse.org> # Security update for python-dnspython Announcement ID: SUSE-SU-2025:20119-1 Release Date: 2025-02-03T09:22:41Z Rating: moderate References: * bsc#1222693 Cross-References: * CVE-2023-29483 CVSS scores: * CVE-2023-29483 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-dnspython fixes the following issues: * CVE-2023-29483: Fixed potential DoS via the Tudoor mechanism (bsc#1222693). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-186=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-dnspython-2.4.2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-29483.html * https://bugzilla.suse.com/show_bug.cgi?id=1222693 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:48:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:48:59 -0000 Subject: SUSE-SU-2025:20118-1: important: Security update for dnsmasq Message-ID: <174902693966.655.17494974795561532725@smelt2.prg2.suse.org> # Security update for dnsmasq Announcement ID: SUSE-SU-2025:20118-1 Release Date: 2025-02-03T09:22:41Z Rating: important References: * bsc#1214884 * bsc#1219823 * bsc#1219826 Cross-References: * CVE-2023-28450 * CVE-2023-50387 * CVE-2023-50868 CVSS scores: * CVE-2023-28450 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-28450 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28450 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for dnsmasq fixes the following issues: * Update to 2.90: * CVE-2023-50387, CVE-2023-50868: Fixed a Denial Of Service while trying to validate specially crafted DNSSEC responses (bsc#1219823, bsc#1219826). * Fix reversion in --rev-server introduced in 2.88 which caused breakage if the prefix length is not exactly divisible by 8 (IPv4) or 4 (IPv6). * Fix possible SEGV when there server(s) for a particular domain are configured, but no server which is not qualified for a particular domain. * Set the default maximum DNS UDP packet sice to 1232. * Add --no-dhcpv4-interface and --no-dhcpv6-interface for better control over which interfaces are providing DHCP service. * Fix issue with stale caching * Add configurable caching for arbitrary RR-types. * Add --filter-rr option, to filter arbitrary RR-types. * SLP got dropped, remove config (bsc#1214884) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-185=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dnsmasq-2.90-1.1 * dnsmasq-debuginfo-2.90-1.1 * dnsmasq-debugsource-2.90-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-28450.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://bugzilla.suse.com/show_bug.cgi?id=1214884 * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:01 -0000 Subject: SUSE-SU-2025:20117-1: important: Security update for python-Jinja2 Message-ID: <174902694184.655.15232917597661641882@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20117-1 Release Date: 2025-02-03T09:20:59Z Rating: important References: * bsc#1234808 * bsc#1234809 Cross-References: * CVE-2024-56201 * CVE-2024-56326 CVSS scores: * CVE-2024-56201 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56201 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56201 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56326 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808) * CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-184=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-Jinja2-3.1.2-7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56201.html * https://www.suse.com/security/cve/CVE-2024-56326.html * https://bugzilla.suse.com/show_bug.cgi?id=1234808 * https://bugzilla.suse.com/show_bug.cgi?id=1234809 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:06 -0000 Subject: SUSE-SU-2025:20116-1: important: Security update for libxml2 Message-ID: <174902694681.655.10616337737148855999@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20116-1 Release Date: 2025-02-03T09:20:59Z Rating: important References: * bsc#1234812 Cross-References: * CVE-2024-40896 CVSS scores: * CVE-2024-40896 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-40896 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2024-40896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-40896: Fixed XML external entity vulnerability (bsc#1234812) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-188=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxml2-2-2.11.6-4.1 * libxml2-tools-debuginfo-2.11.6-4.1 * libxml2-debugsource-2.11.6-4.1 * libxml2-tools-2.11.6-4.1 * libxml2-2-debuginfo-2.11.6-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40896.html * https://bugzilla.suse.com/show_bug.cgi?id=1234812 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:08 -0000 Subject: SUSE-RU-2025:20115-1: moderate: Recommended update for liburing Message-ID: <174902694817.655.16220190539033287049@smelt2.prg2.suse.org> # Recommended update for liburing Announcement ID: SUSE-RU-2025:20115-1 Release Date: 2025-02-03T09:20:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for liburing fixes the following issues: Update to 2.6: * Add getsockopt and setsockopt socket commands * Add test cases to test/hardlink * Man page fixes * Add futex support, and test cases * Add waitid support, and test cases * Add read multishot, and test cases * Add support for IORING_SETUP_NO_SQARRAY * Use IORING_SETUP_NO_SQARRAY as the default * Add support for IORING_OP_FIXED_FD_INSTALL * Add io_uring_prep_fixed_fd_install() helper * Support for napi busy polling * Improve/add test cases * Man page fixes * Add sample 'proxy' example Update to 2.5: * Add support for io_uring_prep_cmd_sock() * Add support for application allocated ring memory, for placing rings in huge mem. Available through io_uring_queue_init_mem(). * Add support for registered ring fds * Various documentation updates * Various fixes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-168=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * liburing2-debuginfo-2.6-1.1 * liburing-debugsource-2.6-1.1 * liburing2-2.6-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:10 -0000 Subject: SUSE-RU-2025:20113-1: moderate: Recommended update for catatonit Message-ID: <174902695030.655.532455119382349218@smelt2.prg2.suse.org> # Recommended update for catatonit Announcement ID: SUSE-RU-2025:20113-1 Release Date: 2025-02-03T09:19:58Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for catatonit fixes the following issues: Update to catatonit v0.2.0. * Change license to GPL-2.0-or-later. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-170=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * catatonit-0.2.0-1.1 * catatonit-debuginfo-0.2.0-1.1 * catatonit-debugsource-0.2.0-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:09 -0000 Subject: SUSE-RU-2025:20114-1: moderate: Recommended update for ignition Message-ID: <174902694923.655.2111007717779073953@smelt2.prg2.suse.org> # Recommended update for ignition Announcement ID: SUSE-RU-2025:20114-1 Release Date: 2025-02-03T09:20:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for ignition fixes the following issues: Build with current GO. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-167=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * ignition-debuginfo-2.17.0-2.1 * ignition-2.17.0-2.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:11 -0000 Subject: SUSE-RU-2025:20112-1: moderate: Recommended update for xmlsec1 Message-ID: <174902695133.655.7070621116960475659@smelt2.prg2.suse.org> # Recommended update for xmlsec1 Announcement ID: SUSE-RU-2025:20112-1 Release Date: 2025-02-03T09:19:58Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for xmlsec1 fixes the following issues: Update to 1.2.41: * (xmlsec-mscng,xmlsec-mscrypto) Improved certificates verification. * (xmlsec-gnutls) Added support for self-signed certificates. * (xmlsec-core) Fix deprecated functions in LibXML2 2.13.1 including disabling HTTP support by default (use '\--enable-http' option to re-enable it). Update to 1.2.40: The legacy XML Security Library 1.2.40 release includes the following changes: * (xmlsec-core) Fixed functions deprecated in LibXML2 2.13.1 (including disabling HTTP support by default). * (xmlsec-nss) Increased keys size in all tests to support NSS 3.101. * (windows) Added "ftp" and "http" flags in 'configure.js' (both are disabled by default). * Several other small fixes (more details). Update to 1.2.39: The legacy XML Security Library 1.2.39 release includes the following changes: * Added options to enable/disable local files, HTTP, and FTP support. FTP is disabled by default. * Several other small fixes (more details). Update to 1.2.38: * Have a look at the changelog for the list of changes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-157=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxmlsec1-1-debuginfo-1.2.41-1.1 * libxmlsec1-openssl1-1.2.41-1.1 * xmlsec1-debugsource-1.2.41-1.1 * libxmlsec1-1-1.2.41-1.1 * libxmlsec1-openssl1-debuginfo-1.2.41-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:13 -0000 Subject: SUSE-RU-2025:20111-1: important: Recommended update for helm Message-ID: <174902695360.655.6996798924672508830@smelt2.prg2.suse.org> # Recommended update for helm Announcement ID: SUSE-RU-2025:20111-1 Release Date: 2025-02-03T09:19:38Z Rating: important References: * jsc#SMO-479 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for helm fixes the following issues: helm is shipped in version 3.16.3. (jsc#SMO-479) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-173=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * helm-3.16.3-1.1 * helm-debuginfo-3.16.3-1.1 * SUSE Linux Micro 6.0 (noarch) * helm-bash-completion-3.16.3-1.1 ## References: * https://jira.suse.com/browse/SMO-479 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:19 -0000 Subject: SUSE-SU-2025:20110-1: critical: Security update for docker Message-ID: <174902695956.655.12370303175550097814@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20110-1 Release Date: 2025-02-03T09:19:38Z Rating: critical References: * bsc#1217070 * bsc#1228324 * bsc#1228553 * bsc#1229806 * bsc#1230294 * bsc#1230331 * bsc#1230333 * bsc#1231348 * bsc#1232999 * bsc#1233819 Cross-References: * CVE-2023-45142 * CVE-2023-47108 * CVE-2024-41110 CVSS scores: * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities and has seven fixes can now be installed. ## Description: This update for docker fixes the following issues: * Update docker-buildx to v0.19.2. See upstream changelog online at . Some notable changelogs from the last update: * * * Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Add %{_sysconfdir}/audit/rules.d to filelist. * Update to Docker 26.1.5-ce. See upstream changelog online at bsc#1230294 * This update includes fixes for: * CVE-2024-41110. bsc#1228324 * CVE-2023-47108. bsc#1217070 * CVE-2023-45142. bsc#1228553 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-169=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-26.1.5_ce-1.1 * docker-debuginfo-26.1.5_ce-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 * https://bugzilla.suse.com/show_bug.cgi?id=1229806 * https://bugzilla.suse.com/show_bug.cgi?id=1230294 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://bugzilla.suse.com/show_bug.cgi?id=1232999 * https://bugzilla.suse.com/show_bug.cgi?id=1233819 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:23 -0000 Subject: SUSE-RU-2025:20109-1: moderate: Recommended update for libzypp Message-ID: <174902696359.655.15168408309606842863@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2025:20109-1 Release Date: 2025-02-03T09:19:19Z Rating: moderate References: * bsc#1225451 * bsc#1233393 * bsc#1234304 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for libzypp fixes the following issues: Version.35.15 (35) * Url query part: `=` is a safe char in value (bsc#1234304) * RpmDb: Recognize rpmdb.sqlite as database file (#593) * The 20MB download limit must not apply to non-metadata files like package URLs provided via the CLI (bsc#1233393). * BuildCache: Don't try to retrieve missing raw metadata if no permission to write the cache (bsc#1225451) * RepoManager: throw RepoNoPermissionException if the user has no permission to update(write) the caches (bsc#1225451) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-158=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libzypp-debuginfo-17.35.16-1.1 * libzypp-debugsource-17.35.16-1.1 * libzypp-17.35.16-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225451 * https://bugzilla.suse.com/show_bug.cgi?id=1233393 * https://bugzilla.suse.com/show_bug.cgi?id=1234304 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:31 -0000 Subject: SUSE-SU-2025:20108-1: important: Security update for nvidia-open-driver-G06-signed Message-ID: <174902697116.655.8409918293791223390@smelt2.prg2.suse.org> # Security update for nvidia-open-driver-G06-signed Announcement ID: SUSE-SU-2025:20108-1 Release Date: 2025-02-03T09:19:19Z Rating: important References: * bsc#1222972 * bsc#1223356 * bsc#1223454 * bsc#1227417 * bsc#1227419 * bsc#1227575 * bsc#1229716 * bsc#1230368 * bsc#1230779 * bsc#1232057 * bsc#1233332 * bsc#1233673 Cross-References: * CVE-2024-0090 * CVE-2024-0091 * CVE-2024-0092 CVSS scores: * CVE-2024-0090 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-0090 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0091 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0091 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0092 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities and has nine fixes can now be installed. ## Description: This update for nvidia-open-driver-G06-signed fixes the following issues: * Make sure the correct FW package is installed on non-CUDA. * only obsolete 555 CUDA driver/firmware packages * For CUDA: update version to 565.57.01 * Add 'dummy' firmware package on SLE to work around update issues. On SLE, the firmware is installed directly from an NVIDIA-hosted repo. * Improve handling of conflicts between different flavors (gfx vs. CUDA) (bsc#1233332). * Update to 550.135 (bsc#1233673) * Update to 550.127.05 (bsc#1232057) * Fixed a bug which could cause applications using GBM to crash when running with nvidia-drm.modeset=0. * cuda-flavor provide also nvidia-open-driver-G06-kmp-$flavor = %version to workaround broken cuda-drivers * For CUDA update version to 560.35.03 * nv-prefer-signed-open-driver: * added specicic versions of cuda-drivers/cuda-drivers-xxx as preconditions for requiring specific version of nvidia-compute-G06 * nv-prefer-signed-open-driver: * no longer require a specific version of nvidia-open-driver-G06-signed-cuda- kmp, so it can select the correct open driver KMP matching the cuda-runtime version * cuda-flavor: * added nvidia-compute-G06 = %version to preconditions for requiring kernel- firmware-nvidia-gspx-G06, since nvidia-compute-utils-G06 does not have a version-specific requires on nvidia-compute-G06 * cuda-flavor: * require kernel-firmware-nvidia-gspx-G06 instead of kernel-firmware-nvidia- gspx-G06-cuda (which provides also kernel-firmware-nvidia-gspx-G06) * trigger removal of driver modules also on kernel-firmware-nvidia-gspx-G06 * no longer hard-require kernel firmware package, but install it automatically once nvidia-compute-utils-G06 gets installed * trigger removal of driver modules with non-existing or wrong firmware when (new) firmware gets installed * Update to 550.120 (bsc#1230779) * Fixed a bug that could cause kernel crashes upon attempting KMS operations through DRM when nvidia_drm was loaded with modeset=0. * CUDA build: removed entries from pci_ids-555.42.06 since this is doing more harm than benefit (bsc#1230368) * For CUDA (preamble file): * added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version which is needed for 'zypper install = ' * added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor = %version useful for containers * reverted CUDA update version to 560.x.y due to changes in CUDA repository with CUDA 12.6/560.x.y drivers * For CUDA update version to 560.35.03 * Update to 550.107.02 (bsc#1229716) * For CUDA update version to 560.28.03 * Update to 550.100 (bsc#1227575) * Fixed a bug that caused OpenGL triple buffering to behave like double buffering. * To avoid issues with missing dependencies when no CUDA repo is present make the dependecy to nvidia-compute-G06 conditional. * CUDA is not available for Tumbleweed, exclude the build of the cuda flavor. * preamble: let the -cuda flavor KMP require the -cuda flavor firmware * Add a second flavor for building the kernel module versions used by CUDA. The kmp targetting CUDA contains '-cuda' in its name to track its versions separately from the graphics kmp. (bsc#1227417) * Provide the meta package nv-prefer-signed-open-driver to make sure the latest available SUSE-build open driver is installed - independent of the latest available open driver version in he CUDA repository. Rationale: The package cuda-runtime provides the link between CUDA and the kernel driver version through a Requires: cuda-drivers >= %version This implies that a CUDA version will run withany kernel driver version equal or higher than a base version. nvidia-compute-G06 provides the glue layer between CUDA and a specific version of he kernel driver both by providing a set of base libraries and by requiring a specific kernel version. 'cuda-drivers' (provided by nvidia-compute-utils-G06) requires an unversioned nvidia- compute-G06. With this, the resolver will install the latest available and applicable nvidia-compute-G06. nv-prefer-signed-open-driver then represents the latest available open driver version and restricts the nvidia- compute-G06 version to it. (bsc#1227419) * Security Update 550.90.07 (bsc#1223356) [CVE-2024-0090, CVE-2024-0091, CVE-2024-0092] * Update to 550.78 (bsc#1223454) * Update to 550.76 (bsc#1222972) * Update to 550.67 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-174=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * nvidia-open-driver-G06-signed-debugsource-550.142-1.1 * nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.142_k6.4.0_20-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0090.html * https://www.suse.com/security/cve/CVE-2024-0091.html * https://www.suse.com/security/cve/CVE-2024-0092.html * https://bugzilla.suse.com/show_bug.cgi?id=1222972 * https://bugzilla.suse.com/show_bug.cgi?id=1223356 * https://bugzilla.suse.com/show_bug.cgi?id=1223454 * https://bugzilla.suse.com/show_bug.cgi?id=1227417 * https://bugzilla.suse.com/show_bug.cgi?id=1227419 * https://bugzilla.suse.com/show_bug.cgi?id=1227575 * https://bugzilla.suse.com/show_bug.cgi?id=1229716 * https://bugzilla.suse.com/show_bug.cgi?id=1230368 * https://bugzilla.suse.com/show_bug.cgi?id=1230779 * https://bugzilla.suse.com/show_bug.cgi?id=1232057 * https://bugzilla.suse.com/show_bug.cgi?id=1233332 * https://bugzilla.suse.com/show_bug.cgi?id=1233673 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:34 -0000 Subject: SUSE-SU-2025:20107-1: important: Security update for buildkit Message-ID: <174902697489.655.4312299972499518678@smelt2.prg2.suse.org> # Security update for buildkit Announcement ID: SUSE-SU-2025:20107-1 Release Date: 2025-02-03T09:18:58Z Rating: important References: * bsc#1219267 * bsc#1219268 * bsc#1219438 Cross-References: * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 CVSS scores: * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for buildkit fixes the following issues: * Update to version 0.12.5: * update runc to v1.1.12 * exec: add extra validation for submount sources (fixes CVE-2024-23651, bsc#1219267) * oci: fix error handling on submount calls * executor: recheck mount stub path within root after container run (fixes CVE-2024-23652, bsc#1219268) * llbsolver: make sure interactive container API validates entitlements (fixes CVE-2024-23653, bsc#1219438) * gateway: pass executor with build and not access worker directly * pb: add extra validation to protobuf types * sourcepolicy: add validations for nil values * exporter: add validation for platforms key value * exporter: add validation for invalid platorm * exporter: validate null config metadata from gateway * ci: disable push if not upstream repo * hack: use git context only for upstream repo * hack/test: allow ALPINE_VERSION to be set from env * hack: align syntax * vendor: github.com/cyphar/filepath-securejoin v0.2.4 * tracing: allow the `Resource` to be set externally * Update to version 0.12.4: * Fix possible concurrent map access on remote cache export * Fix hang on debug server listener * Fix possible deadlock in History API under high number of parallel builds * Fix possible panic on handling deleted records in History API * Fix possible data corruption in zstd library * Update to version 0.12.3: * Fix possible duplicate source files in provenance attestation for chained builds * Fix possible negative step time in progressbar for step shared with other build request * Fix properly closing history and cache DB on shutdown to avoid corruption * Fix incorrect error handling for invalid HTTP source URLs * Fix fallback cases for ambiguous insecure configuration provided for registry used as push target. * Fix possible data race with parallel image config resolves * Fix regression in v0.12 for clients waiting on buildkitd to become available * Fix Cgroup NS handling for hosts supporting only CgroupV1 * Update to version 0.12.2: * Fix possible discarded network error when exporting result to client * Avoid unnecessary memory allocations when writing build progress * Update to version 0.12.1: * executor: fix resource sampler goroutine leak * [v0.11] make tracing socket forward error non-fatal * integration: missing env var to check feature compat * test: update pinned busybox image to 1.36 * test: update pinned alpine image to 3.18 * vendor: github.com/docker/docker 8e51b8b59cb8 (master, v25.0.0-dev) * executor/resource: stub out NewSysSampler on Windows * vendor: github.com/docker/cli v24.0.4 * testutil: move CheckContainerdVersion to a separate package * llbsolver: fix policy rule ordering * filesync: fix backward compatibility with encoding + and % * hack: allow to set GO_VERSION during tests * test: always disable tls for dockerd worker * buildctl: set max backoff delay to 1 second * contenthash: data race * filesync: escape special query characters * applier: add hack to support docker zstd layers * Fix various nits * pullprogress data race * use sampler lock instead * Fix ResolveImageConfig to evaluate source policy * sampler data race fix * update cgroup parent test to work with cgroupns * Revert "specify a `ResponseHeaderTimeout` value" * oci: make sure cgroupns is enabled if supported * bash lint fix * rename BUILDFLAGS to GOBUILDFLAGS * allow ENOTSUP for PSI cgroup files * containerimage: use platform matcher to detect platform to unpack * exporter: silently skip unpacking unknown reference * improve error handling in ReadFile * dockerfile: arg for controlling go build flags * dockerfile: arg to enable go race detection * Add support for health start interval * Re-vendor moby/moby * filesync: mark if options have been encoded to detect old versions * dockerfile: heredoc should use 0644 permissions * docs: update README to reference OpenTelemetry instead of OpenTracing * gateway: restore original filename in ReadFile error message * Dockerfile: update containerd to v1.7.2 * Use system.ToSlash() instead of filepath.ToSlash() * Revert most changes to client/llb * Remove Architecture * Default to linux in client * Ensure we use proper path separators * Set default platform * Add nil pointer check in dispatchWorkdir * Remove nil pointer check and extra NormalizePath * Rename variable, remove superfluous check * Use current OS as a default * Handle file paths base on target platform * exporter: unlazy references in parallel * exporter: simplify unlazy references to reduce duplication * exporter: allow unpack on multi-platform images * tests: add unpack to scratch export test * overlay: set whiteout timestamps to 1970-01-01 (not to SOURCE_DATE_EPOCH) * dockerfile: graduate `ADD --checksum=<checksum>` from labs * dockerfile: graduate `ADD <git ref>` from labs * dockerfile: mod-outdated target to check modules updates * dockerfile: use xx in dnsname stage * dockerfile: install musl-dev to fix compilation issue * dockerfile: update Alpine to 3.18 * vendor: update fsutil to 36ef4d8 * export(local): split opt * buildctl: Provide --wait option * containerimage: support SOURCE_DATE_EPOCH for CreatedAt * move flightcontrol to use generics * containerimage: keep layer labels for exported images * shell: start shell from cmd, not entrypoint * sbom: propogate image-resolve-mode for generator image * client: add extra debug to tests * handle missing provenance for non-evaluated result * tests: add provenance test for duplicate platform * tests: add provenance test for when context directory does not exist * forward: make BridgeClient public for lint * gateway: enable named contexts for gateway frontend * vendor: update vt100 with resize panic fix * docs: dockerfile: remove "known issues" related to AuFS * docs: add running instruction to CONTRIBUTING.md * tests: add worker close method to interface * add and check for gateway.exec.secretenv cap * move Secretenv from Meta to InitMessage * support passing SecretEnv to gateway containers * Add comment, update from review * Fix issue with digest merge (inconsistent graph state) * docs: add helper commands section to CONTRIBUTING.md * docs: update CONTRIBUTING.md whitespace formatting * integration: fix not deleting dockerd workdir * remove uses of deprecated ResolverOptions.Client * filesync: fix handling non-ascii in file paths * tests: add test for unicode filenames * Adding more docs to client/llb * Add special case for rw bind mounts * vendor: github.com/docker/cli v24.0.2 * vendor: github.com/docker/docker v24.0.2 * progressui: fix index printing on partial rows * gateway: wrap ExecProcessServer Send calls with a mutex * resources: make maxsamples configurable * llbsolver: add systemusage samples to provenance attestation * resources: store sys cpu usage per step * resources: add sampler for periodic stat reads * resources: CNI network usage sampling support * resources: add build step resource tracking via cgroups * solver: lock before using actives * Emulate "bind" mounts using the bind filter * Fix mount layers on host * llbsolver: set temporary lease in Commit context * Update containerd dependency * exporter: Add exptypes with Common exporter keys * exporter/image/exptypes: Make strongly typed * solver: move AddBuildConfig into llbsolver package * tests: add test to check url format for image loaded from oci layout * solver: mark locally loaded images as such * solver: merge local and remote images into single list * purl: allow RefToPURL to take a type parameter * tests: don't use purl code to test itself * Use linux as a default for inputOS * Add path handling functions * response to comments * containerimage: Export option keys * vendor: update spdx/tools-golang to v0.5.1 * exporter: remove non dist options from tar exporter * exporter: move fs opt parsing to method * tests: fixup attestation tar to not panic when file not found * git: set umask without reexec * add language property for sourcemap * dockerfile/docs: add set -ex to heredoc #3870 * authprovider: fix a bug where registry-1.docker.io auth was always a cache miss * response to comments * tracing: fix buildx tracing delegation * Update continuity and fsutil * cache: add a few more fields to ref trace logs. * vendor: github.com/containerd/go-runc v1.1.0 * provenance: fix possible empty digest access * vendor: fix broken vendoring * dockerfile: bump up nerdctl to v1.4.0 * bump nydus-snapshotter dependence to v0.8.2 * vendor: github.com/docker/cli v24.0.1 * vendor: github.com/docker/docker v24.0.1 * vendor: github.com/containerd/containerd v1.7.1 * vendor: github.com/Microsoft/hcsshim v0.10.0-rc.8 * vendor: github.com/Microsoft/go-winio v0.6.1 * vendor: golang.org/x/sys v0.7.0 * vendor: github.com/containerd/typeurl/v2 v2.1.1 * chore: bump spdx tools * Fix typo in attestation-storage.md * vendor: github.com/docker/cli v24.0.0 * vendor: github.com/docker/docker v24.0.0 * vendor: github.com/opencontainers/runc v1.1.7 * vendor: github.com/opencontainers/runtime-spec v1.1.0-rc.2 * vendor: github.com/klauspost/compress v1.16.3 * Dockerfile: CONTAINERD_VERSION=v1.7.1 * Dockerfile: CONTAINERD_ALT_VERSION_16=v1.6.21 * Dockerfile: RUNC_VERSION=v1.1.7 * session: avoid logging healthcheck error on canceled connection * session: fix run and close synchronization * testutil: update ReadImages to fallback to reading manifest * Add trace logs for cache leaks. * Add some doc strings for LLB functions * attestations: move containerd media type warnings * update generated proto files * attestations: replace intoto media type with vendored const * nydus: bump nydus versions in Dockerfile and doc * feedback changes for moby/buildkit #2251 * testutil: expose underlying docker address for supported workers * testutil: expose integration workers as public * remove type aliases for leasemanager/contentstore * llbsolver: move history blobs to a separate namespace * build(deps): bump github.com/docker/distribution * added import/export support for OCI compatible image manifest version of cache manifest (opt-in on export, inferred on import) moby/buildkit #2251 * llb: carry platform from inputs for merge/diff * llb: don't include platform in fileop * control: fix possible deadlock on network error * exporter/containerimage: remove redundant type for var declaration * Fix not to set the value on empty vertex * Fix to import as digest * cache: always release ref when getting size in usage. * Drop unneeded variable * ssh: add fallback to ensure conn is closed in all cases. * vendor: github.com/opencontainers/image-spec v1.1.0-rc3 * vendor: github.com/docker/cli v23.0.5 * vendor: github.com/docker/docker v23.0.5 * nydus: update nydus-snapshotter dependency to v0.8.0 * progressui: fix possible zero prefix numbers in logs * llbsolver: send active event only to current client * llbsolver: send delete status event * llbsolver: filter out records marked deleted from list responses * Add Windows service support * docs: fixup build repro doc with updated policy format * test: use appropriate snapshotter service to walk snapshots * overlay: use function to check for overlay-based mounts * Update uses of Image platform fields in OCI image-spec * allow setting user agent products * Bump up golangci-lint to v1.52.2 * chore: tidy up duplicated imports * solver: Release unused refs in LoadWithParents * Avoid panic on parallel walking on DefinitionOp * solver: skip sbom post processor if result is nil * vendor: github.com/docker/docker v23.0.4 * vendor: github.com/docker/cli v23.0.4 * vendor: golang.org/x/time v0.3.0 * vendor: github.com/docker/cli v23.0.2 * vendor: github.com/docker/docker v23.0.2 * test: don't hang if a process doesn't run * ci: put worker name first for better UX in actions * go.mod: remove github.com/kr/pretty * Revert "Problem: can't use anonymous S3 credentials" * go.mod: bump up runc to v1.1.6 * go.mod: Bump up stargz-snapshotter to v0.14.3 * dockerfile: bump up stargz-snapshotter to v0.14.3 * dockerfile: bump up runc to v1.1.6 * buildkitd: add grpc reflection * Bump up nerdctl to 1.3.0 * Bump up containerd 1.6.20 * Fix gzip decoding of HTTP sources. * ci: update runner os to ubuntu 22.04 * Fix bearer token expiration check (fixes #3779) * docs: update buildkitd.toml with new field info * buildkitd: allow durations for gc config * buildkitd: allow multiple units for gc config * dockerui: expose context detection functions as public * Prevent overflow of runc exit code. * Upgrade to latest go-runc. * runc worker: fix sigkill handling * Dockerfile: RUNC_VERSION=v1.1.5 * client: add client opts to enable system certificates * Make ClientOpts type safe * build(deps): bump github.com/opencontainers/runc from 1.1.4 to 1.1.5 * fileop: create new fileOpSolver instance per Exec call * Provide CacheManager to Controller instead of CacheKeyManager. * http: ensure HEAD and GET requests have same headers * docs: add auto-generated sections to buildctl.md * client: allow grpc dial option passthrough * cni: simplify netns creation * add Bass to list of LLB languages * llbsolver: fix sorting of history records * llbsolver: Fix performance of recomputeDigests * solve: use comparables instead of reflection in result struct * vendor: github.com/docker/cli v23.0.1 * vendor: github.com/docker/docker v23.0.1 * client: create oci-layout file in StoreIndex * ci: output annotations for failures * test: set mod vendor * test: use gotestsum to generate reports * fix gateway exec tty cleanup on context.Canceled * fix process termination handling for runc exec * Register builds before recording build history * docs(dockerfile): minimal Dockerfile version support for chmod * Update builder.md to document newly supported --chmod features in both ADD and COPY statements. * use bklog.G(ctx) instead of logrus directly * integration: missing mergeDiff compat check * chore: `translateLegacySolveRequest` does not need to return error checking. * integration: split feature compat check for subtests * integration: missing feature compat check for cache * dockerfile: fix reproducible digest test for non-amd64 * integration: add FeatureMergeDiff compat * integration: add FeatureCacheBackend* compat * integration: enforce features compat through env vars * ci: upstream docs conformance validation * dockerfile(docs): fix liquid syntax * Problem: can't use anonymous S3 credentials * hack: remove build_ci_first_pass script * hack: binaries and cross bake targets * go.mod: update to go 1.20 * Dockerfile: CONTAINERD_VERSION=v1.7.0 * go.mod: github.com/containerd/containerd v1.7.0 * Add Namespace to list of buildkit users. * remove buildinfo * buildinfo: add BUILDKIT_BUILDINFO build arg * buildinfo: mark as deprecated * docs: deprecated features page * rootless: guide for Bottlerocket OS (`sysctl -w user.max_user_namespaces=N`) * rootless: fix up unprivileged mount opts * Dockerfile: CONTAINERD_VERSION=v1.7.0-rc.3, CONTAINERD_ALT_VERSION_16=v1.6.19 * go.mod: github.com/containerd/containerd v1.7.0-rc.3 * version: add "v" prefix to version for tagging convention consistency * remove context name validation from kubepod connhelper * gateway: add hostname option to NewContainer API * fix error message typo * provenance: ensure URLs are redacted before written * test/client: Close buildkit client * docs: missing security policy markdown file * diffapply: do chown before xattrs * Add test for merge of files with capabilities. * fix a possible panic on cache * Update cmd/buildkitd/main_windows.go * ci(validate): use bake * hack: shfmt bake target * hack: generated-files bake target * hack: doctoc bake target * hack: lint bake target * hack: authors Dockerfile and bake target * hack: bake definition with vendor targets * Fix buildkitd panic when frontend input is nil. * ci: trigger workflows on push to release branches * build(deps): bump golang.org/x/net from 0.5.0 to 0.7.0 * ci: create GitHub Release for frontend as well * ci: make release depends on image job * lint: fix issues with go 1.20 * remove deprecated golangci-lint linters * update golangci-lint to v1.51.1 * update to go 1.20 * Allow DefinitionOp to track sources * specify a `ResponseHeaderTimeout` value * Ensures that the primary GID is also included in the additional GIDs * ci: fix missing TESTFLAGS env var in test-os workflow * Dockerfile: update containerd to v1.7.0-beta.4, v1.6.18 * go.mod: github.com/containerd/containerd v1.7.0-beta.4 * ci: update softprops/action-gh-release to v0.1.15 * ci: remove unused vars in dockerd workflow * ci: split cross job * Dockerfile: remove binaries-linux-helper stage * ci: rename unclear env vars * readme: fix and update badges * ci: rename build workflow to buildkit * ci: reusable test workflow * ci: move test-os to a dedicated workflow * ci: move frontend integration tests and build to a dedicated workflow * stargz-snapshotter: graduate from experimental * Bump up stargz-snapshotter to v0.14.1 * set osversion in index descriptor from base image * progress: solve status description * ci: update buildx to latest * Dockerfile: update xx to 1.2.1 * integration: make sure registry directory exists * gha: avoid range requests with too big offset * ci: merge test-nydus job in test one * ci: remove branch restriction on pull request event * client: add tests for layerID in comment field * exporter: fix sbom supplement core detection * exporter: fix supplement sboms on empty scratch layer * exporter: fix file layer finder whiteout detection * exporter: canonicalize sbom file paths during search * Add platform tracing socket paths and mounts * integration: log dockerd cmd * integration: set custom flags for dockerd worker * remotecache: proper exporter naming for gha, s3 and azblob * remotecache: explicit names for registry and local * exporter: use compression.ParseAttributes func * remotecache: mutualize compression parsing attrs * lex: add support for optional colon in variable expansion * test: rework TestProcessWithMatches to use a matrix * dockerfile: update to use dockerui pkg * dockerui: separate docker frontend params to reusable package * cache: add fallback for snapshotID * exporter: remove wrappers for oci data types * vendor: github.com/docker/cli v23.0.0 * vendor: github.com/docker/docker v23.0.0 * hack: do not cache some stages on release * hack: do not set attest flags when exporting to docker * git: override the locale to ensure consistent output * fix support for empty git ref with subdir * gitutil: use subtests * source: more tests cases for git identifier * source: use subtests cases for git identifier * otel: bump dependencies to v1.11.2/v0.37.0 * hack: treat unset variables as an error * frontend: fix typo in release script * ci: create matrix for building frontend image * inline cache: fix blob indexes by uncompressed digest * Skip configuring cache exporter if it is nil. * docs: update syntax for labs channel in examples * integration: remove wrong compat condition * integration: fix compat check for CNI DNS test * cache: don?t link blobonly based on chainid * do not mount secrets that are optional and missing from solve opts * SOURCE_DATE_EPOCH: drop timezone * sbom: create tmp directory for scanner image * progress: keep color enabled with NO_COLOR empty * hack: remove azblob_test * integration: basic azblob cache test * test: add proxy build args when existed * vendor: github.com/docker/cli v23.0.0-rc.3 * vendor: github.com/docker/docker v23.0.0-rc.3 * vendor: golang.org/x/net v0.5.0 * vendor: golang.org/x/text v0.6.0 * vendor: golang.org/x/sys v0.4.0 * Dockerfile: CNI plugins v1.2.0 * Dockerfile: CONTAINERD_VERSION=v1.7.0-beta.3, CONTAINERD_ALT_VERSION_16=v1.6.16 * Fix tracing listener on Windows * go.mod: github.com/containerd/containerd v1.7.0-beta.3 * control: send current timestamp header with event streams * vendor: update containerd to v1.6.16-0.1709cfe273d9 * buildctl: add ref-file to get history record for a build * client: make sure ref is configurable for the history API * history: save completed steps with cache stats * history: fix exporter key not being passed * history: fix logs and traces are saving on canceled builds * hack: add correct entrypoint to shell script * ci: use moby/buildkit:latest in build action * dockerfile: add testReproSourceDateEpoch * Fix cache cannot reuse lazy layers * Correct manifests_prefix documentation for S3 cache * Use golang.org/x/sys/windows instead of syscall * dockerfile: release frontend for i386 platform * Add get-user-info utility * optimize --dry-run flag * fix(tracing): spelling of OTEL_TRACES_EXPORTER value * Propagate sshforward send side connection close * buildctl: add `buildctl debug histories, buildctl prune-histories` * dockerfile: fix panic on warnings with multi-platform * vendor: github.com/docker/cli v23.0.0-rc.2 * vendor: github.com/docker/docker v23.0.0-rc.2 * vendor: github.com/containerd/containerd v1.6.15 * cache: add registry.insecure option to registry exporter * Make local cache non-lazy * docs/build-repro.md: add the SOURCE_DATE_EPOCH section * docs: clarified build argument example by changing the variable name * azblob cache: account_name attribute * docs: master -> 0.11 * ci: fix dockerd workflow with latest changes from moby * integration: set mirrors and entitlements with dockerd worker * github: update CI to buildkit version * exporter: ensure spdx order prioritizes primary sbom * hack: remove s3_test * integration: basic s3 cache test * integration: add runCmd and randomString utils * integration: expose backend logs in sandbox interface * azblob_test: pin busybox to avoid "Illegal instruction" error * docs: add nerdctl container buildkitd address docs * feat: add namespace support for nerdctl container * ci: add ci to check README toc * testutil: pin busybox and alpine used in releases * exporter: allow configuring inline attestations for image exporters * exporter: force enabling inline attestations for image export * docs: change semicolons to double ampersands * llbsolver: fix panic when requesting provenance on nil result * vendor: update fsutil to fb43384 * attestation: only supplement file data for the core scan * docs: add index page for attestations * docs: move attestation docs to dedicated directory * docs: rename slsa.md to slsa-provenance.md * docs: tidy up json examples for slsa definitions * docs: add cross-linking between slsa pages * Flakiness in azblob test job * vendor: update spdx/tools-golang to d6f58551be3f * feat: add nerdctl-container support for client * docs: slsa review updates * docs: moved slsa definitions to a separate page * docs: slsa editorial fixes * docs: add filename to provenance attestation * docs: update hermetic field after it was moved in implementation * docs: update provenance docs * docs: add slsa provenance documentation * progress: fix clean context cancelling * fix: updated_at -> updated-at * Solve panic due to concurrent access to ExportSpans * feat: allow ignoring remote cache-export error if failing * add cache stats to the build history API * vendor: github.com/docker/cli v23.0.0-rc.1 * vendor: github.com/docker/docker v23.0.0-rc.1 * vendor: github.com/containerd/containerd v1.6.14 * frontend: fix testMultiStageImplicitFrom to account for busybox changes * sshforward: skip conn close on stream CloseSend. * chore: update buildkitd.toml docs with mirror path example * feat: handle mirror url with path * provenance: fix the order of the build steps * provenance: move hermetic field into a correct struct * add possibility to override filename for provenance * Fix typo in CapExecMountBindReadWriteNoOutput. * Use SkipOutput instead of -1 for output indexes to clarify semantics. * fix indentation for in-toto and traces * attestation: forbid provenance attestations from frontend * attestation: validate attestations before unbundling as well * exporter: make attestation validation public * result: change reason types to strings * attestations: ignore spdx parse errors * attestations: propogate metadata through unbundling * gateway: add addition check to prevent content func from being forwarded * ociindex: add utility method for getting a single manifest from the index * ociindex: refactor to hide implementation internally * cache: test gha cache exporter * containerdexecutor: add network namespace callback * frontend/dockerfile: BFlags.Parse(): use strings.Cut() * frontend/dockerfile: parseExtraHosts(): use strings.Cut() * frontend/dockerfile: parseMount() use strings.Cut(), and some minor cleanup * frontend/dockerfile: move check for cache-sharing * frontend/dockerfile: provide suggestions for mount share mode * frontend/dockerfile: define types for enums * frontend/dockerfile/shell: use strings.Equalfold * frontend/dockerfile/parser: remove redundant concat * frontend/dockerfile: parseBuildStageName(): pre-compile regex * frontend/dockerfile: remove isSSHMountsSupported, isSecretMountsSupported * docs: Enable rootless for stargz-snapshotter * executor/oci: GetResolvConf(): simplify handling of resolv.conf ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-156=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * buildkit-0.12.5-1.1 * buildkit-debuginfo-0.12.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:38 -0000 Subject: SUSE-SU-2025:20106-1: moderate: Security update for curl Message-ID: <174902697831.655.7150527265895461755@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20106-1 Release Date: 2025-02-03T09:18:10Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: Fixed password leak used for the first host to the followed- to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-166=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcurl4-8.6.0-5.1 * curl-8.6.0-5.1 * libcurl4-debuginfo-8.6.0-5.1 * curl-debugsource-8.6.0-5.1 * curl-debuginfo-8.6.0-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:40 -0000 Subject: SUSE-SU-2025:20105-1: important: Security update for libsoup Message-ID: <174902698068.655.4489205602310086837@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20105-1 Release Date: 2025-02-03T09:17:48Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52531 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285). * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292). * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-165=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.2-5.1 * libsoup-debugsource-3.4.2-5.1 * libsoup-3_0-0-3.4.2-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:42 -0000 Subject: SUSE-SU-2025:20104-1: moderate: Security update for pam Message-ID: <174902698254.655.3337322175850720215@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:20104-1 Release Date: 2025-02-03T09:17:48Z Rating: moderate References: * bsc#1233078 Cross-References: * CVE-2024-10963 CVSS scores: * CVE-2024-10963 ( SUSE ): 8.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10963 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-10963 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-10963: Fixed improper hostname interpretation in pam_access that could lead to access control bypass (bsc#1233078). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-164=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam-1.6.0-4.1 * pam-debuginfo-1.6.0-4.1 * pam-debugsource-1.6.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10963.html * https://bugzilla.suse.com/show_bug.cgi?id=1233078 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:45 -0000 Subject: SUSE-SU-2025:20103-1: moderate: Security update for avahi Message-ID: <174902698514.655.10414860498681209728@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2025:20103-1 Release Date: 2025-02-03T09:17:39Z Rating: moderate References: * bsc#1212476 * bsc#1226586 * bsc#1233420 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: Properly randomize query id of DNS packets (bsc#1233420). Bug fixes: * No longer supply bogus services to callbacks (bsc#1226586). * Tag hardening patches as PATCH-FEATURE-OPENSUSE * Remove dependency on /usr/bin/python3 using %python3_fix_shebang macro (bsc#1212476). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-155=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * avahi-debugsource-0.8-6.1 * libavahi-common3-debuginfo-0.8-6.1 * libavahi-common3-0.8-6.1 * avahi-0.8-6.1 * libavahi-core7-0.8-6.1 * libavahi-client3-debuginfo-0.8-6.1 * libavahi-core7-debuginfo-0.8-6.1 * libavahi-client3-0.8-6.1 * avahi-debuginfo-0.8-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1212476 * https://bugzilla.suse.com/show_bug.cgi?id=1226586 * https://bugzilla.suse.com/show_bug.cgi?id=1233420 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:48 -0000 Subject: SUSE-RU-2025:20102-1: moderate: Recommended update for suseconnect-ng Message-ID: <174902698881.655.9167504421378625439@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2025:20102-1 Release Date: 2025-02-03T09:17:39Z Rating: moderate References: * bsc#1231185 * bsc#1231328 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update version to 1.13: * Integrating uptime-tracker * Honor auto-import-gpg-keys flag on migration (bsc#1231328) * Only send labels if targeting SCC * Skip the docker auth generation on RMT (bsc#1231185) * Add --set-labels to register command to set labels at registration time on SCC * Add a new function to display suse-uptime-tracker version * Integrate with uptime-tracker ( https://github.com/SUSE/uptime-tracker/ ) * Add a command to show the info being gathered ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-162=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * suseconnect-ng-1.13.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231185 * https://bugzilla.suse.com/show_bug.cgi?id=1231328 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:50 -0000 Subject: SUSE-SU-2025:20101-1: moderate: Security update for haproxy Message-ID: <174902699067.655.2285224943069733378@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:20101-1 Release Date: 2025-02-03T09:17:38Z Rating: moderate References: * bsc#1233973 Cross-References: * CVE-2024-53008 CVSS scores: * CVE-2024-53008 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-53008 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-53008 ( NVD ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: Update to version 2.8.11+git0.01c1056a4: * VUL-0: CVE-2024-53008: haproxy: HTTP/3 request smuggling via malformed HTTP headers forwarded to a HTTP/1.1 non-compliant back-end server (bsc#1233973) * BUG/MINOR: cfgparse-listen: fix option httpslog override warning message * BUG/MEDIUM: promex: Wait to have the request before sending the response * BUG/MEDIUM: cache/stats: Wait to have the request before sending the response * BUG/MEDIUM: queue: implement a flag to check for the dequeuing * BUG/MINOR: clock: validate that now_offset still applies to the current date * BUG/MINOR: clock: make time jump corrections a bit more accurate * BUG/MINOR: polling: fix time reporting when using busy polling * BUG/MAJOR: mux-h1: Wake SC to perform 0-copy forwarding in CLOSING state * BUG/MEDIUM: pattern: prevent UAF on reused pattern expr * BUG/MINOR: pattern: prevent const sample from being tampered in pat_match_beg() * BUG/MEDIUM: clock: detect and cover jumps during execution * REGTESTS: fix random failures with wrong_ip_port_logging.vtc under load * DOC: configuration: place the HAPROXY_HTTP_LOG_FMT example on the correct line * BUG/MINOR: pattern: do not leave a leading comma on "set" error messages * BUG/MINOR: pattern: pat_ref_set: return 0 if err was found * BUG/MINOR: pattern: pat_ref_set: fix UAF reported by coverity * BUG/MINOR: stconn: Request to send something to be woken up when the pipe is full * BUG/MEDIUM: mux-pt/mux-h1: Release the pipe on connection error on sending path * BUG/MEDIUM: clock: also update the date offset on time jumps * DOC: config: correct the table for option tcplog * BUG/MINOR: h3: properly reject too long header responses * BUG/MINOR: proto_uxst: delete fd from fdtab if listen() fails * BUG/MINOR: mux-quic: do not send too big MAX_STREAMS ID * REGTESTS: mcli: test the pipelined commands on master CLI * BUG/MEDIUM: mworker/cli: fix pipelined modes on master CLI * MINOR: channel: implement ci_insert() function * BUG/MINOR: proto_tcp: keep error msg if listen() fails * BUG/MINOR: proto_tcp: delete fd from fdtab if listen() fails * BUG/MINOR: quic/trace: make quic_conn_enc_level_init() emit NEW not CLOSE * BUG/MINOR: trace/quic: make "qconn" selectable as a lockon criterion * BUG/MINOR: trace: automatically start in waiting mode with "start " * BUG/MEDIUM: trace: fix null deref in lockon mechanism since TRACE_ENABLED() * BUG/MINOR: trace/quic: permit to lock on frontend/connect/session etc * BUG/MINOR: trace/quic: enable conn/session pointer recovery from quic_conn * BUG/MINOR: fcgi-app: handle a possible strdup() failure * BUG/MEDIUM: mux-h2: Propagate term flags to SE on error in h2s_wake_one_stream * BUG/MEDIUM: h2: Only report early HTX EOM for tunneled streams * BUG/MEDIUM: http-ana: Report error on write error waiting for the response * BUG/MEDIUM: quic: prevent conn freeze on 0RTT undeciphered content * BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was set * BUG/MEDIUM: mux-h1: Properly handle empty message when an error is triggered * BUG/MEDIUM: cli: Always release back endpoint between two commands on the mcli * BUG/MEDIUM: stream: Prevent mux upgrades if client connection is no longer ready * BUG/MEDIUM: init: fix fd_hard_limit default in compute_ideal_maxconn * MEDIUM: init: set default for fd_hard_limit via DEFAULT_MAXFD (take #2) * BUG/MEDIUM: queue: deal with a rare TOCTOU in assign_server_and_queue() * MINOR: queue: add a function to check for TOCTOU after queueing * BUG/MEDIUM: jwt: Clear SSL error queue on error when checking the signature * BUG/MINOR: quic: Lack of precision when computing K (cubic only cc) * BUG/MINOR: cli: Atomically inc the global request counter between CLI commands * BUG/MINOR: server: Don't warn fallback IP is used during init-addr resolution * BUG/MINOR: stick-table: fix crash for src_inc_gpc() without stkcounter * DOC: config: improve the http-keep-alive section * DOC: configuration: issuers-chain-path not compatible with OCSP * BUG/MEDIUM: ssl_sock: fix deadlock in ssl_sock_load_ocsp() on error path * BUG/MEDIUM: debug/cli: fix "show threads" crashing with low thread counts * BUG/MINOR: session: Eval L4/L5 rules defined in the default section * BUG/MEDIUM: bwlim: Be sure to never set the analyze expiration date in past * BUG/MEDIUM: spoe: Be sure to create a SPOE applet if none on the current thread * BUG/MEDIUM: h1: Reject empty Transfer-encoding header * BUG/MINOR: h1: Reject empty coding name as last transfer-encoding value * BUG/MINOR: h1: Fail to parse empty transfer coding names * BUG/MINOR: jwt: fix variable initialisation * DOC: configuration: update maxconn description * BUG/MINOR: jwt: don't try to load files with HMAC algorithm * MEDIUM: ssl: initialize the SSL stack explicitely * DOC: configuration: more details about the master-worker mode * BUG/MEDIUM: quic: fix possible exit from qc_check_dcid() without unlocking * BUG/MINOR: quic: fix race-condition on trace for CID retrieval * BUG/MINOR: quic: fix race condition in qc_check_dcid() * BUG/MEDIUM: quic: fix race-condition in quic_get_cid_tid() * BUG/MEDIUM: h3: ensure the ":scheme" pseudo header is totally valid * BUG/MEDIUM: h3: ensure the ":method" pseudo header is totally valid * MINOR: activity: make the memory profiling hash size configurable at build time * BUG/MINOR: hlua: report proper context upon error in hlua_cli_io_handler_fct() * BUG/MINOR: quic: fix BUG_ON() on Tx pkt alloc failure * BUG/MINOR: mux-quic: fix crash on qcs SD alloc failure * BUG/MINOR: h3: fix crash on STOP_SENDING receive after GOAWAY emission * DOC: api/event_hdl: small updates, fix an example and add some precisions * SCRIPTS: git-show-backports: do not truncate git-show output * DOC: configuration: fix alphabetical order of bind options * DOC: management: rename show stats domain cli "dns" to "resolvers" * DOC/MINOR: management: add missed -dR and -dv options * BUG/MINOR: proxy: fix header_unique_id leak on deinit() * BUG/MINOR: proxy: fix source interface and usesrc leaks on deinit() * BUG/MINOR: proxy: fix dyncookie_key leak on deinit() * BUG/MINOR: proxy: fix check_{command,path} leak on deinit() * BUG/MINOR: proxy: fix log_tag leak on deinit() * BUG/MINOR: proxy: fix server_id_hdr_name leak on deinit() * BUG/MINOR: quic: fix computed length of emitted STREAM frames * [RELEASE] Released version 2.8.10 * BUG/MEDIUM: quic: don't blindly rely on unaligned accesses * BUG/MAJOR: connection: fix server used_conns with H2 + reuse safe * BUG/MEDIUM: http_ana: ignore NTLM for reuse aggressive/always and no H1 * BUG/MAJOR: server: do not delete srv referenced by session * MINOR: session: rename private conns elements * BUG/MEDIUM: quic: fix connection freeze on post handshake * BUG/MEDIUM: server: fix dynamic servers initial settings * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning * BUG/MINOR: activity: fix Delta_calls and Delta_bytes count * BUG/MINOR: ssl/ocsp: init callback func ptr as NULL * CLEANUP: ssl/ocsp: readable ifdef in ssl_sock_load_ocsp * BUILD: fd: errno is also needed without poll() * CI: scripts: fix build of vtest regarding option -C * REGTESTS: acl_cli_spaces: avoid a warning caused by undefined logs * DOC: config: fix incorrect section reference about custom log format * DOC: quic: specify that connection migration is not supported * BUG/MINOR: server: Don't reset resolver options on a new default-server line * BUG/MINOR: http-htx: Support default path during scheme based normalization * BUG/MINOR: quic: adjust restriction for stateless reset emission * MEDIUM: config: prevent communication with privileged ports * BUILD: quic: fix unused variable warning when threads are disabled * BUG/MEDIUM: mux-quic: Create sedesc in same time of the QUIC stream * BUG/MEDIUM: quic_tls: prevent LibreSSL < 4.0 from negotiating CHACHA20_POLY1305 * BUG/MAJOR: quic: Crash with TLS_AES_128_CCM_SHA256 (libressl only) * BUG/MINOR: connection: parse PROXY TLV for LOCAL mode * DOC: configuration: update the crt-list documentation * CLEANUP: ssl/cli: remove unused code in dump_crtlist_conf * BUG/MINOR: stats: Don't state the 303 redirect response is chunked * BUG/MINOR: htpp-ana/stats: Specify that HTX redirect messages have a C-L header * BUG/MEDIUM: fd: prevent memory waste in fdtab array * BUILD: stick-tables: better mark the stktable_data as 32-bit aligned * BUG/MEDIUM: h1: Reject CONNECT request if the target has a scheme * BUG/MINOR: h1: Check authority for non-CONNECT methods only if a scheme is found * BUG/MEDIUM: stick-tables: properly mark stktable_data as packed * BUG/MEDIUM: htx: mark htx_sl as packed since it may be realigned * BUG/MINOR: qpack: fix error code reported on QPACK decoding failure * BUG/MINOR: mux-quic: fix error code on shutdown for non HTTP/3 * BUG/MINOR: log: smp_rgs array issues with inherited global log directives * BUG/MINOR: log: keep the ref in dup_logger() * MINOR: log: add dup_logsrv() helper function * DOC: lua: fix filters.txt file location * BUG/MINOR: haproxy: only tid 0 must not sleep if got signal * BUILD: clock: improve check for pthread_getcpuclockid() * BUG/MINOR: mworker: reintroduce way to disable seamless reload with -x /dev/null * BUG/MINOR: h1: fix detection of upper bytes in the URI * BUG/MINOR: backend: use cum_sess counters instead of cum_conn * BUG/MINOR: fd: my_closefrom() on Linux could skip contiguous series of sockets * BUG/MINOR: sock: handle a weird condition with connect() * BUG/MINOR: stconn: Fix sc_mux_strm() return value * BUG/MEDIUM: cache: Vary not working properly on anything other than accept- encoding * BUG/MINOR: server: fix slowstart behavior * BUG/MEDIUM: peers: Fix exit condition when max-updates-at-once is reached * BUG/MEDIUM: spoe: Always retry when an applet fails to send a frame * BUG/MEDIUM: applet: Fix applet API to put input data in a buffer * BUG/MEDIUM: evports: do not clear returned events list on signal * BUG/MEDIUM: stconn: Don't forward channel data if input data must be filtered * BUG/MEDIUM: grpc: Fix several unaligned 32/64 bits accesses * MINOR: net_helper: Add support for floats/doubles. * CI: revert kernel addr randomization introduced in 3a0fc864 * BUG/MEDIUM: peers/trace: fix crash when listing event types * BUG/MINOR: debug: make sure DEBUG_STRICT=0 does work as documented * BUG/MINOR: http-ana: Fix TX_L7_RETRY and TX_D_L7_RETRY values * BUG/MEDIUM: http-ana: Deliver 502 on keep-alive for fressh server connection * CLEANUP: log: lf_text_len() returns a pointer not an integer * BUG/MINOR: log: invalid snprintf() usage in sess_build_logline() * BUG/MINOR: tools/log: invalid encode_{chunk,string} usage * BUG/MINOR: log: fix lf_text_len() truncate inconsistency * BUG/MINOR: listener: always assign distinct IDs to shards * BUG/MINOR: cli: Report an error to user if command or payload is too big * [RELEASE] Released version 2.8.9 * BUILD: proxy: Replace free_logformat_list() to manually release log-format * [RELEASE] Released version 2.8.8 * BUG/MINOR: proxy: fix logformat expression leak in use_backend rules * BUG/MINOR: backend: properly handle redispatch 0 * BUG/MINOR: server: ignore 'enabled' for dynamic servers * BUG/MEDIUM: cli: Warn if pipelined commands are delimited by a \n * MINOR: cli: Remove useless loop on commands to find unescaped semi-colon * MINOR: server: allow cookie for dynamic servers * BUG/MINOR: server: fix persistence cookie for dynamic servers * BUG/MINOR: ssl: Detect more 'ocsp-update' incompatibilities * BUG/MINOR: ssl: Wrong ocsp-update "incompatibility" error message * BUG/MINOR: server: 'source' interface ignored from 'default-server' directive * OPTIM: http_ext: avoid useless copy in http_7239_extract_{ipv4,ipv6} * BUG/MEDIUM: mux-fcgi: Properly handle EOM flag on end-of-trailers HTX block * BUG/MINOR: mux-quic: close all QCS before freeing QCC tasklet * BUG/MEDIUM: ssl: Fix crash in ocsp-update log function * BUG/MINOR: session: ensure conn owner is set after insert into session * BUG/MEDIUM: spoe: Return an invalid frame on recv if size is too small * CI: temporarily adjust kernel entropy to work with ASAN/clang * BUG/MINOR: spoe: Be sure to be able to quickly close IDLE applets on soft- stop * BUG/MEDIUM: spoe: Don't rely on stream's expiration to detect processing timeout * BUG/MINOR: listener: Don't schedule frontend without task in listener_release() * BUG/MINOR: listener: Wake proxy's mngmt task up if necessary on session release * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread (2nd try) * MINOR: hlua: use accessors for stream hlua ctx * DEBUG: lua: precisely identify if stream is stuck inside lua or not * BUG/MINOR: hlua: fix missing lock in hlua_filter_delete() * BUG/MINOR: hlua: missing lock in hlua_filter_new() * BUG/MINOR: hlua: segfault when loading the same filter from different contexts * BUG/MINOR: ssl: fix possible ctx memory leak in sample_conv_aes_gcm() * DOC: configuration: clarify ciphersuites usage (V2) * BUILD: solaris: fix compilation errors * BUG/MINOR: cfgparse: report proper location for log-format-sd errors * BUG/MINOR: ssl/cli: typo in new ssl crl-file CLI description * CI: skip scheduled builds on forks * BUG/MINOR: sink: fix a race condition in the TCP log forwarding code * BUG/MINOR: hlua: don't call ha_alert() in hlua_event_subscribe() * BUG/MAJOR: hlua: improper lock usage with hlua_ctx_resume() * BUG/MEDIUM: hlua: improper lock usage with SET_SAFE_LJMP() * BUG/MINOR: hlua: improper lock usage in hlua_filter_new() * BUG/MINOR: hlua: improper lock usage in hlua_filter_callback() * BUG/MINOR: hlua: fix possible crash in hlua_filter_new() under load * BUG/MINOR: hlua: don't use lua_tostring() from unprotected contexts * BUG/MINOR: hlua: fix unsafe lua_tostring() usage with empty stack * BUG/MINOR: tools: seed the statistical PRNG slightly better * MINOR: hlua: Be able to disable logging from lua * BUG/MINOR: hlua: Fix log level to the right value when set via TXN:set_loglevel * BUG/MINOR: config/quic: Alert about PROXY protocol use on a QUIC listener * DOC: configuration: clarify ciphersuites usage * LICENSE: http_ext: fix GPL license version * LICENSE: event_hdl: fix GPL license version * BUG/MINOR: ssl/cli: duplicate cleaning code in cli_parse_del_crtlist * BUG/MINOR: ist: only store NUL byte on succeeded alloc * BUG/MINOR: quic: fix output of show quic * BUG/MAJOR: server: fix stream crash due to deleted server * BUG/MINOR: stats: drop srv refcount on early release * BUG/MINOR: ist: allocate nul byte on istdup * MINOR: quic: warn on bind on multiple addresses if no IP_PKTINFO support * DOC: quic: fix recommandation for bind on multiple address * BUG/MEDIUM: quic: fix transient send error with listener socket * BUG/MEDIUM: hlua: Don't loop if a lua socket does not consume received data * BUG/MEDIUM: hlua: Be able to garbage collect uninitialized lua sockets * BUG/MEDIUM: applet: Immediately free appctx on early error * DOC: quic: Missing tuning setting in "Global parameters" * BUG/MINOR: qpack: reject invalid dynamic table capacity * BUG/MINOR: qpack: reject invalid increment count decoding * BUG/MINOR: quic: reject HANDSHAKE_DONE as server * BUG/MINOR: quic: reject unknown frame type * BUG/MAJOR: promex: fix crash on deleted server * MINOR: connection: add sample fetches to report per-connection glitches * MINOR: mux-h2: implement MUX_CTL_GET_GLITCHES * MINOR: connection: add a new mux_ctl to report number of connection glitches * MEDIUM: mux-h2: allow to set the glitches threshold to kill a connection * MINOR: mux-h2: always use h2c_report_glitch() * MINOR: mux-h2: count late reduction of INITIAL_WINDOW_SIZE as a glitch * MINOR: mux-h2: count excess of CONTINUATION frames as a glitch * BUG/MINOR: mux-h2: count rejected DATA frames against the connection's flow control * MINOR: mux-h2: add a counter of "glitches" on a connection * [RELEASE] Released version 2.8.7 * BUG/MAJOR: ssl/ocsp: crash with ocsp when old process exit or using ocsp CLI * [RELEASE] Released version 2.8.6 * DEV: makefile: fix POSIX compatibility for "range" target * DEV: makefile: add a new "range" target to iteratively build all commits * CI: Update to actions/cache at v4 * DOC: internal: update missing data types in peers-v2.0.txt * DOC: install: recommend pcre2 * DOC: httpclient: add dedicated httpclient section * DOC: configuration: clarify http-request wait-for-body * BUILD: address a few remaining calloc(size, n) cases * BUG/MINOR: ext-check: cannot use without preserve-env * MINOR: ext-check: add an option to preserve environment variables * BUG/MINOR: diag: run the final diags before quitting when using -c * BUG/MINOR: diag: always show the version before dumping a diag warning * MINOR: errors: ha_alert() and ha_warning() uses warn_exec_path() * MINOR: quic: Add a counter for reordered packets * MINOR: quic: Dynamic packet reordering threshold * MINOR: quic: Update K CUBIC calculation (RFC 9438) * BUG/MEDIUM: quic: Wrong K CUBIC calculation. * MINOR: quic: Stop using 1024th of a second. * BUG/MINOR: quic: fix possible integer wrap around in cubic window calculation * CLEANUP: quic: Code clarifications for QUIC CUBIC (RFC 9438) * BUG/MINOR: quic: Wrong ack ranges handling when reaching the limit. * BUG/MEDIUM: quic: fix crash on invalid qc_stream_buf_free() BUG_ON * BUG/MEDIUM: qpack: allow 6xx..9xx status codes * BUG/MEDIUM: h3: do not crash on invalid response status code * MINOR: h3: add traces for stream sending function * BUG/MEDIUM: quic: remove unsent data from qc_stream_desc buf * MINOR: quic: extract qc_stream_buf free in a dedicated function * MINOR: quic: Stop hardcoding a scale shifting value (CUBIC_BETA_SCALE_FACTOR_SHIFT) * CLEANUP: quic: Remove unused CUBIC_BETA_SCALE_FACTOR_SHIFT macro. * BUG/MEDIUM: mux-quic: report early error on stream * BUG/MINOR: h3: fix checking on NULL Tx buffer * BUG/MEDIUM: ssl: Fix crash when calling "update ssl ocsp-response" when an update is ongoing * REGTESTS: ssl: Add OCSP related tests * REGTESTS: ssl: Fix empty line in cli command input * BUG/MINOR: ssl: Reenable ocsp auto-update after an "add ssl crt-list" * BUG/MINOR: ssl: Destroy ckch instances before the store during deinit * BUG/MEDIUM: ocsp: Separate refcount per instance and per store * MINOR: ssl: Use OCSP_CERTID instead of ckch_store in ckch_store_build_certid * BUG/MINOR: ssl: Clear the ckch instance when deleting a crt-list line * BUG/MINOR: ssl: Duplicate ocsp update mode when dup'ing ckch * BUG/MINOR: ssl: Fix error message after ssl_sock_load_ocsp call * BUG/MAJOR: ssl_sock: Always clear retry flags in read/write functions * BUG/MEDIUM: h1: always reject the NUL character in header values * BUG/MINOR: h1-htx: properly initialize the err_pos field * BUG/MEDIUM: h1: Don't support LF only to mark the end of a chunk size * BUG/MINOR: h1: Don't support LF only at the end of chunks * BUG/MEDIUM: stconn: Don't check pending shutdown to wake an applet up * BUG/MEDIUM: stconn: Allow expiration update when READ/WRITE event is pending * BUG/MEDIUM: pool: fix rare risk of deadlock in pool_flush() * BUG/MINOR: jwt: fix jwt_verify crash on 32-bit archs * BUG/MEDIUM: cli: fix once for all the problem of missing trailing LFs * BUG/MINOR: vars/cli: fix missing LF after "get var" output * BUG/MEDIUM: cli: some err/warn msg dumps add LR into CSV output on stat's CLI * REGTESTS: add a test to ensure map-ordering is preserved * MINOR: mux-h2/traces: add a missing trace on connection WU with negative inc * BUG/MEDIUM: mux-h2: refine connection vs stream error on headers * MINOR: mux-h2/traces: clarify the "rejected H2 request" event * MINOR: mux-h2/traces: explicitly show the error/refused stream states * MINOR: mux-h2/traces: also suggest invalid header upon parsing error * MINOR: debug: make BUG_ON() catch build errors even without DEBUG_STRICT * MINOR: debug: make ABORT_NOW() store the caller's line number when using abort * MINOR: debug: make sure calls to ha_crash_now() are never merged * MINOR: compiler: add a new DO_NOT_FOLD() macro to prevent code folding * BUG/MEDIUM: quic: keylog callback not called (USE_OPENSSL_COMPAT) * BUG/MINOR: mux-h2: also count streams for refused ones * BUG/MINOR: mux-quic: do not prevent non-STREAM sending on flow control * DOC: configuration: corrected description of keyword tune.ssl.ocsp- update.mindelay * MINOR: mux-h2: support limiting the total number of H2 streams per connection * BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up * BUG/MEDIUM: stconn: Forward shutdown on write timeout only if it is forwardable * BUG/MEDIUM: h3: fix incorrect snd_buf return value * CLEANUP: quic: Remaining useless code into server part * BUG/MINOR: h3: close connection on sending alloc errors * BUG/MINOR: h3: properly handle alloc failure on finalize * BUG/MINOR: h3: close connection on header list too big * MINOR: h3: check connection error during sending * BUG/MINOR: quic: Missing call to TLS message callbacks * BUG/MINOR: quic: Wrong keylog callback setting. * BUG/MINOR: mux-quic: always report error to SC on RESET_STREAM emission * BUG/MEDIUM: stats: unhandled switching rules with TCP frontend * MINOR: stats: store the parent proxy in stats ctx (http) * DOC: config: Update documentation about local haproxy response * BUG/MINOR: resolvers: default resolvers fails when network not configured * BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty * BUG/MEDIUM: quic: QUIC CID removed from tree without locking * BUG/MEDIUM: quic: Possible buffer overflow when building TLS records * BUG/MINOR: mworker/cli: fix set severity-output support * DOC: configuration: typo req.ssl_hello_type * [RELEASE] Released version 2.8.5 * BUG/MEDIUM: proxy: always initialize the default settings after init * BUG/MINOR: lua: Wrong OCSP CID after modifying an SSL certficate (LUA) * BUG/MINOR: ssl: Wrong OCSP CID after modifying an SSL certficate * MINOR: ssl/cli: Add ha_(warning|alert) msgs to CLI ckch callback * BUG/MINOR: ssl: Double free of OCSP Certificate ID * BUG/MINOR: quic: Packet number spaces too lately initialized * BUG/MINOR: quic: Missing QUIC connection path member initialization * BUG/MINOR: quic: Possible leak of TX packets under heavy load * BUG/MEDIUM: quic: Possible crash during retransmissions and heavy load * BUG/MINOR: cache: Remove incomplete entries from the cache when stream is closed * BUG/MEDIUM: peers: fix partial message decoding * DOC: Clarify the differences between field() and word() * BUG/MINOR: sample: Make the `word` converter compatible with `-m found` * REGTESTS: sample: Test the behavior of consecutive delimiters for the field converter * DOC: config: fix monitor-fail typo * DOC: config: add matrix entry for "max-session-srv-conns" * DOC: config: specify supported sections for "max-session-srv-conns" * BUG/MINOR: cfgparse-listen: fix warning being reported as an alert * BUG/MINOR: config: Stopped parsing upon unmatched environment variables * BUG/MINOR: quic_tp: fix preferred_address decoding * DOC: config: fix missing characters in set-spoe-group action * BUG/MINOR: h3: always reject PUSH_PROMISE * BUG/MINOR: h3: fix TRAILERS encoding * BUG/MEDIUM: master/cli: Properly pin the master CLI on thread 1 / group 1 * BUG/MINOR: compression: possible NULL dereferences in comp_prepare_compress_request() * BUG/MINOR: quic: fix CONNECTION_CLOSE_APP encoding * DOC: lua: fix Proxy.get_mode() output * DOC: lua: add sticktable class reference from Proxy.stktable * REGTESTS: connection: disable http_reuse_be_transparent.vtc if !TPROXY * DOC: config: fix timeout check inheritance restrictions * DOC: 51d: updated 51Degrees repo URL for v3.2.10 * BUG/MINOR: server: do not leak default-server in defaults sections * BUG/MINOR: quic: Possible RX packet memory leak under heavy load * BUG/MEDIUM: quic: Possible crash for connections to be killed * BUG/MINOR: sock: mark abns sockets as non-suspendable and always unbind them * BUG/MINOR: startup: set GTUNE_SOCKET_TRANSFER correctly * REGTESTS: http: add a test to validate chunked responses delivery * BUG/MINOR: proxy/stktable: missing frees on proxy cleanup * MINOR: stktable: add stktable_deinit function * BUG/MINOR: stream/cli: report correct stream age in "show sess" * BUG/MEDIUM: mux-fcgi: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h1: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h2: fail earlier on malloc in takeover() * BUG/MAJOR: quic: complete thread migration before tcp-rules * [RELEASE] Released version 2.8.4 * BUG/MINOR: stconn: Report read activity on non-indep streams for partial sends * BUG/MINOR: stconn/applet: Report send activity only if there was output data * BUG/MINOR: stconn: Use HTX-aware channel's functions to get info on buffer * BUG/MINOR: stconn: Fix streamer detection for HTX streams * MINOR: channel: Add functions to get info on buffers and deal with HTX streams * MINOR: htx: Use a macro for overhead induced by HTX * BUG/MEDIUM: stconn: Update fsb date on partial sends * BUG/MEDIUM: stream: Don't call mux .ctl() callback if not implemented * BUG/MEDIUM: mworker: set the master variable earlier * BUG/MEDIUM: applet: Report a send activity everytime data were sent * BUG/MEDIUM: stconn: Report a send activity everytime data were sent * REGTESTS: http: Improve script testing abortonclose option * BUG/MEDIUM: stream: Properly handle abortonclose when set on backend only * MEDIUM: mux-h1: Handle MUX_SUBS_RECV flag in h1_ctl() and susbscribe for reads * MINOR: connection: Add a CTL flag to notify mux it should wait for reads again * BUG/MINOR: stconn: Handle abortonclose if backend connection was already set up * BUG/MEDIUM: connection: report connection errors even when no mux is installed * DOC: quic: Wrong syntax for "quic-cc-algo" keyword. * BUG/MINOR: sink: don't learn srv port from srv addr * BUG/MEDIUM: applet: Remove appctx from buffer wait list on release * DOC: config: use the word 'backend' instead of 'proxy' in 'track' description * BUG/MINOR: quic: fix retry token check inconsistency * DOC: management: -q is quiet all the time * BUG/MEDIUM: stconn: Don't update stream expiration date if already expired * BUG/MEDIUM: quic: Avoid some crashes upon TX packet allocation failures * BUG/MEDIUM: quic: Possible crashes when sending too short Initial packets * BUG/MEDIUM: quic: Avoid trying to send ACK frames from an empty ack ranges tree * BUG/MINOR: quic: idle timer task requeued in the past * BUG/MEDIUM: pool: fix releasable pool calculation when overloaded * BUG/MEDIUM: freq-ctr: Don't report overshoot for long inactivity period * BUG/MINOR: mux-h1: Properly handle http-request and http-keep-alive timeouts * BUG/MINOR: stick-table/cli: Check for invalid ipv4 key * BUG/MEDIUM: quic: fix sslconns on quic_conn alloc failure * BUG/MEDIUM: quic: fix actconn on quic_conn alloc failure * CLEANUP: htx: Properly indent htx_reserve_max_data() function * BUG/MINOR: stconn: Sanitize report for read activity * BUG/MEDIUM: Don't apply a max value on room_needed in sc_need_room() * BUG/MEDIUM: stconn: Don't report rcv/snd expiration date if SC cannot epxire * BUG/MEDIUM: pattern: don't trim pools under lock in pat_ref_purge_range() * BUG/MINOR: cfgparse/stktable: fix error message on stktable_init() failure * BUG/MINOR: stktable: missing free in parse_stick_table() * BUG/MINOR: tcpcheck: Report hexstring instead of binary one on check failure * BUG/MEDIUM: ssl: segfault when cipher is NULL * BUG/MINOR: mux-quic: fix early close if unset client timeout * BUG/MINOR: ssl: suboptimal certificate selection with TLSv1.3 and dual ECDSA/RSA * MEDIUM: quic: count quic_conn for global sslconns * MEDIUM: quic: count quic_conn instance for maxconn * MINOR: frontend: implement a dedicated actconn increment function * BUG/MINOR: ssl: use a thread-safe sslconns increment * BUG/MINOR: quic: do not consider idle timeout on CLOSING state * BUG/MEDIUM: server: "proto" not working for dynamic servers * MINOR: connection: add conn_pr_mode_to_proto_mode() helper func * DEBUG: mux-h2/flags: fix list of h2c flags used by the flags decoder * MINOR: lua: Add flags to configure logging behaviour * BUG/MINOR: ssl: load correctly @system-ca when ca-base is define * DOC: internal: filters: fix reference to entities.pdf * BUG/MINOR: mux-h2: update tracked counters with req cnt/req err * BUG/MINOR: mux-h2: commit the current stream ID even on reject * BUG/MEDIUM: peers: Fix synchro for huge number of tables * BUG/MEDIUM: peers: Be sure to always refresh recconnect timer in sync task * BUG/MINOR: trace: fix trace parser error reporting * BUG/MINOR: mux-h2: fix http-request and http-keep-alive timeouts again * BUG/MEDIUM: mux-h2: Don't report an error on shutr if a shutw is pending * BUG/MINOR: mux-h2: make up other blocked streams upon removal from list * BUG/MINOR: mux-h1: Send a 400-bad-request on shutdown before the first request * BUG/MEDIUM: quic-conn: free unsent frames on retransmit to prevent crash * BUG/MINOR: mux-quic: fix free on qcs-new fail alloc * BUG/MINOR: h3: strengthen host/authority header parsing * BUG/MINOR: mux-quic: support initial 0 max-stream-data * BUG/MEDIUM: mux-quic: fix RESET_STREAM on send-only stream * BUG/MINOR: quic: reject packet with no frame * BUG/MINOR: quic: Avoid crashing with unsupported cryptographic algos * BUG/MEDIUM: stconn: Fix comparison sign in sc_need_room() * BUG/MINOR: hq-interop: simplify parser requirement * BUG/MEDIUM: h1: Ignore C-L value in the H1 parser if T-E is also set * BUG/MINOR: mux-h1: Ignore C-L when sending H1 messages if T-E is also set * BUG/MINOR: mux-h1: Handle read0 in rcv_pipe() only when data receipt was tried * BUG/MEDIUM: hlua: Initialize appctx used by a lua socket on connect only * MINOR: hlua: Test the hlua struct first when the lua socket is connecting * MINOR: hlua: Save the lua socket's server in its context * MINOR: hlua: Save the lua socket's timeout in its context * MINOR: hlua: Don't preform operations on a not connected socket * MINOR: hlua: Set context's appctx when the lua socket is created * BUG/MEDIUM: http-ana: Try to handle response before handling server abort * BUG/MEDIUM: quic_conn: let the scheduler kill the task when needed * BUG/MEDIUM: actions: always apply a longest match on prefix lookup * BUG/MINOR: mux-quic: remove full demux flag on ncbuf release * BUG/MEDIUM: server/cli: don't delete a dynamic server that has streams * MINOR: pattern: fix pat_{parse,match}_ip() function comments * BUG/MINOR: server: add missing free for server->rdr_pfx * BUG/MAJOR: mux-h2: Report a protocol error for any DATA frame before headers * BUG/MINOR: freq_ctr: fix possible negative rate with the scaled API * BUG/MEDIUM: master/cli: Pin the master CLI on the first thread of the group 1 * BUG/MINOR: promex: fix backend_agg_check_status * BUG/MEDIUM: mux-fcgi: Don't swap trash and dbuf when handling STDERR records * BUG/MINOR: hlua/init: coroutine may not resume itself * BUG/MEDIUM: hlua: don't pass stale nargs argument to lua_resume() * CI: musl: drop shopt in workflow invocation * CI: musl: highlight section if there are coredumps * Revert "BUG/MEDIUM: quic: missing check of dcid for init pkt including a token" * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread * MINOR: hlua: add hlua_stream_ctx_prepare helper function * BUILD: quic: fix build on centos 8 and USE_QUIC_OPENSSL_COMPAT * BUG/MINOR: quic: ssl_quic_initial_ctx() uses error count not error code * BUG/MINOR: quic: allow-0rtt warning must only be emitted with quic bind * BUILD: Makefile: add USE_QUIC_OPENSSL_COMPAT to make help * MINOR: quic+openssl_compat: Emit an alert for "allow-0rtt" option * MINOR: quic+openssl_compat: Do not start without "limited-quic" * MINOR: quic: Warning for OpenSSL wrapper QUIC bindings without "limited- quic" * BUG/MINOR: quic+openssl_compat: Non initialized TLS encryption levels * DOC: quic: Add "limited-quic" new tuning setting * MINOR: quic: Add "limited-quic" new tuning setting * MINOR: quic: SSL context initialization with QUIC OpenSSL wrapper. * MINOR: quic: Add a quic_openssl_compat struct to quic_conn struct * MINOR: quic: Call the keylog callback for QUIC openssl wrapper from SSL_CTX_keylog() * MINOR: quic: Initialize TLS contexts for QUIC openssl wrapper * MINOR: quic: Export some KDF functions (QUIC-TLS) * MINOR: quic: Add a compilation option for the QUIC OpenSSL wrapper * MINOR: quic: Do not enable 0RTT with SSL_set_quic_early_data_enabled() * MINOR: quic: Set the QUIC connection as extra data before calling SSL_set_quic_method() * MINOR: quic: Do not enable O-RTT with USE_QUIC_OPENSSL_COMPAT * MINOR: quic: Include QUIC opensssl wrapper header from TLS stacks compatibility header * MINOR: quic: QUIC openssl wrapper implementation * BUG/MINOR: quic: Wrong cluster secret initialization * BUG/MINOR: quic: Leak of frames to send. * BUILD: bug: make BUG_ON() void to avoid a rare warning ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-163=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * haproxy-debuginfo-2.8.11+git0.01c1056a4-1.1 * haproxy-2.8.11+git0.01c1056a4-1.1 * haproxy-debugsource-2.8.11+git0.01c1056a4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53008.html * https://bugzilla.suse.com/show_bug.cgi?id=1233973 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:53 -0000 Subject: SUSE-RU-2025:20100-1: moderate: Recommended update for selinux-policy Message-ID: <174902699361.655.17229689641102382132@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2025:20100-1 Release Date: 2025-02-03T09:16:48Z Rating: moderate References: * bsc#1232753 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Trigger a full relabel on transactional systems upon module installation. This is rather expensive and will hopefully be replaced by a more fine grained solution later on (bsc#1232753) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-175=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * selinux-policy-devel-20230523+git25.ad22dd7f-2.1 * selinux-policy-targeted-20230523+git25.ad22dd7f-2.1 * selinux-policy-20230523+git25.ad22dd7f-2.1 * cockpit-system-309-7.2 * cockpit-selinux-309-7.2 * cockpit-networkmanager-309-7.2 * swtpm-selinux-0.8.0-1.87 * cockpit-storaged-309-7.2 * container-selinux-2.211.0-2.101 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cockpit-ws-309-7.2 * cockpit-debugsource-309-7.2 * cockpit-bridge-309-7.2 * cockpit-309-7.2 * swtpm-debugsource-0.8.0-1.87 * swtpm-debuginfo-0.8.0-1.87 * cockpit-debuginfo-309-7.2 * swtpm-0.8.0-1.87 * cockpit-ws-debuginfo-309-7.2 * cockpit-bridge-debuginfo-309-7.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232753 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:57 -0000 Subject: SUSE-RU-2025:20099-1: moderate: Recommended update for open-vm-tools Message-ID: <174902699794.655.7815342725128176392@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:20099-1 Release Date: 2025-02-03T09:16:01Z Rating: moderate References: * bsc#1227181 * bsc#1231826 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for open-vm-tools fixes the following issues: Update to 12.5.0 (bsc#1231826): * There are no new features in the open-vm-tools 12.5.0 release. * This is primarily a maintenance release that addresses a few critical problems. For a more complete list of issues resolved in this release, see the Resolved Issues section of the Release Notes. * For complete details, see: https://github.com/vmware/open-vm- tools/releases/tag/stable-12.5.0 * Release Notes are available at: https://github.com/vmware/open-vm- tools/blob/stable-12.5.0/ReleaseNotes.md * The granular changes that have gone into the 12.5.0 release are in the ChangeLog at: https://github.com/vmware/open-vm- tools/blob/stable-12.5.0/open-vm-tools/ChangeLog Update to 12.4.5 (build 23787635) (bsc#1227181): * There are no new features in the open-vm-tools 12.4.5 release. This is primarily a maintenance release that addresses a few critical problems, including: * A number of issues flagged by Coverity and ShellCheck have been addressed. * A vmtoolsd process hang related to nested logging from an RPC Channel error has been fixed. * For a more complete list of issues resolved in this release, see the Resolved Issues section of the Release Notes. * For complete details, see: https://github.com/vmware/open-vm- tools/releases/tag/stable-12.4.5 * Release Notes are available at: https://github.com/vmware/open-vm- tools/blob/stable-12.4.5/ReleaseNotes.md * The granular changes that have gone into the 12.4.5 release are in the ChangeLog at: https://github.com/vmware/open-vm- tools/blob/stable-12.4.5/open-vm-tools/ChangeLog ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-149=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * open-vm-tools-12.5.0-1.1 * libvmtools0-12.5.0-1.1 * open-vm-tools-debuginfo-12.5.0-1.1 * open-vm-tools-debugsource-12.5.0-1.1 * libvmtools0-debuginfo-12.5.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227181 * https://bugzilla.suse.com/show_bug.cgi?id=1231826 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:49:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:49:59 -0000 Subject: SUSE-RU-2025:20098-1: moderate: Recommended update for regionServiceClientConfigAzure Message-ID: <174902699937.655.1801613186578534522@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigAzure Announcement ID: SUSE-RU-2025:20098-1 Release Date: 2025-02-03T09:14:27Z Rating: moderate References: * bsc#1217537 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for regionServiceClientConfigAzure fixes the following issues: * Update to version 2.2.0 (jsc#PCT-360) * Add IPv6 certs to enable IPv6 access of the update infrastructure * Add patch to remove IPv6 on SLE 12, no IPv6 support in SLE 12 in the Public Cloud * Update to version 2.1.0 (bsc#1217537) * Replace certs 23.100.36.229.pem and 40.121.202.140.pem (4096 length): rgnsrv-azure-westus -> 23.100.36.229.pem expires 9 years rgnsrv-azure-eastus -> 40.121.202.140.pem expires 10 years * Update to version 2.0.1 (bsc#1217537) * Replacing 104.45.31.195.pem 191.237.254.253.pem certs expiring in 8 years and new length of 4096 These certs will replace the current certs that expire soon ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-183=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * regionServiceClientConfigAzure-2.2.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:01 -0000 Subject: SUSE-SU-2025:20097-1: moderate: Security update for wget Message-ID: <174902700127.655.6596827772806460918@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2025:20097-1 Release Date: 2025-02-03T09:14:08Z Rating: moderate References: * bsc#1233773 Cross-References: * CVE-2024-10524 CVSS scores: * CVE-2024-10524 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10524 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N * CVE-2024-10524 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-10524: Drop support for shorthand URLs (bsc#1233773). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-128=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * wget-debuginfo-1.24.5-2.1 * wget-1.24.5-2.1 * wget-debugsource-1.24.5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10524.html * https://bugzilla.suse.com/show_bug.cgi?id=1233773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:04 -0000 Subject: SUSE-SU-2025:20096-1: moderate: Security update for python-tornado6 Message-ID: <174902700401.655.9309522439458119388@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2025:20096-1 Release Date: 2025-02-03T09:13:20Z Rating: moderate References: * bsc#1233668 Cross-References: * CVE-2024-52804 CVSS scores: * CVE-2024-52804 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-52804 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-52804 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2024-52804: Avoid quadratic performance of cookie parsing (bsc#1233668). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-141=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python-tornado6-debugsource-6.4-2.1 * python311-tornado6-6.4-2.1 * python311-tornado6-debuginfo-6.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52804.html * https://bugzilla.suse.com/show_bug.cgi?id=1233668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:07 -0000 Subject: SUSE-SU-2025:20095-1: important: Security update for glib2 Message-ID: <174902700796.655.13462747089300129574@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20095-1 Release Date: 2025-02-03T09:13:20Z Rating: important References: * bsc#1233282 Cross-References: * CVE-2024-52533 CVSS scores: * CVE-2024-52533 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2024-52533: Fix a single byte buffer overflow (bsc#1233282). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-140=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libglib-2_0-0-debuginfo-2.76.2-6.1 * glib2-debugsource-2.76.2-6.1 * libglib-2_0-0-2.76.2-6.1 * libgio-2_0-0-debuginfo-2.76.2-6.1 * libgio-2_0-0-2.76.2-6.1 * glib2-tools-debuginfo-2.76.2-6.1 * libgmodule-2_0-0-debuginfo-2.76.2-6.1 * libgobject-2_0-0-2.76.2-6.1 * libgmodule-2_0-0-2.76.2-6.1 * glib2-tools-2.76.2-6.1 * libgobject-2_0-0-debuginfo-2.76.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52533.html * https://bugzilla.suse.com/show_bug.cgi?id=1233282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:11 -0000 Subject: SUSE-SU-2025:20094-1: moderate: Security update for python-requests Message-ID: <174902701150.655.6186990921929320768@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:20094-1 Release Date: 2025-02-03T09:12:09Z Rating: moderate References: * bsc#1224788 * bsc#1226321 * bsc#1231500 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for python-requests contains the following fixes: * Add patch to fix to inject the default CA bundles if they are not specified. (bsc#1226321, bsc#1231500) * Remove Requires on python-py, it should have been removed earlier. * update to 2.32.3: * Fixed bug breaking the ability to specify custom SSLContexts in sub-classes of HTTPAdapter. * Fixed issue where Requests started failing to run on Python versions compiled without the `ssl` module. * To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is * Fixed an issue where setting verify=False on the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, * verify=True now reuses a global SSLContext which should improve request time * Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-125=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-requests-2.32.3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 * https://bugzilla.suse.com/show_bug.cgi?id=1226321 * https://bugzilla.suse.com/show_bug.cgi?id=1231500 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:13 -0000 Subject: SUSE-RU-2025:20093-1: moderate: Recommended update for elemental-operator Message-ID: <174902701395.655.5503817296650671137@smelt2.prg2.suse.org> # Recommended update for elemental-operator Announcement ID: SUSE-RU-2025:20093-1 Release Date: 2025-02-03T09:11:51Z Rating: moderate References: * bsc#1232211 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for elemental-operator contains the following fixes: * Update to version 1.6.6: * Do not include Config to MachineRegistration as pointer. (bsc#1232211) * Align values.yaml and questions.yaml. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-124=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-register-1.6.6-1.1 * elemental-support-1.6.6-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232211 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:15 -0000 Subject: SUSE-SU-2025:20092-1: important: Security update for ucode-intel Message-ID: <174902701547.655.11221549412261676002@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20092-1 Release Date: 2025-02-03T09:11:18Z Rating: important References: * bsc#1233313 Cross-References: * CVE-2024-21820 * CVE-2024-21853 * CVE-2024-23918 * CVE-2024-23984 * CVE-2024-24968 CVSS scores: * CVE-2024-21820 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N * CVE-2024-21820 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2024-21820 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-21820 ( NVD ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2024-21853 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21853 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-21853 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23918 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-23918 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-23918 ( NVD ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23918 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-23984 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-23984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-23984 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23984 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-24968 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-24968 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-24968 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-24968 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20241112 release (bsc#1233313) * CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel Xeon Processors may allow an authorized user to potentially enable denial of service via local access. * CVE-2024-23918: Improper conditions check in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. * CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. * CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access. * CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access. * Update for functional issues. Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000036 00000037 Core Gen12 ADL H0 06-97-05/07 00000036 00000037 Core Gen12 ADL L0 06-9a-03/80 00000434 00000435 Core Gen12 ADL R0 06-9a-04/80 00000434 00000435 Core Gen12 EMR-SP A0 06-cf-01/87 21000230 21000283 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000230 21000283 Xeon Scalable Gen5 MTL C0 06-aa-04/e6 0000001f 00000020 Core? Ultra Processor RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004122 00004123 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000036 00000037 Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000036 00000037 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004122 00004123 Core Gen13 SPR-SP E3 06-8f-06/87 2b0005c0 2b000603 Xeon Scalable Gen4 SPR-SP E4/S2 06-8f-07/87 2b0005c0 2b000603 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b0005c0 2b000603 Xeon Scalable Gen4 New Disclosures Updated in Prior Releases: Processor Stepping F-M-S/PI Old Ver New Ver Products ICL-D B0 06-6c-01/10 010002b0 N/A Xeon D-17xx/D-18xx, D-27xx/D-28xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 N/A Xeon Scalable Gen3 * Intel CPU Microcode was updated to the 20241029 release Update for functional issues. Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products RPL-E/HX/S B0 06-b7-01/32 00000129 0000012b Core Gen13/Gen14 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-189=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20241112-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21820.html * https://www.suse.com/security/cve/CVE-2024-21853.html * https://www.suse.com/security/cve/CVE-2024-23918.html * https://www.suse.com/security/cve/CVE-2024-23984.html * https://www.suse.com/security/cve/CVE-2024-24968.html * https://bugzilla.suse.com/show_bug.cgi?id=1233313 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:19 -0000 Subject: SUSE-SU-2025:20091-1: important: Security update for containerd Message-ID: <174902701996.655.18092716712176175410@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:20091-1 Release Date: 2025-02-03T09:11:18Z Rating: important References: * bsc#1200528 * bsc#1217070 * bsc#1221400 * bsc#1224323 * bsc#1228553 Cross-References: * CVE-2022-1996 * CVE-2023-45142 * CVE-2023-45288 * CVE-2023-47108 CVSS scores: * CVE-2022-1996 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1996 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1996 ( NVD ): 9.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has one fix can now be installed. ## Description: This update for containerd fixes the following issues: * Update to containerd v1.7.21. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.21 Fixes CVE-2023-47108. bsc#1217070 Fixes CVE-2023-45142. bsc#1228553 * Update to containerd v1.7.17. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.17 * Update to containerd v1.7.16. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.16 CVE-2023-45288 bsc#1221400 * Update to containerd v1.7.15. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.15 * Update to containerd v1.7.14. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.14 * Update to containerd v1.7.13. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.13 * Update to containerd v1.7.12. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.12 * Update to containerd v1.7.11. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.11 GHSA- jq35-85cj-fj4p bsc#1224323 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-147=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * containerd-1.7.21-1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-1996.html * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://bugzilla.suse.com/show_bug.cgi?id=1200528 * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1221400 * https://bugzilla.suse.com/show_bug.cgi?id=1224323 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:33 -0000 Subject: SUSE-SU-2025:20090-1: important: Security update for cups Message-ID: <174902703323.655.17191184947864284883@smelt2.prg2.suse.org> # Security update for cups Announcement ID: SUSE-SU-2025:20090-1 Release Date: 2025-02-03T09:11:18Z Rating: important References: * bsc#1219503 * bsc#1225365 Cross-References: * CVE-2023-32324 * CVE-2023-32360 * CVE-2023-34241 * CVE-2023-4504 * CVE-2024-35235 CVSS scores: * CVE-2023-32324 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32324 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32360 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-34241 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-34241 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-4504 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4504 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-4504 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-35235 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35235 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for cups fixes the following issues: * Version upgrade to 2.4.11: See https://github.com/openprinting/cups/releases CUPS 2.4.11 brings several bug fixes regarding IPP response validation, processing PPD values, Web UI support (checkbox support, modifying printers) and others fixes. Detailed list (from CHANGES.md): * Updated the maximum file descriptor limit for `cupsd` to 64k-1 (Issue #989) * Fixed `lpoptions -d` with a discovered but not added printer (Issue #833) * Fixed incorrect error message for HTTP/IPP errors (Issue #893) * Fixed JobPrivateAccess and SubscriptionPrivateAccess support for "all" (Issue #990) * Fixed issues with cupsGetDestMediaByXxx (Issue #993) * Fixed adding and modifying of printers via the web interface (Issue #998) * Fixed HTTP PeerCred authentication for domain users (Issue #1001) * Fixed checkbox support (Issue #1008) * Fixed printer state notifications (Issue #1013) * Fixed IPP Everywhere printer setup (Issue #1033) Issues are those at https://github.com/OpenPrinting/cups/issues In particular CUPS 2.4.11 contains those commit regarding IPP response validation and processing PPD values: * "Quote PPD localized strings" https://github.com/OpenPrinting/cups/commit/1e6ca5913eceee906038bc04cc7ccfbe2923bdfd plus a cleanup to "Fix warnings for unused vars" https://github.com/OpenPrinting/cups/commit/2abe1ba8a66864aa82cd9836b37e57103b8e1a3b * Version upgrade to 2.4.10: See https://github.com/openprinting/cups/releases CUPS 2.4.10 brings two fixes: * Fixed error handling when reading a mixed 1setOf attribute. * Fixed scheduler start if there is only domain socket to listen on (Issue #985) which is fix for regression after fix for CVE-2024-35235 in scenarios where is no other listeners in cupsd.conf than domain socket created on demand by systemd, launchd or upstart. Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.9: See https://github.com/openprinting/cups/releases CUPS 2.4.9 brings security fix for CVE-2024-35235 and several bug fixes regarding CUPS Web User Interface, PPD generation and HTTP protocol implementation. Detailed list (from CHANGES.md): * Fixed domain socket handling (CVE-2024-35235) * Fixed creating of `cupsUrfSupported` PPD keyword (Issue #952) * Fixed searching for destinations in web ui (Issue #954) * Fixed TLS negotiation using OpenSSL with servers that require the TLS SNI extension. * Really raised `cups_enum_dests()` timeout for listing available IPP printers (Issue #751)... * Fixed `Host` header regression (Issue #967) * Fixed DNS-SD lookups of local services with Avahi (Issue #970) * Fixed listing jobs in destinations in web ui. (Apple issue #6204) * Fixed showing search query in web ui help page. (Issue #977) Issues are those at https://github.com/OpenPrinting/cups/issues Apple issues are those at https://github.com/apple/cups/issues * Update to version 2.4.8: See https://github.com/openprinting/cups/releases CUPS 2.4.8 brings many bug fixes which aggregated over the last half a year. It brings the important fix for race conditions and errors which can happen when installing permanent IPP Everywhere printer, support for PAM modules password-auth and system-auth and new option for lpstat which can show only the successful jobs. Detailed list (from CHANGES.md): * Added warning if the device has to be asked for 'all,media-col-database' separately (Issue #829) * Added new value for 'lpstat' option '-W' \- successfull - for getting successfully printed jobs (Issue #830) * Added support for PAM modules password-auth and system-auth (Issue #892) * Updated IPP Everywhere printer creation error reporting (Issue #347) * Updated and documented the MIME typing buffering limit (Issue #925) * Raised 'cups_enum_dests()' timeout for listing available IPP printers (Issue #751) * Now report an error for temporary printer defaults with lpadmin (Issue #237) * Fixed mapping of PPD InputSlot, MediaType, and OutputBin values (Issue #238) * Fixed "document-unprintable-error" handling (Issue #391) * Fixed the web interface not showing an error for a non-existent printer (Issue #423) * Fixed printing of jobs with job name longer than 255 chars on older printers (Issue #644) * Really backported fix for Issue #742 * Fixed 'cupsCopyDestInfo' device connection detection (Issue #586) * Fixed "Upgrade" header handling when there is no TLS support (Issue #775) * Fixed memory leak when unloading a job (Issue #813) * Fixed memory leak when creating color profiles (Issue #815) * Fixed a punch finishing bug in the IPP Everywhere support (Issue #821) * Fixed crash in 'scan_ps()' if incoming argument is NULL (Issue #831) * Fixed setting job state reasons for successful jobs (Issue #832) * Fixed infinite loop in IPP backend if hostname is IP address with Kerberos (Issue #838) * Added additional check on socket if 'revents' from 'poll()' returns POLLHUP together with POLLIN or POLLOUT in 'httpAddrConnect2()' (Issue #839) * Fixed crash in 'ppdEmitString()' if 'size' is NULL (Issue #850) * Fixed reporting 'media-source-supported' when sharing printer which has numbers as strings instead of keywords as 'InputSlot' values (Issue #859) * Fixed IPP backend to support the "print-scaling" option with IPP printers (Issue #862) * Fixed potential race condition for the creation of temporary queues (Issue #871) * Fixed 'httpGets' timeout handling (Issue #879) * Fixed checking for required attributes during PPD generation (Issue #890) * Fixed encoding of IPv6 addresses in HTTP requests (Issue #903) * Fixed sending response headers to client (Issue #927) * Fixed CGI program initialization and validation of form checkbox and text fields. Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.7: See https://github.com/openprinting/cups/releases CUPS 2.4.7 is released to ship the fix for CVE-2023-4504 and several other changes, among them it is adding OpenSSL support for cupsHashData function and bug fixes. Detailed list: * CVE-2023-4504 - Fixed Heap-based buffer overflow when reading Postscript in PPD files * Added OpenSSL support for cupsHashData (Issue #762) * Fixed delays in lpd backend (Issue #741) * Fixed extensive logging in scheduler (Issue #604) * Fixed hanging of lpstat on IBM AIX (Issue #773) * Fixed hanging of lpstat on Solaris (Issue #156) * Fixed printing to stderr if we can't open cups-files.conf (Issue #777) * Fixed purging job files via cancel -x (Issue #742) * Fixed RFC 1179 port reserving behavior in LPD backend (Issue #743) * Fixed a bug in the PPD command interpretation code (Issue #768) Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.6: See https://github.com/openprinting/cups/releases CUPS 2.4.6 is released to ship the fix for CVE-2023-34241 and two other bug fixes. Detailed list: * Fix linking error on old MacOS (Issue #715) * Fix printing multiple files on specific printers (Issue #643) * Fix use-after-free when logging warnings in case of failures in cupsdAcceptClient() (fixes CVE-2023-34241) Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.5: See https://github.com/openprinting/cups/releases CUPS 2.4.5 is a hotfix release for a bug which corrupted locally saved certificates, which broke secured printing via TLS after the first print job. * Version upgrade to 2.4.4: See https://github.com/openprinting/cups/releases CUPS 2.4.4 release is created as a hotfix for segfault in cupsGetNamedDest(), when caller tries to find the default destination and the default destination is not set on the machine. * Version upgrade to 2.4.3: See https://github.com/openprinting/cups/releases CUPS 2.4.3 brings fix for CVE-2023-32324, several improvements and many bug fixes. CUPS now implements fallback for printers with broken firmware, which is not capable of answering to IPP request get-printer-attributes with all, media-col-database - this enables driverless support for bunch of printers which don't follow IPP Everywhere standard. Aside from the CVE fix the most important fixes are around color settings, printer application support fixes and OpenSSL support. Detailed list of changes: * Added a title with device uri for found network printers (Issues #402, #393) * Added new media sizes defined by IANA (Issues #501) * Added quirk for GoDEX label printers (Issue #440) * Fixed --enable-libtool-unsupported (Issue #394) * Fixed configuration on RISC-V machines (Issue #404) * Fixed the device_uri invalid pointer for driverless printers with .local hostname (Issue #419) * Fixed an OpenSSL crash bug (Issue #409) * Fixed a potential SNMP OID value overflow issue (Issue #431) * Fixed an OpenSSL certificate loading issue (Issue #465) * Fixed Brazilian Portuguese translations (Issue #288) * Fixed cupsd default keychain location when building with OpenSSL (Issue #529) * Fixed default color settings for CMYK printers as well (Issue #500) * Fixed duplicate PPD2IPP media-type names (Issue #688) * Fixed possible heap buffer overflow in _cups_strlcpy() (fixes CVE-2023-32324) * Fixed InputSlot heuristic for photo sizes smaller than 5x7" if there is no media-source in the request (Issue #569) * Fixed invalid memory access during generating IPP Everywhere queue (Issue #466) * Fixed lprm if no destination is provided (Issue #457) * Fixed memory leaks in create_local_bg_thread() (Issue #466) * Fixed media size tolerance in ippeveprinter (Issue #487) * Fixed passing command name without path into ippeveprinter (Issue #629) * Fixed saving strings file path in printers.conf (Issue #710) * Fixed TLS certificate generation bugs (Issue #652) * ippDeleteValues would not delete the last value (Issue #556) * Ignore some of IPP defaults if the application sends its PPD alternative (Issue #484) * Make Letter the default size in ippevepcl (Issue #543) * Now accessing Admin page in Web UI requires authentication (Issue #518) * Now look for default printer on network if needed (Issue #452) * Now we poll media-col-database separately if we fail at first (Issue #599) * Now report fax attributes and values as needed (Issue #459) * Now localize HTTP responses using the Content-Language value (Issue #426) * Raised file size limit for importing PPD via Web UI (Issue #433) * Raised maximum listen backlog size to INT MAX (Issue #626) * Update print-color-mode if the printer is modified via ColorModel PPD option (Issue #451) * Use localhost when printing via printer application (Issue #353) * Write defaults into /etc/cups/lpoptions if we're root (Issue #456) Issues are those at https://github.com/OpenPrinting/cups/issues ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-122=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cups-debugsource-2.4.11-1.1 * libcups2-2.4.11-1.1 * libcups2-debuginfo-2.4.11-1.1 * cups-config-2.4.11-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32324.html * https://www.suse.com/security/cve/CVE-2023-32360.html * https://www.suse.com/security/cve/CVE-2023-34241.html * https://www.suse.com/security/cve/CVE-2023-4504.html * https://www.suse.com/security/cve/CVE-2024-35235.html * https://bugzilla.suse.com/show_bug.cgi?id=1219503 * https://bugzilla.suse.com/show_bug.cgi?id=1225365 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:36 -0000 Subject: SUSE-SU-2025:20089-1: moderate: Security update for wpa_supplicant Message-ID: <174902703640.655.2936031967276914412@smelt2.prg2.suse.org> # Security update for wpa_supplicant Announcement ID: SUSE-SU-2025:20089-1 Release Date: 2025-02-03T09:09:41Z Rating: moderate References: * bsc#1219975 Cross-References: * CVE-2023-52160 CVSS scores: * CVE-2023-52160 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52160 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-52160 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for wpa_supplicant fixes the following issues: * CVE-2023-52160: Fixed WiFi authentication bypass (bsc#1219975). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-139=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * wpa_supplicant-debugsource-2.10-5.1 * wpa_supplicant-2.10-5.1 * wpa_supplicant-debuginfo-2.10-5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52160.html * https://bugzilla.suse.com/show_bug.cgi?id=1219975 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:39 -0000 Subject: SUSE-SU-2025:20088-1: important: Security update for libndp Message-ID: <174902703903.655.202232176865547022@smelt2.prg2.suse.org> # Security update for libndp Announcement ID: SUSE-SU-2025:20088-1 Release Date: 2025-02-03T09:09:40Z Rating: important References: * bsc#1225771 Cross-References: * CVE-2024-5564 CVSS scores: * CVE-2024-5564 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-5564 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libndp fixes the following issues: * CVE-2024-5564: Fixed buffer overflow in route information length field (bsc#1225771). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-107=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libndp0-debuginfo-1.8-3.1 * libndp-debugsource-1.8-3.1 * libndp0-1.8-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5564.html * https://bugzilla.suse.com/show_bug.cgi?id=1225771 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:41 -0000 Subject: SUSE-SU-2025:20087-1: important: Security update for libarchive Message-ID: <174902704137.655.11172753380659149280@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2025:20087-1 Release Date: 2025-02-03T09:09:14Z Rating: important References: * bsc#1225972 * bsc#1231544 * bsc#1231624 Cross-References: * CVE-2024-20697 * CVE-2024-26256 * CVE-2024-48957 * CVE-2024-48958 CVSS scores: * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-48957 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-48958 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624). * CVE-2024-20697: Fixed out-of-bounds remote code execution vulnerability (bsc#1225972). * CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-121=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libarchive13-3.6.2-4.1 * libarchive-debugsource-3.6.2-4.1 * libarchive13-debuginfo-3.6.2-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20697.html * https://www.suse.com/security/cve/CVE-2024-26256.html * https://www.suse.com/security/cve/CVE-2024-48957.html * https://www.suse.com/security/cve/CVE-2024-48958.html * https://bugzilla.suse.com/show_bug.cgi?id=1225972 * https://bugzilla.suse.com/show_bug.cgi?id=1231544 * https://bugzilla.suse.com/show_bug.cgi?id=1231624 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:43 -0000 Subject: SUSE-SU-2025:20086-1: moderate: Security update for expat Message-ID: <174902704302.655.12999041835037254145@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20086-1 Release Date: 2025-02-03T09:09:14Z Rating: moderate References: * bsc#1232579 Cross-References: * CVE-2024-50602 CVSS scores: * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-50602: Fixed possible denial-of-service vulnerability inside XML_ResumeParser (bsc#1232579). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-120=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * expat-debugsource-2.5.0-4.1 * libexpat1-2.5.0-4.1 * libexpat1-debuginfo-2.5.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1232579 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:45 -0000 Subject: SUSE-SU-2025:20085-1: moderate: Security update for skopeo Message-ID: <174902704581.655.331575101418030882@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20085-1 Release Date: 2025-02-03T09:08:43Z Rating: moderate References: * bsc#1231698 Cross-References: * CVE-2024-9676 CVSS scores: * CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for skopeo fixes the following issues: * CVE-2024-9676: Fixed symlink traversal vulnerability in the containers/storage library that could have let to a denial-of-service attack (bsc#1231698). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-146=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * skopeo-debuginfo-1.14.4-2.1 * skopeo-1.14.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9676.html * https://bugzilla.suse.com/show_bug.cgi?id=1231698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:49 -0000 Subject: SUSE-RU-2025:20084-1: moderate: Recommended update for regionServiceClientConfigGCE Message-ID: <174902704948.655.15030362504012051901@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigGCE Announcement ID: SUSE-RU-2025:20084-1 Release Date: 2025-02-03T09:08:12Z Rating: moderate References: * bsc#1217538 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for regionServiceClientConfigGCE contains the following fixes: * Version 4.2.0 (jsc#PCT-361) * Add IPv6 certs to supprt access of the update infrastructure via IPv6 on GCE instances. * Update to version 4.1.0 (bsc#1217538) * Replace 162.222.182.90 and 35.187.193.56 (length 4096): rgnsrv-gce-asia- northeast1 -> 162.222.182.90 expires in 9 years rgnsrv-gce-us-central1 -> 35.187.193.56 expires in 10 years * Update to version 4.0.1 (bsc#1217538) * Replace 130.211.242.136.pem and 130.211.88.88.pem certs expiring in 8 years and new length of 4096 These certs will replace the current certs that expire soon ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-145=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * regionServiceClientConfigGCE-4.2.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217538 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:51 -0000 Subject: SUSE-SU-2025:20083-1: moderate: Security update for curl Message-ID: <174902705127.655.3948495694595396748@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20083-1 Release Date: 2025-02-03T09:07:56Z Rating: moderate References: * bsc#1232528 Cross-References: * CVE-2024-9681 CVSS scores: * CVE-2024-9681 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9681 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9681 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9681 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-9681: Fixed HSTS subdomain overwrites parent cache entry (bsc#1232528) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-138=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * curl-debugsource-8.6.0-4.1 * libcurl4-8.6.0-4.1 * libcurl4-debuginfo-8.6.0-4.1 * curl-8.6.0-4.1 * curl-debuginfo-8.6.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9681.html * https://bugzilla.suse.com/show_bug.cgi?id=1232528 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:53 -0000 Subject: SUSE-SU-2025:20082-1: moderate: Security update for Mesa Message-ID: <174902705386.655.649045082283812387@smelt2.prg2.suse.org> # Security update for Mesa Announcement ID: SUSE-SU-2025:20082-1 Release Date: 2025-02-03T09:06:43Z Rating: moderate References: * bsc#1222040 * bsc#1222041 * bsc#1222042 Cross-References: * CVE-2023-45913 * CVE-2023-45919 * CVE-2023-45922 CVSS scores: * CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45913 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H * CVE-2023-45919 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45922 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for Mesa fixes the following issues: * CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040). * CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041). * CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#1222042). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-144=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * Mesa-libglapi0-23.3.4-8.1 * Mesa-dri-23.3.4-8.1 * libgbm1-23.3.4-8.1 * Mesa-libEGL1-23.3.4-8.1 * Mesa-debugsource-23.3.4-8.1 * Mesa-libglapi0-debuginfo-23.3.4-8.1 * Mesa-drivers-debugsource-23.3.4-8.1 * Mesa-23.3.4-8.1 * Mesa-libEGL1-debuginfo-23.3.4-8.1 * libgbm1-debuginfo-23.3.4-8.1 * Mesa-dri-debuginfo-23.3.4-8.1 * Mesa-libGL1-23.3.4-8.1 * Mesa-libGL1-debuginfo-23.3.4-8.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * Mesa-gallium-debuginfo-23.3.4-8.1 * Mesa-gallium-23.3.4-8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45913.html * https://www.suse.com/security/cve/CVE-2023-45919.html * https://www.suse.com/security/cve/CVE-2023-45922.html * https://bugzilla.suse.com/show_bug.cgi?id=1222040 * https://bugzilla.suse.com/show_bug.cgi?id=1222041 * https://bugzilla.suse.com/show_bug.cgi?id=1222042 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:56 -0000 Subject: SUSE-SU-2025:20081-1: important: Security update for openssl-3 Message-ID: <174902705611.655.3919389048886077284@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:20081-1 Release Date: 2025-02-03T09:06:02Z Rating: important References: * bsc#1220262 * bsc#1230698 Cross-References: * CVE-2023-50782 * CVE-2024-41996 CVSS scores: * CVE-2023-50782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-50782 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-50782 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41996 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-41996: Fixed a denial of service in the Diffie-Hellman Key Agreement Protocol (bsc#1230698). * CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-201=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssl-3-3.1.4-7.1 * libopenssl-3-fips-provider-3.1.4-7.1 * libopenssl-3-devel-3.1.4-7.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-7.1 * libopenssl3-3.1.4-7.1 * openssl-3-debuginfo-3.1.4-7.1 * openssl-3-debugsource-3.1.4-7.1 * libopenssl3-debuginfo-3.1.4-7.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50782.html * https://www.suse.com/security/cve/CVE-2024-41996.html * https://bugzilla.suse.com/show_bug.cgi?id=1220262 * https://bugzilla.suse.com/show_bug.cgi?id=1230698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:50:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:50:59 -0000 Subject: SUSE-SU-2025:20080-1: moderate: Security update for podman Message-ID: <174902705970.655.16241059120441777907@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20080-1 Release Date: 2025-02-03T09:06:01Z Rating: moderate References: * bsc#1231208 * bsc#1231230 * bsc#1231499 * bsc#1231698 Cross-References: * CVE-2024-6104 * CVE-2024-9341 * CVE-2024-9407 * CVE-2024-9675 * CVE-2024-9676 CVSS scores: * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2024-9675 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2024-9676: Fixed a denial of service via a symlink traversal in the containers/storage library (bsc#1231698) * CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230) * CVE-2024-9675: Fixed caching of arbitrary directory mount (bsc#1231499) * CVE-2024-9407: Fixed improper input validation in bind-propagation option of Dockerfile RUN --mount instruction (bsc#1231208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-95=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-remote-4.9.5-2.1 * podman-4.9.5-2.1 * podman-debuginfo-4.9.5-2.1 * podman-remote-debuginfo-4.9.5-2.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2024-9341.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2024-9675.html * https://www.suse.com/security/cve/CVE-2024-9676.html * https://bugzilla.suse.com/show_bug.cgi?id=1231208 * https://bugzilla.suse.com/show_bug.cgi?id=1231230 * https://bugzilla.suse.com/show_bug.cgi?id=1231499 * https://bugzilla.suse.com/show_bug.cgi?id=1231698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:51:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:51:03 -0000 Subject: SUSE-RU-2025:20079-1: moderate: Recommended update for pam Message-ID: <174902706303.655.15383327317215758552@smelt2.prg2.suse.org> # Recommended update for pam Announcement ID: SUSE-RU-2025:20079-1 Release Date: 2025-02-03T09:05:41Z Rating: moderate References: * bsc#1194818 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for pam fixes the following issue: * Prevent cursor escape from the login prompt (bsc#1194818) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-94=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam-debuginfo-1.6.0-3.1 * pam-1.6.0-3.1 * pam-debugsource-1.6.0-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1194818 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:51:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:51:04 -0000 Subject: SUSE-RU-2025:20078-1: moderate: Recommended update for gcc13 Message-ID: <174902706478.655.17508263788028583578@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2025:20078-1 Release Date: 2025-02-03T09:05:40Z Rating: moderate References: * bsc#1231833 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has one fix can now be installed. ## Description: This update for gcc13 fixes the following issues: * Fix for parsing tzdata 2024b [gcc#116657] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-119=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-119=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgomp1-debuginfo-13.3.0+git8781-2.1 * libstdc++6-13.3.0+git8781-2.1 * libatomic1-13.3.0+git8781-2.1 * libstdc++6-debuginfo-13.3.0+git8781-2.1 * libgcc_s1-debuginfo-13.3.0+git8781-2.1 * libgcc_s1-13.3.0+git8781-2.1 * libatomic1-debuginfo-13.3.0+git8781-2.1 * gcc13-debugsource-13.3.0+git8781-2.1 * libgomp1-13.3.0+git8781-2.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * gcc13-c++-debuginfo-13.3.0+git8781-2.1 * libitm1-13.3.0+git8781-2.1 * liblsan0-13.3.0+git8781-2.1 * gcc13-PIE-13.3.0+git8781-2.1 * libasan8-13.3.0+git8781-2.1 * libtsan2-13.3.0+git8781-2.1 * libasan8-debuginfo-13.3.0+git8781-2.1 * libstdc++6-devel-gcc13-13.3.0+git8781-2.1 * gcc13-debuginfo-13.3.0+git8781-2.1 * libubsan1-debuginfo-13.3.0+git8781-2.1 * liblsan0-debuginfo-13.3.0+git8781-2.1 * libubsan1-13.3.0+git8781-2.1 * cpp13-debuginfo-13.3.0+git8781-2.1 * gcc13-13.3.0+git8781-2.1 * libitm1-debuginfo-13.3.0+git8781-2.1 * gcc13-c++-13.3.0+git8781-2.1 * gcc13-debugsource-13.3.0+git8781-2.1 * libtsan2-debuginfo-13.3.0+git8781-2.1 * cpp13-13.3.0+git8781-2.1 * SUSE Linux Micro Extras 6.0 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-2.1 * libhwasan0-13.3.0+git8781-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231833 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:51:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:51:48 -0000 Subject: SUSE-RU-2025:20162-1: important: Recommended update for supportutils Message-ID: <174902710894.627.15711073698920691557@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2025:20162-1 Release Date: 2025-03-25T09:26:25Z Rating: important References: * bsc#1213291 * bsc#1220082 * bsc#1222021 * bsc#1222896 * bsc#1227127 * bsc#1228265 * bsc#1231396 * bsc#1231423 * bsc#1233726 * jsc#PED-11669 * jsc#PED-8211 * jsc#PED-8221 Affected Products: * SUSE Linux Micro 6.0 An update that contains three features and has nine fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.9 * Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291,jsc#PED-8221) * Supportconfig available in current distro (PED-7131) * Corrected display issues (bsc#1231396) * NFS takes too long, showmount times out (bsc#1231423) * Merged sle15 and master branches (bsc#1233726, jsc#PED-11669) * Changes to version 3.2.8 * Update supportconfig get pam.d sorted * yast_files: Exclude .zcat * Sanitize grub bootloader (bsc#1227127) * Sanitize regcodes * Improve product detection * Add read_values for s390x (bsc#1228265,) * hardware_info: Remove old alsa ver check * drbd_info: Fix incorrect escape of quotes * Changes in version 3.1.30 * Added -V key:value pair option (bsc#1222021,jsc#PED-8211) * Avoid getting duplicate kernel verifications in boot.text * Suppress file descriptor leak warnings from lvm commands (bsc#1220082) * Includes container log timestamps ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-261=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * supportutils-3.2.9-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213291 * https://bugzilla.suse.com/show_bug.cgi?id=1220082 * https://bugzilla.suse.com/show_bug.cgi?id=1222021 * https://bugzilla.suse.com/show_bug.cgi?id=1222896 * https://bugzilla.suse.com/show_bug.cgi?id=1227127 * https://bugzilla.suse.com/show_bug.cgi?id=1228265 * https://bugzilla.suse.com/show_bug.cgi?id=1231396 * https://bugzilla.suse.com/show_bug.cgi?id=1231423 * https://bugzilla.suse.com/show_bug.cgi?id=1233726 * https://jira.suse.com/browse/PED-11669 * https://jira.suse.com/browse/PED-8211 * https://jira.suse.com/browse/PED-8221 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:02 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:02 -0000 Subject: SUSE-SU-2025:20158-1: important: Security update for ucode-intel Message-ID: <174902712207.627.511479289598266849@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20158-1 Release Date: 2025-03-24T12:15:39Z Rating: important References: * bsc#1237096 Cross-References: * CVE-2024-31068 * CVE-2024-36293 * CVE-2024-37020 * CVE-2024-39355 CVSS scores: * CVE-2024-31068 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-31068 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-31068 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31068 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-36293 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-36293 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-36293 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-37020 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-37020 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-37020 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-39355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-39355 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-39355 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-39355 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20250211 release (bsc#1237096) * Security updates for INTEL-SA-01166 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01166.html * CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware Logic for some Intel Processors may allow privileged user to potentially enable denial of service via local access. * Security updates for INTEL-SA-01213 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01213.html * CVE-2024-36293: A potential security vulnerability in some Intel Software Guard Extensions (Intel SGX) Platforms may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01139 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01139.html * not clear which CVEs are fixed here, and which are in UEFI BIOS updates. * Security updates for INTEL-SA-01228 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01228.html * CVE-2024-39355: A potential security vulnerability in some 13th and 14th Generation Intel Core Processors may allow denial of service. Intel is releasing microcode and UEFI reference code updates to mitigate this potential vulnerability. * Security updates for INTEL-SA-01194 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01194.html * CVE-2024-37020: A potential security vulnerability in the Intel Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors may allow denial of service. Intel is releasing software updates to mitigate this potential vulnerability. * Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details. * Update for functional issues. Refer to 13th/14th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details. * Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details. * Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details. * Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details. * Update for functional issues. Refer to 5th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/793902 for details. * Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details. * Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details. * Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details. * Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details. * Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details ### New Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products SRF-SP C0 06-af-03/01 03000330 Xeon 6700-Series Processors with E-Cores ### Updated Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000037 00000038 Core Gen12 ADL H0 06-97-05/07 00000037 00000038 Core Gen12 ADL L0 06-9a-03/80 00000435 00000436 Core Gen12 ADL R0 06-9a-04/80 00000435 00000436 Core Gen12 ADL-N N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E AZB A0/R0 06-9a-04/40 00000007 00000009 Intel(R) Atom(R) C1100 CFL-H R0 06-9e-0d/22 00000100 00000102 Core Gen9 Mobile CFL-H/S/E3 U0 06-9e-0a/22 000000f8 000000fa Core Gen8 Desktop, Mobile, Xeon E EMR-SP A0 06-cf-01/87 21000283 21000291 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000283 21000291 Xeon Scalable Gen5 ICL-D B0 06-6c-01/10 010002b0 010002c0 Xeon D-17xx, D-27xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 0d0003f5 Xeon Scalable Gen3 RPL-E/HX/S B0 06-b7-01/32 0000012b 0000012c Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004123 00004124 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000037 00000038 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004123 00004124 Core Gen13 RPL-S H0 06-bf-05/07 00000037 00000038 Core Gen13/Gen14 RKL-S B0 06-a7-01/02 00000062 00000063 Core Gen11 SPR-HBM Bx 06-8f-08/10 2c000390 2c0003e0 Xeon Max SPR-SP E4/S2 06-8f-07/87 2b000603 2b000620 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b000603 2b000620 Xeon Scalable Gen4 TWL N0 06-be-00/19 0000001a 0000001c Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E ### New Disclosures Updated in Prior Releases Processor Stepping F-M-S/PI Old Ver New Ver Products CFL-H/S P0 06-9e-0c/22 000000f6 000000f8 Core Gen9 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-257=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20250211-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-31068.html * https://www.suse.com/security/cve/CVE-2024-36293.html * https://www.suse.com/security/cve/CVE-2024-37020.html * https://www.suse.com/security/cve/CVE-2024-39355.html * https://bugzilla.suse.com/show_bug.cgi?id=1237096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:07 -0000 Subject: SUSE-SU-2025:20156-1: moderate: Security update for python-Jinja2 Message-ID: <174902712786.627.10042993103866961869@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20156-1 Release Date: 2025-03-24T09:51:17Z Rating: moderate References: * bsc#1238879 Cross-References: * CVE-2025-27516 CVSS scores: * CVE-2025-27516 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-27516 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27516 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-255=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-Jinja2-3.1.2-8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27516.html * https://bugzilla.suse.com/show_bug.cgi?id=1238879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:10 -0000 Subject: SUSE-SU-2025:20155-1: important: Security update for protobuf Message-ID: <174902713062.627.16523489711238922395@smelt2.prg2.suse.org> # Security update for protobuf Announcement ID: SUSE-SU-2025:20155-1 Release Date: 2025-03-20T10:44:07Z Rating: important References: * bsc#1223947 Cross-References: * CVE-2024-2410 CVSS scores: * CVE-2024-2410 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for protobuf fixes the following issues: * CVE-2024-2410: Fixed use after free when parsing JSON from a stream (bsc#1223947). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-254=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libprotobuf23_4_0-23.4-9.1 * protobuf-debugsource-23.4-9.1 * libprotobuf-lite23_4_0-debuginfo-23.4-9.1 * libprotobuf-lite23_4_0-23.4-9.1 * libprotobuf23_4_0-debuginfo-23.4-9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2410.html * https://bugzilla.suse.com/show_bug.cgi?id=1223947 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:27 -0000 Subject: SUSE-SU-2025:20153-1: moderate: Security update for krb5 Message-ID: <174902714783.627.14850084497164673586@smelt2.prg2.suse.org> # Security update for krb5 Announcement ID: SUSE-SU-2025:20153-1 Release Date: 2025-03-19T10:50:26Z Rating: moderate References: * bsc#1236619 Cross-References: * CVE-2025-24528 CVSS scores: * CVE-2025-24528 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-24528 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2025-24528: Prevent overflow when calculating ulog block size. An authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash (bsc#1236619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-251=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-251=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * krb5-debuginfo-1.20.1-6.1 * krb5-1.20.1-6.1 * krb5-debugsource-1.20.1-6.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * krb5-mini-debuginfo-1.20.1-6.1 * krb5-mini-debugsource-1.20.1-6.1 * krb5-mini-1.20.1-6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24528.html * https://bugzilla.suse.com/show_bug.cgi?id=1236619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:29 -0000 Subject: SUSE-SU-2025:20152-1: important: Security update for orc Message-ID: <174902714999.627.7016934134507870857@smelt2.prg2.suse.org> # Security update for orc Announcement ID: SUSE-SU-2025:20152-1 Release Date: 2025-03-19T10:36:33Z Rating: important References: * bsc#1228184 Cross-References: * CVE-2024-40897 CVSS scores: * CVE-2024-40897 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40897 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for orc fixes the following issues: * CVE-2024-40897: Fixed a stack-based buffer overflow in the Orc compiler when formatting error messages for certain input files (bsc#1228184) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-252=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * liborc-0_4-0-0.4.34-3.1 * liborc-0_4-0-debuginfo-0.4.34-3.1 * orc-debugsource-0.4.34-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40897.html * https://bugzilla.suse.com/show_bug.cgi?id=1228184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:34 -0000 Subject: SUSE-RU-2025:20150-1: moderate: Recommended update for elemental-toolkit Message-ID: <174902715436.627.5055963620609335139@smelt2.prg2.suse.org> # Recommended update for elemental-toolkit Announcement ID: SUSE-RU-2025:20150-1 Release Date: 2025-03-14T11:54:57Z Rating: moderate References: * bsc#1233289 * bsc#1233322 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Bump yip to v1.9.6 (bsc#1233322) * Make lint happy * Fixes squashfs images creation (bsc#1233289) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-245=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-toolkit-2.1.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233289 * https://bugzilla.suse.com/show_bug.cgi?id=1233322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:00 -0000 Subject: SUSE-RU-2025:20159-1: moderate: Recommended update for transactional-update Message-ID: <174902712022.627.13769190386538546503@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2025:20159-1 Release Date: 2025-03-25T02:36:04Z Rating: moderate References: * bsc#1230537 * bsc#1230901 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for transactional-update fixes the following issues: * Version update from 4.8.1 to 4.8.3: * Check return value of register command (bsc#1230901) * Allow specifying only low value with setup-kdump (bsc#1230537) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-258=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * dracut-transactional-update-4.8.3-1.1 * transactional-update-zypp-config-4.8.3-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtukit4-debuginfo-4.8.3-1.1 * tukitd-4.8.3-1.1 * transactional-update-debuginfo-4.8.3-1.1 * tukitd-debuginfo-4.8.3-1.1 * tukit-4.8.3-1.1 * transactional-update-4.8.3-1.1 * transactional-update-debugsource-4.8.3-1.1 * libtukit4-4.8.3-1.1 * tukit-debuginfo-4.8.3-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230537 * https://bugzilla.suse.com/show_bug.cgi?id=1230901 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:37 -0000 Subject: SUSE-RU-2025:20149-1: moderate: Recommended update for findutils Message-ID: <174902715706.627.3282664047792645654@smelt2.prg2.suse.org> # Recommended update for findutils Announcement ID: SUSE-RU-2025:20149-1 Release Date: 2025-03-14T11:49:40Z Rating: moderate References: * bsc#1231472 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for findutils fixes the following issues: * do not crash when file system loop was encountered (bsc#1231472) * added patches * modified patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-244=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * findutils-debuginfo-4.9.0-4.1 * findutils-4.9.0-4.1 * findutils-debugsource-4.9.0-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:39 -0000 Subject: SUSE-RU-2025:20148-1: moderate: Recommended update for aardvark-dns, netavark Message-ID: <174902715912.627.2280559580067933675@smelt2.prg2.suse.org> # Recommended update for aardvark-dns, netavark Announcement ID: SUSE-RU-2025:20148-1 Release Date: 2025-03-14T08:39:17Z Rating: moderate References: * bsc#1224167 * bsc#1234660 * bsc#1236567 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for aardvark-dns, netavark fixes the following issues: * Update to version 1.12.2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-243=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * netavark-1.12.2-1.1 * aardvark-dns-1.12.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224167 * https://bugzilla.suse.com/show_bug.cgi?id=1234660 * https://bugzilla.suse.com/show_bug.cgi?id=1236567 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:44 -0000 Subject: SUSE-RU-2025:20145-1: critical: Recommended update for dracut Message-ID: <174902716452.627.17818307774088319646@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2025:20145-1 Release Date: 2025-03-13T09:52:35Z Rating: critical References: * bsc#1228086 * bsc#1230468 * bsc#1231792 * bsc#1232063 * bsc#1236982 * bsc#1237695 Affected Products: * SUSE Linux Micro 6.0 An update that has six fixes can now be installed. ## Description: This update for dracut fixes the following issues: * Update to version 059+suse.591.ge2ab3f62: * fix(iscsi): make sure services are shut down when switching root (bsc#1237695) * fix(iscsi): don't require network setup for qedi * fix(network-legacy): do not require pgrep when using wicked (bsc#1236982) * Update to version 059+suse.585.gc1e69422: Fixes for booting from iSCSI offload with bnx2i (bsc#1228086): * fix(iscsi): attempt iSCSI login before all interfaces are up * fix(iscsi): don't require network setup for bnx2i Other: * fix(dracut): rework timeout for devices added via --mount and --add-device (bsc#1231792) * Update to version 059+suse.578.gd47ce28c: * fix(dm): remove 59-persistent-storage-dm.rules (bsc#1232063) * Update to version 059+suse.575.g06a9ae1f: Fixes for NVMeoF boot (bsc#1230468): * fix(nvmf): install (only) required nvmf modules * fix(nvmf): require NVMeoF modules * fix(nvmf): move /etc/nvme/host{nqn,id} requirement to hostonly ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-240=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dracut-fips-059+suse.591.ge2ab3f62-1.1 * dracut-059+suse.591.ge2ab3f62-1.1 * dracut-debugsource-059+suse.591.ge2ab3f62-1.1 * dracut-debuginfo-059+suse.591.ge2ab3f62-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228086 * https://bugzilla.suse.com/show_bug.cgi?id=1230468 * https://bugzilla.suse.com/show_bug.cgi?id=1231792 * https://bugzilla.suse.com/show_bug.cgi?id=1232063 * https://bugzilla.suse.com/show_bug.cgi?id=1236982 * https://bugzilla.suse.com/show_bug.cgi?id=1237695 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:05 -0000 Subject: SUSE-SU-2025:20157-1: moderate: Security update for gnutls Message-ID: <174902712580.627.1933997041585056962@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:20157-1 Release Date: 2025-03-24T09:53:37Z Rating: moderate References: * bsc#1236974 Cross-References: * CVE-2024-12243 CVSS scores: * CVE-2024-12243 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-12243 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-12243 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-12243: Fixed inefficient DER decoding in libtasn1 which could lead to a remote denial-of-service (bsc#1236974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-256=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gnutls-debuginfo-3.8.3-3.1 * libgnutls30-debuginfo-3.8.3-3.1 * gnutls-debugsource-3.8.3-3.1 * gnutls-3.8.3-3.1 * libgnutls30-3.8.3-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12243.html * https://bugzilla.suse.com/show_bug.cgi?id=1236974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:41 -0000 Subject: SUSE-RU-2025:20146-1: important: Recommended update for lshw Message-ID: <174902716125.627.1013549078210037280@smelt2.prg2.suse.org> # Recommended update for lshw Announcement ID: SUSE-RU-2025:20146-1 Release Date: 2025-03-13T09:59:24Z Rating: important References: * jsc#PED-9912 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for lshw fixes the following issues: * lshw: package update (jsc#9912) * update changelog * update data files * get rid of GTK deprecation warning * get rid of some snprintf warnings * add support for 100Gbit interfaces ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-241=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * lshw-debuginfo-B.02.20-1.1 * lshw-debugsource-B.02.20-1.1 * lshw-B.02.20-1.1 ## References: * https://jira.suse.com/browse/PED-9912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:40 -0000 Subject: SUSE-RU-2025:20147-1: moderate: Recommended update for dmidecode Message-ID: <174902716021.627.12286086588798183268@smelt2.prg2.suse.org> # Recommended update for dmidecode Announcement ID: SUSE-RU-2025:20147-1 Release Date: 2025-03-14T06:31:02Z Rating: moderate References: * jsc#PED-8647 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for dmidecode fixes the following issues: * Update to version 3.6 (jsc#PED-8647): * Support for SMBIOS 3.6.0. This includes new memory device types, new processor upgrades, and Loongarch support. * Support for SMBIOS 3.7.0. This includes new port types, new processor upgrades, new slot characteristics and new fields for memory modules. * Added bash completion. * Decode HPE OEM records 197, 239 and 245. * Implement options --list-strings and --list-types. * Update HPE OEM records 203, 212, 216, 221, 233, 236, 238 and 242. * Update Redfish support. * Bug fixes: Fix enabled slot characteristics not being printed * Minor improvements: Print slot width on its own line Use standard strings for slot width * Update for HPE servers from upstream: * Decode PCI bus segment in HPE type 238 records. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-242=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * dmidecode-3.6-1.1 * dmidecode-debuginfo-3.6-1.1 * dmidecode-debugsource-3.6-1.1 ## References: * https://jira.suse.com/browse/PED-8647 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:51:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:51:57 -0000 Subject: SUSE-SU-2025:20160-1: important: Security update for openssh Message-ID: <174902711773.627.2825099761903971492@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20160-1 Release Date: 2025-03-25T09:02:43Z Rating: important References: * bsc#1186673 * bsc#1213004 * bsc#1213008 * bsc#1221063 * bsc#1221928 * bsc#1222840 * bsc#1225904 * bsc#1227456 * bsc#1229010 * bsc#1229072 * bsc#1229449 * bsc#1236826 * bsc#1237040 * bsc#1237041 Cross-References: * CVE-2025-26465 * CVE-2025-26466 CVSS scores: * CVE-2025-26465 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26465 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-26466 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-26466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-26466 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has 12 fixes can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040). * CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041). Other bugfixes: * Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). * Add #include in some files added by the ldap patch to fix build with gcc14 (bsc#1225904). * Added missing struct initializer, added missing parameter (bsc#1222840). * Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by upstream (bsc#1221928). * Use %config(noreplace) for sshd_config. In any case, it's recommended to drop a file in sshd_config.d instead of editing sshd_config (bsc#1221063). * Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow (bsc#1229449). * Drop keycat binary that is not supported, except of the code that is used by other SELinux patches (bsc#1229072). * Fix RFC4256 implementation that keyboard-interactive authentication method can send instructions and sshd shows them to users (bsc#1229010). * Add attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1186673, bsc#1213004, bsc#1213008). * Remove empty line at the end of sshd-sle.pamd (bsc#1227456) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-259=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssh-9.6p1-3.1 * openssh-clients-debuginfo-9.6p1-3.1 * openssh-common-9.6p1-3.1 * openssh-debugsource-9.6p1-3.1 * openssh-server-debuginfo-9.6p1-3.1 * openssh-debuginfo-9.6p1-3.1 * openssh-server-config-rootlogin-9.6p1-3.1 * openssh-clients-9.6p1-3.1 * openssh-fips-9.6p1-3.1 * openssh-common-debuginfo-9.6p1-3.1 * openssh-server-9.6p1-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26465.html * https://www.suse.com/security/cve/CVE-2025-26466.html * https://bugzilla.suse.com/show_bug.cgi?id=1186673 * https://bugzilla.suse.com/show_bug.cgi?id=1213004 * https://bugzilla.suse.com/show_bug.cgi?id=1213008 * https://bugzilla.suse.com/show_bug.cgi?id=1221063 * https://bugzilla.suse.com/show_bug.cgi?id=1221928 * https://bugzilla.suse.com/show_bug.cgi?id=1222840 * https://bugzilla.suse.com/show_bug.cgi?id=1225904 * https://bugzilla.suse.com/show_bug.cgi?id=1227456 * https://bugzilla.suse.com/show_bug.cgi?id=1229010 * https://bugzilla.suse.com/show_bug.cgi?id=1229072 * https://bugzilla.suse.com/show_bug.cgi?id=1229449 * https://bugzilla.suse.com/show_bug.cgi?id=1236826 * https://bugzilla.suse.com/show_bug.cgi?id=1237040 * https://bugzilla.suse.com/show_bug.cgi?id=1237041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:00 -0000 Subject: SUSE-RU-2025:20140-1: moderate: Recommended update for strace Message-ID: <174902718042.627.11065564194400735850@smelt2.prg2.suse.org> # Recommended update for strace Announcement ID: SUSE-RU-2025:20140-1 Release Date: 2025-03-10T13:40:34Z Rating: moderate References: * bsc#1228216 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for strace fixes the following issues: * Change the license to the correct LGPL-2.1-or-later (bsc#1228216). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-227=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * strace-debugsource-6.7-2.1 * strace-debuginfo-6.7-2.1 * strace-6.7-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228216 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:47 -0000 Subject: SUSE-SU-2025:20144-1: moderate: Security update for curl Message-ID: <174902716779.627.11461333531656495889@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20144-1 Release Date: 2025-03-12T10:46:56Z Rating: moderate References: * bsc#1235151 * bsc#1236588 * bsc#1236590 Cross-References: * CVE-2025-0167 * CVE-2025-0725 CVSS scores: * CVE-2025-0167 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-0167 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-0167 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2025-0725 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-0725 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-0725 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for curl fixes the following issues: Security issues fixed: * CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590) * CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588) Other issues fixed: * Make sure the TLS handshake after a successful STARTTLS command is fully done before further sending/receiving on the connection. (bsc#1235151) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-239=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * curl-8.6.0-6.1 * libcurl4-debuginfo-8.6.0-6.1 * curl-debugsource-8.6.0-6.1 * libcurl4-8.6.0-6.1 * curl-debuginfo-8.6.0-6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0167.html * https://www.suse.com/security/cve/CVE-2025-0725.html * https://bugzilla.suse.com/show_bug.cgi?id=1235151 * https://bugzilla.suse.com/show_bug.cgi?id=1236588 * https://bugzilla.suse.com/show_bug.cgi?id=1236590 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:58 -0000 Subject: SUSE-RU-2025:20141-1: moderate: Recommended update for systemd Message-ID: <174902717866.627.6434551870430617843@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2025:20141-1 Release Date: 2025-03-11T09:56:02Z Rating: moderate References: * bsc#1220338 * bsc#1229228 * bsc#1231048 * bsc#1232227 * bsc#1232844 * bsc#1233752 * bsc#1234015 * bsc#1234313 * bsc#1234765 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has nine fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Fixed agetty fails to open credentials directory (bsc#1229228) * hwdb: comment out the entry for Logitech MX Keys for Mac * test: answer 2nd mdadm --create question for compat with new version * core/unit-serialize: fix serialization of markers * locale-setup: do not load locale from environemnt when /etc/locale.conf is unchanged * core: fix assert when AddDependencyUnitFiles is called with invalid parameter * Fix systemd-network recommending libidn2-devel (bsc#1234765) * tpm2-util: Also retry unsealing after policy_pcr returns PCR_CHANGED (bsc#1233752 bsc#1234313) * add a allow/denylist for reading sysfs attributes (bsc#1234015) * udev: add new builtin net_driver * udev-builtin-net_id: split-out pci_get_onboard_index() from dev_pci_onboard() * udev-builtin-net_id: split-out get_pci_slot_specifiers() * udev-builtin-net_id: introduce get_port_specifier() helper function * udev-builtin-net_id: split out get_dev_port() and make its failure critical * udev-builtin-net_id: split-out pci_get_hotplug_slot() and pci_get_hotplug_slot_from_address() * udev-builtin-net_id: return earlier when hotplug slot is not found * udev-builtin-net_id: skip non-directory entry earlier * udev-builtin-net_id: make names_xen() self-contained * udev-builtin-net_id: use sd_device_get_sysnum() to get index of netdevsim * udev-builtin-net_id: make names_netdevsim() self-contained * udev-builtin-net_id: make names_platform() self-contained * udev-builtin-net_id: make names_vio() self-contained * udev-builtin-net_id: make names_ccw() self-contained * udev-builtin-net_id: make dev_devicetree_onboard() self-contained * udev-builtin-net_id: make names_mac() self-contained * udev-builtin-net_id: split out get_ifname_prefix() * udev-builtin-net_id: swap arguments for streq() and friends * udev-builtin-net_id: drop unused value from NetNameType * drop efifar SystemdOptions (bsc#1220338) Upstream deprecated it and plan to drop it in the future. * pid1: make clear that $WATCHDOG_USEC is set for the shutdown binary, noone else (bsc#1232227) * udev: skipping empty udev rules file while collecting the stats (bsc#1232844) * Clean up some remnants from when homed was in the experimental sub-package (bsc#1231048) * restore some legacy symlinks Given that SLE16 will be based on SLFO, we have no choice but to continue supporting these compat symlinks. This compatibility code is no longer maintained in the Git repository though, as we primarily backport upstream commits these days. Additionally, the compat code rarely changes and often causes conflicts when merged into recent versions of systemd. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-230=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-230=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-experimental-debuginfo-254.23-1.1 * systemd-experimental-254.23-1.1 * systemd-coredump-debuginfo-254.23-1.1 * udev-debuginfo-254.23-1.1 * systemd-container-debuginfo-254.23-1.1 * udev-254.23-1.1 * libsystemd0-debuginfo-254.23-1.1 * systemd-debugsource-254.23-1.1 * systemd-portable-254.23-1.1 * libudev1-debuginfo-254.23-1.1 * systemd-portable-debuginfo-254.23-1.1 * libudev1-254.23-1.1 * systemd-debuginfo-254.23-1.1 * systemd-journal-remote-254.23-1.1 * systemd-254.23-1.1 * libsystemd0-254.23-1.1 * systemd-journal-remote-debuginfo-254.23-1.1 * systemd-container-254.23-1.1 * systemd-coredump-254.23-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-devel-254.23-1.1 * systemd-debugsource-254.23-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220338 * https://bugzilla.suse.com/show_bug.cgi?id=1229228 * https://bugzilla.suse.com/show_bug.cgi?id=1231048 * https://bugzilla.suse.com/show_bug.cgi?id=1232227 * https://bugzilla.suse.com/show_bug.cgi?id=1232844 * https://bugzilla.suse.com/show_bug.cgi?id=1233752 * https://bugzilla.suse.com/show_bug.cgi?id=1234015 * https://bugzilla.suse.com/show_bug.cgi?id=1234313 * https://bugzilla.suse.com/show_bug.cgi?id=1234765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:51:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:51:50 -0000 Subject: SUSE-SU-2025:20161-1: moderate: Security update for libX11 Message-ID: <174902711086.627.2497125967621272341@smelt2.prg2.suse.org> # Security update for libX11 Announcement ID: SUSE-SU-2025:20161-1 Release Date: 2025-03-25T09:13:44Z Rating: moderate References: * bsc#1237431 Cross-References: * CVE-2025-26597 CVSS scores: * CVE-2025-26597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-26597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-26597 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libX11 fixes the following issues: * CVE-2025-26597: Fixed buffer overflow in XkbChangeTypesOfKey() (bsc#1237431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-260=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libX11-xcb1-debuginfo-1.8.7-3.1 * libX11-debugsource-1.8.7-3.1 * libX11-6-debuginfo-1.8.7-3.1 * libX11-6-1.8.7-3.1 * libX11-xcb1-1.8.7-3.1 * SUSE Linux Micro 6.0 (noarch) * libX11-data-1.8.7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-26597.html * https://bugzilla.suse.com/show_bug.cgi?id=1237431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:32 -0000 Subject: SUSE-SU-2025:20151-1: moderate: Security update for tpm2.0-tools, tpm2-0-tss Message-ID: <174902715238.627.2453938903647943095@smelt2.prg2.suse.org> # Security update for tpm2.0-tools, tpm2-0-tss Announcement ID: SUSE-SU-2025:20151-1 Release Date: 2025-03-18T10:58:11Z Rating: moderate References: * bsc#1223687 * bsc#1223689 * bsc#1223690 Cross-References: * CVE-2024-29038 * CVE-2024-29039 * CVE-2024-29040 CVSS scores: * CVE-2024-29038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-29039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-29040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for tpm2.0-tools, tpm2-0-tss fixes the following issues: tpm2-0-tss: Update to version 4.1: \+ Security \- CVE-2024-29040: arbitrary quote data may go undetected by Fapi_VerifyQuote (bsc#1223690) * Fixed * fapi: Fix length check on FAPI auth callbacks * mu: Correct error message for errors * tss2-rc: fix unknown laer handler dropping bits. * fapi: Fix deviation from CEL specification (template_value was used instead of template_data). * fapi: Fix json syntax error in FAPI profiles which was ignored by json-c. * build: fix build fail after make clean. * mu: Fix unneeded size check in TPM2B unmarshaling. * fapi: Fix missing parameter encryption. * build: Fix failed build with --disable-vendor. * fapi: Fix flush of persistent handles. * fapi: Fix test provisioning with template with self generated certificate disabled. * fapi: Fix error in Fapi_GetInfo it TPM supports SHA3 hash algs. * fapi: Revert pcr extension for EV_NO_ACTION events. * fapi: Fix strange error messages if nv, ext, or policy path does not exits. * fapi: Fix segfault caused by wrong allocation of pcr policy. * esys: Fix leak in Esys_EvictControl for persistent handles. * tss2-tcti: tcti-libtpms: fix test failure on big-endian platform. * esys: Add reference counting for Esys_TR_FromTPMPublic. * esys: Fix HMAC error if session bind key has an auth value with a trailing 0. * fapi: fix usage of self signed certificates in TPM. * fapi: Usage of self signed certificates. * fapi: A segfault after the error handling of non existing keys. * fapi: Fix several leaks. * fapi: Fix error handling for policy execution. * fapi: Fix usage of persistent handles (should not be flushed) * fapi: Fix test provisioning with template (skip test without self generated certificate). * fapi: Fix pcr extension for EV_NO_ACTION * test: Fix fapi-key-create-policy-signed-keyedhash with P_ECC384 profile * tcti_spi_helper_transmit: ensure FIFO is accessed only after TPM reports commandReady bit is set * fapi: Fix read large system eventlog (> UINT16_MAX). * esys tests: Fix layer check for TPM2_RC_COMMAND_CODE (for /dev/tpmrm0) * test: unit: tcti-libtpms: fix test failed at 32-bit platforms. * fapi: Fix possible null pointer dereferencing in Fapi_List. * sys: Fix size check in Tss2_Sys_GetCapability. * esys: Fix leak in Esys_TR_FromTPMPublic. * esys: fix unchecked return value in esys crypto. * fapi: Fix wrong usage of local variable in provisioning. * fapi: Fix memset 0 in ifapi_json_TPMS_POLICYNV_deserialize. * fapi: Fix possible out of bound array access in IMA parser. * tcti device: Fix possible unmarshalling from uninitialized variable. * fapi: Fix error checking authorization of signing key. * fapi: Fix cleanup of policy sessions. * fapi: Eventlog H-CRTM events and different localities. * fapi: Fix missing synchronization of quote and eventlog. * faii: Fix invalid free in Fapi_Quote with empty eventlog. * Added * tcti: LetsTrust-TPM2Go TCTI module spi-ltt2go. * mbedtls: add sha512 hmac. * fapi: Enable usage of external keys for Fapi_Encrypt. * fapi: Support download of AMD certificates. * tcti: Add USB TPM (FTDI MPSSE USB to SPI bridge) TCTI module. * fapi: The recreation of primaries (except EK) in the owner hierarchy instead the endorsement hierarchy is fixed. * rc: New TPM return codes added. * fapi: Further Nuvoton certificates added. * tpm_types/esys: Add support for Attestable TPM changes in latest TPM spec. * tcti: Add '/dev/tcm0' to default conf * fapi: New Nuvoton certificates added. * esys: Fix leak in Esys_TR_FromTPMPublic. * Removed * Testing on Ubuntu 18.04 as it's near EOL (May 2023). tpm2.0-tools: Update to version 5.7: \+ Security \- CVE-2024-29038: arbitrary quote data may go undetected by tpm2_checkquote (bsc#1223687) \- CVE-2024-29039: pcr selection value is not compared with the attest (bsc#1223689) \+ Fixed \- Fix eventlog test \- Fix issues with reading NV indexes \- Fix context save error on tpm2_create \- tpm2_sessionconfig: fix handling of --disable-continue session so that the subsequent command will not fail \- when attempting to context save a flushed session. \- detection of functions within libcrypto when CRYPTO_LIBS is set and system has install libcrypto. \- tpm2_send: fix EOF detection on input stream. \- tpm2_policy.c fix compilation error caused by format directive for size_t on 32 bit systems. \- tpm2_nvread: fix input handling no nv index. \- Auth file: Ensure 0-termination when reading auths from a file. \- configure.ac: fix bashisms. configure scripts need to be runnable with a POSIX-compliant /bin/sh. \- cirrus.yml fix tss compilation with libtpms for FreeBSD. \- tpm2_tool.c Fix missing include for basename to enable compilation on netbsd. \- options: fix TCTI handling to avoid failures for commands that should work with no options. \- tpm2_getekcertificate.c Fix leak. ek_uri was not freed if get_ek_server_address failed. \+ Added \- Add the possibility for autoflush (environment variable "TPM2TOOLS_AUTOFLUSH", or -R option) \+ Removed \- Testing on Ubuntu 18.04 as it's near EOL (May 2023).m2_policy.c fix compilation error caused by format directive for size_t on 32 bit systems. \- tpm2_nvread: fix input handling no nv index. * Update to version 5.6 * tpm2_eventlog: * add H-CRTM event support * add support of efivar versions less than 38 * Add support to check for efivar/efivar.h manually * Minor formatting fixes * tpm2_eventlog: add support for replay with different StartupLocality * Fix pcr extension for EV_NO_ACTION * Extend test of yaml string representation * Use helper for printing a string dump * Fix upper bound on unique data size * Fix YAML string formatting * tpm2_policy: * Add support for parsing forward seal TPM values * Use forward seal values in creating policies * Move dgst_size in evaluate_populate_pcr_digests() * Allow more than 8 PCRs for sealing * Move dgst_size in evaluate_populate_pcr_digests * Allow more than 8 PCRs for sealing * Make __wrap_Esys_PCR_Read() more dynamic to enable testing more PCRs * tpm2_encryptdecrypt: Fix pkcs7 padding stripping * tpm2_duplicate: * Support -a option for attributes * Add --key-algorithm option * tpm2_encodeobject: Use the correct -O option instead of -C * tpm2_unseal: Add qualifier static to enhance the privacy of unseal function * tpm2_sign: * Remove -m option which was added mistakenly * Revert sm2 sign and verifysignature * tpm2_createek: * Correct man page example * Fix usage of nonce * Fix integrating nonce * tpm2_clear: add more details about the action * tpm2_startauthsession: allow the file attribute for policy authorization. * tpm2_getekcertificate: Add AMD EK support * tpm2_ecdhzgen: Add public-key parameter * tpm2_nvreadpublic: Prevent free of unallocated pointers on failure * Bug-fixes: * The readthedocs build failed with module 'jinja2' has no attribute 'contextfilter' a requirement file was added to fix this problem * An error caused by the flags -flto -_FORTIFY_SOURCE=3 in kdfa implementation. This error can be avoided by switching off the optimization with pragma * Changed wrong function name of "Esys_Load" to "Esys_Load" * Function names beginning with Esys_ are wrongly written as Eys_ * Reading and writing a serialized persistent ESYS_TR handles * cirrus-ci update image-family to freebsd-13-2 from 13-1 * misc: * Change the default Python version to Python3 in the helper's code * Skip test which uses the sign operator for comparison in abrmd_policynv.sh * tools/tr_encode: Add a tool that can encode serialized ESYS_TR for persistent handles from the TPM2B_PUBLIC and the raw persistent TPM2_HANDLE * Add safe directory in config ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-250=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * tpm2.0-tools-5.7-1.1 * libtss2-tcti-device0-4.1.0-1.1 * libtss2-rc0-debuginfo-4.1.0-1.1 * tpm2-0-tss-4.1.0-1.1 * libtss2-sys1-debuginfo-4.1.0-1.1 * tpm2-0-tss-debugsource-4.1.0-1.1 * libtss2-tcti-spi-helper0-4.1.0-1.1 * efivar-debugsource-38-3.1 * libtss2-tcti-device0-debuginfo-4.1.0-1.1 * tpm2.0-tools-debugsource-5.7-1.1 * libtss2-mu0-4.1.0-1.1 * libtss2-fapi1-4.1.0-1.1 * libtss2-fapi-common-4.1.0-1.1 * libtss2-fapi1-debuginfo-4.1.0-1.1 * libtss2-tctildr0-4.1.0-1.1 * libtss2-tcti-spidev0-debuginfo-4.1.0-1.1 * libefivar1-38-3.1 * libtss2-rc0-4.1.0-1.1 * libtss2-tcti-spi-helper0-debuginfo-4.1.0-1.1 * libtss2-esys0-4.1.0-1.1 * libefivar1-debuginfo-38-3.1 * tpm2.0-tools-debuginfo-5.7-1.1 * libtss2-tctildr0-debuginfo-4.1.0-1.1 * libtss2-sys1-4.1.0-1.1 * libtss2-tcti-spidev0-4.1.0-1.1 * libtss2-esys0-debuginfo-4.1.0-1.1 * libtss2-mu0-debuginfo-4.1.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-29038.html * https://www.suse.com/security/cve/CVE-2024-29039.html * https://www.suse.com/security/cve/CVE-2024-29040.html * https://bugzilla.suse.com/show_bug.cgi?id=1223687 * https://bugzilla.suse.com/show_bug.cgi?id=1223689 * https://bugzilla.suse.com/show_bug.cgi?id=1223690 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:11 -0000 Subject: SUSE-RU-2025:20137-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <174902719110.627.4114871548935974713@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:20137-1 Release Date: 2025-03-10T02:32:37Z Rating: moderate References: * bsc#1234444 * bsc#1235991 * bsc#1235992 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Update to version 1.0.0 (jsc#PCT-531) * API incompatibility: The check_payg_byos function no longer exits, it now returns a tuple of (flavor, exit_code). This makes the function reusable. * Update the build setup to work with the system interpreter of upcoming SLE releases. SLE 12 stays with the Python 3.4 interpreter and SLE 15 with the Python 3.6 interpreter. * Version 0.1.2 (bsc#1234444) * Improve detection of IPv4 and IPv6 network setup and use appropriate IP version for access the update servers * Improve reliability of flavor detection. Try an update server multiple times to get an answer, if we hit timeouts return the value flavor value from a cache file. * Version 0.1.1 (bsc#1235991, bsc#1235992) * Add time stamp to log * From version 0.1.0 * Doc improvements clarifying exit staus codes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-226=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * python-instance-billing-flavor-check-1.0.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234444 * https://bugzilla.suse.com/show_bug.cgi?id=1235991 * https://bugzilla.suse.com/show_bug.cgi?id=1235992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:51:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:51:40 -0000 Subject: SUSE-SU-2025:20163-1: important: Security update for the Linux Kernel Message-ID: <174902710072.627.1233388515667842878@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20163-1 Release Date: 2025-03-27T12:56:23Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26864 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36031 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50292 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50302 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 507 vulnerabilities, contains seven features and has 101 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown" (bsc#1228269). * Revert "ALSA: hda: Conditionally use snooping for AMD HDMI" (stable-fixes). * Revert "KEYS: encrypted: Add check for strsep" (git-fixes). * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "driver core: Fix uevent_show() vs driver detach race" (git-fixes). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path" (git-fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Revert "wifi: iwlwifi: remove retry loops in start" (git-fixes). * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config s390x: build ultravisor userspace access into the kernel (bsc#1232090). * config.sh: Remove Arm build project, we do not build armv7 configs * config: Disable LAM on x86 (bsc#1217845). * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * dwc2: Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342) * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: Drop the previous HD-audio TAS2781 fix (bsc#1230132) * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: Drop OCFS2 patch causing a regression (bsc#1233255) * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035). * supported.conf: mark ultravisor userspace access as supported (bsc#1232090). * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-2=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-2=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-22.1 * kernel-source-rt-6.4.0-22.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-22.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-22-rt-debuginfo-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-1-1.1 * kernel-rt-debugsource-6.4.0-22.1 * kernel-rt-debuginfo-6.4.0-22.1 * kernel-rt-livepatch-6.4.0-22.1 * kernel-livepatch-6_4_0-22-rt-1-1.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-22.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-debuginfo-6.4.0-22.1 * kernel-rt-devel-6.4.0-22.1 * kernel-rt-debugsource-6.4.0-22.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:38 -0000 Subject: SUSE-SU-2025:20130-1: critical: Security update for pam_pkcs11 Message-ID: <174902721828.627.11028512631073756589@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:20130-1 Release Date: 2025-02-26T13:23:33Z Rating: critical References: * bsc#1236314 Cross-References: * CVE-2025-24531 CVSS scores: * CVE-2025-24531 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-24531 ( SUSE ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-24531: Fixed regression in version 0.6.12 returning PAM_IGNORE in many situations with possible authentication bypass (bsc#1236314). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-219=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.12-2.1 * pam_pkcs11-0.6.12-2.1 * pam_pkcs11-debuginfo-0.6.12-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24531.html * https://bugzilla.suse.com/show_bug.cgi?id=1236314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:32 -0000 Subject: SUSE-SU-2025:20131-1: important: Security update for sssd Message-ID: <174902721285.627.8203579336806775903@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2025:20131-1 Release Date: 2025-02-28T13:04:03Z Rating: important References: * bsc#1223100 Cross-References: * CVE-2023-3758 CVSS scores: * CVE-2023-3758 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3758 ( NVD ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3758 ( NVD ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2023-3758: Fixed race condition during authorization leading to GPO policies functioning inconsistently (bsc#1223100). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-220=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsss_certmap0-2.8.2-6.1 * sssd-ad-2.8.2-6.1 * libsss_nss_idmap0-2.8.2-6.1 * sssd-krb5-2.8.2-6.1 * sssd-ldap-2.8.2-6.1 * libsss_idmap0-2.8.2-6.1 * libsss_nss_idmap0-debuginfo-2.8.2-6.1 * sssd-ad-debuginfo-2.8.2-6.1 * sssd-krb5-debuginfo-2.8.2-6.1 * sssd-krb5-common-debuginfo-2.8.2-6.1 * sssd-2.8.2-6.1 * sssd-debugsource-2.8.2-6.1 * sssd-krb5-common-2.8.2-6.1 * libsss_idmap0-debuginfo-2.8.2-6.1 * sssd-ldap-debuginfo-2.8.2-6.1 * sssd-debuginfo-2.8.2-6.1 * libsss_certmap0-debuginfo-2.8.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3758.html * https://bugzilla.suse.com/show_bug.cgi?id=1223100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:42 -0000 Subject: SUSE-SU-2025:20129-1: important: Security update for kernel-firmware Message-ID: <174902722200.627.1361988566011654105@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2025:20129-1 Release Date: 2025-02-25T13:24:48Z Rating: important References: * bsc#1219458 * bsc#1229069 * bsc#1229272 * bsc#1230007 * bsc#1230596 * bsc#1234027 Cross-References: * CVE-2023-31315 CVSS scores: * CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has five fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update to version 20241128 (git commit ea71da6f0690): * i915: Update Xe2LPD DMC to v2.24 * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * iwlwifi: add Bz-gf FW for core89-91 release * amdgpu: update smu 13.0.10 firmware * amdgpu: update sdma 6.0.3 firmware * amdgpu: update psp 13.0.10 firmware * amdgpu: update gc 11.0.3 firmware * amdgpu: add smu 13.0.14 firmware * amdgpu: add sdma 4.4.5 firmware * amdgpu: add psp 13.0.14 firmware * amdgpu: add gc 9.4.4 firmware * amdgpu: update vcn 3.1.2 firmware * amdgpu: update psp 13.0.5 firmware * amdgpu: update psp 13.0.8 firmware * amdgpu: update vega20 firmware * amdgpu: update vega12 firmware * amdgpu: update psp 14.0.4 firmware * amdgpu: update gc 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update vcn 4.0.0 firmware * amdgpu: update smu 13.0.0 firmware * amdgpu: update psp 13.0.0 firmware * amdgpu: update gc 11.0.0 firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update psp 13.0.11 firmware * amdgpu: update gc 11.0.4 firmware * amdgpu: update vcn 4.0.2 firmware * amdgpu: update psp 13.0.4 firmware * amdgpu: update gc 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update vpe 6.1.1 firmware * amdgpu: update vcn 4.0.6 firmware * amdgpu: update psp 14.0.1 firmware * amdgpu: update gc 11.5.1 firmware * amdgpu: update vcn 4.0.5 firmware * amdgpu: update psp 14.0.0 firmware * amdgpu: update gc 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update arcturus firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update sdma 4.4.2 firmware * amdgpu: update psp 13.0.6 firmware * amdgpu: update gc 9.4.3 firmware * amdgpu: update vcn 4.0.4 firmware * amdgpu: update psp 13.0.7 firmware * amdgpu: update gc 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * Update to version 20241125 (git commit 508d770ee6f3): * ice: update ice DDP wireless_edge package to 1.3.20.0 * ice: update ice DDP comms package to 1.3.52.0 * ice: update ice DDP package to ice-1.3.41.0 * amdgpu: update DMCUB to v9.0.10.0 for DCN314 * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * Update to version 20241121 (git commit 48bb90cceb88): * linux-firmware: Update AMD cpu microcode * xe: Update GUC to v70.36.0 for BMG, LNL * i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL * Update to version 20241119 (git commit 60cdfe1831e8): * iwlwifi: add Bz-gf FW for core91-69 release * Update to version 20241113 (git commit 1727aceef4d2): * qcom: venus-5.4: add venus firmware file for qcs615 * qcom: update venus firmware file for SC7280 * QCA: Add 22 bluetooth firmware nvm files for QCA2066 * Update to version 20241112 (git commit c57a0a42468b): * mediatek MT7922: update bluetooth firmware to 20241106163512 * mediatek MT7921: update bluetooth firmware to 20241106151414 * linux-firmware: update firmware for MT7922 WiFi device * linux-firmware: update firmware for MT7921 WiFi device * qcom: Add QDU100 firmware image files. * qcom: Update aic100 firmware files * dedup-firmware.sh: fix infinite loop for --verbose * rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7 * cnm: update chips&media wave521c firmware. * mediatek MT7920: update bluetooth firmware to 20241104091246 * linux-firmware: update firmware for MT7920 WiFi device * copy-firmware.sh: Run check_whence.py only if in a git repo * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * rtw89: 8852a: update fw to v0.13.36.2 * rtw88: Add firmware v52.14.0 for RTL8812AU * i915: Update Xe2LPD DMC to v2.23 * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * linux-firmware: update firmware for MT7925 WiFi device * WHENCE: Add sof-tolg for mt8195 * linux-firmware: Update firmware file for Intel BlazarI core * qcom: Add link for QCS6490 GPU firmware * qcom: update gpu firmwares for qcs615 chipset * cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops * mediatek: Add sof-tolg for mt8195 * Update to version 20241029 (git commit 048795eef350): * ath11k: move WCN6750 firmware to the device-specific subdir * xe: Update LNL GSC to v104.0.0.1263 * i915: Update MTL/ARL GSC to v102.1.15.1926 * Update to version 20241028 (git commit 987607d681cb): * amdgpu: DMCUB updates for various AMDGPU ASICs * i915: Add Xe3LPD DMC * cnm: update chips&media wave521c firmware. * linux-firmware: Add firmware for Cirrus CS35L41 * linux-firmware: Update firmware file for Intel BlazarU core * Makefile: error out of 'install' if COPYOPTS is set * Update to version 20241018 (git commit 2f0464118f40): * check_whence.py: skip some validation if git ls-files fails * qcom: Add Audio firmware for X1E80100 CRD/QCPs * amdgpu: DMCUB updates forvarious AMDGPU ASICs * brcm: replace NVRAM for Jetson TX1 * rtlwifi: Update firmware for RTL8192FU to v7.3 * make: separate installation and de-duplication targets * check_whence.py: check the permissions * Remove execute bit from firmware files * configure: remove unused file * rtl_nic: add firmware rtl8125d-1 * Update to version 20241014 (git commit 99f9c7ed1f4a): * iwlwifi: add gl/Bz FW for core91-69 release * iwlwifi: update ty/So/Ma firmwares for core91-69 release * iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops * cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops * linux-firmware: update firmware for en8811h 2.5G ethernet phy * QCA: Add Bluetooth firmwares for WCN785x with UART transport * Update to version 20241011 (git commit 808cba847c70): * mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher * ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596) * ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1 * ath12k: QCN9274 hw2.0: add board-2.bin * copy-firmware.sh: rename variables in symlink hanlding * copy-firmware.sh: remove no longer reachable test -L * copy-firmware.sh: remove no longer reachable test -f * copy-firmware.sh: call ./check_whence.py before parsing the file * copy-firmware.sh: warn if the destination folder is not empty * copy-firmware.sh: add err() helper * copy-firmware.sh: fix indentation * copy-firmware.sh: reset and consistently handle destdir * Revert "copy-firmware: Support additional compressor options" * copy-firmware.sh: flesh out and fix dedup-firmware.sh * Style update yaml files * editorconfig: add initial config file * check_whence.py: annotate replacement strings as raw * check_whence.py: LC_ALL=C sort -u the filelist * check_whence.py: ban link-to-a-link * check_whence.py: use consistent naming * Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin * tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31 * Update to version 20241010 (git commit d4e688aa74a0): * rtlwifi: Add firmware v39.0 for RTL8192DU * Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer firmware in this package instead) * Update to version 20241004 (git commit bbb77872a8a7): * amdgpu: DMCUB DCN35 update * brcm: Add BCM4354 NVRAM for Jetson TX1 * brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram * Update to version 20241001 (git commit 51e5af813eaf): * linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920) * linux-firmware: add firmware for MT7920 * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update VCN 3.1.2 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update PSP 14.0.4 firmware * amdgpu: update GC 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update SMU 13.0.6 firmware * amdgpu: update SDMA 4.4.2 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * qcom: update gpu firmwares for qcm6490 chipset * mt76: mt7996: add firmware files for mt7992 chipset * mt76: mt7996: add firmware files for mt7996 chipset variants * qcom: add gpu firmwares for sa8775p chipset * rtw89: 8922a: add fw format-2 v0.35.42.1 * Update to version 20240913 (git commit bcbdd1670bc3): * amdgpu: update DMCUB to v0.0.233.0 DCN351 * copy-firmware: Handle links to uncompressed files * WHENCE: Fix battmgr.jsn entry type * Update to version 20240912 (git commit 47c72fee8fe3): * amdgpu: Add VPE 6.1.3 microcode * amdgpu: add SDMA 6.1.2 microcode * amdgpu: Add support for PSP 14.0.4 * amdgpu: add GC 11.5.2 microcode * qcom: qcm6490: add ADSP and CDSP firmware * linux-firmware: Update firmware file for Intel Bluetooth Magnetor core * linux-firmware: Update firmware file for Intel BlazarU core * linux-firmware: Update firmware file for Intel Bluetooth Solar core * Update to version 20240911 (git commit 59def907425d): * rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272) * Update to version 20240910 (git commit 2a7b69a3fa30): * realtek: rt1320: Add patch firmware of MCU * i915: Update MTL DMC v2.23 * cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops * Update to version 20240903 (git commit 96af55bd3d0b): * amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007) * iwlwifi: add Bz FW for core89-58 release * rtl_nic: add firmware rtl8126a-3 * linux-firmware: update firmware for MT7921 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7921) * Update to version 20240830 (git commit d6c600d46981): * amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351 * qcom: vpu: restore compatibility with kernels before 6.6 * Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w updates for bsc#1234027) * amdgpu: DMCUB updates forvarious AMDGPU ASICs * rtw89: 8922a: add fw format-1 v0.35.41.0 * linux-firmware: update firmware for MT7925 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * rtl_bt: Add firmware and config files for RTL8922A * rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part * rtl_bt: de-dupe identical config.bin files * rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin * linux-firmware: Update AMD SEV firmware * linux-firmware: update firmware for MT7996 * Revert "i915: Update MTL DMC v2.22" * ath12k: WCN7850 hw2.0: update board-2.bin * ath11k: WCN6855 hw2.0: update to WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41 * ath11k: WCN6855 hw2.0: update board-2.bin * ath11k: QCA2066 hw2.1: add to WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3 * ath11k: QCA2066 hw2.1: add board-2.bin * ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1 * qcom: vpu: add video firmware for sa8775p * amdgpu: DMCUB updates for various AMDGPU ASICs * Update to version 20240809 (git commit 36db650dae03): * qcom: update path for video firmware for vpu-1/2/3.0 * QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642 * rtw89: 8852c: add fw format-1 v0.27.97.0 * rtw89: 8852bt: add firmware 0.29.91.0 * amdgpu: Update ISP FW for isp v4.1.1 * mediatek: Update mt8195 SOF firmware * amdgpu: DMCUB updates for DCN314 * xe: First GuC release v70.29.2 for BMG * xe: Add GuC v70.29.2 for LNL * i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL * i915: Update MTL DMC v2.22 * i915: update MTL GSC to v102.0.10.1878 * xe: Add BMG HuC 8.2.10 * xe: Add GSC 104.0.0.1161 for LNL * xe: Add LNL HuC 9.4.13 * i915: update DG2 HuC to v7.10.16 * amdgpu: Update ISP FW for isp v4.1.1 * QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-218=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-firmware-intel-20241128-1.1 * kernel-firmware-serial-20241128-1.1 * kernel-firmware-amdgpu-20241128-1.1 * kernel-firmware-brcm-20241128-1.1 * kernel-firmware-sound-20241128-1.1 * kernel-firmware-ti-20241128-1.1 * kernel-firmware-dpaa2-20241128-1.1 * kernel-firmware-radeon-20241128-1.1 * kernel-firmware-nfp-20241128-1.1 * kernel-firmware-ath12k-20241128-1.1 * kernel-firmware-bluetooth-20241128-1.1 * kernel-firmware-ath10k-20241128-1.1 * kernel-firmware-liquidio-20241128-1.1 * kernel-firmware-ath11k-20241128-1.1 * kernel-firmware-network-20241128-1.1 * kernel-firmware-prestera-20241128-1.1 * kernel-firmware-all-20241128-1.1 * kernel-firmware-atheros-20241128-1.1 * ucode-amd-20241128-1.1 * kernel-firmware-chelsio-20241128-1.1 * kernel-firmware-platform-20241128-1.1 * kernel-firmware-mediatek-20241128-1.1 * kernel-firmware-qlogic-20241128-1.1 * kernel-firmware-realtek-20241128-1.1 * kernel-firmware-mellanox-20241128-1.1 * kernel-firmware-usb-network-20241128-1.1 * kernel-firmware-media-20241128-1.1 * kernel-firmware-iwlwifi-20241128-1.1 * kernel-firmware-i915-20241128-1.1 * kernel-firmware-nvidia-20241128-1.1 * kernel-firmware-ueagle-20241128-1.1 * kernel-firmware-bnx2-20241128-1.1 * kernel-firmware-qcom-20241128-1.1 * kernel-firmware-marvell-20241128-1.1 * kernel-firmware-mwifiex-20241128-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31315.html * https://bugzilla.suse.com/show_bug.cgi?id=1219458 * https://bugzilla.suse.com/show_bug.cgi?id=1229069 * https://bugzilla.suse.com/show_bug.cgi?id=1229272 * https://bugzilla.suse.com/show_bug.cgi?id=1230007 * https://bugzilla.suse.com/show_bug.cgi?id=1230596 * https://bugzilla.suse.com/show_bug.cgi?id=1234027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:47 -0000 Subject: SUSE-SU-2025:20128-1: important: Security update for vim Message-ID: <174902722734.627.12513655310941521384@smelt2.prg2.suse.org> # Security update for vim Announcement ID: SUSE-SU-2025:20128-1 Release Date: 2025-02-25T13:11:34Z Rating: important References: * bsc#1220763 * bsc#1229238 * bsc#1229685 * bsc#1229822 * bsc#1230078 * bsc#1231373 * bsc#1235695 * bsc#1236151 * bsc#1237137 Cross-References: * CVE-2024-43374 * CVE-2024-43790 * CVE-2024-43802 * CVE-2024-45306 * CVE-2024-47814 * CVE-2025-1215 * CVE-2025-22134 * CVE-2025-24014 CVSS scores: * CVE-2024-43374 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-43790 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-43790 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-43802 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-43802 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-45306 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45306 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-45306 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-45306 ( NVD ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-47814 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L * CVE-2024-47814 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2024-47814 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2025-1215 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1215 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1215 ( NVD ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1215 ( NVD ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2025-22134 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22134 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-22134 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-24014 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-24014 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-24014 ( NVD ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves eight vulnerabilities and has one fix can now be installed. ## Description: This update for vim fixes the following issues: vim was updated to 9.1.1101: * CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238) * CVE-2024-43790: Fixed Out of bounds read when performing a search command (bsc#1229685) * CVE-2024-43802: Fixed heap-buffer-overflow in ins_typebuf() (bsc#1229822) * CVE-2024-45306: Fixed heap-buffer-overflow in Vim (bsc#1230078) * CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373) * CVE-2025-1215: Fixed manipulation of the argument --log leads to memory corruption (bsc#1237137) * CVE-2025-22134: Fixed heap-buffer-overflow in Vim < 9.1.1003 (bsc#1235695) * CVE-2025-24014: Fixed segmentation fault in win_line() in Vim < 9.1.1043 (bsc#1236151) Update to 9.1.1101: * insexpand.c hard to read * tests: Test_log_nonexistent only works on Linux * Update base-syntax, improve variable matching * Vim9: import with extends may crash * leaking memory with completing multi lines * \--log with non-existent path causes a crash * if_perl: Perl 5.38 adds new symbols causing link failure * tests: matchparen plugin test wrongly named * Vim9: problem finding implemented method in type hierarchy * runtime(qf): Update syntax file, match second delimiter * tests: output of test ...win32_ctrl_z depends on python version * tests: fix expected return code for python 3.13 on Windows * tests: timeout might be a bit too small * tests: test_terminwscroll_topline2 unreliable * tests: No check when tests are run under Github actions * tests: plugin tests are named inconsistently * Vim9: import with extends may crash * completion doesn't work with multi lines * filetype: cmmt files are not recognized * Unable to persistently ignore events in a window and its buffers * improve syntax highlighting * setreg() doesn't correctly handle mbyte chars in blockwise mode * unexpected DCS responses may cause out of bounds reads * has('bsd') is true for GNU/Hurd * filetype: Mill files are not recognized * GUI late startup leads to uninitialized scrollbars * Add support for lz4 to tar & gzip plugin * Terminal ansi colors off by one after tgc reset * included syntax items do not understand contains=TOP * vim_strnchr() is strange and unnecessary * Vim9: len variable not used in compile_load() * runtime(vim): Update base-syntax, match :debuggreedy count prefix * Strange error when heredoc marker starts with "trim" * tests: test_compiler fails on Windows without Maven * 'diffopt' "linematch" cannot be used with {n} less than 10 * args missing after failing to redefine a function * Cannot control cursor positioning of getchar() * preinsert text completions not deleted with / * getchar() can't distinguish between C-I and Tab * tests: Test_termwinscroll_topline2 fails on MacOS * heap-use-after-free and stack-use-after-scope with :14verbose * no digraph for "Approaches the limit" * not possible to use plural forms with gettext() * too many strlen() calls in userfunc.c * terminal: E315 when dragging the terminal with the mouse * runtime(openPlugin): fix unclosed parenthesis in GetWordUnderCursor() * runtime(doc): Tweak documentation style a bit * tests: test_glvs fails when unarchiver not available * Vim always enables 'termguicolors' in a terminal * completion: input text deleted with preinsert when adding leader * translation(sr): Missing Serbian translation for the tutor * Superfluous cleanup steps in test_ins_complete.vim * runtime(netrw): correct wrong version check * Vim doesn't highlight to be inserted text when completing * runtime(netrw): upstream snapshot of v176 * runtime(dist/vim9): fix regressions in dist#vim9#Open * runtime(hyprlang): fix string recognition * make install fails because of a missing dependency * runtime(asm): add byte directives to syntax script * Vim doesn't work well with TERM=xterm-direct * runtime(filetype): commit 99181205c5f8284a3 breaks V lang detection * runtime: decouple Open and Launch commands and gx mapping from netrw * "nosort" enables fuzzy filtering even if "fuzzy" isn't in 'completeopt' * runtime(just): fix typo in syntax file * runtime(filetype): Improve Verilog detection by checking for modules definition * tests: off-by-one error in CheckCWD in test_debugger.vim * tests: no support for env variables when running Vim in terminal * too many strlen() calls in os_unix.c * insert-completed items are always sorted * crash after scrolling and pasting in silent Ex mode * Makefiles uses non-portable syntax * fuzzymatching doesn't prefer matching camelcase * filetype: N-Tripels and TriG files are not recognized * Vim9: Patch 9.1.1014 causes regressions * translation(sr): Update Serbian messages translation Update to 9.1.1043: * [security]: segfault in win_line() * update helptags * filetype: just files are not recognized * Update base-syntax, match ternary and falsy operators * Vim9: out-of-bound access when echoing an enum * Vim9: imported type cannot be used as func return type * runtime(kconfig): updated ftplugin and syntax script * runtime(doc): rename last t_BG reference to t_RB * Vim9: comments are outdated * tests: test_channel.py fails with IPv6 * runtime(vim): Update base-syntax, fix is/isnot operator matching * Vim9: confusing error when using abstract method via super * make install fails when using shadowdir * Vim9: memory leak with blob2str() * runtime(tex): add texEmphStyle to texMatchGroup in syntax script * runtime(netrw): upstream snapshot of v175 * Vim9: compiling abstract method fails without return * runtime(c): add new constexpr keyword to syntax file (C23) * tests: shaderslang was removed from test_filetype erroneously * link error when FEAT_SPELL not defined * Coverity complains about insecure data handling * runtime(sh): update syntax script * runtime(c): Add missing syntax test files * filetype: setting bash filetype is backwards incompatible * runtime(c): Update syntax and ftplugin files * the installer can be improved * too many strlen() calls in screen.c * no sanitize check when running linematch * filetype: swc configuration files are not recognized * runtime(netrw): change netrw maintainer * wrong return type of blob2str() * blob2str/str2blob() do not support list of strings * runtime(doc): fix typo in usr_02.txt * Coverity complains about dereferencing NULL pointer * linematch option value not completed * string might be used without a trailing NUL * no way to get current selected item in a async context * filetype: fd ignore files are not recognized * v9.1.0743 causes regression with diff mode * runtime(doc): fix base64 encode/decode examples * Vim9: Patch 9.1.1013 causes a few problems * Not possible to convert string2blob and blob2string * Coverity complains about dereferencing NULL value * Vim9: variable not found in transitive import * runtime(colors): Update colorschemes, include new unokai colorscheme * runtime(lyrics): support milliseconds in syntax script * runtime(vim): Split Vim legacy and Vim9 script indent tests * Vim9: class interface inheritance not correctly working * popupmenu internal error with some abbr in completion item * filetype: VisualCode setting file not recognized * diff feature can be improved * filetype: various ignore are not recognized * tests: Load screendump files with "git vimdumps" * PmenuMatch completion highlight can be combined * completion text is highlighted even with no pattern found * tests: a few termdebug tests are flaky * [security]: heap-buffer-overflow with visual mode * runtime(doc): add package- helptags for included packages * Vim9: unknown func error with interface declaring func var * runtime(filetype): don't detect string interpolation as angular * ComplMatchIns highlight hard to read on light background * runtime(vim): Update base-syntax, highlight literal string quote escape * runtime(editorconfig): set omnifunc to syntaxcomplete func * tests: ruby tests fail with Ruby 3.4 * Vim9: leaking finished exception * runtime(tiasm): use correct syntax name tiasm in syntax script * filetype: TI assembly files are not recognized * too many strlen() calls in drawscreen.c * runtime(xf86conf): add section name OutputClass to syntax script * ComplMatchIns may highlight wrong text * runtime(vim): Update base-syntax, improve ex-bang matching * runtime(doc): clarify buffer deletion on popup_close() * filetype: shaderslang files are not detected * Vim9: not able to use comment after opening curly brace Update to 9.1.0993: * 9.1.0993: New 'cmdheight' behavior may be surprising * runtime(sh): fix typo in Last Change header * 9.1.0992: Vim9: double-free after v9.1.0988 * 9.1.0991: v:stacktrace has wrong type in Vim9 script * runtime(sh): add PS0 to bashSpecialVariables in syntax script * runtime(vim): Remove trailing comma from match_words * runtime(zsh): sync syntax script with upstream repo * runtime(doc): Capitalise the mnemonic "Zero" for the 'z' flag of search() * 9.1.0990: Inconsistent behavior when changing cmdheight * 9.1.0989: Vim9: Whitespace after the final enum value causes a syntax error * runtime(java): Quietly opt out for unsupported markdown.vim versions * runtime(vim): fix failing vim syntax test * 9.1.0988: Vim9: no error when using uninitialized var in new() * runtime(doc): update index.txt * 9.1.0987: filetype: cake files are not recognized * 9.1.0986: filetype: 'jj' filetype is a bit imprecise * runtime(jj): Support diffs in jj syntax * runtime(vim): Update matchit pattern, no Vim9 short names * 9.1.0985: Vim9: some ex commands can be shortened * 9.1.0984: exception handling can be improved * runtime(doc): update doc for :horizontal * runtime(doc): update index.txt, windows.txt and version9.txt * runtime(doc): Tweak documentation about base64 function * runtime(chordpro): update syntax script * 9.1.0983: not able to get the displayed items in complete_info() * runtime(doc): use standard SGR format at :h xterm-true-color * 9.1.0982: TI linker files are not recognized * runtime(vim): update vim generator syntax script * 9.1.0981: tests: typo in test_filetype.vim * 9.1.0980: no support for base64 en-/decoding functions in Vim Script * syntax(sh): Improve the recognition of bracket expressions * runtime(doc): mention how NUL bytes are handled * 9.1.0979: VMS: type warning with $XDG_VIMRC_FILE * 9.1.0978: GUI tests sometimes fail when setting 'scroll' options * 9.1.0977: filetype: msbuild filetypes are not recognized * 9.1.0976: Vim9: missing return statement with throw * 9.1.0975: Vim9: interpolated string expr not working in object methods * 9.1.0974: typo in change of commit v9.1.0873 * 9.1.0973: too many strlen() calls in fileio.c * runtime(sh): set shellcheck as the compiler for supported shells * runtime(doc): Fix enum example syntax * 9.1.0972: filetype: TI linker map files are not recognized * runtime(vim): Improve syntax script generator for Vim Script * 9.1.0971: filetype: SLNX files are not recognized * 9.1.0970: VMS: build errors on VMS architecture * runtime(doc): Fix documentation typos * runtime(doc): update for new keyprotocol option value (after v9.1.0969) * 9.1.0969: ghostty not using kitty protocol by default * 9.1.0968: tests: GetFileNameChecks() isn't fully sorted by filetype name * runtime(doc): update version9.txt for bash filetype * runtime(netrw): update last change header for #16265 * runtime(doc): fix doc error in :r behaviour * 9.1.0967: SpotBugs compiler setup can be further improved * 9.1.0966: Vim9: :enum command can be shortened * runtime(compiler): include a basic bash syntax checker compiler * 9.1.0965: filetype: sh filetype set when detecting the use of bash * runtime(doc): clarify ARCH value for 32-bit in INSTALLpc.txt * 9.1.0963: fuzzy-matching does not prefer full match * 9.1.0962: filetype: bun.lock file is not recognized * runtime(vim): update indentation plugin for Vim script * runtime(doc): tweak documentation style in helphelp.txt * runtime(vim): Update base-syntax, allow parens in default arguments * runtime(doc): mention auto-format using clang-format for sound.c/sign.c * runtime(help): fix typo s/additional/arbitrary/ * runtime(help): Add better support for language annotation highlighting * 9.1.0961: filetype: TI gel files are not recognized * 9.1.0960: filetype: hy history files are not recognized * translation(fi): Fix typoes in Finish menu translation * 9.1.0959: Coverity complains about type conversion * runtime(vim): Use supported syntax in indent tests * 9.1.0958: filetype: supertux2 config files detected as lisp * 9.1.0956: completion may crash, completion highlight wrong with preview window * 9.1.0955: Vim9: vim9compile.c can be further improved * runtime(doc): move help tag E1182 * runtime(graphql): contribute vim-graphql to Vim core * 9.1.0954: popupmenu.c can be improved * 9.1.0953: filetype: APKBUILD files not correctly detected * 9.1.0952: Vim9: missing type checking for any type assignment * 9.1.0951: filetype: jshell files are not recognized * runtime(dockerfile): do not set commentstring in syntax script * 9.1.0950: filetype: fennelrc files are not recognized * runtime(netrw): do not double escape Vim special characters * git: ignore reformatting change of netrw plugin * runtime(netrw): more reformating #16248 * runtime(doc): Add a note about handling symbolic links in starting.txt * 9.1.0949: popups inconsistently shifted to the left * git: ignore reformatting change of netrw plugin * runtime(netrw): change indent size from 1 to 2 * 9.1.0948: Missing cmdline completion for :pbuffer * runtime(tutor): Reformat tutor1 * 9.1.0947: short-description * 9.1.0946: cross-compiling fails on osx-arm64 * 9.1.0945: ComplMatchIns highlight doesn't end after inserted text * translation(sv): re-include the change from #16240 * 9.1.0944: tests: test_registers fails when not run under X11 * 9.1.0943: Vim9: vim9compile.c can be further improved * runtime(doc): Update README and mention make check to verify * translation(sv): partly revert commit 98874dca6d0b60ccd6fc3a140b3ec * runtime(vim): update base-syntax after v9.1.0936 * 9.1.0942: a few typos were found * 9.1.0941: ComplMatchIns doesn't work after multibyte chars * runtime(doc): Fix style in fold.txt * translation(sv): Fix typo in Swedish translation * 9.1.0940: Wrong cursor shape with "gq" and 'indentexpr' executes :normal * runtime(doc): fix some small errors * 9.1.0939: make installtutor fails * 9.1.0938: exclusive selection not respected when re-selecting block mode * 9.1.0937: test_undolist() is flaky * 9.1.0936: cannot highlight completed text * 9.1.0935: SpotBugs compiler can be improved * 9.1.0934: hard to view an existing buffer in the preview window * runtime(doc): document how to minimize fold computation costs * 9.1.0933: Vim9: vim9compile.c can be further improved * 9.1.0932: new Italian tutor not installed * runtime(doc): fix a few minor errors from the last doc updates * translation(it): add Italian translation for the interactive tutor * runtime(doc): update the change.txt help file * runtime(help): Add Vim lang annotation support for codeblocks * 9.1.0931: ml_get error in terminal buffer * 9.1.0930: tests: test_terminal2 may hang in GUI mode * 9.1.0929: filetype: lalrpop files are not recognized * 9.1.0928: tests: test_popupwin fails because the filter command fails * editorconfig: set trim_trailing_whitespace = false for src/testdir/test*.vim * 9.1.0927: style issues in insexpand.c * 9.1.0926: filetype: Pixi lock files are not recognized * runtime(doc): Add a reference to |++opt| and |+cmd| at `:h :pedit` * runtime(doc): add a note about inclusive motions and exclusive selection * 9.1.0925: Vim9: expression compiled when not necessary * 9.1.0923: too many strlen() calls in filepath.c * 9.1.0923: wrong MIN macro in popupmenu.c * 9.1.0921: popupmenu logic is a bit convoluted * 9.1.0920: Vim9: compile_assignment() too long * 9.1.0919: filetype: some assembler files are not recognized * runtime(netrw): do not pollute search history with symlinks * 9.1.0918: tiny Vim crashes with fuzzy buffer completion * 9.1.0917: various vartabstop and shiftround bugs when shifting lines * runtime(typst): add definition lists to formatlistpat, update maintainer * 9.1.0916: messages.c is exceeding 80 columns * runtime(proto): include filetype plugin for protobuf * 9.1.0915: GVim: default font size a bit too small * 9.1.0914: Vim9: compile_assignment() is too long * 9.1.0913: no error check for neg values for 'messagesopt' * runtime(netrw): only check first arg of netrw_browsex_viewer for being executable * 9.1.0912: xxd: integer overflow with sparse files and -autoskip * 9.1.0911: Variable name for 'messagesopt' doesn't match short name * 9.1.0910: 'messagesopt' does not check max wait time * runtime(doc): update wrong Vietnamese localization tag * 9.1.0909: Vim9: crash when calling instance method Update to 9.1.0908: * 9.1.0908: not possible to configure :messages * 9.1.0907: printoptions:portrait does not change postscript Orientation * runtime(doc): Add vietnamese.txt to helps main TOC * 9.1.0906: filetype: Nvidia PTX files are not recognized * runtime(doc): updated version9.txt with changes from v9.1.0905 * 9.1.0905: Missing information in CompleteDone event * 9.1.0904: Vim9: copy-paste error in class_defining_member() * 9.1.0903: potential overflow in spell_soundfold_wsal() * runtime(netrw): do not detach when launching external programs in gvim * runtime(doc): make tag alignment more consistent in filetype.txt * runtime(doc): fix wrong syntax and style of vietnamese.txt * translation(it): update Italian manpage for vimtutor * runtime(lua): add optional lua function folding * Filelist: include translations for Chapter 2 tutor * translation(vi): Update Vietnamese translation * runtime(doc): include vietnamese.txt * runtime(tutor): fix another typo in tutor2 * runtime(doc): fix typo in vimtutor manpage * translation(it): update Italian manpage for vimtutor * translation(it): include Italian version of tutor chapter 2 * runtime(tutor): regenerated some translated tutor1 files * runtime(tutor): fix typo in Chapter 2 * 9.1.0902: filetype: Conda configuration files are not recognized * runtime(doc): Tweak documentation style a bit * runtime(tutor): update the tutor files and re-number the chapters * runtime(tutor): Update the makefiles for tutor1 and tutor2 files * 9.1.0901: MS-Windows: vimtutor batch script can be improved * runtime(doc): remove buffer-local completeopt todo item * 9.1.0900: Vim9: digraph_getlist() does not accept bool arg * runtime(typst): provide a formatlistpat in ftplugin * runtime(doc): Update documentation for "noselect" in 'completeopt' * 9.1.0899: default for 'backspace' can be set in C code * runtime(helptoc): reload cached g:helptoc.shell_prompt when starting toc * translation(ru): Updated messages translation * 9.1.0898: runtime(compiler): pytest compiler not included * 9.1.0897: filetype: pyrex files are not detected * runtime(compiler): update eslint compiler * 9.1.0896: completion list wrong after v9.1.0891 * runtime(doc): document changed default value for 'history' * 9.1.0895: default history value is too small * 9.1.0894: No test for what the spotbug compiler parses * 9.1.0893: No test that undofile format does not regress * translation(de): update German manpages * runtime(compiler): include spotbugs Java linter * 9.1.0892: the max value of 'tabheight' is limited by other tabpages * runtime(po): remove poDiffOld/New, add po-format flags to syntax file * 9.1.0891: building the completion list array is inefficient * patch 9.1.0890: %! item not allowed for 'rulerformat' * runtime(gzip): load undofile if there exists one * 9.1.0889: Possible unnecessary redraw after adding/deleting lines * 9.1.0888: leftcol property not available in getwininfo() * 9.1.0887: Wrong expression in sign.c * 9.1.0886: filetype: debian control file not detected * runtime(c3): include c3 filetype plugin * 9.1.0885: style of sign.c can be improved * 9.1.0884: gcc warns about uninitialized variable * runtime(apache): Update syntax directives for apache server 2.4.62 * translation(ru): updated vimtutor translation, update MAINTAINERS file * 9.1.0883: message history cleanup is missing some tests * runtime(doc): Expand docs on :! vs. :term * runtime(netrw): Fixing powershell execution issues on Windows * 9.1.0882: too many strlen() calls in insexpand.c * 9.1.0881: GUI: message dialog may not get focus * runtime(netrw): update netrw's decompress logic * runtime(apache): Update syntax keyword definition * runtime(misc): add Italian LICENSE and (top-level) README file * 9.1.0880: filetype: C3 files are not recognized * runtime(doc): add helptag for :HelpToc command * 9.1.0879: source is not consistently formatted * Add clang-format config file * runtime(compiler): fix escaping of arguments passed to :CompilerSet * 9.1.0878: termdebug: cannot enable DEBUG mode * 9.1.0877: tests: missing test for termdebug + decimal signs * 9.1.0876: filetype: openCL files are not recognized * 9.1.0875: filetype: hyprlang detection can be improved * 9.1.0874: filetype: karel files are not detected * 9.1.0873: filetype: Vivado files are not recognized * 9.1.0872: No test for W23 message * 9.1.0871: getcellpixels() can be further improved * 9.1.0870: too many strlen() calls in eval.c * 9.1.0869: Problem: curswant not set on gm in folded line * 9.1.0868: the warning about missing clipboard can be improved * runtime(doc): Makefile does not clean up all temporary files * 9.1.0867: ins_compl_add() has too many args * editorconfig: don't trim trailing whitespaces in runtime/doc * translation(am): Remove duplicate keys in desktop files * runtime(doc): update helptags * runtime(filetype): remove duplicated *.org file pattern * runtime(cfg): only consider leading // as starting a comment * 9.1.0866: filetype: LLVM IR files are not recognized * 9.1.0865: filetype: org files are not recognized * 9.1.0864: message history is fixed to 200 * 9.1.0863: getcellpixels() can be further improved * runtime(sh): better function support for bash/zsh in indent script * runtime(netrw): small fixes to netrw#BrowseX * 9.1.0862: 'wildmenu' not enabled by default in nocp mode * runtime(doc): update how to report issues for mac Vim * runtime(doc): mention option-backslash at :h CompilerSet * runtime(compiler): include a Java Maven compiler plugin * runtime(racket): update Racket runtime files * runtime(doc): improve indentation in examples for netrw-handler * runtime(doc): improve examples for netrw-handler functions * runtime(idris2): include filetype,indent+syntax plugins for (L)Idris2 + ipkg * runtime(doc): clarify the use of filters and external commands * 9.1.0861: Vim9: no runtime check for object member access of any var * runtime(compiler): update pylint linter * 9.1.0860: tests: mouse_shape tests use hard code sleep value * 9.1.0859: several problems with the GLVS plugin * 9.1.0858: Coverity complains about dead code * runtime(tar): Update tar.vim to support permissions * 9.1.0857: xxd: --- is incorrectly recognized as end-of-options * 9.1.0851: too many strlen() calls in getchar.c * 9.1.0850: Vim9: cannot access nested object inside objects * runtime(tex): extra Number highlighting causes issues * runtime(vim): Fix indent after :silent! function * 9.1.0849: there are a few typos in the source * runtime(netrw): directory symlink not resolved in tree view * runtime(doc): add a table of supported Operating Systems * runtime(tex): update Last Change header in syntax script * runtime(doc): fix typo in g:termdebug_config * runtime(vim): Update base-syntax, improve :normal highlighting * runtime(tex): add Number highlighting to syntax file * runtime(doc): Tweak documentation style a bit * 9.1.0848: if_lua: v:false/v:true are not evaluated to boolean * runtime(dune): use :setl instead of :set in ftplugin * runtime(termdebug): allow to use decimal signs * translation(it): Updated Italian vimtutor * runtime(compiler): improve cppcheck * git: git-blame-ignore-revs shown as an error on Github * 9.1.0847: tests: test_popupwin fails because of updated help file * 9.1.0846: debug symbols for xxd are not cleaned in Makefile * runtime(structurizr): Update structurizr syntax * runtime(8th): updated 8th syntax * runtime(doc): Add pi_tutor.txt to help TOC * runtime(compiler): add mypy and ruff compiler; update pylint linter * runtime(netrw): fix several bugs in netrw tree listing * runtime(netrw): prevent polluting the search history * 9.1.0845: vimtutor shell script can be improved * 9.1.0844: if_python: no way to pass local vars to python * 9.1.0843: too many strlen() calls in undo.c * runtime(doc): update default value for fillchars option * runtime(compiler): fix typo in cppcheck compiler plugin * runtime(doc): simplify vimtutor manpage a bit more * runtime(matchparen): Add matchparen_disable_cursor_hl config option * 9.1.0842: not checking for the sync() systemcall * 9.1.0841: tests: still preferring python2 over python3 * 9.1.0840: filetype: idris2 files are not recognized * 9.1.0839: filetype: leo files are not recognized * runtime(cook): include cook filetype plugin * runtime(debversions): Update Debian versions * patch 9.1.0838: vimtutor is bash-specific * runtime(doc): add help specific modeline to pi_tutor.txt * Filelist: vimtutor chapter 2 is missing in Filelist * 9.1.0837: cross-compiling has some issues * runtime(vimtutor): Add a second chapter * update to 9.1.0836 * 9.1.0836: The vimtutor can be improved * 9.1.0835: :setglobal doesn't work properly for 'ffu' and 'tsrfu' * 9.1.0834: tests: 2html test fails * 9.1.0833: CI: recent ASAN changes do not work for indent tests * 9.1.0832: :set doesn't work for 'cot' and 'bkc' after :setlocal * runtime(doc): update help-toc description * runtime(2html): Make links use color scheme colors in TOhtml * 9.1.0831: 'findexpr' can't be used as lambad or Funcref * Filelist: include helptoc package * runtime(doc): include a TOC Vim9 plugin * Filelist: ignore .git-blame-ignore-revs * 9.1.0830: using wrong highlight group for spaces for popupmenu * runtime(typst): synchronize updates from the upstream typst.vim * git: ignore reformatting commit for git-blame (after v9.1.0829) * 9.1.0829: Vim source code uses a mix of tabs and spaces * 9.1.0828: string_T struct could be used more often * 9.1.0827: CI: tests can be improved * runtime(doc): remove stray sentence in pi_netrw.txt * 9.1.0826: filetype: sway files are not recognized * runtime(doc): Include netrw-gp in TOC * runtime(doc): mention 'iskeyword' at :h charclass() * runtime(doc): update help tags * 9.1.0825: compile error for non-diff builds * runtime(netrw): fix E874 when browsing remote directory which contains `~` character * runtime(doc): update coding style documentation * runtime(debversions): Add plucky (25.04) as Ubuntu release name * 9.1.0824: too many strlen() calls in register.c * 9.1.0823: filetype: Zephyr overlay files not recognized * runtime(doc): Clean up minor formatting issues for builtin functions * runtime(netrw): make :Launch/Open autoloadable * runtime(netrw): fix regression with x mapping on Cygwin * runtime(netrw): fix filetype detection for remote files * 9.1.0822: topline might be changed in diff mode unexpectedly * CI: huge linux builds should also run syntax & indent tests * 9.1.0821: 'findexpr' completion doesn't set v:fname to cmdline argument * 9.1.0820: tests: Mac OS tests are too flaky * runtime(awk): Highlight more awk comments in syntax script * runtime(netrw): add missing change for s:redir() * 9.1.0819: tests: using findexpr and imported func not tested * runtime(netrw): improve netrw's open-handling further * runtime(netrw): fix syntax error in netrwPlugin.vim * runtime(netrw): simplify gx file handling * 9.1.0818: some global functions are only used in single files * 9.1.0817: termdebug: cannot evaluate expr in a popup * runtime(defaults): Detect putty terminal and switch to dark background * 9.1.0816: tests: not clear what tests cause asan failures * runtime(doc): Remove some completed items from todo.txt * 9.1.0815: "above" virtual text causes wrong 'colorcolumn' position * runtime(syntax-tests): tiny vim fails because of line-continuation * 9.1.0814: mapset() may remove unrelated mapping * 9.1.0813: no error handling with setglobal and number types * 9.1.0812: Coverity warns about dereferencing NULL ptr * 9.1.0811: :find expansion does not consider 'findexpr' * 9.1.0810: cannot easily adjust the |:find| command * 9.1.0809: filetype: petalinux config files not recognized * 9.1.0808: Terminal scrollback doesn't shrink when decreasing 'termwinscroll' * 9.1.0807: tests: having 'nolist' in modelines isn't always desired * 9.1.0806: tests: no error check when setting global 'briopt' * 9.1.0805: tests: minor issues in gen_opt_test.vim * 9.1.0804: tests: no error check when setting global 'cc' * 9.1.0803: tests: no error check when setting global 'isk' * 9.1.0802: tests: no error check when setting global 'fdm' to empty value * 9.1.0801: tests: no error check when setting global 'termwinkey' * 9.1.0800: tests: no error check when setting global 'termwinsize' * runtime(doc): :ownsyntax also resets 'spelloptions' * 9.1.0799: tests: gettwinvar()/gettabwinvar() tests are not comprehensive * runtime(doc): Fix wrong Mac default options * 9.1.0798: too many strlen() calls in cmdhist.c * 9.1.0797: testing of options can be further improved * 9.1.0796: filetype: libtool files are not recognized * (typst): add folding to typst ftplugin * runtime(netrw): deprecate and remove netrwFileHandlers#Invoke() * 9.1.0795: filetype: Vivado memory info file are not recognized * 9.1.0794: tests: tests may fail on Windows environment * runtime(doc): improve the :colorscheme documentation * 9.1.0793: xxd: -e does add one extra space * 9.1.0792: tests: Test_set_values() is not comprehensive enough * runtime(swayconfig): add flag for bindsym/bindcode to syntax script * 9.1.0791: tests: errors in gen_opt_test.vim are not shown * runtime(compiler): check for compile_commands in build dirs for cppcheck * 9.1.0790: Amiga: AmigaOS4 build should use default runtime (newlib) * runtime(help): Update help syntax * runtime(help): fix end of sentence highlight in code examples * runtime(jinja): Support jinja syntax as secondary filetype * 9.1.0789: tests: ':resize + 5' has invalid space after '+' * 9.1.0788: 27;u is not decoded to literal Escape in kitty/foot * 9.1.0787: cursor position changed when using hidden terminal * 9.1.0786: tests: quickfix update test does not test location list * runtime(doc): add some docs for file-watcher programs * CI: uploading failed screendumps still fails on Cirrus CI * 9.1.0785: cannot preserve error position when setting quickfix list * 9.1.0784: there are several problems with python 3.13 * 9.1.0783: 'spell' option setting has problems * 9.1.0782: tests: using wrong neomuttlog file name * runtime(doc): add preview flag to statusline example * 9.1.0781: tests: test_filetype fails * 9.1.0780: MS-Windows: incorrect Win32 error checking * 9.1.0779: filetype: neomuttlog files are not recognized * 9.1.0778: filetype: lf config files are not recognized * runtime(comment): fix commment toggle with mixed tabs & spaces * runtime(misc): Use consistent "Vim script" spelling * runtime(gleam): add ftplugin for gleam files * runtime(doc): link help-writing from write-local-help * 9.1.0777: filetype: Some upstream php files are not recognized * runtime(java): Define javaBlockStart and javaBlockOtherStart hl groups * runtime(doc): mention conversion rules for remote_expr() * runtime(tutor): Fix missing :s command in spanish translation section 4.4 * 9.1.0776: test_strftime may fail because of missing TZ data * translation(am): Add Armenian language translation * 9.1.0775: tests: not enough tests for setting options * 9.1.0774: "shellcmdline" doesn't work with getcompletion() * 9.1.0773: filetype: some Apache files are not recognized * 9.1.0772: some missing changes from v9.1.0771 * 9.1.0771: completion attribute hl_group is confusing * 9.1.0770: current command line completion is a bit limited * 9.1.0769: filetype: MLIR files are not recognized * 9.1.0768: MS-Windows: incorrect cursor position when restoring screen * runtime(nasm): Update nasm syntax script * 9.1.0767: A condition is always true in ex_getln.c * runtime(skill): Update syntax file to fix string escapes * runtime(help): highlight CTRL- correctly * runtime(doc): add missing usr_52 entry to toc * 9.1.0766: too many strlen() calls in ex_getln.c * runtime(doc): correct `vi` registers 1-9 documentation error * 9.1.0765: No test for patches 6.2.418 and 7.3.489 * runtime(spec): set comments and commentstring options * NSIS: Include libgcc_s_sjlj-1.dll again * runtime(doc): clarify the effect of 'startofline' option * 9.1.0764: [security]: use-after-free when closing a buffer * runtime(vim): Update base-syntax file, improve class, enum and interface highlighting * 9.1.0763: tests: cannot run single syntax tests * 9.1.0762: 'cedit', 'termwinkey' and 'wildchar' may not be parsed correctly * 9.1.0761: :cd completion fails on Windows with backslash in path * 9.1.0760: tests: no error reported, if gen_opt_test.vim fails * 9.1.0759: screenpos() may return invalid position * runtime(misc): unset compiler in various ftplugins * runtime(doc): update formatting and syntax * runtime(compiler): add cppcheck linter compiler plugin * runtime(doc): Fix style in documents * runtime(doc): Fix to two-space convention in user manual * runtime(comment): consider &tabstop in lines after whitespace indent * 9.1.0758: it's possible to set an invalid key to 'wildcharm' * runtime(java): Manage circularity for every :syn-included syntax file * 9.1.0757: tests: messages files contains ANSI escape sequences * 9.1.0756: missing change from patch v9.1.0754 * 9.1.0755: quickfix list does not handle hardlinks well * runtime(doc): 'filetype', 'syntax' and 'keymap' only allow alphanumeric + some characters * runtime(systemd): small fixes to &keywordprg in ftplugin * CI: macos-12 runner is being sunset, switch to 13 * 9.1.0754: fixed order of items in insert-mode completion menu * runtime(comment): commenting might be off by one column * 9.1.0753: Wrong display when typing in diff mode with 'smoothscroll' * 9.1.0752: can set 'cedit' to an invalid value * runtime(doc): add `usr` tag to usr_toc.txt * 9.1.0751: Error callback for term_start() not used * 9.1.0750: there are some Win9x legacy references * runtime(java): Recognise the CommonMark form (///) of Javadoc comments * 9.1.0749: filetype: http files not recognized * runtime(comment): fix syntax error * CI: uploading failed screendump tests does not work Cirrus * 9.1.0748: :keep* commmands are sometimes misidentified as :k * runtime(indent): allow matching negative numbers for gnu indent config file * runtime(comment): add gC mapping to (un)comment rest of line * 9.1.0747: various typos in repo found * 9.1.0746: tests: Test_halfpage_longline() fails on large terminals * runtime(doc): reformat gnat example * runtime(doc): reformat ada_standard_types section * 9.1.0745: filetype: bun and deno history files not recognized * runtime(glvs): Correct the tag name of glvs-autoinstal * runtime(doc): include short form for :earlier/:later * runtime(doc): remove completed TODO * 9.1.0744: filetype: notmuch configs are not recognised * 9.1.0743: diff mode does not handle overlapping diffs correctly * runtime(glvs): fix a few issues * runtime(doc): Fix typo in :help :command-modifiers * 9.1.0742: getcmdprompt() implementation can be improved * runtime(docs): update `:set?` command behavior table * runtime(doc): update vim90 to vim91 in docs * runtime(doc): fix typo in :h dos-colors * 9.1.0741: No way to get prompt for input()/confirm() * runtime(doc): fix typo in version9.txt nrformat -> nrformats * runtime(rmd,rrst): 'fex' option not properly restored * runtime(netrw): remove extraneous closing bracket * 9.1.0740: incorrect internal diff with empty file * 9.1.0739: [security]: use-after-free in ex_getln.c * runtime(filetype): tests: Test_filetype_detection() fails * runtime(dist): do not output a message if executable is not found * 9.1.0738: filetype: rapid files are not recognized * runtime(modconf): remove erroneous :endif in ftplugin * runtime(lyrics): support multiple timestamps in syntax script * runtime(java): Optionally recognise _module_ import declarations * runtime(vim): Update base-syntax, improve folding function matches * CI: upload failed screendump tests also for Cirrus * 9.1.0737: tests: screendump tests may require a bit more time * runtime(misc): simplify keywordprg in various ftplugins * runtime(java): Optionally recognise all primitive constants in _switch-case_ labels * runtime(zsh,sh): set and unset compiler in ftplugin * runtime(netrw): using inefficient highlight pattern for 'mf' * 9.1.0736: Unicode tables are outdated * 9.1.0735: filetype: salt files are not recognized * 9.1.0734: filetype: jinja files are not recognized * runtime(zathurarc): add double-click-follow to syntax script * translation(ru): Updated messages translation * translation(it): updated xxd man page * translation(ru): updated xxd man page * 9.1.0733: keyword completion does not work with fuzzy * 9.1.0732: xxd: cannot use -b and -i together * runtime(java): Highlight javaConceptKind modifiers with StorageClass * runtime(doc): reword and reformat how to use defaults.vim * 9.1.0731: inconsistent case sensitive extension matching * runtime(vim): Update base-syntax, match Vim9 bool/null literal args to :if/:while/:return * runtime(netrw): delete confirmation not strict enough * 9.1.0730: Crash with cursor-screenline and narrow window * 9.1.0729: Wrong cursor-screenline when resizing window * 9.1.0728: [security]: heap-use-after-free in garbage collection with location list user data * runtime(doc): clarify the effect of the timeout for search()-functions * runtime(idlang): update syntax script * runtime(spec): Recognize epoch when making spec changelog in ftplugin * runtime(spec): add file triggers to syntax script * 9.1.0727: too many strlen() calls in option.c * runtime(make): add compiler/make.vim to reset compiler plugin settings * runtime(java): Recognise all available standard doclet tags * 9.1.0726: not using correct python3 API with dynamic linking * runtime(dosini): Update syntax script, spellcheck comments only * runtime(doc): Revert outdated comment in completeopt's fuzzy documentation * 9.1.0725: filetype: swiftinterface files are not recognized * runtime(pandoc): Update compiler plugin to use actual 'spelllang' * runtime(groff): Add compiler plugin for groff * 9.1.0724: if_python: link error with python 3.13 and stable ABI * 9.1.0723: if_python: dynamic linking fails with python3 >= 3.13 * 9.1.0722: crash with large id in text_prop interface * 9.1.0721: tests: test_mksession does not consider XDG_CONFIG_HOME * runtime(glvs): update GetLatestVimScripts plugin * runtime(doc): Fix typo in :help :hide text * runtime(doc): buffers can be re-used * 9.1.0720: Wrong breakindentopt=list:-1 with multibyte or TABs * 9.1.0719: Resetting cell widths can make 'listchars' or 'fillchars' invalid * runtime(doc): Update version9.txt and mention $MYVIMDIR * Update to 9.1.0718: * v9.1.0718: hard to know the users personal Vim Runtime Directory * v9.1.0717: Unnecessary nextcmd NULL checks in parse_command_modifiers() Maintainers: fix typo in author name * v9.1.0716: resetting setcellwidth( doesn't update the screen runtime(hcl,terraform): Add runtime files for HCL and Terraform runtime(tmux): Update syntax script * v9.1.0715: Not correctly parsing color names (after v9.1.0709) * v9.1.0714: GuiEnter_Turkish test may fail * v9.1.0713: Newline causes E749 in Ex mode * v9.1.0712: missing dependency of Test_gettext_makefile * v9.1.0711: test_xxd may file when using different xxd * v9.1.0710: popup window may hide part of Command line runtime(vim): Update syntax, improve user-command matching * v9.1.0709: GUIEnter event not found in Turkish locale runtime(sudoers): improve recognized Runas_Spec and Tag_Spec items * v9.1.0708: Recursive window update does not account for reset skipcol runtime(nu): include filetype plugin * v9.1.0707: invalid cursor position may cause a crash * v9.1.0706: test_gettext fails when using shadow dir CI: Install locales-all package * v9.1.0705: Sorting of fuzzy filename completion is not stable translation(pt): update Portuguese/Brazilian menu translation runtime(vim): Update base-syntax, match bracket mark ranges runtime(doc): Update :help :command-complete list * v9.1.0704: inserting with a count is inefficient runtime(doc): use mkdir -p to save a command * v9.1.0703: crash with 2byte encoding and glob2regpat() runtime(hollywood): update syn highlight for If-Then statements and For-In-Loops * v9.1.0702: Patch 9.1.0700 broke CI * v9.1.0701: crash with NFA regex engine when searching for composing chars * v9.1.0700: crash with 2byte encoding and glob2regpat() * v9.1.0699: "dvgo" is not always an inclusive motion runtime(java): Provide support for syntax preview features * v9.1.0698: "Untitled" file not removed when running Test_crash1_3 alone * v9.1.0697: heap-buffer-overflow in ins_typebuf * v9.1.0696: installing runtime files fails when using SHADOWDIR runtime(doc): fix typo * v9.1.0695: test_crash leaves Untitled file around translation(br): Update Brazilian translation translation(pt): Update menu_pt_br * v9.1.0694: matchparen is slow on a long line * v9.1.0693: Configure doesn't show result when not using python3 stable abi * v9.1.0692: Wrong patlen value in ex_substitute() * v9.1.0691: stable-abi may cause segfault on Python 3.11 runtime(vim): Update base-syntax, match :loadkeymap after colon and bar runtime(mane): Improve ManBS mapping * v9.1.0690: cannot set special highlight kind in popupmenu translation(pt): Revert and fix wrong Portuguese menu translation files translation(pt): revert Portuguese menu translation translation(br): Update Brazilian translations runtime(vim): Update base-syntax, improve :let-heredoc highlighting * v9.1.0689: buffer-overflow in do_search( with 'rightleft' runtime(vim): Improve heredoc handling for all embedded scripts * v9.1.0688: dereferences NULL pointer in check_type_is_value() * v9.1.0687: Makefile may not install desktop files runtime(man): Fix ManBS runtime(java): Make the bundled &foldtext function optional runtime(netrw): Change line on `mx` if command output exists runtime(netrw): Fix `mf`-selected entry highlighting runtime(htmlangular): add html syntax highlighting translation(it): Fix filemode of Italian manpages runtime(doc): Update outdated man.vim plugin information runtime(zip): simplify condition to detect MS-Windows * v9.1.0686: zip-plugin has problems with special characters runtime(pandoc): escape quotes in &errorformat for pandoc translation(it): updated Italian manpage * v9.1.0685: too many strlen( calls in usercmd.c runtime(doc): fix grammar in :h :keeppatterns runtime(pandoc): refine pandoc compiler settings * v9.1.0684: completion is inserted on Enter with "noselect" translation(ru): update man pages * v9.1.0683: mode( returns wrong value with mapping runtime(doc): remove trailing whitespace in cmdline.txt * v9.1.0682: Segfault with uninitialized funcref * v9.1.0681: Analyzing failed screendumps is hard runtime(doc): more clarification for the :keeppatterns needed * v9.1.0680: VMS does not have defined uintptr_t runtime(doc): improve typedchar documentation for KeyInputPre autocmd runtime(dist): verify that executable is in $PATH translation(it): update Italian manpages runtime(doc): clarify the effect of :keeppatterns after * v9.1.0677 runtime(doc): update Makefile and make it portable between GNU and BSD * v9.1.0679: Rename from w_closing to w_locked is incomplete runtime(colors): update colorschemes runtime(vim): Update base-syntax, improve :let-heredoc highlighting runtime(doc): Updating the examples in the xxd manpage translation(ru): Updated uganda.rux runtime(yaml): do not re-indent when commenting out lines * v9.1.0678: use-after-free in alist_add() * v9.1.0677 :keepp does not retain the substitute pattern translation(ja): Update Japanese translations to latest release runtime(netrw): Drop committed trace lines runtime(netrw): Error popup not always used runtime(netrw): ErrorMsg( may throw E121 runtime(tutor): update Makefile and make it portable between GNU and BSD translation: improve the po/cleanup.vim script runtime(lang): update Makefile and make it portable between GNU and BSD * v9.1.0676: style issues with man pages * v9.1.0675: Patch v9.1.0674 causes problems runtime(dosbatch): Show %%i as an argument in syntax file runtime(dosbatch): Add syn-sync to syntax file runtime(sql, mysql): fix E169: Command too recursive with sql_type_default = "mysql" * v9.1.0674: compiling abstract method fails because of missing return runtime(javascript): fix a few issues with syntax higlighting runtime(mediawiki): fix typo in doc, test for b:did_ftplugin var runtime(termdebug): Fix wrong test for balloon feature runtime(doc): Remove mentioning of the voting feature runtime(doc): add help tags for json + markdown global variables * v9.1.0673: too recursive func calls when calling super-class method runtime(syntax-tests): Facilitate the viewing of rendered screendumps runtime(doc): fix a few style issues * v9.1.0672: marker folds may get corrupted on undo * v9.1.0671 Problem: crash with WinNewPre autocommand * v9.1.0670: po file encoding fails on *BSD during make translation(it): Update Italian translation translation: Stop using msgconv * v9.1.0669: stable python ABI not used by default Update .gitignore and .hgignore files * v9.1.0668: build-error with python3.12 and stable ABI translations: Update generated po files * v9.1.0667: Some other options reset curswant unnecessarily when set * v9.1.0666: assert_equal( doesn't show multibyte string correctly runtime(doc): clarify directory of Vim's executable vs CWD * v9.1.0665 :for loop runtime(proto): Add indent script for protobuf filetype * v9.1.0664: console vim did not switch back to main screen on exit runtime(zip): zip plugin does not work with Vim 9.0 * v9.1.0663: zip test still resets 'shellslash' option runtime(zip): use defer to restore old settings runtime(zip): add a generic Message function runtime(zip): increment base version of zip plugin runtime(zip): raise minimum Vim version to * v9.0 runtime(zip): refactor save and restore of options runtime(zip): remove test for fnameescape runtime(zip): use :echomsg instead of :echo runtime(zip): clean up and remove comments * v9.1.0662: filecopy( may return wrong value when readlink( fails * v9.1.0661: the zip plugin is not tested. runtime(zip): Fix for FreeBSD's unzip command runtime(doc): capitalize correctly * v9.1.0660: Shift-Insert does work on old conhost translation(it): update Italian manpage runtime(lua): add/subtract a 'shiftwidth' after '('/')' in indentexpr runtime(zip): escape '[' on Unix as well * v9.1.0659: MSVC Makefile is a bit hard to read runtime(doc): fix typo in syntax.txt runtime(doc): -x is only available when compiled with crypt feature * v9.1.0658: Coverity warns about dereferencing NULL pointer. runtime(colors): update Todo highlight in habamax colorscheme * v9.1.0657: MSVC build time can be optimized * v9.1.0656: MSVC Makefile CPU handling can be improved * v9.1.0655: goaccess config file not recognized CI: update clang compiler to version 20 runtime(netrw): honor `g:netrw_alt{o,v}` for `:{S,H,V}explore` * v9.1.0654: completion does not respect completeslash with fuzzy * v9.1.0653: Patch v9.1.0648 not completely right * v9.1.0652: too many strlen( calls in syntax.c * v9.1.0651 :append * v9.1.0650: Coverity warning in cstrncmp() * v9.1.0649: Wrong comment for "len" argument of call_simple_func() * v9.1.0648: [security] double-free in dialog_changed() * v9.1.0647: [security] use-after-free in tagstack_clear_entry runtime(doc): re-format tag example lines, mention ctags --list-kinds * v9.1.0646: imported function may not be found runtime(java): Document "g:java_space_errors" and "g:java_comment_strings" runtime(java): Cluster optional group definitions and their group links runtime(java): Tidy up the syntax file runtime(java): Tidy up the documentation for "ft-java-syntax" runtime(colors): update habamax scheme - tweak diff/search/todo colors runtime(nohlsearch): add missing loaded_hlsearch guard runtime(kivy): Updated maintainer info for syntax script Maintainers: Add maintainer for ondir ftplugin + syntax files runtime(netrw): removing trailing slash when copying files in same directory * v9.1.0645: wrong match when searching multi-byte char case-insensitive runtime(html): update syntax script to sync by 250 minlines by default * v9.1.0644: Unnecessary STRLEN( when applying mapping runtime(zip): Opening a remote zipfile don't work runtime(cuda): source c and cpp ftplugins * v9.1.0643: cursor may end up on invalid position * v9.1.0642: Check that mapping rhs starts with lhs fails if not simplified * v9.1.0641: OLE enabled in console version runtime(thrift): add ftplugin, indent and syntax scripts * v9.1.0640: Makefile can be improved * v9.1.0639: channel timeout may wrap around * v9.1.0638: E1510 may happen when formatting a message for smsg() * v9.1.0637: Style issues in MSVC Makefile * Update apparmor.vim to latest version (from AppArmor 4.0.2) * add support for "all" and "userns" rules, and new profile flags * Update to 9.1.0636: * 9.1.0636: filetype: ziggy files are not recognized * 9.1.0635: filetype: SuperHTML template files not recognized * 9.1.0634: Ctrl-P not working by default * 9.1.0633: Compilation warnings with `-Wunused-parameter` * 9.1.0632: MS-Windows: Compiler Warnings Add support for Files-Included in syntax script tweak documentation style a bit * 9.1.0631: wrong completion list displayed with non-existing dir + fuzzy completion * 9.1.0630: MS-Windows: build fails with VIMDLL and mzscheme * 9.1.0629: Rename of pum hl_group is incomplete * 9.1.0628: MinGW: coverage files are not cleaned up * 9.1.0627: MinGW: build-error when COVERAGE is enabled * 9.1.0626: Vim9: need more tests with null objects include initial filetype plugin * 9.1.0625: tests: test output all translated messages for all translations * 9.1.0624: ex command modifiers not found * 9.1.0623: Mingw: errors when trying to delete non-existing files * 9.1.0622: MS-Windows: mingw-build can be optimized * 9.1.0621: MS-Windows: startup code can be improved * 9.1.0620: Vim9: segfauls with null objects * 9.1.0619: tests: test_popup fails * 9.1.0618: cannot mark deprecated attributes in completion menu * 9.1.0617: Cursor moves beyond first line of folded end of buffer * 9.1.0616: filetype: Make syntax highlighting off for MS Makefiles * 9.1.0615: Unnecessary STRLEN() in make_percent_swname() Add single-line comment syntax Add syntax test for comments Update maintainer info * 9.1.0614: tests: screendump tests fail due to recent syntax changes * 9.1.0613: tests: termdebug test may fail and leave file around Update base- syntax, improve :set highlighting Optionally highlight the :: token for method references * 9.1.0612: filetype: deno.lock file not recognized Use delete() for deleting directory escape filename before trying to delete it * 9.1.0611: ambiguous mappings not correctly resolved with modifyOtherKeys correctly extract file from zip browser * 9.1.0610: filetype: OpenGL Shading Language files are not detected Fix endless recursion in netrw#Explore() * 9.1.0609: outdated comments in Makefile update syntax script Fix flow mapping key detection Remove orphaned YAML syntax dump files * 9.1.0608: Coverity warns about a few potential issues Update syntax script and remove syn sync * 9.1.0607: termdebug: uses inconsistent style * 9.1.0606: tests: generated files may cause failure in test_codestyle * 9.1.0605: internal error with fuzzy completion * 9.1.0604: popup_filter during Press Enter prompt seems to hang translation: Update Serbian messages translation * 9.1.0603: filetype: use correct extension for Dracula * 9.1.0602: filetype: Prolog detection can be improved fix more inconsistencies in assert function docs * 9.1.0601: Wrong cursor position with 'breakindent' when wide char doesn't fit Update base-syntax, improve :map highlighting * 9.1.0600: Unused function and unused error constants * 9.1.0599: Termdebug: still get E1023 when specifying arguments correct wrong comment options fix typo "a xterm" -> "an xterm" * 9.1.0598: fuzzy completion does not work with default completion * 9.1.0597: KeyInputPre cannot get the (unmapped typed) key * 9.1.0596: filetype: devscripts config files are not recognized gdb file/folder check is now performed only in CWD. quote filename arguments using double quotes update syntax to SDC-standard 2.1 minor updates. Cleanup :match and :loadkeymap syntax test files Update base-syntax, match types in Vim9 variable declarations * 9.1.0595: make errors out with the po Makefile * 9.1.0594: Unnecessary redraw when setting 'winfixbuf' using wrong highlight for UTF-8 include simple syntax plugin * 9.1.0593: filetype: Asymptote files are not recognized add recommended indent options to ftplugin add recommended indent options to ftplugin add recommended indent options to ftplugin * 9.1.0592: filetype: Mediawiki files are not recognized * 9.1.0591: filetype: *.wl files are not recognized * 9.1.0590: Vim9: crash when accessing getregionpos() return value 'cpoptions': Include "z" in the documented default * 9.1.0589: vi: d{motion} and cw work differently than expected update included colorschemes grammar fixes in options.txt * Update to 9.1.0588: * 9.1.0588: The maze program no longer compiles on newer clang runtime(typst): Add typst runtime files * 9.1.0587: tests: Test_gui_lowlevel_keyevent is still flaky * 9.1.0586: ocaml runtime files are outdated runtime(termdebug): fix a few issues * 9.1.0585: tests: test_cpoptions leaves swapfiles around * 9.1.0584: Warning about redeclaring f_id() non-static runtime(doc): Add hint how to load termdebug from vimrc runtime(doc): document global insert behavior * 9.1.0583: filetype: *.pdf_tex files are not recognized * 9.1.0582: Printed line doesn't overwrite colon when pressing Enter in Ex mode * 9.1.0581: Various lines are indented inconsistently * 9.1.0580: :lmap mapping for keypad key not applied when typed in Select mode * 9.1.0579: Ex command is still executed after giving E1247 * 9.1.0578: no tests for :Tohtml * 9.1.0577: Unnecessary checks for v:sizeoflong in test_put.vim * 9.1.0576: tests: still an issue with test_gettext_make * 9.1.0575: Wrong comments in alt_tabpage() * 9.1.0574: ex: wrong handling of commands after bar runtime(doc): add a note for netrw bug reports * 9.1.0573: ex: no implicit print for single addresses runtime(vim): make &indentexpr available from the outside * 9.1.0572: cannot specify tab page closing behaviour runtime(doc): remove obsolete Ex insert behavior * 9.1.0571: tests: Test_gui_lowlevel_keyevent is flaky runtime(logindefs): update syntax with new keywords * 9.1.0570: tests: test_gettext_make can be improved runtime(filetype): Fix Prolog file detection regex * 9.1.0569: fnamemodify() treats ".." and "../" differently runtime(mojo): include mojo ftplugin and indent script * 9.1.0568: Cannot expand paths from 'cdpath' setting * 9.1.0567: Cannot use relative paths as findfile() stop directories * 9.1.0566: Stop dir in findfile() doesn't work properly w/o trailing slash * 9.1.0565: Stop directory doesn't work properly in 'tags' * 9.1.0564: id() can be faster * 9.1.0563: Cannot process any Key event * 9.1.0562: tests: inconsistency in test_findfile.vim runtime(fstab): Add missing keywords to fstab syntax * 9.1.0561: netbeans: variable used un-initialized (Coverity) * 9.1.0560: bindtextdomain() does not indicate an error * 9.1.0559: translation of vim scripts can be improved * 9.1.0558: filetype: prolog detection can be improved * 9.1.0557: moving in the buffer list doesn't work as documented runtime(doc): fix inconsistencies in :h file-searching * 9.1.0556: :bwipe doesn't remove file from jumplist of other tabpages runtime(htmlangular): correct comment * 9.1.0555: filetype: angular ft detection is still problematic * 9.1.0554: :bw leaves jumplist and tagstack data around * 9.1.0553: filetype: *.mcmeta files are not recognized * 9.1.0552: No test for antlr4 filetype * 9.1.0551: filetype: htmlangular files are not properly detected * 9.1.0550: filetype: antlr4 files are not recognized * 9.1.0549: fuzzycollect regex based completion not working as expected runtime(doc): autocmd_add() accepts a list not a dict * 9.1.0548: it's not possible to get a unique id for some vars runtime(tmux): Update syntax script * 9.1.0547: No way to get the arity of a Vim function * 9.1.0546: vim-tiny fails on CTRL-X/CTRL-A runtime(hlsplaylist): include hlsplaylist ftplugin file runtime(doc): fix typo in :h ft-csv-syntax runtime(doc): Correct shell command to get $VIMRUNTIME into shell * 9.1.0545: MSVC conversion warning * 9.1.0544: filetype: ldapconf files are not recognized runtime(cmakecache): include cmakecache ftplugin file runtime(lex): include lex ftplugin file runtime(yacc): include yacc ftplugin file runtime(squirrel): include squirrel ftplugin file runtime(objcpp): include objcpp ftplugin file runtime(tf): include tf ftplugin file runtime(mysql): include mysql ftplugin file runtime(javacc): include javacc ftplugin file runtime(cabal): include cabal ftplugin file runtime(cuda): include CUDA ftplugin file runtime(editorconfig): include editorconfig ftplugin file runtime(kivy): update kivy syntax, include ftplugin runtime(syntax-tests): Stop generating redundant " ___ 99.dump" files * 9.1.0543: Behavior of CursorMovedC is strange runtime(vim): Update base- syntax, improve :match command highlighting * 9.1.0542: Vim9: confusing string() output for object functions * 9.1.0541: failing test with Vim configured without channel * 9.1.0540: Unused assignment in sign_define_cmd() runtime(doc): add page- scrolling keys to index.txt runtime(doc): add reference to xterm-focus-event from FocusGained/Lost * 9.1.0539: Not enough tests for what v9.1.0535 fixed runtime(doc): clarify how to re-init csv syntax file * 9.1.0538: not possible to assign priority when defining a sign * 9.1.0537: signed number detection for CTRL-X/A can be improved * 9.1.0536: filetype: zone files are not recognized * 9.1.0535: newline escape wrong in ex mode runtime(man): honor cmd modifiers before `g:ft_man_open_mode` runtime(man): use `nnoremap` to map to Ex commands * 9.1.0534: completion wrong with fuzzy when cycling back to original runtime(syntax-tests): Abort and report failed cursor progress runtime(syntax-tests): Introduce self tests for screen dumping runtime(syntax-tests): Clear and redraw the ruler line with the shell info runtime(syntax-tests): Allow for folded and wrapped lines in syntax test files * 9.1.0533: Vim9: need more tests for nested objects equality CI: Pre-v* 9.0.0110 versions generate bogus documentation tag entries runtime(doc): Remove wrong help tag CTRL-SHIFT-CR * 9.1.0532: filetype: Cedar files not recognized runtime(doc): document further keys that scroll page up/down * 9.1.0531: resource leak in mch_get_random() runtime(tutor): Fix wrong spanish translation runtime(netrw): fix remaining case of register clobber * 9.1.0530: xxd: MSVC warning about non-ASCII character * 9.1.0529: silent! causes following try/catch to not work runtime(rust): use shiftwidth() in indent script * 9.1.0528: spell completion message still wrong in translations * 9.1.0527: inconsistent parameter in Makefiles for Vim executable * 9.1.0526: Unwanted cursor movement with pagescroll at start of buffer runtime(doc): mention $XDG_CONFIG_HOME instead of $HOME/.config * 9.1.0525: Right release selects immediately when pum is truncated. * 9.1.0524: the recursive parameter in the *_equal functions can be removed runtime(termdebug): Add Deprecation warnings * 9.1.0523: Vim9: cannot downcast an object * 9.1.0522: Vim9: string(object) hangs for recursive references * 9.1.0521: if_py: _PyObject_CallFunction_SizeT is dropped in Python 3.13 * 9.1.0520: Vim9: incorrect type checking for modifying lists runtime(manpager): avoid readonly prompt * 9.1.0519: MS-Windows: libvterm compilation can be optimized * 9.1.0518: initialize the random buffer can be improved * 9.1.0517: MS-Windows: too long lines in Make_mvc.mak runtime(terraform): Add filetype plugin for terraform runtime(dockerfile): enable spellchecking of comments in syntax script runtime(doc): rename variable for pandoc markdown support runtime(doc): In builtin overview use {buf} as param for appendbufline/setbufline runtime(doc): clarify, that register 1- _9 will always be shifted runtime(netrw): save and restore register 0-_ 9, a and unnamed runtime(termdebug): Refactored StartDebug_term and EndDebug functions runtime(java): Compose "g:java_highlight_signature" and "g:java_highlight_functions" * 9.1.0516: need more tests for nested dicts and list comparision * 9.1.0515: Vim9: segfault in object_equal() * 9.1.0514: Vim9: issue with comparing objects recursively runtime(termdebug): Change some variables to Enums runtime(vim): Update base-syntax, fix function tail comments * 9.1.0513: Vim9: segfault with object comparison * Update to 9.1.0512: * Mode message for spell completion doesn't match allowed keys * CursorMovedC triggered wrongly with setcmdpos() * update runtime files * CI: test_gettext fails on MacOS14 + MSVC Win * not possible to translate Vim script messages * termdebug plugin can be further improved * add gomod filetype plugin * hard to detect cursor movement in the command line * Optionally highlight parameterised types * filetype: .envrc & .prettierignore not recognized * filetype: Faust files are not recognized * inner-tag textobject confused about ">" in attributes * cannot use fuzzy keyword completion * Remove the group exclusion list from @javaTop * wrong return type for execute() function * MS-Windows: too much legacy code * too complicated mapping restore in termdebug * simplify mapping * cannot switch buffer in a popup * MS-Windows: doesn't handle symlinks properly * getcmdcompltype() interferes with cmdline completion * termdebug can be further improved * update htmldjango detection * Improve Turkish documentation * include a simple csv filetype and syntax plugin * include the the simple nohlsearch package * matched text is highlighted case-sensitively * Matched text isn't highlighted in cmdline pum * Fix typos in several documents * clarify when text properties are cleared * improve the vim-shebang example * revert unintended formatting changes for termdebug * Add a config variable for commonly used compiler options * Wrong matched text highlighted in pum with 'rightleft' * bump length of character references in syntax script * properly check mapping variables using null_dict * fix KdlIndent and kdlComment in indent script * Test for patch 9.1.0489 doesn't fail without the fix * Fold multi-line comments with the syntax kind of &fdm * using wrong type for PlaceSign() * filetype: Vim-script files not detected by shebang line * revert unintended change to zip#Write() * add another tag for vim-shebang feature * Cmdline pum doesn't work properly with 'rightleft' * minor style problems with patch 9.1.0487 * default completion may break with fuzzy * Wrong padding for pum "kind" with 'rightleft' * Update base-syntax, match shebang lines * MS-Windows: handle files with spaces properly * Restore HTML syntax file tests * completed item not update on fuzzy completion * filetype: Snakemake files are not recognized * make TermDebugSendCommand() a global function again * close all buffers in the same way * Matched text shouldn't be highlighted in "kind" and "menu" * fix wrong helptag for :defer * Update base-syntax, match :sleep arg * include Georgian keymap * Sorting of completeopt+=fuzzy is not stable * correctly test for windows in NetrwGlob() * glob() on windows fails with [] in directory name * rewrite mkdir() doc and simplify {flags} meaning * glob() not sufficiently tested * update return type for job_info() * termdebug plugin needs more love * correct return types for job_start() and job_status() * Update base-syntax, match :catch and :throw args * Include element values in non-marker annotations * Vim9: term_getjob() throws an exception on error * fuzzy string matching executed when not needed * fuzzy_match_str_with_pos() does unnecessary list operations * restore description of "$" in col() and virtcol() * deduplicate getpos(), line(), col(), virtcol() * Update g:vimsyn_comment_strings dump file tests * Use string interpolation instead of string concat * potential deref of NULL pointer in fuzzy_match_str_with_pos * block_editing errors out when using * Update base-syntax, configurable comment string highlighting * fix typos in syntax.txt * Cannot see matched text in popup menu * Update base-syntax, match multiline continued comments * clarify documentation for "v" position at line() * cmod_split modifier is always reset in term_start() * remove line-continuation characters * use shiftwidth() instead of &tabstop in indent script * Remove orphaned screen dump files * include syntax, indent and ftplugin files * CI: Test_ColonEight() fails on github runners * add missing Enabled field in syntax script * basic svelte ftplugin file * term_start() does not clear vertical modifier * fix mousemodel restoration by comparing against null_string * Added definitions of Vim scripts and plugins * Exclude lambda expressions from _when_ _switch-case_ label clauses * Fix saved_mousemodel check * Inconsistencies between functions for option flags * Crash when using autocmd_get() after removing event inside autocmd * Fix small style issues * add return type info for Vim function descriptions * Update Italian Vim manpage * disable the q mapping * Change 'cms' for C++ to '// %s' * fix type mismatch error * Fix wrong email address * convert termdebug plugin to Vim9 script * Update to 9.1.0470: * tests Test_ColonEight_MultiByte() fails sporadically * Cannot have buffer-local value for 'completeopt' * GvimExt does not consult HKEY_CURRENT_USER * typos in some comments * runtime(vim): Update base-syntax, allow whitespace before :substitute pattern * Missing comments for fuzzy completion * runtime(man): update Vim manpage * runtime(comment): clarify the usage of 'commentstring' option value * runtime(doc): clarify how fuzzy 'completeopt' should work * runtime(netrw): prevent accidental data loss * missing filecopy() function * no whitespace padding in commentstring option in ftplugins * no fuzzy-matching support for insert-completion * eval5() and eval7 are too complex * too many strlen() calls in drawline.c * filetype lintstagedrc files are not recognized * Vim9 import autoload does not work with symlink * Coverity complains about division by zero * tests test_gui fails on Wayland * Left shift is incorrect with vartabstop and shiftwidth=0 * runtime(doc): clarify 'shortmess' flag "S" * MS-Windows compiler warning for size_t to int conversion * runtime(doc): include some vim9 script examples in the help * minor issues in test_filetype with rasi test * filetype rasi files are not recognized * runtime(java): Improve the matching of lambda expressions * Configure checks for libelf unnecessarily * No test for escaping '<' with shellescape() * check.vim complains about overlong comment lines * translation(it): Update Italian translation * evalc. code too complex * MS-Windows Compiler warnings * Update to 9.1.0448: * compiler warning in eval.c * remove remaining css code * Add ft_hare.txt to Reference Manual TOC * re-generate vim syntax from generator * fix syntax vim bug * completion may be wrong when deleting all chars * getregionpos() inconsistent for partly-selected multibyte char * fix highlighting nested and escaped quotes in string props * remove the indent plugin since it has too many issues * update Debian runtime files * Coverity warning after 9.1.0440 * Not enough tests for getregion() with multibyte chars * Can't use blockwise selection with width for getregion() * update outdated syntax files * fix floating_modifier highlight * hare runtime files outdated * getregionpos() can't properly indicate positions beyond eol * function get_lval() is too long * Cannot filter the history * Wrong Ex command executed when :g uses '?' as delimiter * support floating_modifier none; revert broken highlighting * Motif requires non-const char pointer for XPM data * Crash when using '?' as separator for :s * filetype: cygport files are not recognized * make errors trying to access autoload/zig * Wrong yanking with exclusive selection and ve=all * add missing help tags file * Ancient XPM preprocessor hack may cause build errors * include basic rescript ftplugin file * eval.c is too long * getregionpos() doesn't handle one char selection * check for gdb file/dir before using as buffer name * refactor zig ftplugin, remove auto format * Coverity complains about eval.c refactor * Tag guessing leaves wrong search history with very short names * some issues with termdebug mapping test * update matchit plugin to v1.20 * too many strlen() calls in search.c * set commentstring option * update vb indent plugin as vim9script * filetype: purescript files are not recognized * filetype: slint files are not recognized * basic nim ftplugin file for comments * Add Arduino ftplugin and indent files * include basic typst ftplugin file * include basic prisma ftplugin file * include basic v ftplugin for comment support * getregionpos() wrong with blockwise mode and multibyte * function echo_string_core() is too long * hyprlang files are not recognized * add basic dart ftplugin file * basic ftplugin file for graphql * mention comment plugin at :h 'commentstring' * set commentstring for sql files in ftplugin * :browse oldfiles prompts even with single entry * eval.c not sufficiently tested * clarify why E195 is returned * clarify temporary file clean up * fix :NoMatchParen not working * Cannot move to previous/next rare word * add basic ftplugin file for sshdconfig * if_py: find_module has been removed in Python 3.12.0a7 * some screen dump tests can be improved * Some functions are not tested * clarify instal instructions for comment package * Unable to leave long line with 'smoothscroll' and 'scrolloff' * fix typo in vim9script help file * Remove trailing spaces * clarify {special} argument for shellescape() update to 9.1.0413: * smoothscroll may cause infinite loop * add missing entries for the keys CTRL-W g and * update vi_diff.txt: add default value for 'flash' * typo in regexp_bt.c in DEBUG code * allow indented commands * Fix wrong define regex in ftplugin * Filter out non-Latin-1 characters for syntax tests * prefer scp over pscp * fix typo in usr_52.txt * too long functions in eval.c * warning about uninitialized variable * too many strlen() calls in the regexp engine * E16 fix, async keyword support for define * Stuck with long line and half-page scrolling * Divide by zero with getmousepos() and 'smoothscroll' * update and remove some invalid links * update translation of xxd manpage * Recursively delete directories by default with netrw delete command * Strive to remain compatible for at least Vim 7.0 * tests: xxd buffer overflow fails on 32-bit * Stop handpicking syntax groups for @javaTop * [security] xxd: buffer-overflow with specific flags * Vim9: not able to import file from start dir * filetype: mdd files detected as zsh filetype * filetype: zsh module files are not recognized * Remove hardcoded private.ppk logic from netrw * Vim9: confusing error message for unknown type * block_editing errors out when using del * add new items to scripts section in syntax plugin * Vim9: imported vars are not properly type checked * Wrong display with 'smoothscroll' when changing quickfix list * filetype: jj files are not recognized * getregionpos() may leak memory on error * The CODEOWNERS File is not useful * Remove and cleanup Win9x legacy from netrw * add MsgArea to 'highlight' option description * Cannot get a list of positions describing a region * Fix digit separator in syntax script for octals and floats * Update link to Wikipedia Vi page * clear $MANPAGER in ftplugin before shelling out * Fix typos in help documents * 'viewdir' not respecting $XDG_CONFIG_HOME * tests: Vim9 debug tests may be flaky * correct getscriptinfo() example * Vim9: could improve testing * test_sound fails on macos-12 * update Serbian menu * update Slovak menu * update Slovenian menu * update Portuguese menu * update Dutch menu * update Korean menu * update Icelandic menu * update Czech menu * update Afrikaans menu * update German menu * filetype: inko files are not recognized * filetype: templ files are not recognized * cursor() and getregion() don't handle v:maxcol well * Vim9: null value tests not sufficient * update Catalan menu * filetype: stylus files not recognized * update spanish menu localization * regenerate helptags * Vim9: crash with null_class and null_object * Add tags about lazyloading of menu * tests: vt420 terminfo entry may not be found * filetype: .out files recognized as tex files * filetype: Kbuild files are not recognized * cbuffer and similar commands don't accept a range * Improve the recognition of the "indent" method declarations * Fix a typo in usr_30.txt * remove undefined var s:save_cpoptions and add include setting * missing setlocal in indent plugin * Calculating line height for unnecessary amount of lines * improve syntax file performance * There are a few typos * Vim9: no comments allowed after class vars * CI: remove trailing white space in documentation * Formatting text wrong when 'breakindent' is set * Add oracular (24.10) as Ubuntu release name * Vim9: Trailing commands after class/enum keywords ignored * tests: 1-second delay after Test_BufEnter_botline() * update helptags for jq syntax * include syntax, ftplugin and compiler plugin * fix typo synconcealend -> synconcealed * include a simple comment toggling plugin * wrong botline in BufEnter * clarify syntax vs matching mechanism * fix undefined variable in indent plugin * ops.c code uses too many strlen() calls * Calling CLEAR_FIELD() on the same struct twice * Vim9: compile_def_function() still too long * Update Serbian messages * clarify the effect of setting the shell to powershell * Improve the recognition of the "style" method declarations * Vim9: problem when importing autoloaded scripts * compile_def_function is too long * filetype: ondir files are not recognized * Crash when typing many keys with D- modifier * tests: test_vim9_builtin is a bit slow * update documentation * change the download URL of "libsodium" * tests: test_winfixbuf is a bit slow * Add filetype, syntax and indent plugin for Astro * expanding rc config files does not work well * Vim9: vim9type.c is too complicated * Vim9: does not handle autoloaded variables well * minor spell fix in starting.txt * wrong drawing in GUI with setcellwidth() * Add include and suffixesadd * Page scrolling should place cursor at window boundaries * align command line table * minor fixes to starting.txt * fix comment definition in filetype plugin * filetype: flake.lock files are not recognized * runtime(uci): No support for uci file types * Support "g:ftplugin_java_source_path" with archived files * tests: Test_autoload_import_relative_compiled fails on Windows * Finding cmd modifiers and cmdline-specials is inefficient * No test that completing a partial mapping clears 'showcmd' * tests: test_vim9_dissamble may fail * Vim9: need static type for typealias * X11 does not ignore smooth scroll event * A few typos in test_xdg when testing gvimrc * Patch v9.1.0338 fixed sourcing a script with import * Problem: gvimrc not sourced from XDG_CONFIG_HOME * Cursor wrong after using setcellwidth() in terminal * 'showcmd' wrong for partial mapping with multibyte * tests: test_taglist fails when 'helplang' contains non-english * Problem: a few memory leaks are found * Problem: Error with matchaddpos() and empty list * tests: xdg test uses screen dumps * Vim9: import through symlinks not correctly handled * Missing entry for XDG vimrc file in :version * tests: typo in test_xdg * runtime(i3config/swayconfig): update syntax scripts * document pandoc compiler and enable configuring arguments * String interpolation fails for List type * No test for highlight behavior with 'ambiwidth' * tests: test_xdg fails on the appimage repo * tests: some assert_equal() calls have wrong order of args * make install does not install all files * runtime(doc): fix typos in starting.txt * Updated to version 9.1 with patch level 0330, fixes the following problems * Fixing bsc#1220763 - vim gets Segmentation fault after updating to version 9.1.0111-150500.20.9.1 For the complete list of changes see https://github.com/vim/vim/compare/v9.1.0111...v9.1.0330 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-217=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-217=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * vim-data-common-9.1.1101-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * vim-small-debuginfo-9.1.1101-1.1 * vim-small-9.1.1101-1.1 * vim-debugsource-9.1.1101-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * xxd-9.1.1101-1.1 * vim-debuginfo-9.1.1101-1.1 * xxd-debuginfo-9.1.1101-1.1 * vim-9.1.1101-1.1 * vim-debugsource-9.1.1101-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43374.html * https://www.suse.com/security/cve/CVE-2024-43790.html * https://www.suse.com/security/cve/CVE-2024-43802.html * https://www.suse.com/security/cve/CVE-2024-45306.html * https://www.suse.com/security/cve/CVE-2024-47814.html * https://www.suse.com/security/cve/CVE-2025-1215.html * https://www.suse.com/security/cve/CVE-2025-22134.html * https://www.suse.com/security/cve/CVE-2025-24014.html * https://bugzilla.suse.com/show_bug.cgi?id=1220763 * https://bugzilla.suse.com/show_bug.cgi?id=1229238 * https://bugzilla.suse.com/show_bug.cgi?id=1229685 * https://bugzilla.suse.com/show_bug.cgi?id=1229822 * https://bugzilla.suse.com/show_bug.cgi?id=1230078 * https://bugzilla.suse.com/show_bug.cgi?id=1231373 * https://bugzilla.suse.com/show_bug.cgi?id=1235695 * https://bugzilla.suse.com/show_bug.cgi?id=1236151 * https://bugzilla.suse.com/show_bug.cgi?id=1237137 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:26 -0000 Subject: SUSE-SU-2025:20133-1: important: Security update for pcp Message-ID: <174902720687.627.7193900834434462118@smelt2.prg2.suse.org> # Security update for pcp Announcement ID: SUSE-SU-2025:20133-1 Release Date: 2025-03-05T15:58:43Z Rating: important References: * bsc#1069468 * bsc#1217783 * bsc#1217826 * bsc#1222121 * bsc#1222815 * bsc#1230551 * bsc#1230552 Cross-References: * CVE-2023-6917 * CVE-2024-3019 * CVE-2024-45769 * CVE-2024-45770 CVSS scores: * CVE-2023-6917 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6917 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2023-6917 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-3019 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45769 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45770 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-45770 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45770 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has three fixes can now be installed. ## Description: This update for pcp fixes the following issues: * CVE-2024-45770: Fixed `pmpost` symlink attack allowing escalating `pcp` to `root` user (bsc#1230552). * CVE-2024-45769: Fixed `pmcd` heap corruption through metric pmstore operations (bsc#1230551). * CVE-2024-3019: Fixed exposure of the redis backend server allowing remote command execution via pmproxy (bsc#1222121). * CVE-2023-6917: Fixed Local privilege escalation from pcp user to root in /usr/libexec/pcp/lib/pmproxy (bsc#1217826). Other fixes: \- Updated to version 6.2.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-222=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libpcp3-debuginfo-6.2.0-1.1 * pcp-debugsource-6.2.0-1.1 * libpcp_import1-debuginfo-6.2.0-1.1 * libpcp_import1-6.2.0-1.1 * libpcp3-6.2.0-1.1 * SUSE Linux Micro 6.0 (noarch) * pcp-conf-6.2.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6917.html * https://www.suse.com/security/cve/CVE-2024-3019.html * https://www.suse.com/security/cve/CVE-2024-45769.html * https://www.suse.com/security/cve/CVE-2024-45770.html * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1217783 * https://bugzilla.suse.com/show_bug.cgi?id=1217826 * https://bugzilla.suse.com/show_bug.cgi?id=1222121 * https://bugzilla.suse.com/show_bug.cgi?id=1222815 * https://bugzilla.suse.com/show_bug.cgi?id=1230551 * https://bugzilla.suse.com/show_bug.cgi?id=1230552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:10 -0000 Subject: SUSE-SU-2025:20123-1: moderate: Security update for cloud-regionsrv-client Message-ID: <174902725097.627.15951252750804942800@smelt2.prg2.suse.org> # Security update for cloud-regionsrv-client Announcement ID: SUSE-SU-2025:20123-1 Release Date: 2025-02-10T21:48:10Z Rating: moderate References: * bsc#1222985 * bsc#1227308 * bsc#1229137 * bsc#1229472 * bsc#1230615 * bsc#1232770 * bsc#1233333 * bsc#1234050 Affected Products: * SUSE Linux Micro 6.0 An update that has eight fixes can now be installed. ## Description: This update for cloud-regionsrv-client contains the following fixes: * Update to 10.3.11 (bsc#1234050) * Send registration code for the extensions, not only base product * Update to 10.3.9: (bsc#1234050) * Send registration code for the extensions, not only base product * Update to 10.3.8: (bsc#1233333) * Fix the package requirements for cloud-regionsrv-client * Follow changes to suseconnect error reporting from stdout to stderr * Update to 10.3.7: (bsc#1232770) * Fix the product triplet for LTSS, it is always SLES-LTSS, not $BASEPRODUCT- LTSS * Update to 10.3.6: (jsc#PCT-471, bsc#1230615) * Fix sudo setup ~ permissions cloudguestregistryauth ~ directory ownership /etc/sudoers.d * spec file ~ Remove traces of registry related entries on SLE 12 * Forward port ~ fix for sles12 disable registry ~ fix for sles12 no trans_update * Deregister non free extensions at registercloudguest --clean * Fix registry cleanup at registercloudguest --clean, don't remove files * Prevent duplicate search entries in registry setup * Update EC2 plugin to 1.0.5 * Switch to using the region endpoint from IMDS to determine the region instead of deriving the data from the availability zone * Update to 10.3.5: * Update spec file to build in all code streams and have proper dependencies. * Update to 10.3.4: * Modify the message when network access over a specific IP version does not work. This is an informational message and should not look like an error * Inform the user that LTSS registration takes a little longer * fix for sles12 no transactional update: * SLE 12 family has no products with transactional-update we do not need to look for this condition * From 10.3.3: (bsc#1229472) * Handle changes in process structure to properly identify the running zypper parent process and only check for 1 PID * From 10.3.2: * Remove rgnsrv-clnt-fix-docker-setup patch included upstream * From 10.3.1: (jsc#PCT-400) * Add support for LTSS registration * Add fix for sles12 disable registry issue: ~ No container support in SLE 12 * Add fix for docker setup: (bsc#1229137) * The entry for the update infrastructure registry mirror was written incorrectly causing docker daemon startup to fail. * Update to version 10.3.0: (bsc#1227308, bsc#1222985) * Add support for sidecar registry Podman and rootless Docker support to set up the necessary configuration for the container engines to run as defined * Add running command as root through sudoers file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-210=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * cloud-regionsrv-client-plugin-gce-1.0.0-3.1 * cloud-regionsrv-client-plugin-azure-2.0.0-3.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-3.1 * python311-toml-0.10.2-5.118 * cloud-regionsrv-client-10.3.11-3.1 * cloud-regionsrv-client-addon-azure-1.0.5-3.1 * cloud-regionsrv-client-generic-config-1.0.0-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222985 * https://bugzilla.suse.com/show_bug.cgi?id=1227308 * https://bugzilla.suse.com/show_bug.cgi?id=1229137 * https://bugzilla.suse.com/show_bug.cgi?id=1229472 * https://bugzilla.suse.com/show_bug.cgi?id=1230615 * https://bugzilla.suse.com/show_bug.cgi?id=1232770 * https://bugzilla.suse.com/show_bug.cgi?id=1233333 * https://bugzilla.suse.com/show_bug.cgi?id=1234050 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:53 -0000 Subject: SUSE-SU-2025:20126-1: moderate: Security update for unbound Message-ID: <174902723329.627.14932849807016690430@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2025:20126-1 Release Date: 2025-02-13T12:29:03Z Rating: moderate References: * bsc#1231284 Cross-References: * CVE-2024-8508 CVSS scores: * CVE-2024-8508 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-8508 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-8508 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for unbound fixes the following issues: * Update to 1.22.0: Features: * Add iter-scrub-ns, iter-scrub-cname and max-global-quota configuration options. * Merge patch to fix for glue that is outside of zone, with `harden- unverified-glue`, from Karthik Umashankar (Microsoft). Enabling this option protects the Unbound resolver against bad glue, that is unverified out of zone glue, by resolving them. It uses the records as last resort if there is no other working glue. * Add redis-command-timeout: 20 and redis-connect-timeout: 200, that can set the timeout separately for commands and the connection set up to the redis server. If they are not specified, the redis-timeout value is used. * Log timestamps in ISO8601 format with timezone. This adds the option `log- time-iso: yes` that logs in ISO8601 format. * DNS over QUIC. This adds `quic-port: 853` and `quic-size: 8m` that enable dnsoverquic, and the counters `num.query.quic` and `mem.quic` in the statistics output. The feature needs to be enabled by compiling with libngtcp2, with `--with-libngtcp2=path` and libngtcp2 needs openssl+quic, pass that with `--with-ssl=path` to compile unbound as well. Bug Fixes: * unbound-control-setup hangs while testing for openssl presence starting from version 1.21.0. * Fix error: "memory exhausted" when defining more than 9994 local-zones. * Fix documentation for cache_fill_missing function. * Fix Loads of logs: "validation failure: key for validation . is marked as invalid because of a previous" for non-DNSSEC signed zone. * Fix that when rpz is applied the message does not get picked up by the validator. That stops validation failures for the message. * Fix that stub-zone and forward-zone clauses do not exhaust memory for long content. * Fix to print port number in logs for auth zone transfer activities. * b.root renumbering. * Add new IANA trust anchor. * Fix config file read for dnstap-sample-rate. * Fix alloc-size and calloc-transposed-args compiler warnings. * Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled (RFC9077). * Fix dns64 with prefetch that the prefetch is stored in cache. * Attempt to further fix doh_downstream_buffer_size.tdir flakiness. * More clear text for prefetch and minimal-responses in the unbound.conf man page. * Fix cache update when serve expired is used. Expired records are favored over resolution and validation failures when serve-expired is used. * Fix negative cache NSEC3 parameter compares for zero length NSEC3 salt. * Fix unbound-control-setup hangs sometimes depending on the openssl version. * Fix Cannot override tcp-upstream and tls- upstream with forward-tcp-upstream and forward-tls-upstream. * Fix to limit NSEC TTL for messages from cachedb. Fix to limit the prefetch ttl for messages after a CNAME with short TTL. * Fix to disable detection of quic configured ports when quic is not compiled in. * Fix harden-unverified-glue for AAAA cache_fill_missing lookups. * Fix contrib/aaaa-filter-iterator for change in call signature for cache_fill_missing. * Fix to display warning if quic-port is set but dnsoverquic is not enabled when compiled. * Fix dnsoverquic to extend the number of streams when one is closed. * Fix for dnstap with dnscrypt and dnstap without dnsoverquic. * Fix for dnsoverquic and dnstap to use the correct dnstap environment. * Update to 1.21.1: Security Fixes: * CVE-2024-8508: unbounded name compression could lead to denial of service. (bsc#1231284) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-213=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libunbound8-1.22.0-1.1 * unbound-anchor-debuginfo-1.22.0-1.1 * libunbound8-debuginfo-1.22.0-1.1 * unbound-debugsource-1.22.0-1.1 * unbound-anchor-1.22.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8508.html * https://bugzilla.suse.com/show_bug.cgi?id=1231284 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:30 -0000 Subject: SUSE-SU-2025:20132-1: moderate: Security update for pam_u2f Message-ID: <174902721098.627.17305727854027784338@smelt2.prg2.suse.org> # Security update for pam_u2f Announcement ID: SUSE-SU-2025:20132-1 Release Date: 2025-03-04T08:28:30Z Rating: moderate References: * bsc#1233517 Cross-References: * CVE-2025-23013 CVSS scores: * CVE-2025-23013 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-23013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23013 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for pam_u2f fixes the following issues: * update to 1.3.2: * Relax authfile permission check to a warning instead of an error to prevent a breaking change locking existing users out of their systems. * update to 1.3.1: * CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()`(bsc#1233517). * Changed return value when nouserok is enabled and the user has no credentials, PAM_IGNORE is used instead of PAM_SUCCESS. * Hardened checks of authfile permissions. * Hardened checks for nouserok. * Improved debug messages. * Improved documentation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-221=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam_u2f-debugsource-1.3.2-1.1 * pam_u2f-1.3.2-1.1 * pam_u2f-debuginfo-1.3.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23013.html * https://bugzilla.suse.com/show_bug.cgi?id=1233517 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:23 -0000 Subject: SUSE-SU-2025:20118-1: important: Security update for dnsmasq Message-ID: <174902726394.627.1804021148417139951@smelt2.prg2.suse.org> # Security update for dnsmasq Announcement ID: SUSE-SU-2025:20118-1 Release Date: 2025-02-03T09:22:41Z Rating: important References: * bsc#1214884 * bsc#1219823 * bsc#1219826 Cross-References: * CVE-2023-28450 * CVE-2023-50387 * CVE-2023-50868 CVSS scores: * CVE-2023-28450 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-28450 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28450 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for dnsmasq fixes the following issues: * Update to 2.90: * CVE-2023-50387, CVE-2023-50868: Fixed a Denial Of Service while trying to validate specially crafted DNSSEC responses (bsc#1219823, bsc#1219826). * Fix reversion in --rev-server introduced in 2.88 which caused breakage if the prefix length is not exactly divisible by 8 (IPv4) or 4 (IPv6). * Fix possible SEGV when there server(s) for a particular domain are configured, but no server which is not qualified for a particular domain. * Set the default maximum DNS UDP packet sice to 1232. * Add --no-dhcpv4-interface and --no-dhcpv6-interface for better control over which interfaces are providing DHCP service. * Fix issue with stale caching * Add configurable caching for arbitrary RR-types. * Add --filter-rr option, to filter arbitrary RR-types. * SLP got dropped, remove config (bsc#1214884) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-185=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dnsmasq-debugsource-2.90-1.1 * dnsmasq-debuginfo-2.90-1.1 * dnsmasq-2.90-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-28450.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://bugzilla.suse.com/show_bug.cgi?id=1214884 * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:38 -0000 Subject: SUSE-SU-2025:20076-1: important: Security update for qemu Message-ID: <174902715865.655.4655790168178316361@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2025:20076-1 Release Date: 2025-02-03T09:05:12Z Rating: important References: * bsc#1224132 * bsc#1229007 * bsc#1229929 * bsc#1230140 * bsc#1230834 * bsc#1230915 * bsc#1231519 Cross-References: * CVE-2024-4693 * CVE-2024-7409 * CVE-2024-8354 * CVE-2024-8612 CVSS scores: * CVE-2024-4693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8612 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2024-8612 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has three fixes can now be installed. ## Description: This update for qemu fixes the following issues: * Bugfixes and CVEs: * hw/usb/hcd-ohci: Fix #1510, #303: pid not IN or OUT (bsc#1230834, CVE-2024-8354) * softmmu: Support concurrent bounce buffers (bsc#1230915, CVE-2024-8612) * system/physmem: Per-AddressSpace bounce buffering (bsc#1230915, CVE-2024-8612) * system/physmem: Propagate AddressSpace to MapClient helpers (bsc#1230915, CVE-2024-8612) * system/physmem: Replace qemu_mutex_lock() calls with QEMU_LOCK_GUARD (bsc#1230915, CVE-2024-8612) * Update version to 8.2.7 * Full changelog here: https://lore.kernel.org/qemu- devel/d9ff276f-f1ba-4e90-8343-a7a0dc2bf305 at tls.msk.ru/ * Fixes: bsc#1229007, CVE-2024-7409 bsc#1224132, CVE-2024-4693 * Some backports: gitlab: fix logic for changing docker tag on stable branches ui/sdl2: set swap interval explicitly when OpenGL is enabled hw/intc/arm_gic: fix spurious level triggered interrupts hw/audio/virtio- sound: fix heap buffer overflow tests/docker: update debian i686 and mipsel images to bookworm tests/docker: remove debian-armel-cross hw/display/vhost- user-gpu.c: fix vhost_user_gpu_chr_read() crypto: check gnutls & gcrypt support the requested pbkdf hash crypto: run qcrypto_pbkdf2_count_iters in a new thread softmmu/physmem: fix memory leak in dirty_memory_extend() target/ppc: Fix migration of CPUs with TLB_EMB TLB type gitlab: migrate the s390x custom machine to 22.04 target/hppa: Fix PSW V-bit packaging in cpu_hppa_get for hppa64 hw/audio/virtio-snd: fix invalid param check virtio- pci: Fix the use of an uninitialized irqfd * Fix bsc#1231519: * accel/kvm: check for KVM_CAP_READONLY_MEM on VM (bsc#1231519) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-93=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-hw-usb-host-debuginfo-8.2.7-1.1 * qemu-block-curl-8.2.7-1.1 * qemu-chardev-spice-8.2.7-1.1 * qemu-hw-display-qxl-debuginfo-8.2.7-1.1 * qemu-debugsource-8.2.7-1.1 * qemu-debuginfo-8.2.7-1.1 * qemu-hw-display-virtio-vga-8.2.7-1.1 * qemu-hw-usb-host-8.2.7-1.1 * qemu-pr-helper-debuginfo-8.2.7-1.1 * qemu-img-debuginfo-8.2.7-1.1 * qemu-tools-debuginfo-8.2.7-1.1 * qemu-ui-spice-core-8.2.7-1.1 * qemu-guest-agent-8.2.7-1.1 * qemu-ui-opengl-debuginfo-8.2.7-1.1 * qemu-tools-8.2.7-1.1 * qemu-block-curl-debuginfo-8.2.7-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.7-1.1 * qemu-hw-usb-redirect-8.2.7-1.1 * qemu-ksm-8.2.7-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.7-1.1 * qemu-audio-spice-debuginfo-8.2.7-1.1 * qemu-hw-display-virtio-gpu-8.2.7-1.1 * qemu-audio-spice-8.2.7-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.7-1.1 * qemu-ui-opengl-8.2.7-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.7-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.7-1.1 * qemu-8.2.7-1.1 * qemu-block-iscsi-8.2.7-1.1 * qemu-img-8.2.7-1.1 * qemu-pr-helper-8.2.7-1.1 * qemu-block-iscsi-debuginfo-8.2.7-1.1 * qemu-hw-display-qxl-8.2.7-1.1 * qemu-block-rbd-debuginfo-8.2.7-1.1 * qemu-block-rbd-8.2.7-1.1 * qemu-guest-agent-debuginfo-8.2.7-1.1 * qemu-block-ssh-debuginfo-8.2.7-1.1 * qemu-ui-spice-core-debuginfo-8.2.7-1.1 * qemu-block-ssh-8.2.7-1.1 * qemu-chardev-spice-debuginfo-8.2.7-1.1 * qemu-lang-8.2.7-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-accel-tcg-x86-debuginfo-8.2.7-1.1 * qemu-accel-tcg-x86-8.2.7-1.1 * qemu-x86-8.2.7-1.1 * qemu-x86-debuginfo-8.2.7-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-seabios-8.2.71.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.7-1.1 * qemu-vgabios-8.2.71.16.3_3_ga95067eb-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-8.2.7-1.1 * qemu-s390x-debuginfo-8.2.7-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-debuginfo-8.2.7-1.1 * qemu-arm-8.2.7-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4693.html * https://www.suse.com/security/cve/CVE-2024-7409.html * https://www.suse.com/security/cve/CVE-2024-8354.html * https://www.suse.com/security/cve/CVE-2024-8612.html * https://bugzilla.suse.com/show_bug.cgi?id=1224132 * https://bugzilla.suse.com/show_bug.cgi?id=1229007 * https://bugzilla.suse.com/show_bug.cgi?id=1229929 * https://bugzilla.suse.com/show_bug.cgi?id=1230140 * https://bugzilla.suse.com/show_bug.cgi?id=1230834 * https://bugzilla.suse.com/show_bug.cgi?id=1230915 * https://bugzilla.suse.com/show_bug.cgi?id=1231519 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:06 -0000 Subject: SUSE-RU-2025:20138-1: moderate: Recommended update for patterns-base Message-ID: <174902718648.627.11896089538726171130@smelt2.prg2.suse.org> # Recommended update for patterns-base Announcement ID: SUSE-RU-2025:20138-1 Release Date: 2025-03-10T13:37:11Z Rating: moderate References: * bsc#1232246 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for patterns-base fixes the following issues: * do not include busybox packages (bsc#1232246) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-228=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * patterns-base-fips-6.0-2.1 * patterns-base-base-6.0-2.1 * patterns-base-kvm_host-6.0-2.1 * patterns-base-transactional-6.0-2.1 * patterns-base-hardware-6.0-2.1 * patterns-base-salt_minion-6.0-2.1 * patterns-base-selinux-6.0-2.1 * patterns-base-cockpit-6.0-2.1 * patterns-base-bootloader-6.0-2.1 * patterns-base-sssd-ldap-6.0-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232246 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:31 -0000 Subject: SUSE-RU-2025:20114-1: moderate: Recommended update for ignition Message-ID: <174902727157.627.4965500370697979025@smelt2.prg2.suse.org> # Recommended update for ignition Announcement ID: SUSE-RU-2025:20114-1 Release Date: 2025-02-03T09:20:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for ignition fixes the following issues: Build with current GO. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-167=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * ignition-debuginfo-2.17.0-2.1 * ignition-2.17.0-2.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:18 -0000 Subject: SUSE-SU-2025:20135-1: important: Security update for glibc Message-ID: <174902719835.627.15747808698227855170@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20135-1 Release Date: 2025-03-05T16:31:27Z Rating: important References: * bsc#1233699 * bsc#1234665 * bsc#1236282 Cross-References: * CVE-2025-0395 CVSS scores: * CVE-2025-0395 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-0395 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0395 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2025-0395: Fixed buffer overflow in the assert() function (bsc#1236282). Other fixes: \- Fix underallocation of abort_msg_s struct \- Correctly determine livepatching support \- Remove nss-systemd from default nsswitch.conf (bsc#1233699) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-224=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * glibc-devel-2.38-8.1 * glibc-debugsource-2.38-8.1 * glibc-locale-2.38-8.1 * glibc-2.38-8.1 * glibc-devel-debuginfo-2.38-8.1 * glibc-locale-base-debuginfo-2.38-8.1 * glibc-locale-base-2.38-8.1 * glibc-debuginfo-2.38-8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0395.html * https://bugzilla.suse.com/show_bug.cgi?id=1233699 * https://bugzilla.suse.com/show_bug.cgi?id=1234665 * https://bugzilla.suse.com/show_bug.cgi?id=1236282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:17 -0000 Subject: SUSE-RU-2025:20121-1: moderate: Recommended update for ocl-icd Message-ID: <174902725751.627.2174418635045514556@smelt2.prg2.suse.org> # Recommended update for ocl-icd Announcement ID: SUSE-RU-2025:20121-1 Release Date: 2025-02-04T08:51:42Z Rating: moderate References: * jsc#PED-11441 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for ocl-icd fixes the following issues: Ship ocl-icd (libOpenCL1) in version 2.3.1. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-202=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libOpenCL1-2.3.1-1.1 * ocl-icd-debugsource-2.3.1-1.1 * libOpenCL1-debuginfo-2.3.1-1.1 ## References: * https://jira.suse.com/browse/PED-11441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:03 -0000 Subject: SUSE-RU-2025:20139-1: moderate: Recommended update for e2fsprogs Message-ID: <174902718392.627.5667839963474477055@smelt2.prg2.suse.org> # Recommended update for e2fsprogs Announcement ID: SUSE-RU-2025:20139-1 Release Date: 2025-03-10T13:39:05Z Rating: moderate References: * bsc#1223596 * bsc#1230145 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for e2fsprogs fixes the following issues: * resize2fs: Check number of group descriptors only if meta_bg is disabled (bsc#1230145) * EA Inode handling fixes * e2fsck: Add more checks for EA inode consistency (bsc#1223596) * e2fsck: Fix golden output of several tests (bsc#1223596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-229=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libext2fs2-1.47.0-3.1 * e2fsprogs-1.47.0-3.1 * e2fsprogs-debuginfo-1.47.0-3.1 * e2fsprogs-debugsource-1.47.0-3.1 * libcom_err2-debuginfo-1.47.0-3.1 * libcom_err2-1.47.0-3.1 * libext2fs2-debuginfo-1.47.0-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223596 * https://bugzilla.suse.com/show_bug.cgi?id=1230145 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:21 -0000 Subject: SUSE-SU-2025:20119-1: moderate: Security update for python-dnspython Message-ID: <174902726102.627.11971661663094538306@smelt2.prg2.suse.org> # Security update for python-dnspython Announcement ID: SUSE-SU-2025:20119-1 Release Date: 2025-02-03T09:22:41Z Rating: moderate References: * bsc#1222693 Cross-References: * CVE-2023-29483 CVSS scores: * CVE-2023-29483 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-dnspython fixes the following issues: * CVE-2023-29483: Fixed potential DoS via the Tudoor mechanism (bsc#1222693). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-186=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-dnspython-2.4.2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-29483.html * https://bugzilla.suse.com/show_bug.cgi?id=1222693 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:29 -0000 Subject: SUSE-RU-2025:20069-1: moderate: Recommended update for kernel-livepatch-tools Message-ID: <174902726918.655.2707184672326562465@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-tools Announcement ID: SUSE-RU-2025:20069-1 Release Date: 2025-02-03T09:02:05Z Rating: moderate References: * bsc#1223930 * bsc#1223966 * bsc#1231397 * bsc#1231422 Affected Products: * SUSE Linux Micro 6.0 An update that has four fixes can now be installed. ## Description: This update for kernel-livepatch-tools fixes the following issues: * Release version 1.5 * cache-cleaner: Correctly handle situation when there is no livepatch loaded (bsc#1231422) * klp-info-cache.service: Expand %%{_libexecdir} when setting ExecStart. The cache-cleaner script has been moved in SL Micro 6.0 (bsc#1231397) * klp.sh: Fix downgrade with skipped package version (bsc#1223966) * klp.sh: Exit with an error code when downgrade fails (bsc#1223930) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-70=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-livepatch-tools-1.5-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223930 * https://bugzilla.suse.com/show_bug.cgi?id=1223966 * https://bugzilla.suse.com/show_bug.cgi?id=1231397 * https://bugzilla.suse.com/show_bug.cgi?id=1231422 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:30 -0000 Subject: SUSE-RU-2025:20115-1: moderate: Recommended update for liburing Message-ID: <174902727022.627.3085052202248231857@smelt2.prg2.suse.org> # Recommended update for liburing Announcement ID: SUSE-RU-2025:20115-1 Release Date: 2025-02-03T09:20:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for liburing fixes the following issues: Update to 2.6: * Add getsockopt and setsockopt socket commands * Add test cases to test/hardlink * Man page fixes * Add futex support, and test cases * Add waitid support, and test cases * Add read multishot, and test cases * Add support for IORING_SETUP_NO_SQARRAY * Use IORING_SETUP_NO_SQARRAY as the default * Add support for IORING_OP_FIXED_FD_INSTALL * Add io_uring_prep_fixed_fd_install() helper * Support for napi busy polling * Improve/add test cases * Man page fixes * Add sample 'proxy' example Update to 2.5: * Add support for io_uring_prep_cmd_sock() * Add support for application allocated ring memory, for placing rings in huge mem. Available through io_uring_queue_init_mem(). * Add support for registered ring fds * Various documentation updates * Various fixes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-168=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * liburing-debugsource-2.6-1.1 * liburing2-2.6-1.1 * liburing2-debuginfo-2.6-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:50 -0000 Subject: SUSE-SU-2025:20143-1: important: Security update for podman Message-ID: <174902717019.627.17234093591404887441@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20143-1 Release Date: 2025-03-12T10:32:11Z Rating: important References: * bsc#1227052 * bsc#1236270 * bsc#1236507 * bsc#1237641 Cross-References: * CVE-2023-45288 * CVE-2024-11218 * CVE-2024-6104 * CVE-2024-9407 * CVE-2025-27144 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-11218 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-11218 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-11218 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-27144: Fixed gopkg.in/square/go-jose.v2,gopkg.in/go-jose/go- jose.v2,github.com/go-jose/go-jose/v4,github.com/go-jose/go-jose/v3: Go JOSE's Parsing Vulnerable to Denial of Service (bsc#1237641): * CVE-2024-11218: Fixed github.com/containers/buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (bsc#1236270): * CVE-2023-45288: Fixed golang.org/x/net/http2: close connections when receiving too many headers (bsc#1236507): * CVE-2024-6104: Fixed hashicorp/go-retryablehttp: url might write sensitive information to log file (bsc#1227052): ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-238=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-remote-debuginfo-4.9.5-3.1 * podman-4.9.5-3.1 * podman-remote-4.9.5-3.1 * podman-debuginfo-4.9.5-3.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-11218.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227052 * https://bugzilla.suse.com/show_bug.cgi?id=1236270 * https://bugzilla.suse.com/show_bug.cgi?id=1236507 * https://bugzilla.suse.com/show_bug.cgi?id=1237641 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:32 -0000 Subject: SUSE-SU-2025:20077-1: important: Security update for the Linux Kernel Message-ID: <174902715296.655.14869590367071305088@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20077-1 Release Date: 2025-02-03T09:05:12Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230413 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-1706 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46794 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 162 vulnerabilities, contains three features and has 49 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * Drop mm patches that caused regressions (bsc#1230413) * Enable livepatching related packages on -RT (jsc#PED-1706) * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Merge branch 'ALP-current' (0e26fa94003b) into 'ALP-current-RT' * Move fixes into sorted section (bsc#1230119) * Move s390 kabi patch into the kabi section * Move upstreamed SCSI patches into sorted section * Move upstreamed input patch into sorted section * Move upstreamed kaslr patch into sorted section * Move upstreamed nvme patches into sorted section * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * No -rt specific changes this merge. * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Replace git-fixes tag by bsc#1226507, patches.suse/md-Don-t-wait-for- MD_RECOVERY_NEEDED-for-HOT_REMOVE_DISK-ioctl-a1fd.patch (bsc#1226507). * Resort io_uring kABI patches These ended up in the wrong section. Push them to the right place, next to the other io_uring kabi patches. * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019) This reverts commit 571e4310e81312c847a5caee7e45e66aeea2a169. It breaks ACS on certain platforms. Even 6.11 is affected. So drop for now and investigate. * Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable- fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" This reverts commit 16ad73a9f4c2888f3bc28513f5e9a88d753f8741. * Revert "mm/sparsemem: fix race in accessing memory_section->usage" This reverts commit 6aa8957889611fbe7f06353f917cfb3d9620a680. * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" This reverts commit 35f619d3c421219e07bc89d2d6a37fbff25519fe. * Split kabi part of dm_blk_ioctl-implement-path-failover-for-SG_IO.patch * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (stable-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * Update patches.suse/af_unix-Fix-data-races-around-sk-sk_shutdown.patch (git- fixes bsc#1226846). * Update patches.suse/gfs2-Fix-NULL-pointer-dereference-in- gfs2_log_flush.patch (bsc#1230948) * Update patches.suse/powerpc-pseries-make-max-polling-consistent-for- long.patch (bsc#1215199 jsc#PED-10954). * Update patches.suse/security-integrity-fix-pointer-to-ESL-data-and-.patch (bsc#1012628 jsc#PED-5085 jsc#PED-10954). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blacklist.conf: ("KVM: arm64: Use TLBI_TTL_UNKNOWN in __kvm_tlb_flush_vmid_range()") (bsc#1229585) * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) Move patch into the sorted section. * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kABI: Workaround kABI change in patches.suse/iommu-dma-Trace-bounce-buffer- usage-when-mapping-buf.patch (git-fixes). * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-84=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-84=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-11.1 * kernel-source-rt-6.4.0-11.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-11.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-debuginfo-6.4.0-11.1 * kernel-rt-debugsource-6.4.0-11.1 * kernel-livepatch-6_4_0-11-rt-1-1.2 * kernel-rt-livepatch-6.4.0-11.1 * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-1-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-1-1.2 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-11.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-11.1 * kernel-rt-devel-debuginfo-6.4.0-11.1 * kernel-rt-debugsource-6.4.0-11.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-1706 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:21 -0000 Subject: SUSE-SU-2025:20072-1: moderate: Security update for opensc Message-ID: <174902726112.655.11056647238118619027@smelt2.prg2.suse.org> # Security update for opensc Announcement ID: SUSE-SU-2025:20072-1 Release Date: 2025-02-03T09:03:35Z Rating: moderate References: * bsc#1230071 * bsc#1230072 * bsc#1230073 * bsc#1230074 * bsc#1230075 * bsc#1230076 * bsc#1230364 Cross-References: * CVE-2024-45615 * CVE-2024-45616 * CVE-2024-45617 * CVE-2024-45618 * CVE-2024-45619 * CVE-2024-45620 * CVE-2024-8443 CVSS scores: * CVE-2024-45615 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45615 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45615 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45615 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45616 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45617 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45618 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45619 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45620 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-8443 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8443 ( SUSE ): 3.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-8443 ( NVD ): 2.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-8443 ( NVD ): 2.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities can now be installed. ## Description: This update for opensc fixes the following issues: * CVE-2024-8443: Fixed heap buffer overflow in OpenPGP driver when generating key (bsc#1230364) * CVE-2024-45620: Fixed incorrect handling of the length of buffers or files in pkcs15init (bsc#1230076) * CVE-2024-45619: Fixed incorrect handling length of buffers or files in libopensc (bsc#1230075) * CVE-2024-45618: Fixed uninitialized values after incorrect or missing checking return values of functions in pkcs15init (bsc#1230074) * CVE-2024-45617: Fixed uninitialized values after incorrect or missing checking return values of functions in libopensc (bsc#1230073) * CVE-2024-45616: Fixed uninitialized values after incorrect check or usage of APDU response values in libopensc (bsc#1230072) * CVE-2024-45615: Fixed uninitialized values in libopensc and pkcs15init (bsc#1230071) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-137=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * opensc-debugsource-0.24.0-3.1 * opensc-debuginfo-0.24.0-3.1 * opensc-0.24.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45615.html * https://www.suse.com/security/cve/CVE-2024-45616.html * https://www.suse.com/security/cve/CVE-2024-45617.html * https://www.suse.com/security/cve/CVE-2024-45618.html * https://www.suse.com/security/cve/CVE-2024-45619.html * https://www.suse.com/security/cve/CVE-2024-45620.html * https://www.suse.com/security/cve/CVE-2024-8443.html * https://bugzilla.suse.com/show_bug.cgi?id=1230071 * https://bugzilla.suse.com/show_bug.cgi?id=1230072 * https://bugzilla.suse.com/show_bug.cgi?id=1230073 * https://bugzilla.suse.com/show_bug.cgi?id=1230074 * https://bugzilla.suse.com/show_bug.cgi?id=1230075 * https://bugzilla.suse.com/show_bug.cgi?id=1230076 * https://bugzilla.suse.com/show_bug.cgi?id=1230364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:21 -0000 Subject: SUSE-SU-2025:20134-1: important: Security update for gstreamer-plugins-base Message-ID: <174902720150.627.3262715632483970817@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2025:20134-1 Release Date: 2025-03-05T16:07:33Z Rating: important References: * bsc#1234415 * bsc#1234450 * bsc#1234453 * bsc#1234455 * bsc#1234456 * bsc#1234459 * bsc#1234460 Cross-References: * CVE-2024-47538 * CVE-2024-47541 * CVE-2024-47542 * CVE-2024-47600 * CVE-2024-47607 * CVE-2024-47615 * CVE-2024-47835 CVSS scores: * CVE-2024-47538 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47538 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47538 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47541 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47542 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47600 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47600 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47600 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47607 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47607 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47607 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47835 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47835 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-47538: Fixed stack-buffer overflow in vorbis_handle_identification_packet (bsc#1234415). * CVE-2024-47835: Fixed NULL-pointer dereference in LRC subtitle parser (bsc#1234450). * CVE-2024-47600: Fixed Out-of-bounds read in gst-discoverer-1.0 commandline tool (bsc#1234453). * CVE-2024-47607: Fixed Stack buffer-overflow in Opus decoder (bsc#1234455). * CVE-2024-47615: Fixed Out-of-bounds write in Ogg demuxer (bsc#1234456). * CVE-2024-47541: Fixed out-of-bounds write in SSA subtitle parser (bsc#1234459). * CVE-2024-47542: Fixed ID3v2 parser out-of-bounds read and NULL-pointer dereference (bsc#1234460). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-223=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgstapp-1_0-0-1.22.9-2.1 * libgstpbutils-1_0-0-debuginfo-1.22.9-2.1 * libgstgl-1_0-0-debuginfo-1.22.9-2.1 * libgsttag-1_0-0-debuginfo-1.22.9-2.1 * gstreamer-plugins-base-1.22.9-2.1 * libgstaudio-1_0-0-debuginfo-1.22.9-2.1 * libgstvideo-1_0-0-debuginfo-1.22.9-2.1 * libgstpbutils-1_0-0-1.22.9-2.1 * libgstallocators-1_0-0-1.22.9-2.1 * libgstaudio-1_0-0-1.22.9-2.1 * libgstapp-1_0-0-debuginfo-1.22.9-2.1 * libgstriff-1_0-0-debuginfo-1.22.9-2.1 * libgstriff-1_0-0-1.22.9-2.1 * libgstallocators-1_0-0-debuginfo-1.22.9-2.1 * gstreamer-plugins-base-debuginfo-1.22.9-2.1 * libgsttag-1_0-0-1.22.9-2.1 * gstreamer-plugins-base-debugsource-1.22.9-2.1 * libgstgl-1_0-0-1.22.9-2.1 * libgstvideo-1_0-0-1.22.9-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47538.html * https://www.suse.com/security/cve/CVE-2024-47541.html * https://www.suse.com/security/cve/CVE-2024-47542.html * https://www.suse.com/security/cve/CVE-2024-47600.html * https://www.suse.com/security/cve/CVE-2024-47607.html * https://www.suse.com/security/cve/CVE-2024-47615.html * https://www.suse.com/security/cve/CVE-2024-47835.html * https://bugzilla.suse.com/show_bug.cgi?id=1234415 * https://bugzilla.suse.com/show_bug.cgi?id=1234450 * https://bugzilla.suse.com/show_bug.cgi?id=1234453 * https://bugzilla.suse.com/show_bug.cgi?id=1234455 * https://bugzilla.suse.com/show_bug.cgi?id=1234456 * https://bugzilla.suse.com/show_bug.cgi?id=1234459 * https://bugzilla.suse.com/show_bug.cgi?id=1234460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:54 -0000 Subject: SUSE-SU-2025:20106-1: moderate: Security update for curl Message-ID: <174902729452.627.9775607287460555502@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20106-1 Release Date: 2025-02-03T09:18:10Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: Fixed password leak used for the first host to the followed- to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-166=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcurl4-debuginfo-8.6.0-5.1 * curl-debuginfo-8.6.0-5.1 * curl-8.6.0-5.1 * libcurl4-8.6.0-5.1 * curl-debugsource-8.6.0-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:35 -0000 Subject: SUSE-SU-2025:20067-1: moderate: Security update for libdb-4_8 Message-ID: <174902727516.655.17610246702164502280@smelt2.prg2.suse.org> # Security update for libdb-4_8 Announcement ID: SUSE-SU-2025:20067-1 Release Date: 2025-02-03T09:01:27Z Rating: moderate References: * bsc#1174414 Cross-References: * CVE-2019-2708 CVSS scores: * CVE-2019-2708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2019-2708 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libdb-4_8 fixes the following issues: CVE-2019-2708: Fixed data store execution leading to partial DoS (bsc#1174414) Changes: * libdb: Data store execution leads to partial DoS * Backport the upsteam commits: * Fixed several possible crashes when running db_verify on a corrupted database. [#27864] * Fixed several possible hangs when running db_verify on a corrupted database. [#27864] * Added a warning message when attempting to verify a queue database which has many extent files. Verification will take a long time if there are many extent files. [#27864] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-118=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libdb-4_8-4.8.30-7.1 * libdb-4_8-debugsource-4.8.30-7.1 * libdb-4_8-debuginfo-4.8.30-7.1 ## References: * https://www.suse.com/security/cve/CVE-2019-2708.html * https://bugzilla.suse.com/show_bug.cgi?id=1174414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:57 -0000 Subject: SUSE-SU-2025:20105-1: important: Security update for libsoup Message-ID: <174902729728.627.16657357884955114038@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20105-1 Release Date: 2025-02-03T09:17:48Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52531 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285). * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292). * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-165=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoup-debugsource-3.4.2-5.1 * libsoup-3_0-0-debuginfo-3.4.2-5.1 * libsoup-3_0-0-3.4.2-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:41 -0000 Subject: SUSE-SU-2025:20075-1: low: Security update for patch Message-ID: <174902716138.655.13398719909179638740@smelt2.prg2.suse.org> # Security update for patch Announcement ID: SUSE-SU-2025:20075-1 Release Date: 2025-02-03T09:04:34Z Rating: low References: * bsc#1167721 Cross-References: * CVE-2019-20633 CVSS scores: * CVE-2019-20633 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-20633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for patch fixes the following issues: * CVE-2019-20633: Fix double-free/OOB read in pch.c (bsc#1167721) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-83=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * patch-debuginfo-2.7.6-3.1 * patch-2.7.6-3.1 * patch-debugsource-2.7.6-3.1 ## References: * https://www.suse.com/security/cve/CVE-2019-20633.html * https://bugzilla.suse.com/show_bug.cgi?id=1167721 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:32 -0000 Subject: SUSE-RU-2025:20113-1: moderate: Recommended update for catatonit Message-ID: <174902727261.627.1941697181580612444@smelt2.prg2.suse.org> # Recommended update for catatonit Announcement ID: SUSE-RU-2025:20113-1 Release Date: 2025-02-03T09:19:58Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for catatonit fixes the following issues: Update to catatonit v0.2.0. * Change license to GPL-2.0-or-later. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-170=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * catatonit-0.2.0-1.1 * catatonit-debugsource-0.2.0-1.1 * catatonit-debuginfo-0.2.0-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:46 -0000 Subject: SUSE-RU-2025:20063-1: critical: Recommended update for perl-Bootloader Message-ID: <174902728626.655.10439929152182283345@smelt2.prg2.suse.org> # Recommended update for perl-Bootloader Announcement ID: SUSE-RU-2025:20063-1 Release Date: 2025-02-03T08:59:05Z Rating: critical References: * bsc#1215064 * bsc#1221470 * bsc#1230070 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for perl-Bootloader fixes the following issues: * handle missing grub_installdevice on powerpc (bsc#1230070) * log grub2-install errors correctly (bsc#1221470) * skip warning about unsupported options when in compat mode * bootloader_entry script can have an optional 'force-default' argument (bsc#1215064) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-78=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * perl-Bootloader-1.8.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215064 * https://bugzilla.suse.com/show_bug.cgi?id=1221470 * https://bugzilla.suse.com/show_bug.cgi?id=1230070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:46 -0000 Subject: SUSE-SU-2025:20074-1: important: Security update for protobuf Message-ID: <174902716609.655.2069115043683664045@smelt2.prg2.suse.org> # Security update for protobuf Announcement ID: SUSE-SU-2025:20074-1 Release Date: 2025-02-03T09:04:21Z Rating: important References: * bsc#1230778 Cross-References: * CVE-2024-7254 CVSS scores: * CVE-2024-7254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7254 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for protobuf fixes the following issues: * CVE-2024-7254: Fixed a stack overflow vulnerability in protocol buffers (bsc#1230778) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-91=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libprotobuf23_4_0-23.4-8.1 * libprotobuf-lite23_4_0-23.4-8.1 * libprotobuf23_4_0-debuginfo-23.4-8.1 * protobuf-debugsource-23.4-8.1 * libprotobuf-lite23_4_0-debuginfo-23.4-8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7254.html * https://bugzilla.suse.com/show_bug.cgi?id=1230778 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:56 -0000 Subject: SUSE-SU-2025:20058-1: moderate: Security update for ucode-intel Message-ID: <174902729692.655.2776668153638960997@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20058-1 Release Date: 2025-02-03T08:57:28Z Rating: moderate References: * bsc#1230400 Cross-References: * CVE-2024-23984 * CVE-2024-24968 CVSS scores: * CVE-2024-23984 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-23984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-23984 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23984 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-24968 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-24968 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-24968 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-24968 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20240910 release (bsc#1230400) * CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access. * CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access ### New Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products TWL N0 06-be-00/19 0000001a Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E ### Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000035 00000036 Core Gen12 ADL H0 06-97-05/07 00000035 00000036 Core Gen12 ADL L0 06-9a-03/80 00000433 00000434 Core Gen12 ADL R0 06-9a-04/80 00000433 00000434 Core Gen12 ADL-N N0 06-be-00/11 00000017 0000001a Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E MTL C0 06-aa-04/e6 0000001e 0000001f Core Ultra Processor RPL-E/HX/S B0 06-b7-01/32 00000123 00000129 Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004121 00004122 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000035 00000036 Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000035 00000036 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004121 00004122 Core Gen13 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-54=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20240910-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23984.html * https://www.suse.com/security/cve/CVE-2024-24968.html * https://bugzilla.suse.com/show_bug.cgi?id=1230400 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:53 -0000 Subject: SUSE-RU-2025:20142-1: moderate: Recommended update for amazon-dracut-config Message-ID: <174902717315.627.4796802650042202214@smelt2.prg2.suse.org> # Recommended update for amazon-dracut-config Announcement ID: SUSE-RU-2025:20142-1 Release Date: 2025-03-11T14:15:18Z Rating: moderate References: * bsc#1232024 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for amazon-dracut-config fixes the following issues: * Initial release for amazon-dracut config on Micro 6.0: Already include the following fixes: * Update to 0.0.4: * Move dracut config files to usr/lib/ dir * Update to 0.0.3: * Add provides and conflicts on generic name dracut-instance-change-config * Update to 0.0.2: * Rename config for nvme for consistency * Add dracut build requirement * Initial release v0.0.1 (PED-11572) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-237=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * amazon-dracut-config-0.0.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232024 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:49 -0000 Subject: SUSE-SU-2025:20108-1: important: Security update for nvidia-open-driver-G06-signed Message-ID: <174902728946.627.8498963220581835838@smelt2.prg2.suse.org> # Security update for nvidia-open-driver-G06-signed Announcement ID: SUSE-SU-2025:20108-1 Release Date: 2025-02-03T09:19:19Z Rating: important References: * bsc#1222972 * bsc#1223356 * bsc#1223454 * bsc#1227417 * bsc#1227419 * bsc#1227575 * bsc#1229716 * bsc#1230368 * bsc#1230779 * bsc#1232057 * bsc#1233332 * bsc#1233673 Cross-References: * CVE-2024-0090 * CVE-2024-0091 * CVE-2024-0092 CVSS scores: * CVE-2024-0090 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-0090 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0091 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0091 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0092 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities and has nine fixes can now be installed. ## Description: This update for nvidia-open-driver-G06-signed fixes the following issues: * Make sure the correct FW package is installed on non-CUDA. * only obsolete 555 CUDA driver/firmware packages * For CUDA: update version to 565.57.01 * Add 'dummy' firmware package on SLE to work around update issues. On SLE, the firmware is installed directly from an NVIDIA-hosted repo. * Improve handling of conflicts between different flavors (gfx vs. CUDA) (bsc#1233332). * Update to 550.135 (bsc#1233673) * Update to 550.127.05 (bsc#1232057) * Fixed a bug which could cause applications using GBM to crash when running with nvidia-drm.modeset=0. * cuda-flavor provide also nvidia-open-driver-G06-kmp-$flavor = %version to workaround broken cuda-drivers * For CUDA update version to 560.35.03 * nv-prefer-signed-open-driver: * added specicic versions of cuda-drivers/cuda-drivers-xxx as preconditions for requiring specific version of nvidia-compute-G06 * nv-prefer-signed-open-driver: * no longer require a specific version of nvidia-open-driver-G06-signed-cuda- kmp, so it can select the correct open driver KMP matching the cuda-runtime version * cuda-flavor: * added nvidia-compute-G06 = %version to preconditions for requiring kernel- firmware-nvidia-gspx-G06, since nvidia-compute-utils-G06 does not have a version-specific requires on nvidia-compute-G06 * cuda-flavor: * require kernel-firmware-nvidia-gspx-G06 instead of kernel-firmware-nvidia- gspx-G06-cuda (which provides also kernel-firmware-nvidia-gspx-G06) * trigger removal of driver modules also on kernel-firmware-nvidia-gspx-G06 * no longer hard-require kernel firmware package, but install it automatically once nvidia-compute-utils-G06 gets installed * trigger removal of driver modules with non-existing or wrong firmware when (new) firmware gets installed * Update to 550.120 (bsc#1230779) * Fixed a bug that could cause kernel crashes upon attempting KMS operations through DRM when nvidia_drm was loaded with modeset=0. * CUDA build: removed entries from pci_ids-555.42.06 since this is doing more harm than benefit (bsc#1230368) * For CUDA (preamble file): * added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version which is needed for 'zypper install = ' * added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor = %version useful for containers * reverted CUDA update version to 560.x.y due to changes in CUDA repository with CUDA 12.6/560.x.y drivers * For CUDA update version to 560.35.03 * Update to 550.107.02 (bsc#1229716) * For CUDA update version to 560.28.03 * Update to 550.100 (bsc#1227575) * Fixed a bug that caused OpenGL triple buffering to behave like double buffering. * To avoid issues with missing dependencies when no CUDA repo is present make the dependecy to nvidia-compute-G06 conditional. * CUDA is not available for Tumbleweed, exclude the build of the cuda flavor. * preamble: let the -cuda flavor KMP require the -cuda flavor firmware * Add a second flavor for building the kernel module versions used by CUDA. The kmp targetting CUDA contains '-cuda' in its name to track its versions separately from the graphics kmp. (bsc#1227417) * Provide the meta package nv-prefer-signed-open-driver to make sure the latest available SUSE-build open driver is installed - independent of the latest available open driver version in he CUDA repository. Rationale: The package cuda-runtime provides the link between CUDA and the kernel driver version through a Requires: cuda-drivers >= %version This implies that a CUDA version will run withany kernel driver version equal or higher than a base version. nvidia-compute-G06 provides the glue layer between CUDA and a specific version of he kernel driver both by providing a set of base libraries and by requiring a specific kernel version. 'cuda-drivers' (provided by nvidia-compute-utils-G06) requires an unversioned nvidia- compute-G06. With this, the resolver will install the latest available and applicable nvidia-compute-G06. nv-prefer-signed-open-driver then represents the latest available open driver version and restricts the nvidia- compute-G06 version to it. (bsc#1227419) * Security Update 550.90.07 (bsc#1223356) [CVE-2024-0090, CVE-2024-0091, CVE-2024-0092] * Update to 550.78 (bsc#1223454) * Update to 550.76 (bsc#1222972) * Update to 550.67 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-174=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-550.142_k6.4.0_20-1.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.142_k6.4.0_20-1.1 * nvidia-open-driver-G06-signed-debugsource-550.142-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0090.html * https://www.suse.com/security/cve/CVE-2024-0091.html * https://www.suse.com/security/cve/CVE-2024-0092.html * https://bugzilla.suse.com/show_bug.cgi?id=1222972 * https://bugzilla.suse.com/show_bug.cgi?id=1223356 * https://bugzilla.suse.com/show_bug.cgi?id=1223454 * https://bugzilla.suse.com/show_bug.cgi?id=1227417 * https://bugzilla.suse.com/show_bug.cgi?id=1227419 * https://bugzilla.suse.com/show_bug.cgi?id=1227575 * https://bugzilla.suse.com/show_bug.cgi?id=1229716 * https://bugzilla.suse.com/show_bug.cgi?id=1230368 * https://bugzilla.suse.com/show_bug.cgi?id=1230779 * https://bugzilla.suse.com/show_bug.cgi?id=1232057 * https://bugzilla.suse.com/show_bug.cgi?id=1233332 * https://bugzilla.suse.com/show_bug.cgi?id=1233673 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:54 -0000 Subject: SUSE-SU-2025:20059-1: moderate: Security update for libpcap Message-ID: <174902729492.655.7875863682627065620@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2025:20059-1 Release Date: 2025-02-03T08:57:44Z Rating: moderate References: * bsc#1230020 * bsc#1230034 Cross-References: * CVE-2023-7256 * CVE-2024-8006 CVSS scores: * CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2024-8006: Fixed NULL pointer dereference in pcap_findalldevs_ex() (bsc#1230034) * CVE-2023-7256: Fixed double free via addrinfo in sock_initaddress() (bsc#1230020) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-50=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.10.4-3.1 * libpcap-debugsource-1.10.4-3.1 * libpcap1-1.10.4-3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7256.html * https://www.suse.com/security/cve/CVE-2024-8006.html * https://bugzilla.suse.com/show_bug.cgi?id=1230020 * https://bugzilla.suse.com/show_bug.cgi?id=1230034 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:07 -0000 Subject: SUSE-SU-2025:20124-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <174902724722.627.13939560117042046570@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2025:20124-1 Release Date: 2025-02-13T08:40:08Z Rating: moderate References: * bsc#1228182 * bsc#1228690 * bsc#1229079 * bsc#1229104 * bsc#1231497 * bsc#1231568 * bsc#1231618 * bsc#1231759 * bsc#1232575 * bsc#1232769 * bsc#1232817 * bsc#1233202 * bsc#1233279 * bsc#1233630 * bsc#1233660 * bsc#1233667 * bsc#1234123 * jsc#MSQA-914 Cross-References: * CVE-2024-22037 CVSS scores: * CVE-2024-22037 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L * CVE-2024-22037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-22037 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-22037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability, contains one feature and has 16 fixes can now be installed. ## Description: This update fixes the following issues: salt: * Revert setting SELinux context for minion service (bsc#1233667) * Removed System V init support * Fix the condition of alternatives for Tumbleweed and Leap 16 * Build all python bindings for all flavors * Make minion reconnecting on changing master IP (bsc#1228182) * Handle logger exception when flushing already closed file * Include passlib as a recommended dependency * Make Salt Bundle more tolerant to long running jobs (bsc#1228690) uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0: * Security issues fixed: * CVE-2024-22037: Use podman secret to store the database credentials (bsc#1231497) * Other changes and bugs fixed: * Version 0.1.27-0 * Bump the default image tag to 5.0.3 * IsInstalled function fix * Run systemctl daemon-reload after changing the container image config (bsc#1233279) * Coco-replicas-upgrade * Persist search server indexes (bsc#1231759) * Sync deletes files during migration (bsc#1233660) * Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079) * Add --registry back to mgrpxy (bsc#1233202) * Only add java.hostname on migrated server if not present * Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104) * Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630) * Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123) * Version 0.1.26-0 * Ignore all zypper caches during migration (bsc#1232769) * Use the uyuni network for all podman containers (bsc#1232817) * Version 0.1.25-0 * Don't migrate enabled systemd services, recreate them (bsc#1232575) * Version 0.1.24-0 * Redact JSESSIONID and pxt-session-cookie values from logs and console output (bsc#1231568) venv-salt-minion: * Included D-Bus python module for SUSE distros (bsc#1231618) * Reverted setting SELinux context for minion service (bsc#1233667) * Make minion reconnecting on changing master IP (bsc#1228182) * Fixed post_start_cleanup.sh shebang to work on all systems * Handle logger exception when flushing already closed file * Made Salt Bundle more tolerant to long running jobs (bsc#1228690) * Modified: * include-rpm * filter-requires.sh ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-211=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-minion-3006.0-9.1 * salt-3006.0-9.1 * python311-salt-3006.0-9.1 * salt-master-3006.0-9.1 * salt-transactional-update-3006.0-9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22037.html * https://bugzilla.suse.com/show_bug.cgi?id=1228182 * https://bugzilla.suse.com/show_bug.cgi?id=1228690 * https://bugzilla.suse.com/show_bug.cgi?id=1229079 * https://bugzilla.suse.com/show_bug.cgi?id=1229104 * https://bugzilla.suse.com/show_bug.cgi?id=1231497 * https://bugzilla.suse.com/show_bug.cgi?id=1231568 * https://bugzilla.suse.com/show_bug.cgi?id=1231618 * https://bugzilla.suse.com/show_bug.cgi?id=1231759 * https://bugzilla.suse.com/show_bug.cgi?id=1232575 * https://bugzilla.suse.com/show_bug.cgi?id=1232769 * https://bugzilla.suse.com/show_bug.cgi?id=1232817 * https://bugzilla.suse.com/show_bug.cgi?id=1233202 * https://bugzilla.suse.com/show_bug.cgi?id=1233279 * https://bugzilla.suse.com/show_bug.cgi?id=1233630 * https://bugzilla.suse.com/show_bug.cgi?id=1233660 * https://bugzilla.suse.com/show_bug.cgi?id=1233667 * https://bugzilla.suse.com/show_bug.cgi?id=1234123 * https://jira.suse.com/browse/MSQA-914 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:15 -0000 Subject: SUSE-SU-2025:20136-1: important: Security update for pcr-oracle, shim Message-ID: <174902719556.627.3733698936291626042@smelt2.prg2.suse.org> # Security update for pcr-oracle, shim Announcement ID: SUSE-SU-2025:20136-1 Release Date: 2025-03-07T15:31:39Z Rating: important References: * bsc#1215098 * bsc#1215099 * bsc#1215100 * bsc#1215101 * bsc#1215102 * bsc#1215103 * bsc#1230316 Cross-References: * CVE-2023-40546 * CVE-2023-40547 * CVE-2023-40548 * CVE-2023-40549 * CVE-2023-40550 * CVE-2023-40551 CVSS scores: * CVE-2023-40546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40546 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40547 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40547 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2023-40547 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2023-40548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-40548 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-40548 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-40549 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40549 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40550 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-40550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-40550 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-40551 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40551 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-40551 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities and has one fix can now be installed. ## Description: This update for pcr-oracle, shim fixes the following issues: pcr-oracle: * predict SbatLevelRT for the next boot (bsc#1230316) shim was updated to version 15.8: * Update shim-install to use the 'removable' way for encrypted SL-Micro images (bsc#1230316) * Always use the removable way for SL-Micro * Limit the removable option to encrypted SL-Micro Security issues fixed: * mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546) * avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547) * Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548) * Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549) * pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550) * pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-225=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * shim-15.8-1.1 * pcr-oracle-debugsource-0.4.6-2.1 * pcr-oracle-0.4.6-2.1 * pcr-oracle-debuginfo-0.4.6-2.1 * shim-debugsource-15.8-1.1 * shim-debuginfo-15.8-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40546.html * https://www.suse.com/security/cve/CVE-2023-40547.html * https://www.suse.com/security/cve/CVE-2023-40548.html * https://www.suse.com/security/cve/CVE-2023-40549.html * https://www.suse.com/security/cve/CVE-2023-40550.html * https://www.suse.com/security/cve/CVE-2023-40551.html * https://bugzilla.suse.com/show_bug.cgi?id=1215098 * https://bugzilla.suse.com/show_bug.cgi?id=1215099 * https://bugzilla.suse.com/show_bug.cgi?id=1215100 * https://bugzilla.suse.com/show_bug.cgi?id=1215101 * https://bugzilla.suse.com/show_bug.cgi?id=1215102 * https://bugzilla.suse.com/show_bug.cgi?id=1215103 * https://bugzilla.suse.com/show_bug.cgi?id=1230316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:32 -0000 Subject: SUSE-SU-2025:20068-1: moderate: Security update for tiff Message-ID: <174902727253.655.10638666311414686854@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:20068-1 Release Date: 2025-02-03T09:01:28Z Rating: moderate References: * bsc#1228924 Cross-References: * CVE-2024-7006 CVSS scores: * CVE-2024-7006 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2024-7006: Fix pointer deref in tif_dirinfo.c [bsc#1228924] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-89=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtiff6-debuginfo-4.6.0-4.1 * libtiff6-4.6.0-4.1 * tiff-debugsource-4.6.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7006.html * https://bugzilla.suse.com/show_bug.cgi?id=1228924 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:52:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:52:25 -0000 Subject: SUSE-SU-2025:20154-1: important: Security update for python311 Message-ID: <174902714572.627.13055038660792708212@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:20154-1 Release Date: 2025-03-19T11:45:10Z Rating: important References: * bsc#1174091 * bsc#1210638 * bsc#1219559 * bsc#1219666 * bsc#1221854 * bsc#1225660 * bsc#1226447 * bsc#1226448 * bsc#1227378 * bsc#1227999 * bsc#1228165 * bsc#1228780 * bsc#1229596 * bsc#1229704 * bsc#1230227 * bsc#1230906 * bsc#1231795 * bsc#1232241 * bsc#1236705 * bsc#1238450 * bsc#1239210 * bsc#831629 Cross-References: * CVE-2019-20907 * CVE-2019-9947 * CVE-2020-15523 * CVE-2020-15801 * CVE-2022-25236 * CVE-2023-27043 * CVE-2023-52425 * CVE-2023-6597 * CVE-2024-0397 * CVE-2024-0450 * CVE-2024-4030 * CVE-2024-4032 * CVE-2024-6232 * CVE-2024-6923 * CVE-2024-7592 * CVE-2024-8088 * CVE-2024-9287 * CVE-2025-0938 * CVE-2025-1795 CVSS scores: * CVE-2019-20907 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2019-20907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-9947 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2020-15523 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-15801 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6597 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0397 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0397 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-0450 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0450 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4030 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-6923 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9287 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9287 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0938 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-0938 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-1795 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves 19 vulnerabilities and has three fixes can now be installed. ## Description: This update for python311 fixes the following issues: * Skip PGO with %want_reproducible_builds (bsc#1239210) * CVE-2025-0938: Disallows square brackets ([ and ]) in domain names for parsed URLs (bsc#1236705). * Configure externally_managed with a bcond (bsc#1228165). * Update to 3.11.11: * Tools/Demos * gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15 and multissltests to use 3.0.15, 3.1.7, and 3.2.3. * Tests * gh-125041: Re-enable skipped tests for zlib on the s390x architecture: only skip checks of the compressed bytes, which can be different between zlib?s software implementation and the hardware-accelerated implementation. * Security * gh-126623: Upgrade libexpat to 2.6.4 * gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to consistently use the mapped IPv4 address value for deciding properties. Properties which have their behavior fixed are is_multicast, is_reserved, is_link_local, is_global, and is_unspecified. * Library * gh-124651: Properly quote template strings in venv activation scripts (bsc#1232241, CVE-2024-9287). * Remove -IVendor/ from python-config (bsc#1231795) * CVE-2024-9287: Properly quote path names provided when creating a virtual environment (bsc#1232241) * Drop .pyc files from docdir for reproducible builds (bsc#1230906). * Update to 3.11.10: * Security * gh-123678: Upgrade libexpat to 2.6.3 * gh-121957: Fixed missing audit events around interactive use of Python, now also properly firing for `python -i`, as well as for `python -m asyncio`. The event in question is `cpython.run_stdin`. * gh-122133: Authenticate the socket connection for the `socket.socketpair()` fallback on platforms where `AF_UNIX` is not available like Windows. Patch by Gregory P. Smith and Seth Larson . Reported by Ellie * gh-121285: Remove backtracking from tarfile header parsing for `hdrcharset`, PAX, and GNU sparse headers (bsc#1230227, CVE-2024-6232). * gh-118486: :func:`os.mkdir` on Windows now accepts _mode_ of `0o700` to restrict the new directory to the current user. This fixes CVE-2024-4030 affecting :func:`tempfile.mkdtemp` in scenarios where the base temporary directory is more permissive than the default. * gh-116741: Update bundled libexpat to 2.6.2 * Library * gh-123270: Applied a more surgical fix for malformed payloads in :class:`zipfile.Path` causing infinite loops (gh-122905) without breaking contents using legitimate characters (bsc#1229704, CVE-2024-8088). * gh-123067: Fix quadratic complexity in parsing `"`-quoted cookie values with backslashes by :mod:`http.cookies` (bsc#1229596, CVE-2024-7592). * gh-122905: :class:`zipfile.Path` objects now sanitize names from the zipfile. * gh-121650: :mod:`email` headers with embedded newlines are now quoted on output. The :mod:`~email.generator` will now refuse to serialize (write) headers that are unsafely folded or delimited; see :attr:`~email.policy.Policy.verify_generated_headers`. (Contributed by Bas Bloemsaat and Petr Viktorin in :gh:`121650`; CVE-2024-6923, bsc#1228780). * gh-119506: Fix :meth:`!io.TextIOWrapper.write` method breaks internal buffer when the method is called again during flushing internal buffer. * gh-118643: Fix an AttributeError in the :mod:`email` module when re-fold a long address list. Also fix more cases of incorrect encoding of the address separator in the address list. * gh-113171: Fixed various false positives and false negatives in * :attr:`ipaddress.IPv4Address.is_private` (see these docs for details) * :attr:`ipaddress.IPv4Address.is_global` * :attr:`ipaddress.IPv6Address.is_private` * :attr:`ipaddress.IPv6Address.is_global` Also in the corresponding :class:`ipaddress.IPv4Network` and :class:`ipaddress.IPv6Network` attributes. Fixes bsc#1226448 (CVE-2024-4032). * gh-102988: :func:`email.utils.getaddresses` and :func:`email.utils.parseaddr` now return `('', '')` 2-tuples in more situations where invalid email addresses are encountered instead of potentially inaccurate values. Add optional _strict_ parameter to these two functions: use `strict=False` to get the old behavior, accept malformed inputs. `getattr(email.utils, 'supports_strict_parsing', False)` can be use to check if the _strict_ paramater is available. Patch by Thomas Dwyer and Victor Stinner to improve the CVE-2023-27043 fix (bsc#1210638). * gh-67693: Fix :func:`urllib.parse.urlunparse` and :func:`urllib.parse.urlunsplit` for URIs with path starting with multiple slashes and no authority. Based on patch by Ashwin Ramaswami. * Core and Builtins * gh-112275: A deadlock involving `pystate.c`'s `HEAD_LOCK` in `posixmodule.c` at fork is now fixed. Patch by ChuBoning based on previous Python 3.12 fix by Victor Stinner. * gh-109120: Added handle of incorrect star expressions, e.g `f(3, *)`. Patch by Grigoryev Semyon * CVE-2024-8088: Prevent malformed payload to cause infinite loops in zipfile.Path (bsc#1229704). * Make pip and modern tools install directly in /usr/local when used by the user. (bsc#1225660). * CVE-2024-4032: Fix rearranging definition of private v global IP addresses (bsc#1226448). * Update to 3.11.9: * Security * gh-115398: Allow controlling Expat >=2.6.0 reparse deferral (CVE-2023-52425, bsc#1219559) by adding five new methods: xml.etree.ElementTree.XMLParser.flush() xml.etree.ElementTree.XMLPullParser.flush() xml.parsers.expat.xmlparser.GetReparseDeferralEnabled() xml.parsers.expat.xmlparser.SetReparseDeferralEnabled() xml.sax.expatreader.ExpatParser.flush() * gh-115399: Update bundled libexpat to 2.6.0 * gh-115243: Fix possible crashes in collections.deque.index() when the deque is concurrently modified. * gh-114572: ssl.SSLContext.cert_store_stats() and ssl.SSLContext.get_ca_certs() now correctly lock access to the certificate store, when the ssl.SSLContext is shared across multiple threads (bsc#1226447, CVE-2024-0397). * Core and Builtins * gh-116296: Fix possible refleak in object. **reduce** () internal error handling. * gh-116034: Fix location of the error on a failed assertion. * gh-115823: Properly calculate error ranges in the parser when raising SyntaxError exceptions caused by invalid byte sequences. Patch by Pablo Galindo * gh-112087: For an empty reverse iterator for list will be reduced to reversed(). Patch by Donghee Na. * gh-115011: Setters for members with an unsigned integer type now support the same range of valid values for objects that has a **index** () method as for int. * gh-96497: Fix incorrect resolution of mangled class variables used in assignment expressions in comprehensions. * Library * gh-117310: Fixed an unlikely early & extra Py_DECREF triggered crash in ssl when creating a new _ssl._SSLContext if CPython was built implausibly such that the default cipher list is empty or the SSL library it was linked against reports a failure from its C SSL_CTX_set_cipher_list() API. * gh-117178: Fix regression in lazy loading of self-referential modules, introduced in gh-114781. * gh-117084: Fix zipfile extraction for directory entries with the name containing backslashes on Windows. * gh-117110: Fix a bug that prevents subclasses of typing.Any to be instantiated with arguments. Patch by Chris Fu. * gh-90872: On Windows, subprocess.Popen.wait() no longer calls WaitForSingleObject() with a negative timeout: pass 0 ms if the timeout is negative. Patch by Victor Stinner. * gh-116957: configparser: Don?t leave ConfigParser values in an invalid state (stored as a list instead of a str) after an earlier read raised DuplicateSectionError or DuplicateOptionError. * gh-90095: Ignore empty lines and comments in .pdbrc * gh-116764: Restore support of None and other false values in urllib.parse functions parse_qs() and parse_qsl(). Also, they now raise a TypeError for non-zero integers and non-empty sequences. * gh-116811: In PathFinder.invalidate_caches, delegate to MetadataPathFinder.invalidate_caches. * gh-116600: Fix repr() for global Flag members. * gh-116484: Change automatically generated tkinter.Checkbutton widget names to avoid collisions with automatically generated tkinter.ttk.Checkbutton widget names within the same parent widget. * gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on opening named pipe. * gh-116143: Fix a race in pydoc _start_server, eliminating a window in which _start_server can return a thread that is ?serving? but without a docserver set. * gh-116325: typing: raise SyntaxError instead of AttributeError on forward references as empty strings. * gh-90535: Fix support of interval values > 1 in logging.TimedRotatingFileHandler for when='MIDNIGHT' and when='Wx'. * gh-115978: Disable preadv(), readv(), pwritev(), and writev() on WASI. * Under wasmtime for WASI 0.2, these functions don?t pass test_posix (https://github.com/bytecodealliance/wasmtime/issues/7830). * gh-88352: Fix the computation of the next rollover time in the logging.TimedRotatingFileHandler handler. computeRollover() now always returns a timestamp larger than the specified time and works correctly during the DST change. doRollover() no longer overwrite the already rolled over file, saving from data loss when run at midnight or during repeated time at the DST change. * gh-87115: Set **main**. **spec** to None when running a script with pdb * gh-76511: Fix UnicodeEncodeError in email.Message.as_string() that results when a message that claims to be in the ascii character set actually has non-ascii characters. Non-ascii characters are now replaced with the U+FFFD replacement character, like in the replace error handler. * gh-75988: Fixed unittest.mock.create_autospec() to pass the call through to the wrapped object to return the real result. * gh-115881: Fix issue where ast.parse() would incorrectly flag conditional context managers (such as with (x() if y else z()): ...) as invalid syntax if feature_version=(3, 8) was passed. This reverts changes to the grammar made as part of gh-94949. * gh-115886: Fix silent truncation of the name with an embedded null character in multiprocessing.shared_memory.SharedMemory. * gh-115809: Improve algorithm for computing which rolled-over log files to delete in logging.TimedRotatingFileHandler. It is now reliable for handlers without namer and with arbitrary deterministic namer that leaves the datetime part in the file name unmodified. * gh-74668: urllib.parse functions parse_qs() and parse_qsl() now support bytes arguments containing raw and percent-encoded non-ASCII data. * gh-67044: csv.writer() now always quotes or escapes '\r' and '\n', regardless of lineterminator value. * gh-115712: csv.writer() now quotes empty fields if delimiter is a space and skipinitialspace is true and raises exception if quoting is not possible. * gh-115618: Fix improper decreasing the reference count for None argument in property methods getter(), setter() and deleter(). * gh-115570: A DeprecationWarning is no longer omitted on access to the **doc** attributes of the deprecated typing.io and typing.re pseudo-modules. * gh-112006: Fix inspect.unwrap() for types with the **wrapper** data descriptor. * gh-101293: Support callables with the **call** () method and types with **new** () and **init** () methods set to class methods, static methods, bound methods, partial functions, and other types of methods and descriptors in inspect.Signature.from_callable(). * gh-115392: Fix a bug in doctest where incorrect line numbers would be reported for decorated functions. * gh-114563: Fix several format() bugs when using the C implementation of Decimal: * memory leak in some rare cases when using the z format option (coerce negative 0) * incorrect output when applying the z format option to type F (fixed-point with capital NAN / INF) * incorrect output when applying the # format option (alternate form) * gh-115197: urllib.request no longer resolves the hostname before checking it against the system?s proxy bypass list on macOS and Windows. * gh-115198: Fix support of Docutils >= 0.19 in distutils. * gh-115165: Most exceptions are now ignored when attempting to set the **orig_class** attribute on objects returned when calling typing generic aliases (including generic aliases created using typing.Annotated). Previously only AttributeError was ignored. Patch by Dave Shawley. * gh-115133: Fix tests for XMLPullParser with Expat 2.6.0. * gh-115059: io.BufferedRandom.read1() now flushes the underlying write buffer. * gh-79382: Trailing ** no longer allows to match files and non-existing paths in recursive glob(). * gh-114763: Protect modules loaded with importlib.util.LazyLoader from race conditions when multiple threads try to access attributes before the loading is complete. * gh-97959: Fix rendering class methods, bound methods, method and function aliases in pydoc. Class methods no longer have ?method of builtins.type instance? note. Corresponding notes are now added for class and unbound methods. Method and function aliases now have references to the module or the class where the origin was defined if it differs from the current. Bound methods are now listed in the static methods section. Methods of builtin classes are now supported as well as methods of Python classes. * gh-112281: Allow creating union of types for typing.Annotated with unhashable metadata. * gh-111775: Fix importlib.resources.simple.ResourceHandle.open() for text mode, added missed stream argument. * gh-90095: Make .pdbrc and -c work with any valid pdb commands. * gh-107155: Fix incorrect output of help(x) where x is a lambda function, which has an **annotations** dictionary attribute with a "return" key. * gh-105866: Fixed _get_slots bug which caused error when defining dataclasses with slots and a weakref_slot. * gh-60346: Fix ArgumentParser inconsistent with parse_known_args. * gh-100985: Update HTTPSConnection to consistently wrap IPv6 Addresses when using a proxy. * gh-100884: email: fix misfolding of comma in address-lists over multiple lines in combination with unicode encoding (bsc#1238450 CVE-2025-1795) * gh-95782: Fix io.BufferedReader.tell(), io.BufferedReader.seek(), _pyio.BufferedReader.tell(), io.BufferedRandom.tell(), io.BufferedRandom.seek() and _pyio.BufferedRandom.tell() being able to return negative offsets. * gh-96310: Fix a traceback in argparse when all options in a mutually exclusive group are suppressed. * gh-93205: Fixed a bug in logging.handlers.TimedRotatingFileHandler where multiple rotating handler instances pointing to files with the same name but different extensions would conflict and not delete the correct files. * bpo-44865: Add missing call to localization function in argparse. * bpo-43952: Fix multiprocessing.connection.Listener.accept() to accept empty bytes as authkey. Not accepting empty bytes as key causes it to hang indefinitely. * bpo-42125: linecache: get module name from **spec** if available. This allows getting source code for the **main** module when a custom loader is used. * gh-66543: Make mimetypes.guess_type() properly parsing of URLs with only a host name, URLs containing fragment or query, and filenames with only a UNC sharepoint on Windows. Based on patch by Dong-hee Na. * bpo-33775: Add ?default? and ?version? help text for localization in argparse. * Documentation * gh-115399: Document CVE-2023-52425 of Expat <2.6.0 under ?XML vulnerabilities?. * gh-115233: Fix an example for LoggerAdapter in the Logging Cookbook. * Tests * gh-83434: Disable JUnit XML output (--junit-xml=FILE command line option) in regrtest when hunting for reference leaks (-R option). Patch by Victor Stinner. * gh-117187: Fix XML tests for vanilla Expat <2.6.0. * gh-115979: Update test_importlib so that it passes under WASI SDK 21. * gh-116307: Added import helper isolated_modules as CleanImport does not remove modules imported during the context. * gh-115720: Leak tests (-R, --huntrleaks) now show a summary of the number of leaks found in each iteration. * gh-115122: Add --bisect option to regrtest test runner: run failed tests with test.bisect_cmd to identify failing tests. Patch by Victor Stinner. * gh-115596: Fix ProgramPriorityTests in test_os permanently changing the process priority. * gh-115198: Fix test_check_metadata_deprecate in distutils tests with a newer Docutils. * Build * gh-116313: Get WASI builds to work under wasmtime 18 w/ WASI 0.2/preview2 primitives. * gh-115167: Avoid vendoring vcruntime140_threads.dll when building with Visual Studio 2022 version 17.8. * Windows * gh-116773: Fix instances of <_overlapped.Overlapped object at 0xXXX> still has pending operation at deallocation, the process may crash. * gh-91227: Fix the asyncio ProactorEventLoop implementation so that sending a datagram to an address that is not listening does not prevent receiving any more datagrams. * gh-115554: The installer now has more strict rules about updating the Python Launcher for Windows. In general, most users only have a single launcher installed and will see no difference. When multiple launchers have been installed, the option to install the launcher is disabled until all but one have been removed. Downgrading the launcher (which was never allowed) is now more obviously blocked. * gh-115543: Python Launcher for Windows can now detect Python 3.13 when installed from the Microsoft Store, and will install Python 3.12 by default when PYLAUNCHER_ALLOW_INSTALL is set. * gh-115009: Update Windows installer to use SQLite 3.45.1. * IDLE * gh-88516: On macOS show a proxy icon in the title bar of editor windows to match platform behaviour. * Tools/Demos * gh-113516: Don?t set LDSHARED when building for WASI. * C API * gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows 64-bit platforms. * Add reference to CVE-2024-0450 (bsc#1221854) to changelog. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-253=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-curses-3.11.11-1.1 * python311-base-3.11.11-1.1 * python311-curses-debuginfo-3.11.11-1.1 * libpython3_11-1_0-3.11.11-1.1 * python311-core-debugsource-3.11.11-1.1 * python311-base-debuginfo-3.11.11-1.1 * libpython3_11-1_0-debuginfo-3.11.11-1.1 * python311-3.11.11-1.1 * python311-debuginfo-3.11.11-1.1 * python311-debugsource-3.11.11-1.1 ## References: * https://www.suse.com/security/cve/CVE-2019-20907.html * https://www.suse.com/security/cve/CVE-2019-9947.html * https://www.suse.com/security/cve/CVE-2020-15523.html * https://www.suse.com/security/cve/CVE-2020-15801.html * https://www.suse.com/security/cve/CVE-2022-25236.html * https://www.suse.com/security/cve/CVE-2023-27043.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2023-6597.html * https://www.suse.com/security/cve/CVE-2024-0397.html * https://www.suse.com/security/cve/CVE-2024-0450.html * https://www.suse.com/security/cve/CVE-2024-4030.html * https://www.suse.com/security/cve/CVE-2024-4032.html * https://www.suse.com/security/cve/CVE-2024-6232.html * https://www.suse.com/security/cve/CVE-2024-6923.html * https://www.suse.com/security/cve/CVE-2024-7592.html * https://www.suse.com/security/cve/CVE-2024-8088.html * https://www.suse.com/security/cve/CVE-2024-9287.html * https://www.suse.com/security/cve/CVE-2025-0938.html * https://www.suse.com/security/cve/CVE-2025-1795.html * https://bugzilla.suse.com/show_bug.cgi?id=1174091 * https://bugzilla.suse.com/show_bug.cgi?id=1210638 * https://bugzilla.suse.com/show_bug.cgi?id=1219559 * https://bugzilla.suse.com/show_bug.cgi?id=1219666 * https://bugzilla.suse.com/show_bug.cgi?id=1221854 * https://bugzilla.suse.com/show_bug.cgi?id=1225660 * https://bugzilla.suse.com/show_bug.cgi?id=1226447 * https://bugzilla.suse.com/show_bug.cgi?id=1226448 * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1227999 * https://bugzilla.suse.com/show_bug.cgi?id=1228165 * https://bugzilla.suse.com/show_bug.cgi?id=1228780 * https://bugzilla.suse.com/show_bug.cgi?id=1229596 * https://bugzilla.suse.com/show_bug.cgi?id=1229704 * https://bugzilla.suse.com/show_bug.cgi?id=1230227 * https://bugzilla.suse.com/show_bug.cgi?id=1230906 * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1232241 * https://bugzilla.suse.com/show_bug.cgi?id=1236705 * https://bugzilla.suse.com/show_bug.cgi?id=1238450 * https://bugzilla.suse.com/show_bug.cgi?id=1239210 * https://bugzilla.suse.com/show_bug.cgi?id=831629 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:59 -0000 Subject: SUSE-SU-2025:20104-1: moderate: Security update for pam Message-ID: <174902729927.627.14264587462164624867@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:20104-1 Release Date: 2025-02-03T09:17:48Z Rating: moderate References: * bsc#1233078 Cross-References: * CVE-2024-10963 CVSS scores: * CVE-2024-10963 ( SUSE ): 8.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10963 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-10963 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-10963: Fixed improper hostname interpretation in pam_access that could lead to access control bypass (bsc#1233078). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-164=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam-debugsource-1.6.0-4.1 * pam-debuginfo-1.6.0-4.1 * pam-1.6.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10963.html * https://bugzilla.suse.com/show_bug.cgi?id=1233078 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:40 -0000 Subject: SUSE-RU-2025:20066-1: moderate: Recommended update for salt Message-ID: <174902728029.655.9525023059398633848@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20066-1 Release Date: 2025-02-03T09:01:09Z Rating: moderate References: * bsc#1219041 * bsc#1220357 * bsc#1226141 * bsc#1229109 * bsc#1229539 * bsc#1230322 Affected Products: * SUSE Linux Micro 6.0 An update that has six fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fix failing x509 tests with OpenSSL < 1.1 * Avoid explicit reading of /etc/salt/minion (bsc#1220357) * Allow NamedLoaderContexts to be returned from loader * Revert the change making reactor less blocking (bsc#1230322) * Use --cachedir for extension_modules in salt-call (bsc#1226141) * Prevent using SyncWrapper with no reason * Fix the SELinux context for Salt Minion service (bsc#1219041) * Set contextvars as a build requirement for package * Increase warn_until_date date for code we still support * The test_debian test now uses port 80 for ubuntu keyserver * Fix too frequent systemd service restart in test_system test * Avoid crash on wrong output of systemctl version (bsc#1229539) * Improve error handling with different OpenSSL versions * Remove redundant run_func from salt.master.MWorker._handle_aes * Fix cloud minion configuration for multiple masters (bsc#1229109) * Use Pygit2 id instead of deprecated oid in gitfs * Fix few failing tests to work with both Salt and Salt bundle * Skip testing unsupported OpenSSL crypto algorithms ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-88=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-minion-3006.0-8.1 * salt-3006.0-8.1 * salt-transactional-update-3006.0-8.1 * salt-master-3006.0-8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219041 * https://bugzilla.suse.com/show_bug.cgi?id=1220357 * https://bugzilla.suse.com/show_bug.cgi?id=1226141 * https://bugzilla.suse.com/show_bug.cgi?id=1229109 * https://bugzilla.suse.com/show_bug.cgi?id=1229539 * https://bugzilla.suse.com/show_bug.cgi?id=1230322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:52 -0000 Subject: SUSE-SU-2025:20107-1: important: Security update for buildkit Message-ID: <174902729240.627.1552448831145164579@smelt2.prg2.suse.org> # Security update for buildkit Announcement ID: SUSE-SU-2025:20107-1 Release Date: 2025-02-03T09:18:58Z Rating: important References: * bsc#1219267 * bsc#1219268 * bsc#1219438 Cross-References: * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 CVSS scores: * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for buildkit fixes the following issues: * Update to version 0.12.5: * update runc to v1.1.12 * exec: add extra validation for submount sources (fixes CVE-2024-23651, bsc#1219267) * oci: fix error handling on submount calls * executor: recheck mount stub path within root after container run (fixes CVE-2024-23652, bsc#1219268) * llbsolver: make sure interactive container API validates entitlements (fixes CVE-2024-23653, bsc#1219438) * gateway: pass executor with build and not access worker directly * pb: add extra validation to protobuf types * sourcepolicy: add validations for nil values * exporter: add validation for platforms key value * exporter: add validation for invalid platorm * exporter: validate null config metadata from gateway * ci: disable push if not upstream repo * hack: use git context only for upstream repo * hack/test: allow ALPINE_VERSION to be set from env * hack: align syntax * vendor: github.com/cyphar/filepath-securejoin v0.2.4 * tracing: allow the `Resource` to be set externally * Update to version 0.12.4: * Fix possible concurrent map access on remote cache export * Fix hang on debug server listener * Fix possible deadlock in History API under high number of parallel builds * Fix possible panic on handling deleted records in History API * Fix possible data corruption in zstd library * Update to version 0.12.3: * Fix possible duplicate source files in provenance attestation for chained builds * Fix possible negative step time in progressbar for step shared with other build request * Fix properly closing history and cache DB on shutdown to avoid corruption * Fix incorrect error handling for invalid HTTP source URLs * Fix fallback cases for ambiguous insecure configuration provided for registry used as push target. * Fix possible data race with parallel image config resolves * Fix regression in v0.12 for clients waiting on buildkitd to become available * Fix Cgroup NS handling for hosts supporting only CgroupV1 * Update to version 0.12.2: * Fix possible discarded network error when exporting result to client * Avoid unnecessary memory allocations when writing build progress * Update to version 0.12.1: * executor: fix resource sampler goroutine leak * [v0.11] make tracing socket forward error non-fatal * integration: missing env var to check feature compat * test: update pinned busybox image to 1.36 * test: update pinned alpine image to 3.18 * vendor: github.com/docker/docker 8e51b8b59cb8 (master, v25.0.0-dev) * executor/resource: stub out NewSysSampler on Windows * vendor: github.com/docker/cli v24.0.4 * testutil: move CheckContainerdVersion to a separate package * llbsolver: fix policy rule ordering * filesync: fix backward compatibility with encoding + and % * hack: allow to set GO_VERSION during tests * test: always disable tls for dockerd worker * buildctl: set max backoff delay to 1 second * contenthash: data race * filesync: escape special query characters * applier: add hack to support docker zstd layers * Fix various nits * pullprogress data race * use sampler lock instead * Fix ResolveImageConfig to evaluate source policy * sampler data race fix * update cgroup parent test to work with cgroupns * Revert "specify a `ResponseHeaderTimeout` value" * oci: make sure cgroupns is enabled if supported * bash lint fix * rename BUILDFLAGS to GOBUILDFLAGS * allow ENOTSUP for PSI cgroup files * containerimage: use platform matcher to detect platform to unpack * exporter: silently skip unpacking unknown reference * improve error handling in ReadFile * dockerfile: arg for controlling go build flags * dockerfile: arg to enable go race detection * Add support for health start interval * Re-vendor moby/moby * filesync: mark if options have been encoded to detect old versions * dockerfile: heredoc should use 0644 permissions * docs: update README to reference OpenTelemetry instead of OpenTracing * gateway: restore original filename in ReadFile error message * Dockerfile: update containerd to v1.7.2 * Use system.ToSlash() instead of filepath.ToSlash() * Revert most changes to client/llb * Remove Architecture * Default to linux in client * Ensure we use proper path separators * Set default platform * Add nil pointer check in dispatchWorkdir * Remove nil pointer check and extra NormalizePath * Rename variable, remove superfluous check * Use current OS as a default * Handle file paths base on target platform * exporter: unlazy references in parallel * exporter: simplify unlazy references to reduce duplication * exporter: allow unpack on multi-platform images * tests: add unpack to scratch export test * overlay: set whiteout timestamps to 1970-01-01 (not to SOURCE_DATE_EPOCH) * dockerfile: graduate `ADD --checksum=<checksum>` from labs * dockerfile: graduate `ADD <git ref>` from labs * dockerfile: mod-outdated target to check modules updates * dockerfile: use xx in dnsname stage * dockerfile: install musl-dev to fix compilation issue * dockerfile: update Alpine to 3.18 * vendor: update fsutil to 36ef4d8 * export(local): split opt * buildctl: Provide --wait option * containerimage: support SOURCE_DATE_EPOCH for CreatedAt * move flightcontrol to use generics * containerimage: keep layer labels for exported images * shell: start shell from cmd, not entrypoint * sbom: propogate image-resolve-mode for generator image * client: add extra debug to tests * handle missing provenance for non-evaluated result * tests: add provenance test for duplicate platform * tests: add provenance test for when context directory does not exist * forward: make BridgeClient public for lint * gateway: enable named contexts for gateway frontend * vendor: update vt100 with resize panic fix * docs: dockerfile: remove "known issues" related to AuFS * docs: add running instruction to CONTRIBUTING.md * tests: add worker close method to interface * add and check for gateway.exec.secretenv cap * move Secretenv from Meta to InitMessage * support passing SecretEnv to gateway containers * Add comment, update from review * Fix issue with digest merge (inconsistent graph state) * docs: add helper commands section to CONTRIBUTING.md * docs: update CONTRIBUTING.md whitespace formatting * integration: fix not deleting dockerd workdir * remove uses of deprecated ResolverOptions.Client * filesync: fix handling non-ascii in file paths * tests: add test for unicode filenames * Adding more docs to client/llb * Add special case for rw bind mounts * vendor: github.com/docker/cli v24.0.2 * vendor: github.com/docker/docker v24.0.2 * progressui: fix index printing on partial rows * gateway: wrap ExecProcessServer Send calls with a mutex * resources: make maxsamples configurable * llbsolver: add systemusage samples to provenance attestation * resources: store sys cpu usage per step * resources: add sampler for periodic stat reads * resources: CNI network usage sampling support * resources: add build step resource tracking via cgroups * solver: lock before using actives * Emulate "bind" mounts using the bind filter * Fix mount layers on host * llbsolver: set temporary lease in Commit context * Update containerd dependency * exporter: Add exptypes with Common exporter keys * exporter/image/exptypes: Make strongly typed * solver: move AddBuildConfig into llbsolver package * tests: add test to check url format for image loaded from oci layout * solver: mark locally loaded images as such * solver: merge local and remote images into single list * purl: allow RefToPURL to take a type parameter * tests: don't use purl code to test itself * Use linux as a default for inputOS * Add path handling functions * response to comments * containerimage: Export option keys * vendor: update spdx/tools-golang to v0.5.1 * exporter: remove non dist options from tar exporter * exporter: move fs opt parsing to method * tests: fixup attestation tar to not panic when file not found * git: set umask without reexec * add language property for sourcemap * dockerfile/docs: add set -ex to heredoc #3870 * authprovider: fix a bug where registry-1.docker.io auth was always a cache miss * response to comments * tracing: fix buildx tracing delegation * Update continuity and fsutil * cache: add a few more fields to ref trace logs. * vendor: github.com/containerd/go-runc v1.1.0 * provenance: fix possible empty digest access * vendor: fix broken vendoring * dockerfile: bump up nerdctl to v1.4.0 * bump nydus-snapshotter dependence to v0.8.2 * vendor: github.com/docker/cli v24.0.1 * vendor: github.com/docker/docker v24.0.1 * vendor: github.com/containerd/containerd v1.7.1 * vendor: github.com/Microsoft/hcsshim v0.10.0-rc.8 * vendor: github.com/Microsoft/go-winio v0.6.1 * vendor: golang.org/x/sys v0.7.0 * vendor: github.com/containerd/typeurl/v2 v2.1.1 * chore: bump spdx tools * Fix typo in attestation-storage.md * vendor: github.com/docker/cli v24.0.0 * vendor: github.com/docker/docker v24.0.0 * vendor: github.com/opencontainers/runc v1.1.7 * vendor: github.com/opencontainers/runtime-spec v1.1.0-rc.2 * vendor: github.com/klauspost/compress v1.16.3 * Dockerfile: CONTAINERD_VERSION=v1.7.1 * Dockerfile: CONTAINERD_ALT_VERSION_16=v1.6.21 * Dockerfile: RUNC_VERSION=v1.1.7 * session: avoid logging healthcheck error on canceled connection * session: fix run and close synchronization * testutil: update ReadImages to fallback to reading manifest * Add trace logs for cache leaks. * Add some doc strings for LLB functions * attestations: move containerd media type warnings * update generated proto files * attestations: replace intoto media type with vendored const * nydus: bump nydus versions in Dockerfile and doc * feedback changes for moby/buildkit #2251 * testutil: expose underlying docker address for supported workers * testutil: expose integration workers as public * remove type aliases for leasemanager/contentstore * llbsolver: move history blobs to a separate namespace * build(deps): bump github.com/docker/distribution * added import/export support for OCI compatible image manifest version of cache manifest (opt-in on export, inferred on import) moby/buildkit #2251 * llb: carry platform from inputs for merge/diff * llb: don't include platform in fileop * control: fix possible deadlock on network error * exporter/containerimage: remove redundant type for var declaration * Fix not to set the value on empty vertex * Fix to import as digest * cache: always release ref when getting size in usage. * Drop unneeded variable * ssh: add fallback to ensure conn is closed in all cases. * vendor: github.com/opencontainers/image-spec v1.1.0-rc3 * vendor: github.com/docker/cli v23.0.5 * vendor: github.com/docker/docker v23.0.5 * nydus: update nydus-snapshotter dependency to v0.8.0 * progressui: fix possible zero prefix numbers in logs * llbsolver: send active event only to current client * llbsolver: send delete status event * llbsolver: filter out records marked deleted from list responses * Add Windows service support * docs: fixup build repro doc with updated policy format * test: use appropriate snapshotter service to walk snapshots * overlay: use function to check for overlay-based mounts * Update uses of Image platform fields in OCI image-spec * allow setting user agent products * Bump up golangci-lint to v1.52.2 * chore: tidy up duplicated imports * solver: Release unused refs in LoadWithParents * Avoid panic on parallel walking on DefinitionOp * solver: skip sbom post processor if result is nil * vendor: github.com/docker/docker v23.0.4 * vendor: github.com/docker/cli v23.0.4 * vendor: golang.org/x/time v0.3.0 * vendor: github.com/docker/cli v23.0.2 * vendor: github.com/docker/docker v23.0.2 * test: don't hang if a process doesn't run * ci: put worker name first for better UX in actions * go.mod: remove github.com/kr/pretty * Revert "Problem: can't use anonymous S3 credentials" * go.mod: bump up runc to v1.1.6 * go.mod: Bump up stargz-snapshotter to v0.14.3 * dockerfile: bump up stargz-snapshotter to v0.14.3 * dockerfile: bump up runc to v1.1.6 * buildkitd: add grpc reflection * Bump up nerdctl to 1.3.0 * Bump up containerd 1.6.20 * Fix gzip decoding of HTTP sources. * ci: update runner os to ubuntu 22.04 * Fix bearer token expiration check (fixes #3779) * docs: update buildkitd.toml with new field info * buildkitd: allow durations for gc config * buildkitd: allow multiple units for gc config * dockerui: expose context detection functions as public * Prevent overflow of runc exit code. * Upgrade to latest go-runc. * runc worker: fix sigkill handling * Dockerfile: RUNC_VERSION=v1.1.5 * client: add client opts to enable system certificates * Make ClientOpts type safe * build(deps): bump github.com/opencontainers/runc from 1.1.4 to 1.1.5 * fileop: create new fileOpSolver instance per Exec call * Provide CacheManager to Controller instead of CacheKeyManager. * http: ensure HEAD and GET requests have same headers * docs: add auto-generated sections to buildctl.md * client: allow grpc dial option passthrough * cni: simplify netns creation * add Bass to list of LLB languages * llbsolver: fix sorting of history records * llbsolver: Fix performance of recomputeDigests * solve: use comparables instead of reflection in result struct * vendor: github.com/docker/cli v23.0.1 * vendor: github.com/docker/docker v23.0.1 * client: create oci-layout file in StoreIndex * ci: output annotations for failures * test: set mod vendor * test: use gotestsum to generate reports * fix gateway exec tty cleanup on context.Canceled * fix process termination handling for runc exec * Register builds before recording build history * docs(dockerfile): minimal Dockerfile version support for chmod * Update builder.md to document newly supported --chmod features in both ADD and COPY statements. * use bklog.G(ctx) instead of logrus directly * integration: missing mergeDiff compat check * chore: `translateLegacySolveRequest` does not need to return error checking. * integration: split feature compat check for subtests * integration: missing feature compat check for cache * dockerfile: fix reproducible digest test for non-amd64 * integration: add FeatureMergeDiff compat * integration: add FeatureCacheBackend* compat * integration: enforce features compat through env vars * ci: upstream docs conformance validation * dockerfile(docs): fix liquid syntax * Problem: can't use anonymous S3 credentials * hack: remove build_ci_first_pass script * hack: binaries and cross bake targets * go.mod: update to go 1.20 * Dockerfile: CONTAINERD_VERSION=v1.7.0 * go.mod: github.com/containerd/containerd v1.7.0 * Add Namespace to list of buildkit users. * remove buildinfo * buildinfo: add BUILDKIT_BUILDINFO build arg * buildinfo: mark as deprecated * docs: deprecated features page * rootless: guide for Bottlerocket OS (`sysctl -w user.max_user_namespaces=N`) * rootless: fix up unprivileged mount opts * Dockerfile: CONTAINERD_VERSION=v1.7.0-rc.3, CONTAINERD_ALT_VERSION_16=v1.6.19 * go.mod: github.com/containerd/containerd v1.7.0-rc.3 * version: add "v" prefix to version for tagging convention consistency * remove context name validation from kubepod connhelper * gateway: add hostname option to NewContainer API * fix error message typo * provenance: ensure URLs are redacted before written * test/client: Close buildkit client * docs: missing security policy markdown file * diffapply: do chown before xattrs * Add test for merge of files with capabilities. * fix a possible panic on cache * Update cmd/buildkitd/main_windows.go * ci(validate): use bake * hack: shfmt bake target * hack: generated-files bake target * hack: doctoc bake target * hack: lint bake target * hack: authors Dockerfile and bake target * hack: bake definition with vendor targets * Fix buildkitd panic when frontend input is nil. * ci: trigger workflows on push to release branches * build(deps): bump golang.org/x/net from 0.5.0 to 0.7.0 * ci: create GitHub Release for frontend as well * ci: make release depends on image job * lint: fix issues with go 1.20 * remove deprecated golangci-lint linters * update golangci-lint to v1.51.1 * update to go 1.20 * Allow DefinitionOp to track sources * specify a `ResponseHeaderTimeout` value * Ensures that the primary GID is also included in the additional GIDs * ci: fix missing TESTFLAGS env var in test-os workflow * Dockerfile: update containerd to v1.7.0-beta.4, v1.6.18 * go.mod: github.com/containerd/containerd v1.7.0-beta.4 * ci: update softprops/action-gh-release to v0.1.15 * ci: remove unused vars in dockerd workflow * ci: split cross job * Dockerfile: remove binaries-linux-helper stage * ci: rename unclear env vars * readme: fix and update badges * ci: rename build workflow to buildkit * ci: reusable test workflow * ci: move test-os to a dedicated workflow * ci: move frontend integration tests and build to a dedicated workflow * stargz-snapshotter: graduate from experimental * Bump up stargz-snapshotter to v0.14.1 * set osversion in index descriptor from base image * progress: solve status description * ci: update buildx to latest * Dockerfile: update xx to 1.2.1 * integration: make sure registry directory exists * gha: avoid range requests with too big offset * ci: merge test-nydus job in test one * ci: remove branch restriction on pull request event * client: add tests for layerID in comment field * exporter: fix sbom supplement core detection * exporter: fix supplement sboms on empty scratch layer * exporter: fix file layer finder whiteout detection * exporter: canonicalize sbom file paths during search * Add platform tracing socket paths and mounts * integration: log dockerd cmd * integration: set custom flags for dockerd worker * remotecache: proper exporter naming for gha, s3 and azblob * remotecache: explicit names for registry and local * exporter: use compression.ParseAttributes func * remotecache: mutualize compression parsing attrs * lex: add support for optional colon in variable expansion * test: rework TestProcessWithMatches to use a matrix * dockerfile: update to use dockerui pkg * dockerui: separate docker frontend params to reusable package * cache: add fallback for snapshotID * exporter: remove wrappers for oci data types * vendor: github.com/docker/cli v23.0.0 * vendor: github.com/docker/docker v23.0.0 * hack: do not cache some stages on release * hack: do not set attest flags when exporting to docker * git: override the locale to ensure consistent output * fix support for empty git ref with subdir * gitutil: use subtests * source: more tests cases for git identifier * source: use subtests cases for git identifier * otel: bump dependencies to v1.11.2/v0.37.0 * hack: treat unset variables as an error * frontend: fix typo in release script * ci: create matrix for building frontend image * inline cache: fix blob indexes by uncompressed digest * Skip configuring cache exporter if it is nil. * docs: update syntax for labs channel in examples * integration: remove wrong compat condition * integration: fix compat check for CNI DNS test * cache: don?t link blobonly based on chainid * do not mount secrets that are optional and missing from solve opts * SOURCE_DATE_EPOCH: drop timezone * sbom: create tmp directory for scanner image * progress: keep color enabled with NO_COLOR empty * hack: remove azblob_test * integration: basic azblob cache test * test: add proxy build args when existed * vendor: github.com/docker/cli v23.0.0-rc.3 * vendor: github.com/docker/docker v23.0.0-rc.3 * vendor: golang.org/x/net v0.5.0 * vendor: golang.org/x/text v0.6.0 * vendor: golang.org/x/sys v0.4.0 * Dockerfile: CNI plugins v1.2.0 * Dockerfile: CONTAINERD_VERSION=v1.7.0-beta.3, CONTAINERD_ALT_VERSION_16=v1.6.16 * Fix tracing listener on Windows * go.mod: github.com/containerd/containerd v1.7.0-beta.3 * control: send current timestamp header with event streams * vendor: update containerd to v1.6.16-0.1709cfe273d9 * buildctl: add ref-file to get history record for a build * client: make sure ref is configurable for the history API * history: save completed steps with cache stats * history: fix exporter key not being passed * history: fix logs and traces are saving on canceled builds * hack: add correct entrypoint to shell script * ci: use moby/buildkit:latest in build action * dockerfile: add testReproSourceDateEpoch * Fix cache cannot reuse lazy layers * Correct manifests_prefix documentation for S3 cache * Use golang.org/x/sys/windows instead of syscall * dockerfile: release frontend for i386 platform * Add get-user-info utility * optimize --dry-run flag * fix(tracing): spelling of OTEL_TRACES_EXPORTER value * Propagate sshforward send side connection close * buildctl: add `buildctl debug histories, buildctl prune-histories` * dockerfile: fix panic on warnings with multi-platform * vendor: github.com/docker/cli v23.0.0-rc.2 * vendor: github.com/docker/docker v23.0.0-rc.2 * vendor: github.com/containerd/containerd v1.6.15 * cache: add registry.insecure option to registry exporter * Make local cache non-lazy * docs/build-repro.md: add the SOURCE_DATE_EPOCH section * docs: clarified build argument example by changing the variable name * azblob cache: account_name attribute * docs: master -> 0.11 * ci: fix dockerd workflow with latest changes from moby * integration: set mirrors and entitlements with dockerd worker * github: update CI to buildkit version * exporter: ensure spdx order prioritizes primary sbom * hack: remove s3_test * integration: basic s3 cache test * integration: add runCmd and randomString utils * integration: expose backend logs in sandbox interface * azblob_test: pin busybox to avoid "Illegal instruction" error * docs: add nerdctl container buildkitd address docs * feat: add namespace support for nerdctl container * ci: add ci to check README toc * testutil: pin busybox and alpine used in releases * exporter: allow configuring inline attestations for image exporters * exporter: force enabling inline attestations for image export * docs: change semicolons to double ampersands * llbsolver: fix panic when requesting provenance on nil result * vendor: update fsutil to fb43384 * attestation: only supplement file data for the core scan * docs: add index page for attestations * docs: move attestation docs to dedicated directory * docs: rename slsa.md to slsa-provenance.md * docs: tidy up json examples for slsa definitions * docs: add cross-linking between slsa pages * Flakiness in azblob test job * vendor: update spdx/tools-golang to d6f58551be3f * feat: add nerdctl-container support for client * docs: slsa review updates * docs: moved slsa definitions to a separate page * docs: slsa editorial fixes * docs: add filename to provenance attestation * docs: update hermetic field after it was moved in implementation * docs: update provenance docs * docs: add slsa provenance documentation * progress: fix clean context cancelling * fix: updated_at -> updated-at * Solve panic due to concurrent access to ExportSpans * feat: allow ignoring remote cache-export error if failing * add cache stats to the build history API * vendor: github.com/docker/cli v23.0.0-rc.1 * vendor: github.com/docker/docker v23.0.0-rc.1 * vendor: github.com/containerd/containerd v1.6.14 * frontend: fix testMultiStageImplicitFrom to account for busybox changes * sshforward: skip conn close on stream CloseSend. * chore: update buildkitd.toml docs with mirror path example * feat: handle mirror url with path * provenance: fix the order of the build steps * provenance: move hermetic field into a correct struct * add possibility to override filename for provenance * Fix typo in CapExecMountBindReadWriteNoOutput. * Use SkipOutput instead of -1 for output indexes to clarify semantics. * fix indentation for in-toto and traces * attestation: forbid provenance attestations from frontend * attestation: validate attestations before unbundling as well * exporter: make attestation validation public * result: change reason types to strings * attestations: ignore spdx parse errors * attestations: propogate metadata through unbundling * gateway: add addition check to prevent content func from being forwarded * ociindex: add utility method for getting a single manifest from the index * ociindex: refactor to hide implementation internally * cache: test gha cache exporter * containerdexecutor: add network namespace callback * frontend/dockerfile: BFlags.Parse(): use strings.Cut() * frontend/dockerfile: parseExtraHosts(): use strings.Cut() * frontend/dockerfile: parseMount() use strings.Cut(), and some minor cleanup * frontend/dockerfile: move check for cache-sharing * frontend/dockerfile: provide suggestions for mount share mode * frontend/dockerfile: define types for enums * frontend/dockerfile/shell: use strings.Equalfold * frontend/dockerfile/parser: remove redundant concat * frontend/dockerfile: parseBuildStageName(): pre-compile regex * frontend/dockerfile: remove isSSHMountsSupported, isSecretMountsSupported * docs: Enable rootless for stargz-snapshotter * executor/oci: GetResolvConf(): simplify handling of resolv.conf ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-156=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * buildkit-0.12.5-1.1 * buildkit-debuginfo-0.12.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:16 -0000 Subject: SUSE-SU-2025:20122-1: critical: Security update for rsync Message-ID: <174902725626.627.5292331434919713523@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2025:20122-1 Release Date: 2025-02-04T08:59:16Z Rating: critical References: * bsc#1234100 * bsc#1234101 * bsc#1234102 * bsc#1234103 * bsc#1234104 * bsc#1235475 Cross-References: * CVE-2024-12084 * CVE-2024-12085 * CVE-2024-12086 * CVE-2024-12087 * CVE-2024-12088 * CVE-2024-12747 CVSS scores: * CVE-2024-12084 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12084 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12084 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12085 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12085 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-12085 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-12086 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-12086 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-12086 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2024-12087 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12087 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-12087 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-12088 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12747 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-12747 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-12747 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2024-12084: Fixed Heap Buffer Overflow in Checksum Parsing (bsc#1234100). * CVE-2024-12085: Fixed Info Leak via uninitialized Stack contents defeating ASLR (bsc#1234101). * CVE-2024-12086: Fixed server leaking arbitrary client files (bsc#1234102). * CVE-2024-12087: Fixed server use of symbolic links to make client write files outside of destination directory (bsc#1234103). * CVE-2024-12088: Fixed --safe-links bypass (bsc#1234104). * CVE-2024-12747: Fixed Race Condition in rsync Handling Symbolic Links (bsc#1235475). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-203=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * rsync-debugsource-3.2.7-4.1 * rsync-3.2.7-4.1 * rsync-debuginfo-3.2.7-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12084.html * https://www.suse.com/security/cve/CVE-2024-12085.html * https://www.suse.com/security/cve/CVE-2024-12086.html * https://www.suse.com/security/cve/CVE-2024-12087.html * https://www.suse.com/security/cve/CVE-2024-12088.html * https://www.suse.com/security/cve/CVE-2024-12747.html * https://bugzilla.suse.com/show_bug.cgi?id=1234100 * https://bugzilla.suse.com/show_bug.cgi?id=1234101 * https://bugzilla.suse.com/show_bug.cgi?id=1234102 * https://bugzilla.suse.com/show_bug.cgi?id=1234103 * https://bugzilla.suse.com/show_bug.cgi?id=1234104 * https://bugzilla.suse.com/show_bug.cgi?id=1235475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:56 -0000 Subject: SUSE-RU-2025:20125-1: moderate: Recommended update for audit Message-ID: <174902723672.627.14190000716785656091@smelt2.prg2.suse.org> # Recommended update for audit Announcement ID: SUSE-RU-2025:20125-1 Release Date: 2025-02-13T12:07:02Z Rating: moderate References: * bsc#1215377 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for audit fixes the following issues: * Fix plugin termination when using systemd service units (bsc#1215377) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-212=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libaudit1-debuginfo-3.0.9-4.1 * audit-audispd-plugins-3.0.9-6.1 * audit-debuginfo-3.0.9-6.1 * audit-secondary-debugsource-3.0.9-6.1 * python3-audit-debuginfo-3.0.9-6.1 * libaudit1-3.0.9-4.1 * audit-debugsource-3.0.9-4.1 * audit-audispd-plugins-debuginfo-3.0.9-6.1 * audit-3.0.9-6.1 * system-group-audit-3.0.9-6.1 * python3-audit-3.0.9-6.1 * libauparse0-debuginfo-3.0.9-4.1 * libauparse0-3.0.9-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215377 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:34 -0000 Subject: SUSE-RU-2025:20111-1: important: Recommended update for helm Message-ID: <174902727474.627.16336632820951616593@smelt2.prg2.suse.org> # Recommended update for helm Announcement ID: SUSE-RU-2025:20111-1 Release Date: 2025-02-03T09:19:38Z Rating: important References: * jsc#SMO-479 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for helm fixes the following issues: helm is shipped in version 3.16.3. (jsc#SMO-479) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-173=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * helm-3.16.3-1.1 * helm-debuginfo-3.16.3-1.1 * SUSE Linux Micro 6.0 (noarch) * helm-bash-completion-3.16.3-1.1 ## References: * https://jira.suse.com/browse/SMO-479 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:44 -0000 Subject: SUSE-RU-2025:20064-1: moderate: Recommended update for elemental-operator, elemental Message-ID: <174902728429.655.9908385087825262828@smelt2.prg2.suse.org> # Recommended update for elemental-operator, elemental Announcement ID: SUSE-RU-2025:20064-1 Release Date: 2025-02-03T08:59:26Z Rating: moderate References: * bsc#1230904 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for elemental-operator, elemental contains the following fixes: elemental: \- Include net.ifnames=0 kernel parameter. (bsc#1230904) elemental-operator: \- Update to version 1.6.5: * Add SeedImage.status.checksumURL. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-68=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * elemental-2.1.3-1.1 * elemental-updater-2.1.3-1.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-support-1.6.5-1.1 * elemental-register-1.6.5-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230904 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:43 -0000 Subject: SUSE-RU-2025:20109-1: moderate: Recommended update for libzypp Message-ID: <174902728332.627.12109706170522671960@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2025:20109-1 Release Date: 2025-02-03T09:19:19Z Rating: moderate References: * bsc#1225451 * bsc#1233393 * bsc#1234304 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for libzypp fixes the following issues: Version.35.15 (35) * Url query part: `=` is a safe char in value (bsc#1234304) * RpmDb: Recognize rpmdb.sqlite as database file (#593) * The 20MB download limit must not apply to non-metadata files like package URLs provided via the CLI (bsc#1233393). * BuildCache: Don't try to retrieve missing raw metadata if no permission to write the cache (bsc#1225451) * RepoManager: throw RepoNoPermissionException if the user has no permission to update(write) the caches (bsc#1225451) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-158=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libzypp-debugsource-17.35.16-1.1 * libzypp-debuginfo-17.35.16-1.1 * libzypp-17.35.16-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1225451 * https://bugzilla.suse.com/show_bug.cgi?id=1233393 * https://bugzilla.suse.com/show_bug.cgi?id=1234304 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:18 -0000 Subject: SUSE-SU-2025:20054-1: moderate: Security update for kubevirt Message-ID: <174902731814.655.3209367446851476888@smelt2.prg2.suse.org> # Security update for kubevirt Announcement ID: SUSE-SU-2025:20054-1 Release Date: 2025-02-03T08:56:36Z Rating: moderate References: * bsc#1220512 * bsc#1221538 * bsc#1223965 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has three fixes can now be installed. ## Description: This update for kubevirt fixes the following issues: * Update to version 1.3.1 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.3.1 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.3.0 * Fix DV error report via VM printable status * Fix permission error in storage migration tests * Add registry path for SLE15 SP7 * Bump to the latest tag 1.3.1-150600.5.9.1 * Use the images based on SLE15 SP6 BCI * Bump to the latest tag 1.2.2-150600.5.6.1 bsc#1221538; bsc#1220512; bsc#1223965 * Update to version 1.2.2 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.2 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.1 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.0 * Pack configuration files for libvirt ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-49=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-49=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kubevirt-virtctl-debuginfo-1.3.1-1.1 * kubevirt-virtctl-1.3.1-1.1 * kubevirt-manifests-1.3.1-1.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kubevirt-tests-debuginfo-1.3.1-1.1 * kubevirt-tests-1.3.1-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220512 * https://bugzilla.suse.com/show_bug.cgi?id=1221538 * https://bugzilla.suse.com/show_bug.cgi?id=1223965 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:19 -0000 Subject: SUSE-RU-2025:20120-1: moderate: Recommended update for iptables Message-ID: <174902725945.627.2103777112339850901@smelt2.prg2.suse.org> # Recommended update for iptables Announcement ID: SUSE-RU-2025:20120-1 Release Date: 2025-02-03T09:24:25Z Rating: moderate References: * bsc#1234996 * bsc#1235088 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for iptables fixes the following issues: * Fixes checking existence of rules. Fixes issues with rule creation with podman/netavark. (bsc#1235088, bsc#1234996) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-190=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * iptables-1.8.9-4.1 * libip6tc2-1.8.9-4.1 * libxtables12-1.8.9-4.1 * libxtables12-debuginfo-1.8.9-4.1 * xtables-plugins-1.8.9-4.1 * libip4tc2-debuginfo-1.8.9-4.1 * xtables-plugins-debuginfo-1.8.9-4.1 * libip6tc2-debuginfo-1.8.9-4.1 * iptables-debuginfo-1.8.9-4.1 * iptables-debugsource-1.8.9-4.1 * libip4tc2-1.8.9-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234996 * https://bugzilla.suse.com/show_bug.cgi?id=1235088 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:33 -0000 Subject: SUSE-RU-2025:20112-1: moderate: Recommended update for xmlsec1 Message-ID: <174902727365.627.6848921303113382890@smelt2.prg2.suse.org> # Recommended update for xmlsec1 Announcement ID: SUSE-RU-2025:20112-1 Release Date: 2025-02-03T09:19:58Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for xmlsec1 fixes the following issues: Update to 1.2.41: * (xmlsec-mscng,xmlsec-mscrypto) Improved certificates verification. * (xmlsec-gnutls) Added support for self-signed certificates. * (xmlsec-core) Fix deprecated functions in LibXML2 2.13.1 including disabling HTTP support by default (use '\--enable-http' option to re-enable it). Update to 1.2.40: The legacy XML Security Library 1.2.40 release includes the following changes: * (xmlsec-core) Fixed functions deprecated in LibXML2 2.13.1 (including disabling HTTP support by default). * (xmlsec-nss) Increased keys size in all tests to support NSS 3.101. * (windows) Added "ftp" and "http" flags in 'configure.js' (both are disabled by default). * Several other small fixes (more details). Update to 1.2.39: The legacy XML Security Library 1.2.39 release includes the following changes: * Added options to enable/disable local files, HTTP, and FTP support. FTP is disabled by default. * Several other small fixes (more details). Update to 1.2.38: * Have a look at the changelog for the list of changes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-157=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxmlsec1-openssl1-debuginfo-1.2.41-1.1 * xmlsec1-debugsource-1.2.41-1.1 * libxmlsec1-1-debuginfo-1.2.41-1.1 * libxmlsec1-openssl1-1.2.41-1.1 * libxmlsec1-1-1.2.41-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:23 -0000 Subject: SUSE-SU-2025:20071-1: moderate: Security update for sevctl Message-ID: <174902726345.655.11502948220779115225@smelt2.prg2.suse.org> # Security update for sevctl Announcement ID: SUSE-SU-2025:20071-1 Release Date: 2025-02-03T09:03:35Z Rating: moderate References: * bsc#1218499 * bsc#1218502 * bsc#1229953 Cross-References: * CVE-2023-50711 CVSS scores: * CVE-2023-50711 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L * CVE-2023-50711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for sevctl fixes the following issues: Security issue fixed: * CVE-2023-50711: Fixed out of bounds memory accesses in a vendored dependency (bsc#1218502) Non-security issue fixed: * Update vendored dependencies and re-enable cargo update obs service (bsc#1229953) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-136=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * sevctl-debuginfo-0.4.3-2.1 * sevctl-debugsource-0.4.3-2.1 * sevctl-0.4.3-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50711.html * https://bugzilla.suse.com/show_bug.cgi?id=1218499 * https://bugzilla.suse.com/show_bug.cgi?id=1218502 * https://bugzilla.suse.com/show_bug.cgi?id=1229953 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:14 -0000 Subject: SUSE-SU-2025:20055-1: important: Security update for containerized-data-importer Message-ID: <174902731448.655.7485917221379750739@smelt2.prg2.suse.org> # Security update for containerized-data-importer Announcement ID: SUSE-SU-2025:20055-1 Release Date: 2025-02-03T08:56:47Z Rating: important References: * bsc#1224119 Cross-References: * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for containerized-data-importer fixes the following issues: * Update to version 1.60.1 Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.60.1 * Add registry path for SLE15 SP7 * Bump to the latest tag 1.60.1-150600.3.9.1 * Use the images based on SLE15 SP6 BCI * Bump to the latest tag 1.59.0-150600.3.6.1 * Update to version 1.59.0 Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.59.0 Release notes https://github.com/kubevirt/containerized-data- importer/releases/tag/v1.58.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-160=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * containerized-data-importer-manifests-1.60.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:50 -0000 Subject: SUSE-RU-2025:20061-1: moderate: Recommended update for cockpit Message-ID: <174902729098.655.11238853243959362186@smelt2.prg2.suse.org> # Recommended update for cockpit Announcement ID: SUSE-RU-2025:20061-1 Release Date: 2025-02-03T08:57:56Z Rating: moderate References: * bsc#1221336 * bsc#1226050 * bsc#1227441 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for cockpit fixes the following issues: * Updated documentation to point at new links (bsc#1226050) * Removed additional hardcoded RH refs (bsc#1221336) * Use SUSE ID as branding instead of sle-micro (bsc#1227441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-66=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cockpit-309-7.1 * cockpit-bridge-309-7.1 * cockpit-ws-debuginfo-309-7.1 * cockpit-ws-309-7.1 * cockpit-bridge-debuginfo-309-7.1 * cockpit-debuginfo-309-7.1 * cockpit-debugsource-309-7.1 * SUSE Linux Micro 6.0 (noarch) * cockpit-system-309-7.1 * cockpit-selinux-309-7.1 * cockpit-networkmanager-309-7.1 * cockpit-storaged-309-7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221336 * https://bugzilla.suse.com/show_bug.cgi?id=1226050 * https://bugzilla.suse.com/show_bug.cgi?id=1227441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:25 -0000 Subject: SUSE-RU-2025:20099-1: moderate: Recommended update for open-vm-tools Message-ID: <174902732588.627.11286308466971702654@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:20099-1 Release Date: 2025-02-03T09:16:01Z Rating: moderate References: * bsc#1227181 * bsc#1231826 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for open-vm-tools fixes the following issues: Update to 12.5.0 (bsc#1231826): * There are no new features in the open-vm-tools 12.5.0 release. * This is primarily a maintenance release that addresses a few critical problems. For a more complete list of issues resolved in this release, see the Resolved Issues section of the Release Notes. * For complete details, see: https://github.com/vmware/open-vm- tools/releases/tag/stable-12.5.0 * Release Notes are available at: https://github.com/vmware/open-vm- tools/blob/stable-12.5.0/ReleaseNotes.md * The granular changes that have gone into the 12.5.0 release are in the ChangeLog at: https://github.com/vmware/open-vm- tools/blob/stable-12.5.0/open-vm-tools/ChangeLog Update to 12.4.5 (build 23787635) (bsc#1227181): * There are no new features in the open-vm-tools 12.4.5 release. This is primarily a maintenance release that addresses a few critical problems, including: * A number of issues flagged by Coverity and ShellCheck have been addressed. * A vmtoolsd process hang related to nested logging from an RPC Channel error has been fixed. * For a more complete list of issues resolved in this release, see the Resolved Issues section of the Release Notes. * For complete details, see: https://github.com/vmware/open-vm- tools/releases/tag/stable-12.4.5 * Release Notes are available at: https://github.com/vmware/open-vm- tools/blob/stable-12.4.5/ReleaseNotes.md * The granular changes that have gone into the 12.4.5 release are in the ChangeLog at: https://github.com/vmware/open-vm- tools/blob/stable-12.4.5/open-vm-tools/ChangeLog ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-149=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * open-vm-tools-debugsource-12.5.0-1.1 * open-vm-tools-12.5.0-1.1 * open-vm-tools-debuginfo-12.5.0-1.1 * libvmtools0-debuginfo-12.5.0-1.1 * libvmtools0-12.5.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1227181 * https://bugzilla.suse.com/show_bug.cgi?id=1231826 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:28 -0000 Subject: SUSE-SU-2025:20051-1: important: Security update for krb5 Message-ID: <174902732894.655.11206857813453368759@smelt2.prg2.suse.org> # Security update for krb5 Announcement ID: SUSE-SU-2025:20051-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1220770 * bsc#1220771 * bsc#1220772 * bsc#1227186 * bsc#1227187 Cross-References: * CVE-2024-26458 * CVE-2024-26461 * CVE-2024-26462 * CVE-2024-37370 * CVE-2024-37371 CVSS scores: * CVE-2024-26458 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26461 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26461 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26462 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26462 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26462 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37370 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-37370 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-37370 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37371 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37371 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-37371 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2024-37370: Confidential GSS krb5 wrap tokens with invalid plaintext Extra Count fields were erroneously accepted during unwrap (bsc#1227186) * CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187) * CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770) * CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771) * CVE-2024-26462: Fixed memory leak at /krb5/src/kdc/ndr.c (bsc#1220772) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-74=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-74=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * krb5-debugsource-1.20.1-5.1 * krb5-1.20.1-5.1 * krb5-debuginfo-1.20.1-5.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * krb5-mini-debugsource-1.20.1-5.1 * krb5-mini-debuginfo-1.20.1-5.1 * krb5-mini-1.20.1-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26458.html * https://www.suse.com/security/cve/CVE-2024-26461.html * https://www.suse.com/security/cve/CVE-2024-26462.html * https://www.suse.com/security/cve/CVE-2024-37370.html * https://www.suse.com/security/cve/CVE-2024-37371.html * https://bugzilla.suse.com/show_bug.cgi?id=1220770 * https://bugzilla.suse.com/show_bug.cgi?id=1220771 * https://bugzilla.suse.com/show_bug.cgi?id=1220772 * https://bugzilla.suse.com/show_bug.cgi?id=1227186 * https://bugzilla.suse.com/show_bug.cgi?id=1227187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:14 -0000 Subject: SUSE-SU-2025:20103-1: moderate: Security update for avahi Message-ID: <174902731495.627.15142824938396674381@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2025:20103-1 Release Date: 2025-02-03T09:17:39Z Rating: moderate References: * bsc#1212476 * bsc#1226586 * bsc#1233420 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: Properly randomize query id of DNS packets (bsc#1233420). Bug fixes: * No longer supply bogus services to callbacks (bsc#1226586). * Tag hardening patches as PATCH-FEATURE-OPENSUSE * Remove dependency on /usr/bin/python3 using %python3_fix_shebang macro (bsc#1212476). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-155=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libavahi-common3-debuginfo-0.8-6.1 * libavahi-client3-debuginfo-0.8-6.1 * libavahi-core7-debuginfo-0.8-6.1 * libavahi-core7-0.8-6.1 * libavahi-client3-0.8-6.1 * avahi-debuginfo-0.8-6.1 * avahi-0.8-6.1 * avahi-debugsource-0.8-6.1 * libavahi-common3-0.8-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1212476 * https://bugzilla.suse.com/show_bug.cgi?id=1226586 * https://bugzilla.suse.com/show_bug.cgi?id=1233420 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:27 -0000 Subject: SUSE-RU-2025:20098-1: moderate: Recommended update for regionServiceClientConfigAzure Message-ID: <174902732761.627.611947269784585788@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigAzure Announcement ID: SUSE-RU-2025:20098-1 Release Date: 2025-02-03T09:14:27Z Rating: moderate References: * bsc#1217537 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for regionServiceClientConfigAzure fixes the following issues: * Update to version 2.2.0 (jsc#PCT-360) * Add IPv6 certs to enable IPv6 access of the update infrastructure * Add patch to remove IPv6 on SLE 12, no IPv6 support in SLE 12 in the Public Cloud * Update to version 2.1.0 (bsc#1217537) * Replace certs 23.100.36.229.pem and 40.121.202.140.pem (4096 length): rgnsrv-azure-westus -> 23.100.36.229.pem expires 9 years rgnsrv-azure-eastus -> 40.121.202.140.pem expires 10 years * Update to version 2.0.1 (bsc#1217537) * Replacing 104.45.31.195.pem 191.237.254.253.pem certs expiring in 8 years and new length of 4096 These certs will replace the current certs that expire soon ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-183=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * regionServiceClientConfigAzure-2.2.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217537 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:42 -0000 Subject: SUSE-SU-2025:20065-1: important: Security update for python311 Message-ID: <174902728256.655.9662520726552699179@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:20065-1 Release Date: 2025-02-03T09:00:00Z Rating: important References: * bsc#1229596 * bsc#1229704 * bsc#1230227 Cross-References: * CVE-2024-6232 * CVE-2024-7592 * CVE-2024-8088 CVSS scores: * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: * CVE-2024-8088: Fixed a denial of service in zipfile (bsc#1229704) * CVE-2024-6232: Fixed a ReDos via excessive backtracking while parsing header values (bsc#1230227) * CVE-2024-7592: Fixed a denial of service in the http.cookies module (bsc#1229596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-87=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-debugsource-3.11.8-4.1 * python311-core-debugsource-3.11.8-4.1 * python311-curses-3.11.8-4.1 * libpython3_11-1_0-3.11.8-4.1 * libpython3_11-1_0-debuginfo-3.11.8-4.1 * python311-base-debuginfo-3.11.8-4.1 * python311-3.11.8-4.1 * python311-debuginfo-3.11.8-4.1 * python311-curses-debuginfo-3.11.8-4.1 * python311-base-3.11.8-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6232.html * https://www.suse.com/security/cve/CVE-2024-7592.html * https://www.suse.com/security/cve/CVE-2024-8088.html * https://bugzilla.suse.com/show_bug.cgi?id=1229596 * https://bugzilla.suse.com/show_bug.cgi?id=1229704 * https://bugzilla.suse.com/show_bug.cgi?id=1230227 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:38 -0000 Subject: SUSE-SU-2025:20094-1: moderate: Security update for python-requests Message-ID: <174902733899.627.10824560263710224472@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:20094-1 Release Date: 2025-02-03T09:12:09Z Rating: moderate References: * bsc#1224788 * bsc#1226321 * bsc#1231500 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for python-requests contains the following fixes: * Add patch to fix to inject the default CA bundles if they are not specified. (bsc#1226321, bsc#1231500) * Remove Requires on python-py, it should have been removed earlier. * update to 2.32.3: * Fixed bug breaking the ability to specify custom SSLContexts in sub-classes of HTTPAdapter. * Fixed issue where Requests started failing to run on Python versions compiled without the `ssl` module. * To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is * Fixed an issue where setting verify=False on the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, * verify=True now reuses a global SSLContext which should improve request time * Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-125=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-requests-2.32.3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 * https://bugzilla.suse.com/show_bug.cgi?id=1226321 * https://bugzilla.suse.com/show_bug.cgi?id=1231500 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:52 -0000 Subject: SUSE-SU-2025:20060-1: important: Security update for orc Message-ID: <174902729261.655.10570260866065708579@smelt2.prg2.suse.org> # Security update for orc Announcement ID: SUSE-SU-2025:20060-1 Release Date: 2025-02-03T08:57:45Z Rating: important References: * bsc#1228184 Cross-References: * CVE-2024-40897 CVSS scores: * CVE-2024-40897 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40897 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for orc fixes the following issues: * CVE-2024-40897: Fixed a stack-based buffer overflow when formatting error messages (bsc#1228184) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-52=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * liborc-0_4-0-0.4.34-2.1 * orc-debugsource-0.4.34-2.1 * liborc-0_4-0-debuginfo-0.4.34-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40897.html * https://bugzilla.suse.com/show_bug.cgi?id=1228184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:01 -0000 Subject: SUSE-SU-2025:20057-1: moderate: Security update for rust-keylime Message-ID: <174902730108.655.792583318577289340@smelt2.prg2.suse.org> # Security update for rust-keylime Announcement ID: SUSE-SU-2025:20057-1 Release Date: 2025-02-03T08:57:20Z Rating: moderate References: * bsc#1223234 * bsc#1229952 * bsc#1230029 Cross-References: * CVE-2024-32650 * CVE-2024-43806 CVSS scores: * CVE-2024-32650 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43806 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for rust-keylime fixes the following issues: * Update vendored crates (CVE-2024-43806, bsc#1229952, bsc#1230029) * rustix 0.37.25 * rustix 0.38.34 * shlex 1.3.0 * Update to version 0.2.6+13: * Enable test functional/iak-idevid-persisted-and-protected * build(deps): bump uuid from 1.7.0 to 1.10.0 * build(deps): bump openssl from 0.10.64 to 0.10.66 * keylime-agent/src/revocation: Fix comment indentation * keylime/crypto: Fix indentation of documentation comment * build(deps): bump thiserror from 1.0.59 to 1.0.63 * build(deps): bump serde_json from 1.0.116 to 1.0.120 * dependabot: Extend to also monitor workflow actions * ci: Disable Packit CI on CentOS Stream 9 * ci: use CODECOV_TOKEN when submitting coverage data * revocation: Use into() for unfallible transformation * secure_mount: Fix possible infinite loop * error: Rename enum variants to avoid clippy warning * Update to version 0.2.6~0: * Bump version to 0.2.6 * build(deps): bump libc from 0.2.153 to 0.2.155 * build(deps): bump serde from 1.0.196 to 1.0.203 * rpm/fedora: Update rust macro usage * config: Support hostnames in registrar_ip option * added use of persisted IAK and IDevID and authorisation values * config changes * Adding /agent/info API to agent * Fix leftover 'unnecessary qualification' warnings on tests * Update to version 0.2.5~4: * Fix 'unnecessary qualification' warnings * fix IAK template to match IDevID * rpm: fix COPR RPMs build for centos-stream-10 * Build COPR RPMs for centos-stream-10 * Update to version 0.2.5~0: * Bump version to 0.2.5 * cargo: Relax required version for pest crate * build(deps): bump log from 0.4.20 to 0.4.21 * build(deps): bump thiserror from 1.0.56 to 1.0.59 * actix-web update moves rustls as feature (bsc#1223234, CVE-2024-32650) * Update to version 0.2.4~39: * build(deps): bump openssl from 0.10.63 to 0.10.64 * build(deps): bump h2 from 0.3.24 to 0.3.26 * build(deps): bump serde_json from 1.0.107 to 1.0.116 * build(deps): bump actix-web from 4.4.1 to 4.5.1 * crypto: Enable TLS 1.3 * build(deps): bump tempfile from 3.9.0 to 3.10.1 * build(deps): bump mio from 0.8.4 to 0.8.11 * enable hex values to be used for tpm_ownerpassword * config: Support IPv6 with or without brackets * keylime: Implement a simple IP parser to remove brackets * crypto: Implement CertificateBuilder to generate certificates * tests: Fix coverage download by supporting arbitrary URL * cargo: Add testing feature to keylime library * Set X509 SAN with local DNSname/IP/IPv6 * Include newest Node20 versions for Github actions * tpm: Add unit test for uncovered public functions * crypto: Implement ECC key generation support * crypto: Add test for match_cert_to_template() * Fix minor typo, format and remove end whitespaces * crypto: Make error types less specific * tests/run.sh: Run tarpaulin with a single thread * payloads: Remove explicit drop of channel transmitter * crypto: Move to keylime library * crypto: Add specific type for every possible error * tpm: Rename origin of error as source in structures * list_parser: Add source for error for backtrace * algorithms: Make errors more specific * typo fix for default path to measured boot log file * README: remove mentions of libarchive as a dependency * Dockerfile.wolfi: Update clang to version 17 * docker: Remove libarchive as a dependency * rpm: Remove libarchive from dependencies * cargo: Replace compress-tools with zip crate * cargo: Bump ahash to version 0.8.7 * build(deps): bump serde from 1.0.195 to 1.0.196 * build(deps): bump libc from 0.2.152 to 0.2.153 * build(deps): bump reqwest from 0.11.23 to 0.11.24 * docker: Install configuration file in the correct path * config: Make IAK/IDevID disabled by default * Update to version 0.2.4+git.1706692574.a744517: * Bump version to 0.2.4 * build(deps): bump uuid from 1.4.1 to 1.7.0 * keylime-agent.conf: Allow setting event logs paths * Mutable log paths: allow IMA and MBA log paths to be overridden by keylime configuration. * workflows: Update checkout action to version 4 * build(deps): bump serde from 1.0.188 to 1.0.195 * build(deps): bump pest_derive from 2.7.0 to 2.7.6 * build(deps): bump openssl from 0.10.62 to 0.10.63 * build(deps): bump config from 0.13.3 to 0.13.4 * build(deps): bump base64 from 0.21.4 to 0.21.7 * build(deps): bump tempfile from 3.8.0 to 3.9.0 * build(deps): bump pest from 2.7.0 to 2.7.6 * build(deps): bump actix-web from 4.4.0 to 4.4.1 * build(deps): bump reqwest from 0.11.22 to 0.11.23 * build(deps): bump h2 from 0.3.17 to 0.3.24 * build(deps): bump shlex from 1.1.0 to 1.3.0 * cargo: Bump tss-esapi to version 7.4.0 * workflows: Fix keylime-bot token usage * tpm: Add error context for every possible error * tpm: Add AlgorithmError to TpmError * detect idevid template from certificates * build(deps): bump wiremock from 0.5.18 to 0.5.22 * build(deps): bump thiserror from 1.0.48 to 1.0.56 * Make use of workspace dependencies * build(deps): bump openssl from 0.10.57 to 0.10.62 * packit: Bump Fedora version used for code coverage * Update to version 0.2.3+git.1701075380.a5dc985: * build(deps): bump actix-rt from 2.8.0 to 2.9.0 * Bump version to 0.2.3 * build(deps): bump reqwest from 0.11.20 to 0.11.22 * Bump configuration version and fix enable_iak_idevid * Enable test functional/iak-idevid-register-with-certificates * Update packit plan with new tests * Add certificates and certificate checking for IDevID and IAK keys (#669) * Update to version 0.2.2+git.1697658634.9c7c6fa: * build(deps): bump rustix from 0.37.11 to 0.37.25 * build(deps): bump tempfile from 3.6.0 to 3.8.0 * build(deps): bump base64 from 0.21.0 to 0.21.4 * build(deps): bump serde_json from 1.0.96 to 1.0.107 * build(deps): bump openssl from 0.10.55 to 0.10.57 * cargo: Bump serde to version 1.0.188 * tests: Fix tarpaulin issues with dropped -v option * build(deps): bump signal-hook from 0.3.15 to 0.3.17 * build(deps): bump actix-web from 4.3.1 to 4.4.0 * build(deps): bump thiserror from 1.0.40 to 1.0.48 * Remove private_in_public * Initial PR to add support for IDevID and IAK * build(deps): bump uuid from 1.3.1 to 1.4.1 * build(deps): bump log from 0.4.17 to 0.4.20 * build(deps): bump reqwest from 0.11.16 to 0.11.20 * Do not use too specific version on cargo audit workflow * Add workflow to run cargo-audit security audit * README: update dependencies for Debian and Ubuntu * Use latest versions of checkout/upload-artifacts * docker: Add 'keylime' system user * Use "currently" for swtpm emulator warning (#632) * Update container workflow actions versions * Build container image and push to quay.io * README: update requirements * Update to version 0.2.2+git.1689256829.3d2b627: * Bump version to 0.2.2 * build(deps): bump tempfile from 3.5.0 to 3.6.0 * removing SIGINT stop signals from Dockerfiles and systemd service, as well as adding SIGTERM to IMA emulator as shutdown signal * Update to version 0.2.1+git.1689167094.67ce0cf: * cargo: Bump serde to version 1.0.166 * build(deps): bump libc from 0.2.142 to 0.2.147 * adding release Dockerfiles in 3 flavours: fedora, distroless and wolfi * hash: add more configurable hash algorithm for public key digest * cargo: Update clap to version 4.3.11 * cargo: Bump tokio crate version to 1.28.2 * Add an example of IMA policy * main: Gracefully shutdown on SIGTERM or SIGINT * cargo: Bump proc-macro2 crate version * revocation: Parse revocation actions flexibly * crypto: Add unit tests for x509 functions * crypto: Make internal functions private * config: Add unit test for the list to files mapping * config: Make trusted_client_ca to accept lists * lib: Implement parser for lists from config file * build(deps): bump openssl from 0.10.48 to 0.10.55 * Add secure mount sanity test to packit testing. * [packit] Do not let COPR project expire * Recommends the IMA Policy subpackage only if SELinux is configured * Update to version 0.2.1+git.1685699835.3c9d17c: * Remove MOUNT_SECURE bool * rpm: Remove unused directory and add dependency for mount * keylime-agent/src: update API version to 2.1 to consistent with https://github.com/keylime/keylime/blob/master/docs/rest_apis.rst * docker/fedora/keylime_rust.Dockerfile: add the logic of cloning and compiling rust-keylime * [tests] Update test coverage task name regexp * [tests] Simply coverage file URL parsing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-65=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * rust-keylime-debugsource-0.2.6+13-1.1 * rust-keylime-0.2.6+13-1.1 * rust-keylime-debuginfo-0.2.6+13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32650.html * https://www.suse.com/security/cve/CVE-2024-43806.html * https://bugzilla.suse.com/show_bug.cgi?id=1223234 * https://bugzilla.suse.com/show_bug.cgi?id=1229952 * https://bugzilla.suse.com/show_bug.cgi?id=1230029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:39 -0000 Subject: SUSE-SU-2025:20049-1: important: Security update for git Message-ID: <174902733934.655.8900025661480297177@smelt2.prg2.suse.org> # Security update for git Announcement ID: SUSE-SU-2025:20049-1 Release Date: 2025-02-03T08:56:21Z Rating: important References: * bsc#1042640 * bsc#1061041 * bsc#1069468 * bsc#1082023 * bsc#1216545 * bsc#1218588 * bsc#1218664 * bsc#1224168 * bsc#1224170 * bsc#1224171 * bsc#1224172 * bsc#1224173 * bsc#779536 * jsc#SLE-17838 Cross-References: * CVE-2005-4900 * CVE-2017-14867 * CVE-2024-32002 * CVE-2024-32004 * CVE-2024-32020 * CVE-2024-32021 * CVE-2024-32465 CVSS scores: * CVE-2005-4900 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2017-14867 ( SUSE ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2017-14867 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-32002 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-32002 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-32004 ( SUSE ): 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-32020 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L * CVE-2024-32021 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L * CVE-2024-32465 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities, contains one feature and has six fixes can now be installed. ## Description: This update for git fixes the following issues: git was updated to 2.45.1: * CVE-2024-32002: recursive clones on case-insensitive filesystems that support symbolic links are susceptible to case confusion (bsc#1224168) * CVE-2024-32004: arbitrary code execution during local clones (bsc#1224170) * CVE-2024-32020: file overwriting vulnerability during local clones (bsc#1224171) * CVE-2024-32021: git may create hardlinks to arbitrary user- readable files (bsc#1224172) * CVE-2024-32465: arbitrary code execution during clone operations (bsc#1224173) Update to 2.45.0: * Improved efficiency managing repositories with many references ("git init --ref-format=reftable") * "git checkout -p" and friends learned that that "@" is a synonym for "HEAD" * cli improvements handling refs * Expanded a number of commands and options, UI improvements * status.showUntrackedFiles now accepts "true" * git-cherry-pick(1) now automatically drops redundant commits with new --empty option * The userdiff patterns for C# has been updated. Update to 2.44.0: * "git checkout -B " now longer allows switching to a branch that is in use on another worktree. The users need to use "\--ignore-other- worktrees" option. * Faster server-side rebases with git replay * Faster pack generation with multi-pack reuse * rebase auto-squashing now works in non-interactive mode * pathspec now understands attr, e.g. ':(attr:~binary) for selecting non- binaries, or builtin_objectmode for selecting items by file mode or other properties * Many other cli UI and internal improvements and extensions * Do not replace apparmor configuration, fixes bsc#1216545 Update to 2.43.2: * https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.43.2.txt * Update to a new feature recently added, "git show-ref --exists". * Rename detection logic ignored the final line of a file if it is an incomplete line. * "git diff --no-rename A B" did not disable rename detection but did not trigger an error from the command line parser. * "git diff --no-index file1 file2" segfaulted while invoking the external diff driver, which has been corrected. * A failed "git tag -s" did not necessarily result in an error depending on the crypto backend, which has been corrected. * "git stash" sometimes was silent even when it failed due to unwritable index file, which has been corrected. * Recent conversion to allow more than 0/1 in GIT_FLUSH broke the mechanism by flipping what yes/no means by mistake, which has been corrected. Update to 2.43.1: * https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.43.1.txt * gitweb AppArmor profile: allow reading etc/gitweb-common.conf (bsc#1218664) * git moved to /usr/libexec/git/git, update AppArmor profile accordingly (bsc#1218588) Update to 2.43.0: * The "\--rfc" option of "git format-patch" used to be a valid way to override an earlier "\--subject-prefix=" on the command line and replace it with "[RFC PATCH]", but from this release, it merely prefixes the string "RFC " in front of the given subject prefix. If you are negatively affected by this change, please use "\--subject-prefix=PATCH --rfc" as a replacement. * In Git 2.42, "git rev-list --stdin" learned to take non-revisions (like "\--not") from the standard input, but the way such a "\--not" was handled was quite confusing, which has been rethought. The updated rule is that "\--not" given from the command line only affects revs given from the command line that comes but not revs read from the standard input, and "\--not" read from the standard input affects revs given from the standard input and not revs given from the command line. * A message written in olden time prevented a branch from getting checked out, saying it is already checked out elsewhere. But these days, we treat a branch that is being bisected or rebased just like a branch that is checked out and protect it from getting modified with the same codepath. The message has been rephrased to say that the branch is "in use" to avoid confusion. * Hourly and other schedules of "git maintenance" jobs are randomly distributed now. * "git cmd -h" learned to signal which options can be negated by listing such options like "\--[no-]opt". * The way authentication related data other than passwords (e.g., oauth token and password expiration data) are stored in libsecret keyrings has been rethought. * Update the libsecret and wincred credential helpers to correctly match which credential to erase; they erased the wrong entry in some cases. * Git GUI updates. * "git format-patch" learned a new "\--description-file" option that lets cover letter description to be fed; this can be used on detached HEAD where there is no branch description available, and also can override the branch description if there is one. * Use of the "\--max-pack-size" option to allow multiple packfiles to be created is now supported even when we are sending unreachable objects to cruft packs. * "git format-patch --rfc --subject-prefix=" used to ignore the "\--subject-prefix" option and used "[RFC PATCH]"; now we will add "RFC" prefix to whatever subject prefix is specified. * "git log --format" has been taught the %(decorate) placeholder for further customization over what the "\--decorate" option offers. * The default log message created by "git revert", when reverting a commit that records a revert, has been tweaked, to encourage people to describe complex "revert of revert of revert" situations better in their own words. * The command-line completion support (in contrib/) learned to complete "git commit --trailer=" for possible trailer keys. * "git update-index" learned the "\--show-index-version" option to inspect the index format version used by the on-disk index file. * "git diff" learned the "diff.statNameWidth" configuration variable, to give the default width for the name part in the "\--stat" output. * "git range-diff --notes=foo" compared "log --notes=foo --notes" of the two ranges, instead of using just the specified notes tree, which has been corrected to use only the specified notes tree. * The command line completion script (in contrib/) can be told to complete aliases by including ": git ;" in the alias to tell it that the alias should be completed in a similar way to how "git " is completed. The parsing code for the alias has been loosened to allow ';' without an extra space before it. * "git for-each-ref" and friends learned to apply mailmap to authorname and other fields in a more flexible way than using separate placeholder letters like %a[eElL] every time we want to come up with small variants. * "git repack" machinery learned to pay attention to the "\--filter=" option. * "git repack" learned the "\--max-cruft-size" option to prevent cruft packs from growing without bounds. * "git merge-tree" learned to take strategy backend specific options via the "-X" option, like "git merge" does. * "git log" and friends learned the "\--dd" option that is a short-hand for "\--diff-merges=first-parent -p". * The attribute subsystem learned to honor the "attr.tree" configuration variable that specifies which tree to read the .gitattributes files from. * "git merge-file" learns a mode to read three variants of the contents to be merged from blob objects. * see https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.43.0.txt Update 2.42.1: * Fix "git diff" exit code handling ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-48=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * git-debugsource-2.45.1-1.1 * git-core-2.45.1-1.1 * git-core-debuginfo-2.45.1-1.1 * git-2.45.1-1.1 * git-debuginfo-2.45.1-1.1 * perl-Git-2.45.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2005-4900.html * https://www.suse.com/security/cve/CVE-2017-14867.html * https://www.suse.com/security/cve/CVE-2024-32002.html * https://www.suse.com/security/cve/CVE-2024-32004.html * https://www.suse.com/security/cve/CVE-2024-32020.html * https://www.suse.com/security/cve/CVE-2024-32021.html * https://www.suse.com/security/cve/CVE-2024-32465.html * https://bugzilla.suse.com/show_bug.cgi?id=1042640 * https://bugzilla.suse.com/show_bug.cgi?id=1061041 * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1082023 * https://bugzilla.suse.com/show_bug.cgi?id=1216545 * https://bugzilla.suse.com/show_bug.cgi?id=1218588 * https://bugzilla.suse.com/show_bug.cgi?id=1218664 * https://bugzilla.suse.com/show_bug.cgi?id=1224168 * https://bugzilla.suse.com/show_bug.cgi?id=1224170 * https://bugzilla.suse.com/show_bug.cgi?id=1224171 * https://bugzilla.suse.com/show_bug.cgi?id=1224172 * https://bugzilla.suse.com/show_bug.cgi?id=1224173 * https://bugzilla.suse.com/show_bug.cgi?id=779536 * https://jira.suse.com/browse/SLE-17838 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:47 -0000 Subject: SUSE-RU-2025:20062-1: moderate: Recommended update for audit Message-ID: <174902728792.655.7889386381639842878@smelt2.prg2.suse.org> # Recommended update for audit Announcement ID: SUSE-RU-2025:20062-1 Release Date: 2025-02-03T08:58:51Z Rating: moderate References: * bsc#1215377 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for audit fixes the following issues: * Fix plugin termination when using systemd service units (bsc#1215377) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-77=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libauparse0-3.0.9-4.1 * libaudit1-3.0.9-4.1 * libauparse0-debuginfo-3.0.9-4.1 * audit-debugsource-3.0.9-4.1 * libaudit1-debuginfo-3.0.9-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215377 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:35 -0000 Subject: SUSE-SU-2025:20095-1: important: Security update for glib2 Message-ID: <174902733587.627.840292965190567817@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20095-1 Release Date: 2025-02-03T09:13:20Z Rating: important References: * bsc#1233282 Cross-References: * CVE-2024-52533 CVSS scores: * CVE-2024-52533 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2024-52533: Fix a single byte buffer overflow (bsc#1233282). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-140=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgmodule-2_0-0-2.76.2-6.1 * glib2-tools-debuginfo-2.76.2-6.1 * libglib-2_0-0-debuginfo-2.76.2-6.1 * libgobject-2_0-0-2.76.2-6.1 * libglib-2_0-0-2.76.2-6.1 * glib2-debugsource-2.76.2-6.1 * libgio-2_0-0-debuginfo-2.76.2-6.1 * libgobject-2_0-0-debuginfo-2.76.2-6.1 * libgio-2_0-0-2.76.2-6.1 * glib2-tools-2.76.2-6.1 * libgmodule-2_0-0-debuginfo-2.76.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52533.html * https://bugzilla.suse.com/show_bug.cgi?id=1233282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:16 -0000 Subject: SUSE-SU-2025:20083-1: moderate: Security update for curl Message-ID: <174902737678.627.3367471442476699699@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20083-1 Release Date: 2025-02-03T09:07:56Z Rating: moderate References: * bsc#1232528 Cross-References: * CVE-2024-9681 CVSS scores: * CVE-2024-9681 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9681 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9681 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9681 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-9681: Fixed HSTS subdomain overwrites parent cache entry (bsc#1232528) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-138=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcurl4-8.6.0-4.1 * curl-debuginfo-8.6.0-4.1 * curl-debugsource-8.6.0-4.1 * curl-8.6.0-4.1 * libcurl4-debuginfo-8.6.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9681.html * https://bugzilla.suse.com/show_bug.cgi?id=1232528 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:20 -0000 Subject: SUSE-SU-2025:20053-1: important: Security update for python-setuptools Message-ID: <174902732004.655.6843912615015453414@smelt2.prg2.suse.org> # Security update for python-setuptools Announcement ID: SUSE-SU-2025:20053-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1228105 Cross-References: * CVE-2024-6345 CVSS scores: * CVE-2024-6345 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-setuptools fixes the following issues: * CVE-2024-6345: Fixed code execution via download functions in the package_index module in pypa/setuptools (bsc#1228105) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-76=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-setuptools-69.0.2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6345.html * https://bugzilla.suse.com/show_bug.cgi?id=1228105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:27 -0000 Subject: SUSE-SU-2025:20080-1: moderate: Security update for podman Message-ID: <174902738779.627.4118676939235701606@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20080-1 Release Date: 2025-02-03T09:06:01Z Rating: moderate References: * bsc#1231208 * bsc#1231230 * bsc#1231499 * bsc#1231698 Cross-References: * CVE-2024-6104 * CVE-2024-9341 * CVE-2024-9407 * CVE-2024-9675 * CVE-2024-9676 CVSS scores: * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2024-9675 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2024-9676: Fixed a denial of service via a symlink traversal in the containers/storage library (bsc#1231698) * CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230) * CVE-2024-9675: Fixed caching of arbitrary directory mount (bsc#1231499) * CVE-2024-9407: Fixed improper input validation in bind-propagation option of Dockerfile RUN --mount instruction (bsc#1231208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-95=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-4.9.5-2.1 * podman-debuginfo-4.9.5-2.1 * podman-remote-debuginfo-4.9.5-2.1 * podman-remote-4.9.5-2.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2024-9341.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2024-9675.html * https://www.suse.com/security/cve/CVE-2024-9676.html * https://bugzilla.suse.com/show_bug.cgi?id=1231208 * https://bugzilla.suse.com/show_bug.cgi?id=1231230 * https://bugzilla.suse.com/show_bug.cgi?id=1231499 * https://bugzilla.suse.com/show_bug.cgi?id=1231698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:15 -0000 Subject: SUSE-SU-2025:20073-1: important: Security update for the Linux Kernel Message-ID: <174902725570.655.6246455590265239269@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20073-1 Release Date: 2025-02-03T09:04:19Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230413 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46794 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 162 vulnerabilities, contains two features and has 49 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * Drop mm patches that caused regressions (bsc#1230413) * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Move fixes into sorted section (bsc#1230119) * Move s390 kabi patch into the kabi section * Move upstreamed SCSI patches into sorted section * Move upstreamed input patch into sorted section * Move upstreamed kaslr patch into sorted section * Move upstreamed nvme patches into sorted section * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (stable-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kABI: Split kABI out of 'io_uring/kbuf: get rid of bl->is_ready' * kABI: Split kABI out of 'io_uring: Re-add dummy_ubuf for kABI purposes' * kABI: Split kABI out of io_uring/kbuf: protect io_buffer_list teardown with a reference * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-81=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-81=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-6.4.0-20.1 * kernel-macros-6.4.0-20.1 * kernel-source-6.4.0-20.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-20.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-20.1 * kernel-default-debuginfo-6.4.0-20.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_3-debugsource-1-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-1-1.2 * kernel-default-livepatch-6.4.0-20.1 * kernel-livepatch-6_4_0-20-default-1-1.2 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-20.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-20.1 * kernel-kvmsmall-debugsource-6.4.0-20.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-17.1.1.51 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-20.1 * kernel-default-6.4.0-20.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-20.1 * kernel-64kb-devel-6.4.0-20.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-syms-6.4.0-20.1 * kernel-obs-build-debugsource-6.4.0-20.1 * kernel-obs-build-6.4.0-20.1 * kernel-default-debugsource-6.4.0-20.1 * kernel-default-devel-6.4.0-20.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:24 -0000 Subject: SUSE-SU-2025:20081-1: important: Security update for openssl-3 Message-ID: <174902738469.627.5745453501497146752@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:20081-1 Release Date: 2025-02-03T09:06:02Z Rating: important References: * bsc#1220262 * bsc#1230698 Cross-References: * CVE-2023-50782 * CVE-2024-41996 CVSS scores: * CVE-2023-50782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-50782 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-50782 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41996 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2024-41996: Fixed a denial of service in the Diffie-Hellman Key Agreement Protocol (bsc#1230698). * CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-201=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libopenssl3-3.1.4-7.1 * openssl-3-3.1.4-7.1 * libopenssl3-debuginfo-3.1.4-7.1 * libopenssl-3-fips-provider-3.1.4-7.1 * openssl-3-debugsource-3.1.4-7.1 * openssl-3-debuginfo-3.1.4-7.1 * libopenssl-3-devel-3.1.4-7.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-7.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50782.html * https://www.suse.com/security/cve/CVE-2024-41996.html * https://bugzilla.suse.com/show_bug.cgi?id=1220262 * https://bugzilla.suse.com/show_bug.cgi?id=1230698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:23 -0000 Subject: SUSE-SU-2025:20052-1: important: Security update for gtk3 Message-ID: <174902732388.655.1736397378530887407@smelt2.prg2.suse.org> # Security update for gtk3 Announcement ID: SUSE-SU-2025:20052-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1228120 Cross-References: * CVE-2024-6655 CVSS scores: * CVE-2024-6655 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6655 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gtk3 fixes the following issues: * CVE-2024-6655: Fixed library injection from current working directory (bsc#1228120). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-75=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * gtk3-schema-3.24.37+70-6.1 * gtk3-data-3.24.37+70-6.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gtk3-tools-debuginfo-3.24.37+70-6.1 * typelib-1_0-Gtk-3_0-3.24.37+70-6.1 * gtk3-tools-3.24.37+70-6.1 * libgtk-3-0-3.24.37+70-6.1 * gtk3-debugsource-3.24.37+70-6.1 * libgtk-3-0-debuginfo-3.24.37+70-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6655.html * https://bugzilla.suse.com/show_bug.cgi?id=1228120 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:20 -0000 Subject: SUSE-SU-2025:20101-1: moderate: Security update for haproxy Message-ID: <174902732023.627.11573954037388738905@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:20101-1 Release Date: 2025-02-03T09:17:38Z Rating: moderate References: * bsc#1233973 Cross-References: * CVE-2024-53008 CVSS scores: * CVE-2024-53008 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-53008 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-53008 ( NVD ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: Update to version 2.8.11+git0.01c1056a4: * VUL-0: CVE-2024-53008: haproxy: HTTP/3 request smuggling via malformed HTTP headers forwarded to a HTTP/1.1 non-compliant back-end server (bsc#1233973) * BUG/MINOR: cfgparse-listen: fix option httpslog override warning message * BUG/MEDIUM: promex: Wait to have the request before sending the response * BUG/MEDIUM: cache/stats: Wait to have the request before sending the response * BUG/MEDIUM: queue: implement a flag to check for the dequeuing * BUG/MINOR: clock: validate that now_offset still applies to the current date * BUG/MINOR: clock: make time jump corrections a bit more accurate * BUG/MINOR: polling: fix time reporting when using busy polling * BUG/MAJOR: mux-h1: Wake SC to perform 0-copy forwarding in CLOSING state * BUG/MEDIUM: pattern: prevent UAF on reused pattern expr * BUG/MINOR: pattern: prevent const sample from being tampered in pat_match_beg() * BUG/MEDIUM: clock: detect and cover jumps during execution * REGTESTS: fix random failures with wrong_ip_port_logging.vtc under load * DOC: configuration: place the HAPROXY_HTTP_LOG_FMT example on the correct line * BUG/MINOR: pattern: do not leave a leading comma on "set" error messages * BUG/MINOR: pattern: pat_ref_set: return 0 if err was found * BUG/MINOR: pattern: pat_ref_set: fix UAF reported by coverity * BUG/MINOR: stconn: Request to send something to be woken up when the pipe is full * BUG/MEDIUM: mux-pt/mux-h1: Release the pipe on connection error on sending path * BUG/MEDIUM: clock: also update the date offset on time jumps * DOC: config: correct the table for option tcplog * BUG/MINOR: h3: properly reject too long header responses * BUG/MINOR: proto_uxst: delete fd from fdtab if listen() fails * BUG/MINOR: mux-quic: do not send too big MAX_STREAMS ID * REGTESTS: mcli: test the pipelined commands on master CLI * BUG/MEDIUM: mworker/cli: fix pipelined modes on master CLI * MINOR: channel: implement ci_insert() function * BUG/MINOR: proto_tcp: keep error msg if listen() fails * BUG/MINOR: proto_tcp: delete fd from fdtab if listen() fails * BUG/MINOR: quic/trace: make quic_conn_enc_level_init() emit NEW not CLOSE * BUG/MINOR: trace/quic: make "qconn" selectable as a lockon criterion * BUG/MINOR: trace: automatically start in waiting mode with "start " * BUG/MEDIUM: trace: fix null deref in lockon mechanism since TRACE_ENABLED() * BUG/MINOR: trace/quic: permit to lock on frontend/connect/session etc * BUG/MINOR: trace/quic: enable conn/session pointer recovery from quic_conn * BUG/MINOR: fcgi-app: handle a possible strdup() failure * BUG/MEDIUM: mux-h2: Propagate term flags to SE on error in h2s_wake_one_stream * BUG/MEDIUM: h2: Only report early HTX EOM for tunneled streams * BUG/MEDIUM: http-ana: Report error on write error waiting for the response * BUG/MEDIUM: quic: prevent conn freeze on 0RTT undeciphered content * BUG/MEDIUM: stconn: Report error on SC on send if a previous SE error was set * BUG/MEDIUM: mux-h1: Properly handle empty message when an error is triggered * BUG/MEDIUM: cli: Always release back endpoint between two commands on the mcli * BUG/MEDIUM: stream: Prevent mux upgrades if client connection is no longer ready * BUG/MEDIUM: init: fix fd_hard_limit default in compute_ideal_maxconn * MEDIUM: init: set default for fd_hard_limit via DEFAULT_MAXFD (take #2) * BUG/MEDIUM: queue: deal with a rare TOCTOU in assign_server_and_queue() * MINOR: queue: add a function to check for TOCTOU after queueing * BUG/MEDIUM: jwt: Clear SSL error queue on error when checking the signature * BUG/MINOR: quic: Lack of precision when computing K (cubic only cc) * BUG/MINOR: cli: Atomically inc the global request counter between CLI commands * BUG/MINOR: server: Don't warn fallback IP is used during init-addr resolution * BUG/MINOR: stick-table: fix crash for src_inc_gpc() without stkcounter * DOC: config: improve the http-keep-alive section * DOC: configuration: issuers-chain-path not compatible with OCSP * BUG/MEDIUM: ssl_sock: fix deadlock in ssl_sock_load_ocsp() on error path * BUG/MEDIUM: debug/cli: fix "show threads" crashing with low thread counts * BUG/MINOR: session: Eval L4/L5 rules defined in the default section * BUG/MEDIUM: bwlim: Be sure to never set the analyze expiration date in past * BUG/MEDIUM: spoe: Be sure to create a SPOE applet if none on the current thread * BUG/MEDIUM: h1: Reject empty Transfer-encoding header * BUG/MINOR: h1: Reject empty coding name as last transfer-encoding value * BUG/MINOR: h1: Fail to parse empty transfer coding names * BUG/MINOR: jwt: fix variable initialisation * DOC: configuration: update maxconn description * BUG/MINOR: jwt: don't try to load files with HMAC algorithm * MEDIUM: ssl: initialize the SSL stack explicitely * DOC: configuration: more details about the master-worker mode * BUG/MEDIUM: quic: fix possible exit from qc_check_dcid() without unlocking * BUG/MINOR: quic: fix race-condition on trace for CID retrieval * BUG/MINOR: quic: fix race condition in qc_check_dcid() * BUG/MEDIUM: quic: fix race-condition in quic_get_cid_tid() * BUG/MEDIUM: h3: ensure the ":scheme" pseudo header is totally valid * BUG/MEDIUM: h3: ensure the ":method" pseudo header is totally valid * MINOR: activity: make the memory profiling hash size configurable at build time * BUG/MINOR: hlua: report proper context upon error in hlua_cli_io_handler_fct() * BUG/MINOR: quic: fix BUG_ON() on Tx pkt alloc failure * BUG/MINOR: mux-quic: fix crash on qcs SD alloc failure * BUG/MINOR: h3: fix crash on STOP_SENDING receive after GOAWAY emission * DOC: api/event_hdl: small updates, fix an example and add some precisions * SCRIPTS: git-show-backports: do not truncate git-show output * DOC: configuration: fix alphabetical order of bind options * DOC: management: rename show stats domain cli "dns" to "resolvers" * DOC/MINOR: management: add missed -dR and -dv options * BUG/MINOR: proxy: fix header_unique_id leak on deinit() * BUG/MINOR: proxy: fix source interface and usesrc leaks on deinit() * BUG/MINOR: proxy: fix dyncookie_key leak on deinit() * BUG/MINOR: proxy: fix check_{command,path} leak on deinit() * BUG/MINOR: proxy: fix log_tag leak on deinit() * BUG/MINOR: proxy: fix server_id_hdr_name leak on deinit() * BUG/MINOR: quic: fix computed length of emitted STREAM frames * [RELEASE] Released version 2.8.10 * BUG/MEDIUM: quic: don't blindly rely on unaligned accesses * BUG/MAJOR: connection: fix server used_conns with H2 + reuse safe * BUG/MEDIUM: http_ana: ignore NTLM for reuse aggressive/always and no H1 * BUG/MAJOR: server: do not delete srv referenced by session * MINOR: session: rename private conns elements * BUG/MEDIUM: quic: fix connection freeze on post handshake * BUG/MEDIUM: server: fix dynamic servers initial settings * BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+RSA configuration * CLEANUP: hlua: simplify ambiguous lua_insert() usage in hlua_ctx_resume() * BUG/MINOR: hlua: fix leak in hlua_ckch_set() error path * BUG/MINOR: hlua: prevent LJMP in hlua_traceback() * BUG/MINOR: hlua: fix unsafe hlua_pusherror() usage * BUG/MINOR: hlua: don't use lua_pushfstring() when we don't expect LJMP * CLEANUP: hlua: use hlua_pusherror() where relevant * BUG/MINOR: quic: prevent crash on qc_kill_conn() * BUG/MINOR: hlua: use CertCache.set() from various hlua contexts * BUG/MINOR: tools: fix possible null-deref in env_expand() on out-of-memory * BUG/MINOR: tcpcheck: report correct error in tcp-check rule parser * BUG/MINOR: cfgparse: remove the correct option on httpcheck send-state warning * BUG/MINOR: activity: fix Delta_calls and Delta_bytes count * BUG/MINOR: ssl/ocsp: init callback func ptr as NULL * CLEANUP: ssl/ocsp: readable ifdef in ssl_sock_load_ocsp * BUILD: fd: errno is also needed without poll() * CI: scripts: fix build of vtest regarding option -C * REGTESTS: acl_cli_spaces: avoid a warning caused by undefined logs * DOC: config: fix incorrect section reference about custom log format * DOC: quic: specify that connection migration is not supported * BUG/MINOR: server: Don't reset resolver options on a new default-server line * BUG/MINOR: http-htx: Support default path during scheme based normalization * BUG/MINOR: quic: adjust restriction for stateless reset emission * MEDIUM: config: prevent communication with privileged ports * BUILD: quic: fix unused variable warning when threads are disabled * BUG/MEDIUM: mux-quic: Create sedesc in same time of the QUIC stream * BUG/MEDIUM: quic_tls: prevent LibreSSL < 4.0 from negotiating CHACHA20_POLY1305 * BUG/MAJOR: quic: Crash with TLS_AES_128_CCM_SHA256 (libressl only) * BUG/MINOR: connection: parse PROXY TLV for LOCAL mode * DOC: configuration: update the crt-list documentation * CLEANUP: ssl/cli: remove unused code in dump_crtlist_conf * BUG/MINOR: stats: Don't state the 303 redirect response is chunked * BUG/MINOR: htpp-ana/stats: Specify that HTX redirect messages have a C-L header * BUG/MEDIUM: fd: prevent memory waste in fdtab array * BUILD: stick-tables: better mark the stktable_data as 32-bit aligned * BUG/MEDIUM: h1: Reject CONNECT request if the target has a scheme * BUG/MINOR: h1: Check authority for non-CONNECT methods only if a scheme is found * BUG/MEDIUM: stick-tables: properly mark stktable_data as packed * BUG/MEDIUM: htx: mark htx_sl as packed since it may be realigned * BUG/MINOR: qpack: fix error code reported on QPACK decoding failure * BUG/MINOR: mux-quic: fix error code on shutdown for non HTTP/3 * BUG/MINOR: log: smp_rgs array issues with inherited global log directives * BUG/MINOR: log: keep the ref in dup_logger() * MINOR: log: add dup_logsrv() helper function * DOC: lua: fix filters.txt file location * BUG/MINOR: haproxy: only tid 0 must not sleep if got signal * BUILD: clock: improve check for pthread_getcpuclockid() * BUG/MINOR: mworker: reintroduce way to disable seamless reload with -x /dev/null * BUG/MINOR: h1: fix detection of upper bytes in the URI * BUG/MINOR: backend: use cum_sess counters instead of cum_conn * BUG/MINOR: fd: my_closefrom() on Linux could skip contiguous series of sockets * BUG/MINOR: sock: handle a weird condition with connect() * BUG/MINOR: stconn: Fix sc_mux_strm() return value * BUG/MEDIUM: cache: Vary not working properly on anything other than accept- encoding * BUG/MINOR: server: fix slowstart behavior * BUG/MEDIUM: peers: Fix exit condition when max-updates-at-once is reached * BUG/MEDIUM: spoe: Always retry when an applet fails to send a frame * BUG/MEDIUM: applet: Fix applet API to put input data in a buffer * BUG/MEDIUM: evports: do not clear returned events list on signal * BUG/MEDIUM: stconn: Don't forward channel data if input data must be filtered * BUG/MEDIUM: grpc: Fix several unaligned 32/64 bits accesses * MINOR: net_helper: Add support for floats/doubles. * CI: revert kernel addr randomization introduced in 3a0fc864 * BUG/MEDIUM: peers/trace: fix crash when listing event types * BUG/MINOR: debug: make sure DEBUG_STRICT=0 does work as documented * BUG/MINOR: http-ana: Fix TX_L7_RETRY and TX_D_L7_RETRY values * BUG/MEDIUM: http-ana: Deliver 502 on keep-alive for fressh server connection * CLEANUP: log: lf_text_len() returns a pointer not an integer * BUG/MINOR: log: invalid snprintf() usage in sess_build_logline() * BUG/MINOR: tools/log: invalid encode_{chunk,string} usage * BUG/MINOR: log: fix lf_text_len() truncate inconsistency * BUG/MINOR: listener: always assign distinct IDs to shards * BUG/MINOR: cli: Report an error to user if command or payload is too big * [RELEASE] Released version 2.8.9 * BUILD: proxy: Replace free_logformat_list() to manually release log-format * [RELEASE] Released version 2.8.8 * BUG/MINOR: proxy: fix logformat expression leak in use_backend rules * BUG/MINOR: backend: properly handle redispatch 0 * BUG/MINOR: server: ignore 'enabled' for dynamic servers * BUG/MEDIUM: cli: Warn if pipelined commands are delimited by a \n * MINOR: cli: Remove useless loop on commands to find unescaped semi-colon * MINOR: server: allow cookie for dynamic servers * BUG/MINOR: server: fix persistence cookie for dynamic servers * BUG/MINOR: ssl: Detect more 'ocsp-update' incompatibilities * BUG/MINOR: ssl: Wrong ocsp-update "incompatibility" error message * BUG/MINOR: server: 'source' interface ignored from 'default-server' directive * OPTIM: http_ext: avoid useless copy in http_7239_extract_{ipv4,ipv6} * BUG/MEDIUM: mux-fcgi: Properly handle EOM flag on end-of-trailers HTX block * BUG/MINOR: mux-quic: close all QCS before freeing QCC tasklet * BUG/MEDIUM: ssl: Fix crash in ocsp-update log function * BUG/MINOR: session: ensure conn owner is set after insert into session * BUG/MEDIUM: spoe: Return an invalid frame on recv if size is too small * CI: temporarily adjust kernel entropy to work with ASAN/clang * BUG/MINOR: spoe: Be sure to be able to quickly close IDLE applets on soft- stop * BUG/MEDIUM: spoe: Don't rely on stream's expiration to detect processing timeout * BUG/MINOR: listener: Don't schedule frontend without task in listener_release() * BUG/MINOR: listener: Wake proxy's mngmt task up if necessary on session release * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread (2nd try) * MINOR: hlua: use accessors for stream hlua ctx * DEBUG: lua: precisely identify if stream is stuck inside lua or not * BUG/MINOR: hlua: fix missing lock in hlua_filter_delete() * BUG/MINOR: hlua: missing lock in hlua_filter_new() * BUG/MINOR: hlua: segfault when loading the same filter from different contexts * BUG/MINOR: ssl: fix possible ctx memory leak in sample_conv_aes_gcm() * DOC: configuration: clarify ciphersuites usage (V2) * BUILD: solaris: fix compilation errors * BUG/MINOR: cfgparse: report proper location for log-format-sd errors * BUG/MINOR: ssl/cli: typo in new ssl crl-file CLI description * CI: skip scheduled builds on forks * BUG/MINOR: sink: fix a race condition in the TCP log forwarding code * BUG/MINOR: hlua: don't call ha_alert() in hlua_event_subscribe() * BUG/MAJOR: hlua: improper lock usage with hlua_ctx_resume() * BUG/MEDIUM: hlua: improper lock usage with SET_SAFE_LJMP() * BUG/MINOR: hlua: improper lock usage in hlua_filter_new() * BUG/MINOR: hlua: improper lock usage in hlua_filter_callback() * BUG/MINOR: hlua: fix possible crash in hlua_filter_new() under load * BUG/MINOR: hlua: don't use lua_tostring() from unprotected contexts * BUG/MINOR: hlua: fix unsafe lua_tostring() usage with empty stack * BUG/MINOR: tools: seed the statistical PRNG slightly better * MINOR: hlua: Be able to disable logging from lua * BUG/MINOR: hlua: Fix log level to the right value when set via TXN:set_loglevel * BUG/MINOR: config/quic: Alert about PROXY protocol use on a QUIC listener * DOC: configuration: clarify ciphersuites usage * LICENSE: http_ext: fix GPL license version * LICENSE: event_hdl: fix GPL license version * BUG/MINOR: ssl/cli: duplicate cleaning code in cli_parse_del_crtlist * BUG/MINOR: ist: only store NUL byte on succeeded alloc * BUG/MINOR: quic: fix output of show quic * BUG/MAJOR: server: fix stream crash due to deleted server * BUG/MINOR: stats: drop srv refcount on early release * BUG/MINOR: ist: allocate nul byte on istdup * MINOR: quic: warn on bind on multiple addresses if no IP_PKTINFO support * DOC: quic: fix recommandation for bind on multiple address * BUG/MEDIUM: quic: fix transient send error with listener socket * BUG/MEDIUM: hlua: Don't loop if a lua socket does not consume received data * BUG/MEDIUM: hlua: Be able to garbage collect uninitialized lua sockets * BUG/MEDIUM: applet: Immediately free appctx on early error * DOC: quic: Missing tuning setting in "Global parameters" * BUG/MINOR: qpack: reject invalid dynamic table capacity * BUG/MINOR: qpack: reject invalid increment count decoding * BUG/MINOR: quic: reject HANDSHAKE_DONE as server * BUG/MINOR: quic: reject unknown frame type * BUG/MAJOR: promex: fix crash on deleted server * MINOR: connection: add sample fetches to report per-connection glitches * MINOR: mux-h2: implement MUX_CTL_GET_GLITCHES * MINOR: connection: add a new mux_ctl to report number of connection glitches * MEDIUM: mux-h2: allow to set the glitches threshold to kill a connection * MINOR: mux-h2: always use h2c_report_glitch() * MINOR: mux-h2: count late reduction of INITIAL_WINDOW_SIZE as a glitch * MINOR: mux-h2: count excess of CONTINUATION frames as a glitch * BUG/MINOR: mux-h2: count rejected DATA frames against the connection's flow control * MINOR: mux-h2: add a counter of "glitches" on a connection * [RELEASE] Released version 2.8.7 * BUG/MAJOR: ssl/ocsp: crash with ocsp when old process exit or using ocsp CLI * [RELEASE] Released version 2.8.6 * DEV: makefile: fix POSIX compatibility for "range" target * DEV: makefile: add a new "range" target to iteratively build all commits * CI: Update to actions/cache at v4 * DOC: internal: update missing data types in peers-v2.0.txt * DOC: install: recommend pcre2 * DOC: httpclient: add dedicated httpclient section * DOC: configuration: clarify http-request wait-for-body * BUILD: address a few remaining calloc(size, n) cases * BUG/MINOR: ext-check: cannot use without preserve-env * MINOR: ext-check: add an option to preserve environment variables * BUG/MINOR: diag: run the final diags before quitting when using -c * BUG/MINOR: diag: always show the version before dumping a diag warning * MINOR: errors: ha_alert() and ha_warning() uses warn_exec_path() * MINOR: quic: Add a counter for reordered packets * MINOR: quic: Dynamic packet reordering threshold * MINOR: quic: Update K CUBIC calculation (RFC 9438) * BUG/MEDIUM: quic: Wrong K CUBIC calculation. * MINOR: quic: Stop using 1024th of a second. * BUG/MINOR: quic: fix possible integer wrap around in cubic window calculation * CLEANUP: quic: Code clarifications for QUIC CUBIC (RFC 9438) * BUG/MINOR: quic: Wrong ack ranges handling when reaching the limit. * BUG/MEDIUM: quic: fix crash on invalid qc_stream_buf_free() BUG_ON * BUG/MEDIUM: qpack: allow 6xx..9xx status codes * BUG/MEDIUM: h3: do not crash on invalid response status code * MINOR: h3: add traces for stream sending function * BUG/MEDIUM: quic: remove unsent data from qc_stream_desc buf * MINOR: quic: extract qc_stream_buf free in a dedicated function * MINOR: quic: Stop hardcoding a scale shifting value (CUBIC_BETA_SCALE_FACTOR_SHIFT) * CLEANUP: quic: Remove unused CUBIC_BETA_SCALE_FACTOR_SHIFT macro. * BUG/MEDIUM: mux-quic: report early error on stream * BUG/MINOR: h3: fix checking on NULL Tx buffer * BUG/MEDIUM: ssl: Fix crash when calling "update ssl ocsp-response" when an update is ongoing * REGTESTS: ssl: Add OCSP related tests * REGTESTS: ssl: Fix empty line in cli command input * BUG/MINOR: ssl: Reenable ocsp auto-update after an "add ssl crt-list" * BUG/MINOR: ssl: Destroy ckch instances before the store during deinit * BUG/MEDIUM: ocsp: Separate refcount per instance and per store * MINOR: ssl: Use OCSP_CERTID instead of ckch_store in ckch_store_build_certid * BUG/MINOR: ssl: Clear the ckch instance when deleting a crt-list line * BUG/MINOR: ssl: Duplicate ocsp update mode when dup'ing ckch * BUG/MINOR: ssl: Fix error message after ssl_sock_load_ocsp call * BUG/MAJOR: ssl_sock: Always clear retry flags in read/write functions * BUG/MEDIUM: h1: always reject the NUL character in header values * BUG/MINOR: h1-htx: properly initialize the err_pos field * BUG/MEDIUM: h1: Don't support LF only to mark the end of a chunk size * BUG/MINOR: h1: Don't support LF only at the end of chunks * BUG/MEDIUM: stconn: Don't check pending shutdown to wake an applet up * BUG/MEDIUM: stconn: Allow expiration update when READ/WRITE event is pending * BUG/MEDIUM: pool: fix rare risk of deadlock in pool_flush() * BUG/MINOR: jwt: fix jwt_verify crash on 32-bit archs * BUG/MEDIUM: cli: fix once for all the problem of missing trailing LFs * BUG/MINOR: vars/cli: fix missing LF after "get var" output * BUG/MEDIUM: cli: some err/warn msg dumps add LR into CSV output on stat's CLI * REGTESTS: add a test to ensure map-ordering is preserved * MINOR: mux-h2/traces: add a missing trace on connection WU with negative inc * BUG/MEDIUM: mux-h2: refine connection vs stream error on headers * MINOR: mux-h2/traces: clarify the "rejected H2 request" event * MINOR: mux-h2/traces: explicitly show the error/refused stream states * MINOR: mux-h2/traces: also suggest invalid header upon parsing error * MINOR: debug: make BUG_ON() catch build errors even without DEBUG_STRICT * MINOR: debug: make ABORT_NOW() store the caller's line number when using abort * MINOR: debug: make sure calls to ha_crash_now() are never merged * MINOR: compiler: add a new DO_NOT_FOLD() macro to prevent code folding * BUG/MEDIUM: quic: keylog callback not called (USE_OPENSSL_COMPAT) * BUG/MINOR: mux-h2: also count streams for refused ones * BUG/MINOR: mux-quic: do not prevent non-STREAM sending on flow control * DOC: configuration: corrected description of keyword tune.ssl.ocsp- update.mindelay * MINOR: mux-h2: support limiting the total number of H2 streams per connection * BUG/MEDIUM: spoe: Never create new spoe applet if there is no server up * BUG/MEDIUM: stconn: Forward shutdown on write timeout only if it is forwardable * BUG/MEDIUM: h3: fix incorrect snd_buf return value * CLEANUP: quic: Remaining useless code into server part * BUG/MINOR: h3: close connection on sending alloc errors * BUG/MINOR: h3: properly handle alloc failure on finalize * BUG/MINOR: h3: close connection on header list too big * MINOR: h3: check connection error during sending * BUG/MINOR: quic: Missing call to TLS message callbacks * BUG/MINOR: quic: Wrong keylog callback setting. * BUG/MINOR: mux-quic: always report error to SC on RESET_STREAM emission * BUG/MEDIUM: stats: unhandled switching rules with TCP frontend * MINOR: stats: store the parent proxy in stats ctx (http) * DOC: config: Update documentation about local haproxy response * BUG/MINOR: resolvers: default resolvers fails when network not configured * BUG/MEDIUM: mux-h2: Report too large HEADERS frame only when rxbuf is empty * BUG/MEDIUM: quic: QUIC CID removed from tree without locking * BUG/MEDIUM: quic: Possible buffer overflow when building TLS records * BUG/MINOR: mworker/cli: fix set severity-output support * DOC: configuration: typo req.ssl_hello_type * [RELEASE] Released version 2.8.5 * BUG/MEDIUM: proxy: always initialize the default settings after init * BUG/MINOR: lua: Wrong OCSP CID after modifying an SSL certficate (LUA) * BUG/MINOR: ssl: Wrong OCSP CID after modifying an SSL certficate * MINOR: ssl/cli: Add ha_(warning|alert) msgs to CLI ckch callback * BUG/MINOR: ssl: Double free of OCSP Certificate ID * BUG/MINOR: quic: Packet number spaces too lately initialized * BUG/MINOR: quic: Missing QUIC connection path member initialization * BUG/MINOR: quic: Possible leak of TX packets under heavy load * BUG/MEDIUM: quic: Possible crash during retransmissions and heavy load * BUG/MINOR: cache: Remove incomplete entries from the cache when stream is closed * BUG/MEDIUM: peers: fix partial message decoding * DOC: Clarify the differences between field() and word() * BUG/MINOR: sample: Make the `word` converter compatible with `-m found` * REGTESTS: sample: Test the behavior of consecutive delimiters for the field converter * DOC: config: fix monitor-fail typo * DOC: config: add matrix entry for "max-session-srv-conns" * DOC: config: specify supported sections for "max-session-srv-conns" * BUG/MINOR: cfgparse-listen: fix warning being reported as an alert * BUG/MINOR: config: Stopped parsing upon unmatched environment variables * BUG/MINOR: quic_tp: fix preferred_address decoding * DOC: config: fix missing characters in set-spoe-group action * BUG/MINOR: h3: always reject PUSH_PROMISE * BUG/MINOR: h3: fix TRAILERS encoding * BUG/MEDIUM: master/cli: Properly pin the master CLI on thread 1 / group 1 * BUG/MINOR: compression: possible NULL dereferences in comp_prepare_compress_request() * BUG/MINOR: quic: fix CONNECTION_CLOSE_APP encoding * DOC: lua: fix Proxy.get_mode() output * DOC: lua: add sticktable class reference from Proxy.stktable * REGTESTS: connection: disable http_reuse_be_transparent.vtc if !TPROXY * DOC: config: fix timeout check inheritance restrictions * DOC: 51d: updated 51Degrees repo URL for v3.2.10 * BUG/MINOR: server: do not leak default-server in defaults sections * BUG/MINOR: quic: Possible RX packet memory leak under heavy load * BUG/MEDIUM: quic: Possible crash for connections to be killed * BUG/MINOR: sock: mark abns sockets as non-suspendable and always unbind them * BUG/MINOR: startup: set GTUNE_SOCKET_TRANSFER correctly * REGTESTS: http: add a test to validate chunked responses delivery * BUG/MINOR: proxy/stktable: missing frees on proxy cleanup * MINOR: stktable: add stktable_deinit function * BUG/MINOR: stream/cli: report correct stream age in "show sess" * BUG/MEDIUM: mux-fcgi: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h1: fail earlier on malloc in takeover() * BUG/MEDIUM: mux-h2: fail earlier on malloc in takeover() * BUG/MAJOR: quic: complete thread migration before tcp-rules * [RELEASE] Released version 2.8.4 * BUG/MINOR: stconn: Report read activity on non-indep streams for partial sends * BUG/MINOR: stconn/applet: Report send activity only if there was output data * BUG/MINOR: stconn: Use HTX-aware channel's functions to get info on buffer * BUG/MINOR: stconn: Fix streamer detection for HTX streams * MINOR: channel: Add functions to get info on buffers and deal with HTX streams * MINOR: htx: Use a macro for overhead induced by HTX * BUG/MEDIUM: stconn: Update fsb date on partial sends * BUG/MEDIUM: stream: Don't call mux .ctl() callback if not implemented * BUG/MEDIUM: mworker: set the master variable earlier * BUG/MEDIUM: applet: Report a send activity everytime data were sent * BUG/MEDIUM: stconn: Report a send activity everytime data were sent * REGTESTS: http: Improve script testing abortonclose option * BUG/MEDIUM: stream: Properly handle abortonclose when set on backend only * MEDIUM: mux-h1: Handle MUX_SUBS_RECV flag in h1_ctl() and susbscribe for reads * MINOR: connection: Add a CTL flag to notify mux it should wait for reads again * BUG/MINOR: stconn: Handle abortonclose if backend connection was already set up * BUG/MEDIUM: connection: report connection errors even when no mux is installed * DOC: quic: Wrong syntax for "quic-cc-algo" keyword. * BUG/MINOR: sink: don't learn srv port from srv addr * BUG/MEDIUM: applet: Remove appctx from buffer wait list on release * DOC: config: use the word 'backend' instead of 'proxy' in 'track' description * BUG/MINOR: quic: fix retry token check inconsistency * DOC: management: -q is quiet all the time * BUG/MEDIUM: stconn: Don't update stream expiration date if already expired * BUG/MEDIUM: quic: Avoid some crashes upon TX packet allocation failures * BUG/MEDIUM: quic: Possible crashes when sending too short Initial packets * BUG/MEDIUM: quic: Avoid trying to send ACK frames from an empty ack ranges tree * BUG/MINOR: quic: idle timer task requeued in the past * BUG/MEDIUM: pool: fix releasable pool calculation when overloaded * BUG/MEDIUM: freq-ctr: Don't report overshoot for long inactivity period * BUG/MINOR: mux-h1: Properly handle http-request and http-keep-alive timeouts * BUG/MINOR: stick-table/cli: Check for invalid ipv4 key * BUG/MEDIUM: quic: fix sslconns on quic_conn alloc failure * BUG/MEDIUM: quic: fix actconn on quic_conn alloc failure * CLEANUP: htx: Properly indent htx_reserve_max_data() function * BUG/MINOR: stconn: Sanitize report for read activity * BUG/MEDIUM: Don't apply a max value on room_needed in sc_need_room() * BUG/MEDIUM: stconn: Don't report rcv/snd expiration date if SC cannot epxire * BUG/MEDIUM: pattern: don't trim pools under lock in pat_ref_purge_range() * BUG/MINOR: cfgparse/stktable: fix error message on stktable_init() failure * BUG/MINOR: stktable: missing free in parse_stick_table() * BUG/MINOR: tcpcheck: Report hexstring instead of binary one on check failure * BUG/MEDIUM: ssl: segfault when cipher is NULL * BUG/MINOR: mux-quic: fix early close if unset client timeout * BUG/MINOR: ssl: suboptimal certificate selection with TLSv1.3 and dual ECDSA/RSA * MEDIUM: quic: count quic_conn for global sslconns * MEDIUM: quic: count quic_conn instance for maxconn * MINOR: frontend: implement a dedicated actconn increment function * BUG/MINOR: ssl: use a thread-safe sslconns increment * BUG/MINOR: quic: do not consider idle timeout on CLOSING state * BUG/MEDIUM: server: "proto" not working for dynamic servers * MINOR: connection: add conn_pr_mode_to_proto_mode() helper func * DEBUG: mux-h2/flags: fix list of h2c flags used by the flags decoder * MINOR: lua: Add flags to configure logging behaviour * BUG/MINOR: ssl: load correctly @system-ca when ca-base is define * DOC: internal: filters: fix reference to entities.pdf * BUG/MINOR: mux-h2: update tracked counters with req cnt/req err * BUG/MINOR: mux-h2: commit the current stream ID even on reject * BUG/MEDIUM: peers: Fix synchro for huge number of tables * BUG/MEDIUM: peers: Be sure to always refresh recconnect timer in sync task * BUG/MINOR: trace: fix trace parser error reporting * BUG/MINOR: mux-h2: fix http-request and http-keep-alive timeouts again * BUG/MEDIUM: mux-h2: Don't report an error on shutr if a shutw is pending * BUG/MINOR: mux-h2: make up other blocked streams upon removal from list * BUG/MINOR: mux-h1: Send a 400-bad-request on shutdown before the first request * BUG/MEDIUM: quic-conn: free unsent frames on retransmit to prevent crash * BUG/MINOR: mux-quic: fix free on qcs-new fail alloc * BUG/MINOR: h3: strengthen host/authority header parsing * BUG/MINOR: mux-quic: support initial 0 max-stream-data * BUG/MEDIUM: mux-quic: fix RESET_STREAM on send-only stream * BUG/MINOR: quic: reject packet with no frame * BUG/MINOR: quic: Avoid crashing with unsupported cryptographic algos * BUG/MEDIUM: stconn: Fix comparison sign in sc_need_room() * BUG/MINOR: hq-interop: simplify parser requirement * BUG/MEDIUM: h1: Ignore C-L value in the H1 parser if T-E is also set * BUG/MINOR: mux-h1: Ignore C-L when sending H1 messages if T-E is also set * BUG/MINOR: mux-h1: Handle read0 in rcv_pipe() only when data receipt was tried * BUG/MEDIUM: hlua: Initialize appctx used by a lua socket on connect only * MINOR: hlua: Test the hlua struct first when the lua socket is connecting * MINOR: hlua: Save the lua socket's server in its context * MINOR: hlua: Save the lua socket's timeout in its context * MINOR: hlua: Don't preform operations on a not connected socket * MINOR: hlua: Set context's appctx when the lua socket is created * BUG/MEDIUM: http-ana: Try to handle response before handling server abort * BUG/MEDIUM: quic_conn: let the scheduler kill the task when needed * BUG/MEDIUM: actions: always apply a longest match on prefix lookup * BUG/MINOR: mux-quic: remove full demux flag on ncbuf release * BUG/MEDIUM: server/cli: don't delete a dynamic server that has streams * MINOR: pattern: fix pat_{parse,match}_ip() function comments * BUG/MINOR: server: add missing free for server->rdr_pfx * BUG/MAJOR: mux-h2: Report a protocol error for any DATA frame before headers * BUG/MINOR: freq_ctr: fix possible negative rate with the scaled API * BUG/MEDIUM: master/cli: Pin the master CLI on the first thread of the group 1 * BUG/MINOR: promex: fix backend_agg_check_status * BUG/MEDIUM: mux-fcgi: Don't swap trash and dbuf when handling STDERR records * BUG/MINOR: hlua/init: coroutine may not resume itself * BUG/MEDIUM: hlua: don't pass stale nargs argument to lua_resume() * CI: musl: drop shopt in workflow invocation * CI: musl: highlight section if there are coredumps * Revert "BUG/MEDIUM: quic: missing check of dcid for init pkt including a token" * BUG/MEDIUM: hlua: streams don't support mixing lua-load with lua-load-per- thread * MINOR: hlua: add hlua_stream_ctx_prepare helper function * BUILD: quic: fix build on centos 8 and USE_QUIC_OPENSSL_COMPAT * BUG/MINOR: quic: ssl_quic_initial_ctx() uses error count not error code * BUG/MINOR: quic: allow-0rtt warning must only be emitted with quic bind * BUILD: Makefile: add USE_QUIC_OPENSSL_COMPAT to make help * MINOR: quic+openssl_compat: Emit an alert for "allow-0rtt" option * MINOR: quic+openssl_compat: Do not start without "limited-quic" * MINOR: quic: Warning for OpenSSL wrapper QUIC bindings without "limited- quic" * BUG/MINOR: quic+openssl_compat: Non initialized TLS encryption levels * DOC: quic: Add "limited-quic" new tuning setting * MINOR: quic: Add "limited-quic" new tuning setting * MINOR: quic: SSL context initialization with QUIC OpenSSL wrapper. * MINOR: quic: Add a quic_openssl_compat struct to quic_conn struct * MINOR: quic: Call the keylog callback for QUIC openssl wrapper from SSL_CTX_keylog() * MINOR: quic: Initialize TLS contexts for QUIC openssl wrapper * MINOR: quic: Export some KDF functions (QUIC-TLS) * MINOR: quic: Add a compilation option for the QUIC OpenSSL wrapper * MINOR: quic: Do not enable 0RTT with SSL_set_quic_early_data_enabled() * MINOR: quic: Set the QUIC connection as extra data before calling SSL_set_quic_method() * MINOR: quic: Do not enable O-RTT with USE_QUIC_OPENSSL_COMPAT * MINOR: quic: Include QUIC opensssl wrapper header from TLS stacks compatibility header * MINOR: quic: QUIC openssl wrapper implementation * BUG/MINOR: quic: Wrong cluster secret initialization * BUG/MINOR: quic: Leak of frames to send. * BUILD: bug: make BUG_ON() void to avoid a rare warning ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-163=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * haproxy-debugsource-2.8.11+git0.01c1056a4-1.1 * haproxy-2.8.11+git0.01c1056a4-1.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53008.html * https://bugzilla.suse.com/show_bug.cgi?id=1233973 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:29 -0000 Subject: SUSE-SU-2025:20097-1: moderate: Security update for wget Message-ID: <174902732998.627.17330734667174983785@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2025:20097-1 Release Date: 2025-02-03T09:14:08Z Rating: moderate References: * bsc#1233773 Cross-References: * CVE-2024-10524 CVSS scores: * CVE-2024-10524 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10524 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N * CVE-2024-10524 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-10524: Drop support for shorthand URLs (bsc#1233773). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-128=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * wget-debuginfo-1.24.5-2.1 * wget-1.24.5-2.1 * wget-debugsource-1.24.5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10524.html * https://bugzilla.suse.com/show_bug.cgi?id=1233773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:25 -0000 Subject: SUSE-SU-2025:20117-1: important: Security update for python-Jinja2 Message-ID: <174902726594.627.12858291203825895453@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20117-1 Release Date: 2025-02-03T09:20:59Z Rating: important References: * bsc#1234808 * bsc#1234809 Cross-References: * CVE-2024-56201 * CVE-2024-56326 CVSS scores: * CVE-2024-56201 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56201 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56201 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56326 ( NVD ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-56326 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808) * CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-184=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-Jinja2-3.1.2-7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56201.html * https://www.suse.com/security/cve/CVE-2024-56326.html * https://bugzilla.suse.com/show_bug.cgi?id=1234808 * https://bugzilla.suse.com/show_bug.cgi?id=1234809 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:59 -0000 Subject: SUSE-SU-2025:20089-1: moderate: Security update for wpa_supplicant Message-ID: <174902735989.627.8909262542296163653@smelt2.prg2.suse.org> # Security update for wpa_supplicant Announcement ID: SUSE-SU-2025:20089-1 Release Date: 2025-02-03T09:09:41Z Rating: moderate References: * bsc#1219975 Cross-References: * CVE-2023-52160 CVSS scores: * CVE-2023-52160 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52160 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-52160 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for wpa_supplicant fixes the following issues: * CVE-2023-52160: Fixed WiFi authentication bypass (bsc#1219975). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-139=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * wpa_supplicant-debuginfo-2.10-5.1 * wpa_supplicant-debugsource-2.10-5.1 * wpa_supplicant-2.10-5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52160.html * https://bugzilla.suse.com/show_bug.cgi?id=1219975 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:41 -0000 Subject: SUSE-RU-2025:20048-1: critical: Recommended update for perl-Bootloader Message-ID: <174902734132.655.14747631647802175772@smelt2.prg2.suse.org> # Recommended update for perl-Bootloader Announcement ID: SUSE-RU-2025:20048-1 Release Date: 2025-02-03T08:56:21Z Rating: critical References: * bsc#1215064 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for perl-Bootloader fixes the following issues: * bootloader_entry script can have an optional 'force-default' argument (bsc#1215064) This fixes the %post section for kernel-rt. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-42=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * perl-Bootloader-1.6-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:06 -0000 Subject: SUSE-SU-2025:20087-1: important: Security update for libarchive Message-ID: <174902736632.627.12498017402088633691@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2025:20087-1 Release Date: 2025-02-03T09:09:14Z Rating: important References: * bsc#1225972 * bsc#1231544 * bsc#1231624 Cross-References: * CVE-2024-20697 * CVE-2024-26256 * CVE-2024-48957 * CVE-2024-48958 CVSS scores: * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-26256 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-48957 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-48958 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-48958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-48958: Fixed out-of-bounds access in execute_filter_delta (bsc#1231624). * CVE-2024-20697: Fixed out-of-bounds remote code execution vulnerability (bsc#1225972). * CVE-2024-48957: Fixed out-of-bounds access in execute_filter_audio (bsc#1231544). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-121=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.6.2-4.1 * libarchive13-3.6.2-4.1 * libarchive-debugsource-3.6.2-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20697.html * https://www.suse.com/security/cve/CVE-2024-26256.html * https://www.suse.com/security/cve/CVE-2024-48957.html * https://www.suse.com/security/cve/CVE-2024-48958.html * https://bugzilla.suse.com/show_bug.cgi?id=1225972 * https://bugzilla.suse.com/show_bug.cgi?id=1231544 * https://bugzilla.suse.com/show_bug.cgi?id=1231624 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:52 -0000 Subject: SUSE-SU-2025:20091-1: important: Security update for containerd Message-ID: <174902735298.627.14818143671102507778@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:20091-1 Release Date: 2025-02-03T09:11:18Z Rating: important References: * bsc#1200528 * bsc#1217070 * bsc#1221400 * bsc#1224323 * bsc#1228553 Cross-References: * CVE-2022-1996 * CVE-2023-45142 * CVE-2023-45288 * CVE-2023-47108 CVSS scores: * CVE-2022-1996 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1996 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1996 ( NVD ): 9.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has one fix can now be installed. ## Description: This update for containerd fixes the following issues: * Update to containerd v1.7.21. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.21 Fixes CVE-2023-47108. bsc#1217070 Fixes CVE-2023-45142. bsc#1228553 * Update to containerd v1.7.17. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.17 * Update to containerd v1.7.16. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.16 CVE-2023-45288 bsc#1221400 * Update to containerd v1.7.15. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.15 * Update to containerd v1.7.14. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.14 * Update to containerd v1.7.13. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.13 * Update to containerd v1.7.12. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.12 * Update to containerd v1.7.11. Upstream release notes: https://github.com/containerd/containerd/releases/tag/v1.7.11 GHSA- jq35-85cj-fj4p bsc#1224323 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-147=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * containerd-1.7.21-1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-1996.html * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://bugzilla.suse.com/show_bug.cgi?id=1200528 * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1221400 * https://bugzilla.suse.com/show_bug.cgi?id=1224323 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:10 -0000 Subject: SUSE-SU-2025:20056-1: critical: Security update for docker Message-ID: <174902731060.655.15864377884201060960@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20056-1 Release Date: 2025-02-03T08:56:57Z Rating: critical References: * bsc#1210141 * bsc#1214855 * bsc#1215323 * bsc#1217513 * bsc#1219267 * bsc#1219268 * bsc#1219438 * bsc#1220339 * bsc#1221916 * bsc#1223409 * bsc#1228324 Cross-References: * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 * CVE-2024-41110 CVSS scores: * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has seven fixes can now be installed. ## Description: This update for docker fixes the following issues: Security fixes: * CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267) * CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268) * CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438) * CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324) Other changes: * Update to Docker 25.0.6-ce. * Fix BuildKit's symlink resolution logic to correctly handle non-lexical symlinks. (bsc#1221916) * Write volume options atomically so sudden system crashes won't result in future Docker starts failing due to empty files. (bsc#1214855) * Fixed world writable docker overlay files (bsc#1220339) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-64=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-25.0.6_ce-1.1 * docker-debuginfo-25.0.6_ce-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1210141 * https://bugzilla.suse.com/show_bug.cgi?id=1214855 * https://bugzilla.suse.com/show_bug.cgi?id=1215323 * https://bugzilla.suse.com/show_bug.cgi?id=1217513 * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 * https://bugzilla.suse.com/show_bug.cgi?id=1220339 * https://bugzilla.suse.com/show_bug.cgi?id=1221916 * https://bugzilla.suse.com/show_bug.cgi?id=1223409 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:53:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:53:50 -0000 Subject: SUSE-RU-2025:20127-1: moderate: Recommended update for python-PyJWT Message-ID: <174902723083.627.2368242216262847873@smelt2.prg2.suse.org> # Recommended update for python-PyJWT Announcement ID: SUSE-RU-2025:20127-1 Release Date: 2025-02-13T12:29:03Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for python-PyJWT fixes the following issues: Update to version 2.9.0 * Allow JWT issuer claim validation to accept a list of strings too by @mattpollak in #913 * Fix unnecessary string concatenation by @sirosen in #904 * Fix docs for `jwt.decode_complete` to include `strict_aud` option by @woodruffw in #923 * Fix docs step by @jpadilla in #950 * Fix: Remove an unused variable from example code block by @kenkoooo in #958 * Add support for Python 3.12 by @hugovk in #910 * Improve performance of `is_ssh_key` \+ add unit test by @bdraco in #940 * Allow `jwt.decode()` to accept a PyJWK object by @luhn in #886 * Make `algorithm_name` attribute available on PyJWK by @luhn in #886 * Raise `InvalidKeyError` on invalid PEM keys to be compatible with cryptography 42.x.x by @CollinEMac in #952 * Raise an exception when required cryptography dependency is missing by @tobloef in #963 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-214=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-PyJWT-2.9.0-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:39 -0000 Subject: SUSE-SU-2025:20110-1: critical: Security update for docker Message-ID: <174902727999.627.8859279302388869526@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20110-1 Release Date: 2025-02-03T09:19:38Z Rating: critical References: * bsc#1217070 * bsc#1228324 * bsc#1228553 * bsc#1229806 * bsc#1230294 * bsc#1230331 * bsc#1230333 * bsc#1231348 * bsc#1232999 * bsc#1233819 Cross-References: * CVE-2023-45142 * CVE-2023-47108 * CVE-2024-41110 CVSS scores: * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities and has seven fixes can now be installed. ## Description: This update for docker fixes the following issues: * Update docker-buildx to v0.19.2. See upstream changelog online at . Some notable changelogs from the last update: * * * Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Add %{_sysconfdir}/audit/rules.d to filelist. * Update to Docker 26.1.5-ce. See upstream changelog online at bsc#1230294 * This update includes fixes for: * CVE-2024-41110. bsc#1228324 * CVE-2023-47108. bsc#1217070 * CVE-2023-45142. bsc#1228553 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-169=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-26.1.5_ce-1.1 * docker-debuginfo-26.1.5_ce-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 * https://bugzilla.suse.com/show_bug.cgi?id=1229806 * https://bugzilla.suse.com/show_bug.cgi?id=1230294 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://bugzilla.suse.com/show_bug.cgi?id=1232999 * https://bugzilla.suse.com/show_bug.cgi?id=1233819 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:32 -0000 Subject: SUSE-RU-2025:20079-1: moderate: Recommended update for pam Message-ID: <174902739210.627.1746473582363398700@smelt2.prg2.suse.org> # Recommended update for pam Announcement ID: SUSE-RU-2025:20079-1 Release Date: 2025-02-03T09:05:41Z Rating: moderate References: * bsc#1194818 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for pam fixes the following issue: * Prevent cursor escape from the login prompt (bsc#1194818) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-94=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * pam-debugsource-1.6.0-3.1 * pam-debuginfo-1.6.0-3.1 * pam-1.6.0-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1194818 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:23 -0000 Subject: SUSE-RU-2025:20100-1: moderate: Recommended update for selinux-policy Message-ID: <174902732394.627.16964860506923657193@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2025:20100-1 Release Date: 2025-02-03T09:16:48Z Rating: moderate References: * bsc#1232753 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Trigger a full relabel on transactional systems upon module installation. This is rather expensive and will hopefully be replaced by a more fine grained solution later on (bsc#1232753) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-175=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * selinux-policy-devel-20230523+git25.ad22dd7f-2.1 * selinux-policy-targeted-20230523+git25.ad22dd7f-2.1 * cockpit-storaged-309-7.2 * cockpit-selinux-309-7.2 * cockpit-system-309-7.2 * swtpm-selinux-0.8.0-1.87 * cockpit-networkmanager-309-7.2 * container-selinux-2.211.0-2.101 * selinux-policy-20230523+git25.ad22dd7f-2.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * swtpm-debugsource-0.8.0-1.87 * cockpit-bridge-debuginfo-309-7.2 * cockpit-debuginfo-309-7.2 * cockpit-bridge-309-7.2 * swtpm-0.8.0-1.87 * cockpit-309-7.2 * cockpit-ws-309-7.2 * cockpit-ws-debuginfo-309-7.2 * cockpit-debugsource-309-7.2 * swtpm-debuginfo-0.8.0-1.87 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232753 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:32 -0000 Subject: SUSE-SU-2025:20050-1: important: Security update for libarchive Message-ID: <174902733220.655.8365313319316746647@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2025:20050-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1225971 * bsc#1225972 Cross-References: * CVE-2024-20696 * CVE-2024-20697 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20696 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-20696: Fixed out-of-bounds access in in copy_from_lzss_window_to_unp() (bsc#1225971) * CVE-2024-20697: Fixed heap based buffer overflow in rar e8 filter (bsc#1225972) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-47=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libarchive-debugsource-3.6.2-3.1 * libarchive13-debuginfo-3.6.2-3.1 * libarchive13-3.6.2-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://www.suse.com/security/cve/CVE-2024-20697.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 * https://bugzilla.suse.com/show_bug.cgi?id=1225972 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:46 -0000 Subject: SUSE-SU-2025:20092-1: important: Security update for ucode-intel Message-ID: <174902734690.627.6571942576398631006@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20092-1 Release Date: 2025-02-03T09:11:18Z Rating: important References: * bsc#1233313 Cross-References: * CVE-2024-21820 * CVE-2024-21853 * CVE-2024-23918 * CVE-2024-23984 * CVE-2024-24968 CVSS scores: * CVE-2024-21820 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N * CVE-2024-21820 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2024-21820 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-21820 ( NVD ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2024-21853 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21853 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-21853 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23918 ( SUSE ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-23918 ( SUSE ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-23918 ( NVD ): 8.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23918 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-23984 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-23984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-23984 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23984 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-24968 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-24968 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-24968 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-24968 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20241112 release (bsc#1233313) * CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel Xeon Processors may allow an authorized user to potentially enable denial of service via local access. * CVE-2024-23918: Improper conditions check in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. * CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access. * CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access. * CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access. * Update for functional issues. Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000036 00000037 Core Gen12 ADL H0 06-97-05/07 00000036 00000037 Core Gen12 ADL L0 06-9a-03/80 00000434 00000435 Core Gen12 ADL R0 06-9a-04/80 00000434 00000435 Core Gen12 EMR-SP A0 06-cf-01/87 21000230 21000283 Xeon Scalable Gen5 EMR-SP A1 06-cf-02/87 21000230 21000283 Xeon Scalable Gen5 MTL C0 06-aa-04/e6 0000001f 00000020 Core? Ultra Processor RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004122 00004123 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000036 00000037 Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000036 00000037 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004122 00004123 Core Gen13 SPR-SP E3 06-8f-06/87 2b0005c0 2b000603 Xeon Scalable Gen4 SPR-SP E4/S2 06-8f-07/87 2b0005c0 2b000603 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b0005c0 2b000603 Xeon Scalable Gen4 New Disclosures Updated in Prior Releases: Processor Stepping F-M-S/PI Old Ver New Ver Products ICL-D B0 06-6c-01/10 010002b0 N/A Xeon D-17xx/D-18xx, D-27xx/D-28xx ICX-SP Dx/M1 06-6a-06/87 0d0003e7 N/A Xeon Scalable Gen3 * Intel CPU Microcode was updated to the 20241029 release Update for functional issues. Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products RPL-E/HX/S B0 06-b7-01/32 00000129 0000012b Core Gen13/Gen14 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-189=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20241112-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21820.html * https://www.suse.com/security/cve/CVE-2024-21853.html * https://www.suse.com/security/cve/CVE-2024-23918.html * https://www.suse.com/security/cve/CVE-2024-23984.html * https://www.suse.com/security/cve/CVE-2024-24968.html * https://bugzilla.suse.com/show_bug.cgi?id=1233313 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:35 -0000 Subject: SUSE-RU-2025:20078-1: moderate: Recommended update for gcc13 Message-ID: <174902739522.627.15847160337885602992@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2025:20078-1 Release Date: 2025-02-03T09:05:40Z Rating: moderate References: * bsc#1231833 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has one fix can now be installed. ## Description: This update for gcc13 fixes the following issues: * Fix for parsing tzdata 2024b [gcc#116657] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-119=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-119=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgcc_s1-13.3.0+git8781-2.1 * libgomp1-13.3.0+git8781-2.1 * libgomp1-debuginfo-13.3.0+git8781-2.1 * gcc13-debugsource-13.3.0+git8781-2.1 * libatomic1-debuginfo-13.3.0+git8781-2.1 * libgcc_s1-debuginfo-13.3.0+git8781-2.1 * libstdc++6-13.3.0+git8781-2.1 * libstdc++6-debuginfo-13.3.0+git8781-2.1 * libatomic1-13.3.0+git8781-2.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * libstdc++6-devel-gcc13-13.3.0+git8781-2.1 * libubsan1-13.3.0+git8781-2.1 * gcc13-c++-13.3.0+git8781-2.1 * cpp13-debuginfo-13.3.0+git8781-2.1 * gcc13-PIE-13.3.0+git8781-2.1 * libasan8-debuginfo-13.3.0+git8781-2.1 * libitm1-13.3.0+git8781-2.1 * gcc13-debugsource-13.3.0+git8781-2.1 * gcc13-13.3.0+git8781-2.1 * libitm1-debuginfo-13.3.0+git8781-2.1 * libasan8-13.3.0+git8781-2.1 * libtsan2-13.3.0+git8781-2.1 * cpp13-13.3.0+git8781-2.1 * libtsan2-debuginfo-13.3.0+git8781-2.1 * libubsan1-debuginfo-13.3.0+git8781-2.1 * gcc13-debuginfo-13.3.0+git8781-2.1 * liblsan0-13.3.0+git8781-2.1 * gcc13-c++-debuginfo-13.3.0+git8781-2.1 * liblsan0-debuginfo-13.3.0+git8781-2.1 * SUSE Linux Micro Extras 6.0 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-2.1 * libhwasan0-13.3.0+git8781-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231833 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:09 -0000 Subject: SUSE-SU-2025:20086-1: moderate: Security update for expat Message-ID: <174902736962.627.12352993797656061153@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20086-1 Release Date: 2025-02-03T09:09:14Z Rating: moderate References: * bsc#1232579 Cross-References: * CVE-2024-50602 CVSS scores: * CVE-2024-50602 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-50602: Fixed possible denial-of-service vulnerability inside XML_ResumeParser (bsc#1232579). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-120=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * expat-debugsource-2.5.0-4.1 * libexpat1-debuginfo-2.5.0-4.1 * libexpat1-2.5.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1232579 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:43 -0000 Subject: SUSE-RU-2025:20093-1: moderate: Recommended update for elemental-operator Message-ID: <174902734311.627.12515694337653126556@smelt2.prg2.suse.org> # Recommended update for elemental-operator Announcement ID: SUSE-RU-2025:20093-1 Release Date: 2025-02-03T09:11:51Z Rating: moderate References: * bsc#1232211 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for elemental-operator contains the following fixes: * Update to version 1.6.6: * Do not include Config to MachineRegistration as pointer. (bsc#1232211) * Align values.yaml and questions.yaml. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-124=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-register-1.6.6-1.1 * elemental-support-1.6.6-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1232211 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:58:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:58:23 -0000 Subject: SUSE-SU-2025:20075-1: low: Security update for patch Message-ID: <174902750356.627.2452595625864497204@smelt2.prg2.suse.org> # Security update for patch Announcement ID: SUSE-SU-2025:20075-1 Release Date: 2025-02-03T09:04:34Z Rating: low References: * bsc#1167721 Cross-References: * CVE-2019-20633 CVSS scores: * CVE-2019-20633 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-20633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for patch fixes the following issues: * CVE-2019-20633: Fix double-free/OOB read in pch.c (bsc#1167721) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-83=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * patch-debuginfo-2.7.6-3.1 * patch-2.7.6-3.1 * patch-debugsource-2.7.6-3.1 ## References: * https://www.suse.com/security/cve/CVE-2019-20633.html * https://bugzilla.suse.com/show_bug.cgi?id=1167721 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:58:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:58:26 -0000 Subject: SUSE-SU-2025:20074-1: important: Security update for protobuf Message-ID: <174902750660.627.9235779828831080534@smelt2.prg2.suse.org> # Security update for protobuf Announcement ID: SUSE-SU-2025:20074-1 Release Date: 2025-02-03T09:04:21Z Rating: important References: * bsc#1230778 Cross-References: * CVE-2024-7254 CVSS scores: * CVE-2024-7254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7254 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for protobuf fixes the following issues: * CVE-2024-7254: Fixed a stack overflow vulnerability in protocol buffers (bsc#1230778) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-91=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libprotobuf23_4_0-debuginfo-23.4-8.1 * libprotobuf-lite23_4_0-debuginfo-23.4-8.1 * protobuf-debugsource-23.4-8.1 * libprotobuf23_4_0-23.4-8.1 * libprotobuf-lite23_4_0-23.4-8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7254.html * https://bugzilla.suse.com/show_bug.cgi?id=1230778 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:57 -0000 Subject: SUSE-SU-2025:20090-1: important: Security update for cups Message-ID: <174902735776.627.10510404316097032058@smelt2.prg2.suse.org> # Security update for cups Announcement ID: SUSE-SU-2025:20090-1 Release Date: 2025-02-03T09:11:18Z Rating: important References: * bsc#1219503 * bsc#1225365 Cross-References: * CVE-2023-32324 * CVE-2023-32360 * CVE-2023-34241 * CVE-2023-4504 * CVE-2024-35235 CVSS scores: * CVE-2023-32324 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32324 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32360 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-34241 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-34241 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-4504 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4504 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-4504 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-35235 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35235 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for cups fixes the following issues: * Version upgrade to 2.4.11: See https://github.com/openprinting/cups/releases CUPS 2.4.11 brings several bug fixes regarding IPP response validation, processing PPD values, Web UI support (checkbox support, modifying printers) and others fixes. Detailed list (from CHANGES.md): * Updated the maximum file descriptor limit for `cupsd` to 64k-1 (Issue #989) * Fixed `lpoptions -d` with a discovered but not added printer (Issue #833) * Fixed incorrect error message for HTTP/IPP errors (Issue #893) * Fixed JobPrivateAccess and SubscriptionPrivateAccess support for "all" (Issue #990) * Fixed issues with cupsGetDestMediaByXxx (Issue #993) * Fixed adding and modifying of printers via the web interface (Issue #998) * Fixed HTTP PeerCred authentication for domain users (Issue #1001) * Fixed checkbox support (Issue #1008) * Fixed printer state notifications (Issue #1013) * Fixed IPP Everywhere printer setup (Issue #1033) Issues are those at https://github.com/OpenPrinting/cups/issues In particular CUPS 2.4.11 contains those commit regarding IPP response validation and processing PPD values: * "Quote PPD localized strings" https://github.com/OpenPrinting/cups/commit/1e6ca5913eceee906038bc04cc7ccfbe2923bdfd plus a cleanup to "Fix warnings for unused vars" https://github.com/OpenPrinting/cups/commit/2abe1ba8a66864aa82cd9836b37e57103b8e1a3b * Version upgrade to 2.4.10: See https://github.com/openprinting/cups/releases CUPS 2.4.10 brings two fixes: * Fixed error handling when reading a mixed 1setOf attribute. * Fixed scheduler start if there is only domain socket to listen on (Issue #985) which is fix for regression after fix for CVE-2024-35235 in scenarios where is no other listeners in cupsd.conf than domain socket created on demand by systemd, launchd or upstart. Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.9: See https://github.com/openprinting/cups/releases CUPS 2.4.9 brings security fix for CVE-2024-35235 and several bug fixes regarding CUPS Web User Interface, PPD generation and HTTP protocol implementation. Detailed list (from CHANGES.md): * Fixed domain socket handling (CVE-2024-35235) * Fixed creating of `cupsUrfSupported` PPD keyword (Issue #952) * Fixed searching for destinations in web ui (Issue #954) * Fixed TLS negotiation using OpenSSL with servers that require the TLS SNI extension. * Really raised `cups_enum_dests()` timeout for listing available IPP printers (Issue #751)... * Fixed `Host` header regression (Issue #967) * Fixed DNS-SD lookups of local services with Avahi (Issue #970) * Fixed listing jobs in destinations in web ui. (Apple issue #6204) * Fixed showing search query in web ui help page. (Issue #977) Issues are those at https://github.com/OpenPrinting/cups/issues Apple issues are those at https://github.com/apple/cups/issues * Update to version 2.4.8: See https://github.com/openprinting/cups/releases CUPS 2.4.8 brings many bug fixes which aggregated over the last half a year. It brings the important fix for race conditions and errors which can happen when installing permanent IPP Everywhere printer, support for PAM modules password-auth and system-auth and new option for lpstat which can show only the successful jobs. Detailed list (from CHANGES.md): * Added warning if the device has to be asked for 'all,media-col-database' separately (Issue #829) * Added new value for 'lpstat' option '-W' \- successfull - for getting successfully printed jobs (Issue #830) * Added support for PAM modules password-auth and system-auth (Issue #892) * Updated IPP Everywhere printer creation error reporting (Issue #347) * Updated and documented the MIME typing buffering limit (Issue #925) * Raised 'cups_enum_dests()' timeout for listing available IPP printers (Issue #751) * Now report an error for temporary printer defaults with lpadmin (Issue #237) * Fixed mapping of PPD InputSlot, MediaType, and OutputBin values (Issue #238) * Fixed "document-unprintable-error" handling (Issue #391) * Fixed the web interface not showing an error for a non-existent printer (Issue #423) * Fixed printing of jobs with job name longer than 255 chars on older printers (Issue #644) * Really backported fix for Issue #742 * Fixed 'cupsCopyDestInfo' device connection detection (Issue #586) * Fixed "Upgrade" header handling when there is no TLS support (Issue #775) * Fixed memory leak when unloading a job (Issue #813) * Fixed memory leak when creating color profiles (Issue #815) * Fixed a punch finishing bug in the IPP Everywhere support (Issue #821) * Fixed crash in 'scan_ps()' if incoming argument is NULL (Issue #831) * Fixed setting job state reasons for successful jobs (Issue #832) * Fixed infinite loop in IPP backend if hostname is IP address with Kerberos (Issue #838) * Added additional check on socket if 'revents' from 'poll()' returns POLLHUP together with POLLIN or POLLOUT in 'httpAddrConnect2()' (Issue #839) * Fixed crash in 'ppdEmitString()' if 'size' is NULL (Issue #850) * Fixed reporting 'media-source-supported' when sharing printer which has numbers as strings instead of keywords as 'InputSlot' values (Issue #859) * Fixed IPP backend to support the "print-scaling" option with IPP printers (Issue #862) * Fixed potential race condition for the creation of temporary queues (Issue #871) * Fixed 'httpGets' timeout handling (Issue #879) * Fixed checking for required attributes during PPD generation (Issue #890) * Fixed encoding of IPv6 addresses in HTTP requests (Issue #903) * Fixed sending response headers to client (Issue #927) * Fixed CGI program initialization and validation of form checkbox and text fields. Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.7: See https://github.com/openprinting/cups/releases CUPS 2.4.7 is released to ship the fix for CVE-2023-4504 and several other changes, among them it is adding OpenSSL support for cupsHashData function and bug fixes. Detailed list: * CVE-2023-4504 - Fixed Heap-based buffer overflow when reading Postscript in PPD files * Added OpenSSL support for cupsHashData (Issue #762) * Fixed delays in lpd backend (Issue #741) * Fixed extensive logging in scheduler (Issue #604) * Fixed hanging of lpstat on IBM AIX (Issue #773) * Fixed hanging of lpstat on Solaris (Issue #156) * Fixed printing to stderr if we can't open cups-files.conf (Issue #777) * Fixed purging job files via cancel -x (Issue #742) * Fixed RFC 1179 port reserving behavior in LPD backend (Issue #743) * Fixed a bug in the PPD command interpretation code (Issue #768) Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.6: See https://github.com/openprinting/cups/releases CUPS 2.4.6 is released to ship the fix for CVE-2023-34241 and two other bug fixes. Detailed list: * Fix linking error on old MacOS (Issue #715) * Fix printing multiple files on specific printers (Issue #643) * Fix use-after-free when logging warnings in case of failures in cupsdAcceptClient() (fixes CVE-2023-34241) Issues are those at https://github.com/OpenPrinting/cups/issues * Version upgrade to 2.4.5: See https://github.com/openprinting/cups/releases CUPS 2.4.5 is a hotfix release for a bug which corrupted locally saved certificates, which broke secured printing via TLS after the first print job. * Version upgrade to 2.4.4: See https://github.com/openprinting/cups/releases CUPS 2.4.4 release is created as a hotfix for segfault in cupsGetNamedDest(), when caller tries to find the default destination and the default destination is not set on the machine. * Version upgrade to 2.4.3: See https://github.com/openprinting/cups/releases CUPS 2.4.3 brings fix for CVE-2023-32324, several improvements and many bug fixes. CUPS now implements fallback for printers with broken firmware, which is not capable of answering to IPP request get-printer-attributes with all, media-col-database - this enables driverless support for bunch of printers which don't follow IPP Everywhere standard. Aside from the CVE fix the most important fixes are around color settings, printer application support fixes and OpenSSL support. Detailed list of changes: * Added a title with device uri for found network printers (Issues #402, #393) * Added new media sizes defined by IANA (Issues #501) * Added quirk for GoDEX label printers (Issue #440) * Fixed --enable-libtool-unsupported (Issue #394) * Fixed configuration on RISC-V machines (Issue #404) * Fixed the device_uri invalid pointer for driverless printers with .local hostname (Issue #419) * Fixed an OpenSSL crash bug (Issue #409) * Fixed a potential SNMP OID value overflow issue (Issue #431) * Fixed an OpenSSL certificate loading issue (Issue #465) * Fixed Brazilian Portuguese translations (Issue #288) * Fixed cupsd default keychain location when building with OpenSSL (Issue #529) * Fixed default color settings for CMYK printers as well (Issue #500) * Fixed duplicate PPD2IPP media-type names (Issue #688) * Fixed possible heap buffer overflow in _cups_strlcpy() (fixes CVE-2023-32324) * Fixed InputSlot heuristic for photo sizes smaller than 5x7" if there is no media-source in the request (Issue #569) * Fixed invalid memory access during generating IPP Everywhere queue (Issue #466) * Fixed lprm if no destination is provided (Issue #457) * Fixed memory leaks in create_local_bg_thread() (Issue #466) * Fixed media size tolerance in ippeveprinter (Issue #487) * Fixed passing command name without path into ippeveprinter (Issue #629) * Fixed saving strings file path in printers.conf (Issue #710) * Fixed TLS certificate generation bugs (Issue #652) * ippDeleteValues would not delete the last value (Issue #556) * Ignore some of IPP defaults if the application sends its PPD alternative (Issue #484) * Make Letter the default size in ippevepcl (Issue #543) * Now accessing Admin page in Web UI requires authentication (Issue #518) * Now look for default printer on network if needed (Issue #452) * Now we poll media-col-database separately if we fail at first (Issue #599) * Now report fax attributes and values as needed (Issue #459) * Now localize HTTP responses using the Content-Language value (Issue #426) * Raised file size limit for importing PPD via Web UI (Issue #433) * Raised maximum listen backlog size to INT MAX (Issue #626) * Update print-color-mode if the printer is modified via ColorModel PPD option (Issue #451) * Use localhost when printing via printer application (Issue #353) * Write defaults into /etc/cups/lpoptions if we're root (Issue #456) Issues are those at https://github.com/OpenPrinting/cups/issues ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-122=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cups-config-2.4.11-1.1 * libcups2-debuginfo-2.4.11-1.1 * libcups2-2.4.11-1.1 * cups-debugsource-2.4.11-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32324.html * https://www.suse.com/security/cve/CVE-2023-32360.html * https://www.suse.com/security/cve/CVE-2023-34241.html * https://www.suse.com/security/cve/CVE-2023-4504.html * https://www.suse.com/security/cve/CVE-2024-35235.html * https://bugzilla.suse.com/show_bug.cgi?id=1219503 * https://bugzilla.suse.com/show_bug.cgi?id=1225365 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:17 -0000 Subject: SUSE-RU-2025:20102-1: moderate: Recommended update for suseconnect-ng Message-ID: <174902731735.627.6993007689810014577@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2025:20102-1 Release Date: 2025-02-03T09:17:39Z Rating: moderate References: * bsc#1231185 * bsc#1231328 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Update version to 1.13: * Integrating uptime-tracker * Honor auto-import-gpg-keys flag on migration (bsc#1231328) * Only send labels if targeting SCC * Skip the docker auth generation on RMT (bsc#1231185) * Add --set-labels to register command to set labels at registration time on SCC * Add a new function to display suse-uptime-tracker version * Integrate with uptime-tracker ( https://github.com/SUSE/uptime-tracker/ ) * Add a command to show the info being gathered ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-162=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * suseconnect-ng-1.13.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231185 * https://bugzilla.suse.com/show_bug.cgi?id=1231328 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:14 -0000 Subject: SUSE-RU-2025:20084-1: moderate: Recommended update for regionServiceClientConfigGCE Message-ID: <174902737461.627.12445713284062752602@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigGCE Announcement ID: SUSE-RU-2025:20084-1 Release Date: 2025-02-03T09:08:12Z Rating: moderate References: * bsc#1217538 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for regionServiceClientConfigGCE contains the following fixes: * Version 4.2.0 (jsc#PCT-361) * Add IPv6 certs to supprt access of the update infrastructure via IPv6 on GCE instances. * Update to version 4.1.0 (bsc#1217538) * Replace 162.222.182.90 and 35.187.193.56 (length 4096): rgnsrv-gce-asia- northeast1 -> 162.222.182.90 expires in 9 years rgnsrv-gce-us-central1 -> 35.187.193.56 expires in 10 years * Update to version 4.0.1 (bsc#1217538) * Replace 130.211.242.136.pem and 130.211.88.88.pem certs expiring in 8 years and new length of 4096 These certs will replace the current certs that expire soon ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-145=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * regionServiceClientConfigGCE-4.2.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217538 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:22 -0000 Subject: SUSE-SU-2025:20082-1: moderate: Security update for Mesa Message-ID: <174902738258.627.9741628845771467763@smelt2.prg2.suse.org> # Security update for Mesa Announcement ID: SUSE-SU-2025:20082-1 Release Date: 2025-02-03T09:06:43Z Rating: moderate References: * bsc#1222040 * bsc#1222041 * bsc#1222042 Cross-References: * CVE-2023-45913 * CVE-2023-45919 * CVE-2023-45922 CVSS scores: * CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45913 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H * CVE-2023-45919 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-45922 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for Mesa fixes the following issues: * CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040). * CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041). * CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#1222042). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-144=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * Mesa-dri-23.3.4-8.1 * Mesa-libGL1-debuginfo-23.3.4-8.1 * libgbm1-23.3.4-8.1 * Mesa-libglapi0-debuginfo-23.3.4-8.1 * Mesa-libGL1-23.3.4-8.1 * Mesa-debugsource-23.3.4-8.1 * libgbm1-debuginfo-23.3.4-8.1 * Mesa-libglapi0-23.3.4-8.1 * Mesa-drivers-debugsource-23.3.4-8.1 * Mesa-23.3.4-8.1 * Mesa-dri-debuginfo-23.3.4-8.1 * Mesa-libEGL1-debuginfo-23.3.4-8.1 * Mesa-libEGL1-23.3.4-8.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * Mesa-gallium-23.3.4-8.1 * Mesa-gallium-debuginfo-23.3.4-8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45913.html * https://www.suse.com/security/cve/CVE-2023-45919.html * https://www.suse.com/security/cve/CVE-2023-45922.html * https://bugzilla.suse.com/show_bug.cgi?id=1222040 * https://bugzilla.suse.com/show_bug.cgi?id=1222041 * https://bugzilla.suse.com/show_bug.cgi?id=1222042 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:28 -0000 Subject: SUSE-SU-2025:20116-1: important: Security update for libxml2 Message-ID: <174902726878.627.747061814450309364@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20116-1 Release Date: 2025-02-03T09:20:59Z Rating: important References: * bsc#1234812 Cross-References: * CVE-2024-40896 CVSS scores: * CVE-2024-40896 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-40896 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2024-40896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-40896: Fixed XML external entity vulnerability (bsc#1234812) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-188=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxml2-debugsource-2.11.6-4.1 * libxml2-tools-debuginfo-2.11.6-4.1 * libxml2-2-2.11.6-4.1 * libxml2-2-debuginfo-2.11.6-4.1 * libxml2-tools-2.11.6-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40896.html * https://bugzilla.suse.com/show_bug.cgi?id=1234812 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:55:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:55:33 -0000 Subject: SUSE-SU-2025:20096-1: moderate: Security update for python-tornado6 Message-ID: <174902733306.627.862895935174233186@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2025:20096-1 Release Date: 2025-02-03T09:13:20Z Rating: moderate References: * bsc#1233668 Cross-References: * CVE-2024-52804 CVSS scores: * CVE-2024-52804 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-52804 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-52804 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2024-52804: Avoid quadratic performance of cookie parsing (bsc#1233668). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-141=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-tornado6-debuginfo-6.4-2.1 * python-tornado6-debugsource-6.4-2.1 * python311-tornado6-6.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52804.html * https://bugzilla.suse.com/show_bug.cgi?id=1233668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:54:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:54:26 -0000 Subject: SUSE-RU-2025:20070-1: moderate: Recommended update for regionServiceClientConfigEC2 Message-ID: <174902726684.655.4105727449233437852@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigEC2 Announcement ID: SUSE-RU-2025:20070-1 Release Date: 2025-02-03T09:02:47Z Rating: moderate References: * bsc#1217536 * bsc#1218656 * bsc#1228363 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for regionServiceClientConfigEC2 contains the following fixes: * Update to version 4.3.0 (bsc#1228363) * The IPv6 cert was switched up for the region server running in us-west-2 and as such the SSL handshake was failing. Drop the incorrect cert and add the correct cert. * Switch the patch syntax away form the deprecated shorthand macro * Version 4.2.0 Replace certs (length 4096): rgnsrv-ec2-cn-north1 -> 54.223.148.145 expires in 8 years rgnsrv-ec2-us-west2-2 -> 54.245.101.47 expires in 9 years Sidenote: We have one server with a short cert (2048) left; 34.197.223.242 expires in 2027 * Version 4.1.1 Add patch to not serve IPv6 addresses on SLES12 Related to bsc#1218656 * Update to version 4.1.1 (bsc#1217536) * Replace 54.247.166.75.pem and 54.253.118.149.pem old soon to expired certs with new generated ones that expire in 8 years and have longer length (4096) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-80=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * regionServiceClientConfigEC2-4.3.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217536 * https://bugzilla.suse.com/show_bug.cgi?id=1218656 * https://bugzilla.suse.com/show_bug.cgi?id=1228363 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:11 -0000 Subject: SUSE-SU-2025:20085-1: moderate: Security update for skopeo Message-ID: <174902737191.627.11067279810655582057@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20085-1 Release Date: 2025-02-03T09:08:43Z Rating: moderate References: * bsc#1231698 Cross-References: * CVE-2024-9676 CVSS scores: * CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for skopeo fixes the following issues: * CVE-2024-9676: Fixed symlink traversal vulnerability in the containers/storage library that could have let to a denial-of-service attack (bsc#1231698). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-146=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * skopeo-1.14.4-2.1 * skopeo-debuginfo-1.14.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9676.html * https://bugzilla.suse.com/show_bug.cgi?id=1231698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:56:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:56:03 -0000 Subject: SUSE-SU-2025:20088-1: important: Security update for libndp Message-ID: <174902736351.627.6363384565435537242@smelt2.prg2.suse.org> # Security update for libndp Announcement ID: SUSE-SU-2025:20088-1 Release Date: 2025-02-03T09:09:40Z Rating: important References: * bsc#1225771 Cross-References: * CVE-2024-5564 CVSS scores: * CVE-2024-5564 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-5564 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libndp fixes the following issues: * CVE-2024-5564: Fixed buffer overflow in route information length field (bsc#1225771). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-107=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libndp0-debuginfo-1.8-3.1 * libndp0-1.8-3.1 * libndp-debugsource-1.8-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5564.html * https://bugzilla.suse.com/show_bug.cgi?id=1225771 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:59:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:59:29 -0000 Subject: SUSE-SU-2025:20045-1: important: Security update for expat Message-ID: <174902756975.655.10239973771523096352@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20045-1 Release Date: 2025-02-03T08:54:50Z Rating: important References: * bsc#1221289 * bsc#1229930 * bsc#1229931 * bsc#1229932 Cross-References: * CVE-2024-28757 * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 CVSS scores: * CVE-2024-28757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-45492: detect integer overflow in function nextScaffoldPart (bsc#1229932) * CVE-2024-45491: detect integer overflow in dtdCopy (bsc#1229931) * CVE-2024-45490: reject negative len for XML_ParseBuffer (bsc#1229930) * CVE-2024-28757: XML Entity Expansion attack when there is isolated use of external parsers (bsc#1221289) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-44=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.5.0-3.1 * expat-debugsource-2.5.0-3.1 * libexpat1-2.5.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28757.html * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://bugzilla.suse.com/show_bug.cgi?id=1221289 * https://bugzilla.suse.com/show_bug.cgi?id=1229930 * https://bugzilla.suse.com/show_bug.cgi?id=1229931 * https://bugzilla.suse.com/show_bug.cgi?id=1229932 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:59:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:59:21 -0000 Subject: SUSE-SU-2025:20047-1: important: Security update for the Linux Kernel Message-ID: <174902756142.655.8750252014580266286@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20047-1 Release Date: 2025-02-03T08:56:20Z Rating: important References: * bsc#1012628 * bsc#1193454 * bsc#1194869 * bsc#1205462 * bsc#1208783 * bsc#1213123 * bsc#1214285 * bsc#1215199 * bsc#1220066 * bsc#1220252 * bsc#1220877 * bsc#1221326 * bsc#1221630 * bsc#1221645 * bsc#1221652 * bsc#1221857 * bsc#1222254 * bsc#1222335 * bsc#1222350 * bsc#1222364 * bsc#1222372 * bsc#1222387 * bsc#1222433 * bsc#1222434 * bsc#1222625 * bsc#1222633 * bsc#1222634 * bsc#1222808 * bsc#1222967 * bsc#1222973 * bsc#1223053 * bsc#1223074 * bsc#1223191 * bsc#1223395 * bsc#1223635 * bsc#1223720 * bsc#1223731 * bsc#1223742 * bsc#1223763 * bsc#1223767 * bsc#1223777 * bsc#1223803 * bsc#1224105 * bsc#1224415 * bsc#1224485 * bsc#1224496 * bsc#1224510 * bsc#1224535 * bsc#1224631 * bsc#1224636 * bsc#1224690 * bsc#1224694 * bsc#1224700 * bsc#1224711 * bsc#1225475 * bsc#1225582 * bsc#1225607 * bsc#1225718 * bsc#1225751 * bsc#1225814 * bsc#1225832 * bsc#1225838 * bsc#1225903 * bsc#1226031 * bsc#1226127 * bsc#1226502 * bsc#1226530 * bsc#1226588 * bsc#1226604 * bsc#1226743 * bsc#1226751 * bsc#1226765 * bsc#1226798 * bsc#1226801 * bsc#1226834 * bsc#1226874 * bsc#1226885 * bsc#1226920 * bsc#1227149 * bsc#1227182 * bsc#1227383 * bsc#1227437 * bsc#1227492 * bsc#1227493 * bsc#1227494 * bsc#1227618 * bsc#1227620 * bsc#1227623 * bsc#1227627 * bsc#1227634 * bsc#1227706 * bsc#1227722 * bsc#1227724 * bsc#1227725 * bsc#1227728 * bsc#1227729 * bsc#1227732 * bsc#1227733 * bsc#1227734 * bsc#1227747 * bsc#1227750 * bsc#1227754 * bsc#1227758 * bsc#1227760 * bsc#1227761 * bsc#1227764 * bsc#1227766 * bsc#1227770 * bsc#1227771 * bsc#1227772 * bsc#1227774 * bsc#1227781 * bsc#1227784 * bsc#1227785 * bsc#1227787 * bsc#1227790 * bsc#1227791 * bsc#1227792 * bsc#1227796 * bsc#1227798 * bsc#1227799 * bsc#1227802 * bsc#1227808 * bsc#1227810 * bsc#1227811 * bsc#1227812 * bsc#1227815 * bsc#1227816 * bsc#1227818 * bsc#1227820 * bsc#1227823 * bsc#1227824 * bsc#1227826 * bsc#1227828 * bsc#1227829 * bsc#1227830 * bsc#1227832 * bsc#1227833 * bsc#1227834 * bsc#1227839 * bsc#1227840 * bsc#1227846 * bsc#1227849 * bsc#1227851 * bsc#1227853 * bsc#1227863 * bsc#1227864 * bsc#1227865 * bsc#1227867 * bsc#1227869 * bsc#1227870 * bsc#1227883 * bsc#1227884 * bsc#1227891 * bsc#1227893 * bsc#1227929 * bsc#1227950 * bsc#1227957 * bsc#1227981 * bsc#1228020 * bsc#1228021 * bsc#1228192 * bsc#1228235 * bsc#1228236 * bsc#1228247 * bsc#1228321 * bsc#1228409 * bsc#1228410 * bsc#1228426 * bsc#1228427 * bsc#1228429 * bsc#1228446 * bsc#1228447 * bsc#1228449 * bsc#1228450 * bsc#1228452 * bsc#1228456 * bsc#1228457 * bsc#1228458 * bsc#1228459 * bsc#1228460 * bsc#1228462 * bsc#1228463 * bsc#1228466 * bsc#1228468 * bsc#1228469 * bsc#1228470 * bsc#1228472 * bsc#1228479 * bsc#1228480 * bsc#1228481 * bsc#1228482 * bsc#1228483 * bsc#1228484 * bsc#1228485 * bsc#1228486 * bsc#1228487 * bsc#1228489 * bsc#1228491 * bsc#1228492 * bsc#1228493 * bsc#1228494 * bsc#1228495 * bsc#1228496 * bsc#1228499 * bsc#1228500 * bsc#1228501 * bsc#1228502 * bsc#1228503 * bsc#1228505 * bsc#1228508 * bsc#1228509 * bsc#1228510 * bsc#1228511 * bsc#1228513 * bsc#1228515 * bsc#1228516 * bsc#1228518 * bsc#1228520 * bsc#1228525 * bsc#1228527 * bsc#1228530 * bsc#1228531 * bsc#1228539 * bsc#1228561 * bsc#1228563 * bsc#1228564 * bsc#1228565 * bsc#1228567 * bsc#1228568 * bsc#1228572 * bsc#1228576 * bsc#1228579 * bsc#1228580 * bsc#1228581 * bsc#1228582 * bsc#1228584 * bsc#1228586 * bsc#1228588 * bsc#1228590 * bsc#1228591 * bsc#1228599 * bsc#1228615 * bsc#1228616 * bsc#1228617 * bsc#1228625 * bsc#1228626 * bsc#1228633 * bsc#1228635 * bsc#1228636 * bsc#1228640 * bsc#1228643 * bsc#1228644 * bsc#1228646 * bsc#1228649 * bsc#1228650 * bsc#1228654 * bsc#1228655 * bsc#1228656 * bsc#1228658 * bsc#1228660 * bsc#1228662 * bsc#1228665 * bsc#1228666 * bsc#1228667 * bsc#1228672 * bsc#1228673 * bsc#1228674 * bsc#1228677 * bsc#1228680 * bsc#1228687 * bsc#1228705 * bsc#1228706 * bsc#1228707 * bsc#1228708 * bsc#1228709 * bsc#1228710 * bsc#1228718 * bsc#1228720 * bsc#1228721 * bsc#1228722 * bsc#1228723 * bsc#1228724 * bsc#1228726 * bsc#1228727 * bsc#1228733 * bsc#1228737 * bsc#1228743 * bsc#1228748 * bsc#1228754 * bsc#1228756 * bsc#1228757 * bsc#1228758 * bsc#1228764 * bsc#1228766 * bsc#1228779 * bsc#1228801 * bsc#1228849 * bsc#1228850 * bsc#1228857 * bsc#1228959 * bsc#1228964 * bsc#1228966 * bsc#1228967 * bsc#1228971 * bsc#1228973 * bsc#1228977 * bsc#1228978 * bsc#1228979 * bsc#1228986 * bsc#1228988 * bsc#1228989 * bsc#1228991 * bsc#1228992 * bsc#1229005 * bsc#1229024 * bsc#1229025 * bsc#1229042 * bsc#1229045 * bsc#1229046 * bsc#1229054 * bsc#1229056 * bsc#1229086 * bsc#1229134 * bsc#1229136 * bsc#1229154 * bsc#1229156 * bsc#1229160 * bsc#1229167 * bsc#1229168 * bsc#1229169 * bsc#1229170 * bsc#1229171 * bsc#1229172 * bsc#1229173 * bsc#1229174 * bsc#1229239 * bsc#1229240 * bsc#1229241 * bsc#1229243 * bsc#1229244 * bsc#1229245 * bsc#1229246 * bsc#1229247 * bsc#1229248 * bsc#1229249 * bsc#1229250 * bsc#1229251 * bsc#1229252 * bsc#1229253 * bsc#1229254 * bsc#1229255 * bsc#1229256 * bsc#1229287 * bsc#1229290 * bsc#1229291 * bsc#1229292 * bsc#1229294 * bsc#1229296 * bsc#1229297 * bsc#1229298 * bsc#1229299 * bsc#1229301 * bsc#1229303 * bsc#1229304 * bsc#1229305 * bsc#1229307 * bsc#1229309 * bsc#1229312 * bsc#1229313 * bsc#1229314 * bsc#1229315 * bsc#1229316 * bsc#1229317 * bsc#1229318 * bsc#1229319 * bsc#1229320 * bsc#1229327 * bsc#1229341 * bsc#1229342 * bsc#1229344 * bsc#1229345 * bsc#1229346 * bsc#1229347 * bsc#1229349 * bsc#1229350 * bsc#1229351 * bsc#1229353 * bsc#1229354 * bsc#1229355 * bsc#1229356 * bsc#1229357 * bsc#1229358 * bsc#1229359 * bsc#1229360 * bsc#1229365 * bsc#1229366 * bsc#1229369 * bsc#1229370 * bsc#1229373 * bsc#1229374 * bsc#1229379 * bsc#1229381 * bsc#1229382 * bsc#1229383 * bsc#1229386 * bsc#1229388 * bsc#1229390 * bsc#1229391 * bsc#1229392 * bsc#1229395 * bsc#1229398 * bsc#1229399 * bsc#1229400 * bsc#1229402 * bsc#1229403 * bsc#1229404 * bsc#1229407 * bsc#1229409 * bsc#1229410 * bsc#1229411 * bsc#1229413 * bsc#1229414 * bsc#1229417 * bsc#1229444 * bsc#1229451 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229480 * bsc#1229481 * bsc#1229482 * bsc#1229484 * bsc#1229485 * bsc#1229486 * bsc#1229487 * bsc#1229488 * bsc#1229489 * bsc#1229490 * bsc#1229493 * bsc#1229495 * bsc#1229496 * bsc#1229497 * bsc#1229500 * bsc#1229503 * bsc#1229707 * bsc#1229739 * bsc#1229743 * bsc#1229746 * bsc#1229747 * bsc#1229752 * bsc#1229754 * bsc#1229755 * bsc#1229756 * bsc#1229759 * bsc#1229761 * bsc#1229767 * bsc#1229781 * bsc#1229784 * bsc#1229785 * bsc#1229787 * bsc#1229788 * bsc#1229789 * bsc#1229792 * bsc#1229820 * bsc#1229827 * bsc#1229830 * bsc#1229837 * bsc#1229940 * bsc#1230056 * jsc#PED-10029 * jsc#PED-10045 * jsc#PED-10055 * jsc#PED-10105 * jsc#PED-10108 * jsc#PED-8491 * jsc#PED-8779 * jsc#PED-8954 Cross-References: * CVE-2023-52489 * CVE-2023-52581 * CVE-2023-52668 * CVE-2023-52688 * CVE-2023-52859 * CVE-2023-52885 * CVE-2023-52886 * CVE-2023-52887 * CVE-2023-52889 * CVE-2024-26590 * CVE-2024-26631 * CVE-2024-26637 * CVE-2024-26668 * CVE-2024-26669 * CVE-2024-26677 * CVE-2024-26682 * CVE-2024-26683 * CVE-2024-26735 * CVE-2024-26808 * CVE-2024-26809 * CVE-2024-26812 * CVE-2024-26835 * CVE-2024-26837 * CVE-2024-26849 * CVE-2024-26851 * CVE-2024-26976 * CVE-2024-27010 * CVE-2024-27011 * CVE-2024-27024 * CVE-2024-27049 * CVE-2024-27050 * CVE-2024-27079 * CVE-2024-27403 * CVE-2024-27433 * CVE-2024-27437 * CVE-2024-31076 * CVE-2024-35855 * CVE-2024-35897 * CVE-2024-35902 * CVE-2024-35913 * CVE-2024-35939 * CVE-2024-35949 * CVE-2024-36270 * CVE-2024-36286 * CVE-2024-36288 * CVE-2024-36489 * CVE-2024-36881 * CVE-2024-36907 * CVE-2024-36929 * CVE-2024-36933 * CVE-2024-36939 * CVE-2024-36970 * CVE-2024-36979 * CVE-2024-38563 * CVE-2024-38609 * CVE-2024-38662 * CVE-2024-39476 * CVE-2024-39483 * CVE-2024-39484 * CVE-2024-39486 * CVE-2024-39488 * CVE-2024-39489 * CVE-2024-39491 * CVE-2024-39493 * CVE-2024-39497 * CVE-2024-39499 * CVE-2024-39500 * CVE-2024-39501 * CVE-2024-39505 * CVE-2024-39506 * CVE-2024-39508 * CVE-2024-39509 * CVE-2024-39510 * CVE-2024-40899 * CVE-2024-40900 * CVE-2024-40902 * CVE-2024-40903 * CVE-2024-40904 * CVE-2024-40905 * CVE-2024-40909 * CVE-2024-40910 * CVE-2024-40911 * CVE-2024-40912 * CVE-2024-40913 * CVE-2024-40916 * CVE-2024-40920 * CVE-2024-40921 * CVE-2024-40922 * CVE-2024-40924 * CVE-2024-40926 * CVE-2024-40927 * CVE-2024-40929 * CVE-2024-40930 * CVE-2024-40932 * CVE-2024-40934 * CVE-2024-40936 * CVE-2024-40938 * CVE-2024-40939 * CVE-2024-40941 * CVE-2024-40942 * CVE-2024-40943 * CVE-2024-40944 * CVE-2024-40945 * CVE-2024-40954 * CVE-2024-40956 * CVE-2024-40957 * CVE-2024-40958 * CVE-2024-40959 * CVE-2024-40962 * CVE-2024-40964 * CVE-2024-40967 * CVE-2024-40976 * CVE-2024-40977 * CVE-2024-40978 * CVE-2024-40981 * CVE-2024-40982 * CVE-2024-40984 * CVE-2024-40987 * CVE-2024-40988 * CVE-2024-40989 * CVE-2024-40990 * CVE-2024-40992 * CVE-2024-40994 * CVE-2024-40995 * CVE-2024-40997 * CVE-2024-41000 * CVE-2024-41001 * CVE-2024-41002 * CVE-2024-41004 * CVE-2024-41007 * CVE-2024-41009 * CVE-2024-41010 * CVE-2024-41012 * CVE-2024-41015 * CVE-2024-41016 * CVE-2024-41020 * CVE-2024-41022 * CVE-2024-41024 * CVE-2024-41025 * CVE-2024-41028 * CVE-2024-41032 * CVE-2024-41035 * CVE-2024-41036 * CVE-2024-41037 * CVE-2024-41038 * CVE-2024-41039 * CVE-2024-41040 * CVE-2024-41041 * CVE-2024-41044 * CVE-2024-41045 * CVE-2024-41048 * CVE-2024-41049 * CVE-2024-41050 * CVE-2024-41051 * CVE-2024-41056 * CVE-2024-41057 * CVE-2024-41058 * CVE-2024-41059 * CVE-2024-41060 * CVE-2024-41061 * CVE-2024-41062 * CVE-2024-41063 * CVE-2024-41064 * CVE-2024-41065 * CVE-2024-41066 * CVE-2024-41068 * CVE-2024-41069 * CVE-2024-41070 * CVE-2024-41071 * CVE-2024-41072 * CVE-2024-41073 * CVE-2024-41074 * CVE-2024-41075 * CVE-2024-41076 * CVE-2024-41078 * CVE-2024-41079 * CVE-2024-41080 * CVE-2024-41081 * CVE-2024-41084 * CVE-2024-41087 * CVE-2024-41088 * CVE-2024-41089 * CVE-2024-41092 * CVE-2024-41093 * CVE-2024-41094 * CVE-2024-41095 * CVE-2024-41096 * CVE-2024-41097 * CVE-2024-41098 * CVE-2024-42064 * CVE-2024-42069 * CVE-2024-42070 * CVE-2024-42073 * CVE-2024-42074 * CVE-2024-42076 * CVE-2024-42077 * CVE-2024-42079 * CVE-2024-42080 * CVE-2024-42082 * CVE-2024-42085 * CVE-2024-42086 * CVE-2024-42087 * CVE-2024-42089 * CVE-2024-42090 * CVE-2024-42092 * CVE-2024-42093 * CVE-2024-42095 * CVE-2024-42096 * CVE-2024-42097 * CVE-2024-42098 * CVE-2024-42101 * CVE-2024-42104 * CVE-2024-42105 * CVE-2024-42106 * CVE-2024-42107 * CVE-2024-42109 * CVE-2024-42110 * CVE-2024-42113 * CVE-2024-42114 * CVE-2024-42115 * CVE-2024-42117 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42121 * CVE-2024-42122 * CVE-2024-42124 * CVE-2024-42125 * CVE-2024-42126 * CVE-2024-42127 * CVE-2024-42130 * CVE-2024-42131 * CVE-2024-42132 * CVE-2024-42133 * CVE-2024-42136 * CVE-2024-42137 * CVE-2024-42138 * CVE-2024-42139 * CVE-2024-42141 * CVE-2024-42142 * CVE-2024-42143 * CVE-2024-42144 * CVE-2024-42145 * CVE-2024-42147 * CVE-2024-42148 * CVE-2024-42152 * CVE-2024-42153 * CVE-2024-42155 * CVE-2024-42156 * CVE-2024-42157 * CVE-2024-42158 * CVE-2024-42159 * CVE-2024-42161 * CVE-2024-42162 * CVE-2024-42223 * CVE-2024-42224 * CVE-2024-42225 * CVE-2024-42226 * CVE-2024-42227 * CVE-2024-42228 * CVE-2024-42229 * CVE-2024-42230 * CVE-2024-42232 * CVE-2024-42236 * CVE-2024-42237 * CVE-2024-42238 * CVE-2024-42239 * CVE-2024-42240 * CVE-2024-42241 * CVE-2024-42244 * CVE-2024-42245 * CVE-2024-42246 * CVE-2024-42247 * CVE-2024-42250 * CVE-2024-42253 * CVE-2024-42259 * CVE-2024-42268 * CVE-2024-42269 * CVE-2024-42270 * CVE-2024-42271 * CVE-2024-42274 * CVE-2024-42276 * CVE-2024-42277 * CVE-2024-42278 * CVE-2024-42279 * CVE-2024-42280 * CVE-2024-42281 * CVE-2024-42283 * CVE-2024-42284 * CVE-2024-42285 * CVE-2024-42286 * CVE-2024-42287 * CVE-2024-42288 * CVE-2024-42289 * CVE-2024-42290 * CVE-2024-42291 * CVE-2024-42292 * CVE-2024-42295 * CVE-2024-42298 * CVE-2024-42301 * CVE-2024-42302 * CVE-2024-42303 * CVE-2024-42308 * CVE-2024-42309 * CVE-2024-42310 * CVE-2024-42311 * CVE-2024-42312 * CVE-2024-42313 * CVE-2024-42314 * CVE-2024-42315 * CVE-2024-42316 * CVE-2024-42318 * CVE-2024-42319 * CVE-2024-42320 * CVE-2024-42322 * CVE-2024-43816 * CVE-2024-43817 * CVE-2024-43818 * CVE-2024-43819 * CVE-2024-43821 * CVE-2024-43823 * CVE-2024-43824 * CVE-2024-43825 * CVE-2024-43826 * CVE-2024-43829 * CVE-2024-43830 * CVE-2024-43831 * CVE-2024-43833 * CVE-2024-43834 * CVE-2024-43837 * CVE-2024-43839 * CVE-2024-43840 * CVE-2024-43841 * CVE-2024-43842 * CVE-2024-43846 * CVE-2024-43847 * CVE-2024-43849 * CVE-2024-43850 * CVE-2024-43851 * CVE-2024-43853 * CVE-2024-43854 * CVE-2024-43855 * CVE-2024-43856 * CVE-2024-43858 * CVE-2024-43860 * CVE-2024-43861 * CVE-2024-43863 * CVE-2024-43864 * CVE-2024-43866 * CVE-2024-43867 * CVE-2024-43871 * CVE-2024-43872 * CVE-2024-43873 * CVE-2024-43874 * CVE-2024-43875 * CVE-2024-43876 * CVE-2024-43877 * CVE-2024-43879 * CVE-2024-43880 * CVE-2024-43881 * CVE-2024-43882 * CVE-2024-43883 * CVE-2024-43884 * CVE-2024-43885 * CVE-2024-43889 * CVE-2024-43892 * CVE-2024-43893 * CVE-2024-43894 * CVE-2024-43895 * CVE-2024-43897 * CVE-2024-43899 * CVE-2024-43900 * CVE-2024-43902 * CVE-2024-43903 * CVE-2024-43905 * CVE-2024-43906 * CVE-2024-43907 * CVE-2024-43908 * CVE-2024-43909 * CVE-2024-43911 * CVE-2024-43912 * CVE-2024-44931 * CVE-2024-44938 * CVE-2024-44939 CVSS scores: * CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52489 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52887 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-26837 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27024 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41020 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41022 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41024 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41028 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41057 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41057 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41058 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41063 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41065 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42086 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42093 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42097 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42105 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42133 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42136 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42143 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-42144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42155 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42236 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42253 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42271 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42274 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43881 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43883 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43885 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44938 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 383 vulnerabilities, contains eight features and has 87 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326). * CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287). * CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252). * CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350). * CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633). * CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808). * CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973). * CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742). * CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711). * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for wr-protected (bsc#1225718). * CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604). * CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798). * CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781). * CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784). * CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840). * CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810). * CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811). * CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812). * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823). * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021). * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460). * CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496). * CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518). * CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499). * CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468). * CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462). * CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459). * CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643). * CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646). * CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457). * CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672). * CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work before notifier (bsc#1228505). * CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568). * CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500). * CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503). * CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727). * CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754). * CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756). * CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986). * CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one movable task" (bsc#1228978). * CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init() (bsc#1229402). * CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init() (bsc#1229404). * CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379). * CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353). * CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316). * CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342). * CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496). * CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827). The following non-security bugs were fixed: * ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes). * ACPI: battery: create alarm sysfs attribute atomically (stable-fixes). * ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git- fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes). * ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes). * ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable- fixes). * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes). * ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes). * ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable- fixes). * ALSA: hda/tas2781: Use correct endian conversion (git-fixes). * ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes). * ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git- fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Skip event type filtering for UMP events (git-fixes). * ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes). * ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes). * ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes). * ALSA: timer: Relax start tick time check for slave timer elements (git- fixes). * ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable- fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable- fixes). * ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes). * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes). * ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: amd: Fix for acp init sequence (git-fixes). * ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes). * ASoC: SOF: mediatek: Add missing board compatible (stable-fixes). * ASoC: allow module autoloading for table board_ids (stable-fixes). * ASoC: allow module autoloading for table db1200_pids (stable-fixes). * ASoC: amd: acp: fix module autoloading (git-fixes). * ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable- fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes). * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Add error handling to pair_device() (git-fixes). * Bluetooth: SMP: Fix assumption of Central always being Initiator (git- fixes). * Bluetooth: bnep: Fix out-of-bound access (stable-fixes). * Bluetooth: btintel: Fail setup on error (git-fixes). * Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable- fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable- fixes). * Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes). * Bluetooth: hci_core: Fix LE quote calculation (git-fixes). * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes). * Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes). * Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes). * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git- fixes). * Drop libata patch that caused a regression (bsc#1229054) * Fix build errors without patches.kabi (bsc#1226502) * HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * Input: MT - limit max slots (stable-fixes). * Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056). * Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes). * Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes). * KVM: Always flush async #PF workqueue when vCPU is being destroyed (git- fixes). * KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git- fixes). * KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869). * KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199). * KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes). * KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes). * KVM: Stop processing _all_ memslots when "null" mmu_notifier handler is found (git-fixes). * KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes). * KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes). * KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git- fixes). * KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git- fixes). * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes). * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git- fixes). * KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes). * KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes). * KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes) * KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes). * KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes). * KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes). * KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes). * KVM: arm64: vgic-v4: Restore pending state on host userspace write (git- fixes). * KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes). * KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes). * KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes). * KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes). * KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes). * KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes). * KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes). * KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * KVM: s390: fix validity interception issue when gisa is switched off (git- fixes bsc#1229167). * KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes). * KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes). * Move upstreamed powerpc patches into sorted section * Move upstreamed sound patches into sorted section * Moved upstreamed ASoC patch into sorted section * NFSD: Support write delegations in LAYOUTGET (git-fixes). * NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes). * PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes). * RDMA/cache: Release GID table even if leak is detected (git-fixes) * RDMA/device: Return error earlier if port in not valid (git-fixes) * RDMA/hns: Check atomic wr length (git-fixes) * RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes) * RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes) * RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes) * RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes) * RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes) * RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes) * RDMA/hns: Fix unmatch exception handling when init eq table fails (git- fixes) * RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes) * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes). * RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes) * RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes) * RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes) * RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes) * RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes) * README.BRANCH: Add Petr Tesarik as branch maintainer * Revert "ALSA: firewire-lib: obsolete workqueue for period update" (bsc#1208783). * Revert "ALSA: firewire-lib: operate for period elapse event in process context" (bsc#1208783). * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes). * Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git- fixes). * Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes). * Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD" (git-fixes). * Revert "usb: gadget: uvc: cleanup request when not in correct state" (stable-fixes). * Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes). * SUNRPC: Fix a race to wake a sync task (git-fixes). * SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * Squashfs: fix variable overflow triggered by sysbot (git-fixes). * USB: serial: debug: do not echo input by default (stable-fixes). * Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834) * Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920) * Update patch refefernce for MFD patch (jsc#PED-10029) * Update patch reference for MD patch (jsc#PED-10029 jsc#PED-10045) * Update patch reference for SPI patch (jsc#PED-10105) * Update patch reference for iwlwifi fix (jsc#PED-10055) * Update patch reference of USB patch (jsc#PED-10108) * Update patch references for ASoC regression fixes (bsc#1229045 bsc#1229046) * afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes). * apparmor: unpack transition table if dfa is not present (bsc#1226031). * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: barrier: Restore spec_bar() macro (git-fixes) * arm64: cputype: Add Cortex-A720 definitions (git-fixes) * arm64: cputype: Add Cortex-A725 definitions (git-fixes) * arm64: cputype: Add Cortex-X1C definitions (git-fixes) * arm64: cputype: Add Cortex-X3 definitions (git-fixes) * arm64: cputype: Add Cortex-X4 definitions (git-fixes) * arm64: cputype: Add Cortex-X925 definitions (git-fixes) * arm64: cputype: Add Neoverse-V3 definitions (git-fixes) * arm64: dts: imx8mp: Add NPU Node (git-fixes) * arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes) * arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes) * arm64: dts: imx8mp: add HDMI power-domains (git-fixes) * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes) * arm64: errata: Expand speculative SSBS workaround (git-fixes) * arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files. * arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git- fixes) * ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable- fixes). * ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable- fixes). * blacklist.conf: Add libata upstream revert entry (bsc#1229054) * blacklist.conf: printk/sysctl: breaks kernel without pre-requisite patches (bsc#1229025) * bnxt_re: Fix imm_data endianness (git-fixes) * bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes) * bpf, lpm: Fix check prefixlen before walking trie (git-fixes). * bpf/tests: Remove duplicate JSGT tests (git-fixes). * bpf: Add crosstask check to __bpf_get_stack (git-fixes). * bpf: Detect IP == ksym.end as part of BPF program (git-fixes). * bpf: Ensure proper register state printing for cond jumps (git-fixes). * bpf: Fix a few selftest failures due to llvm18 change (git-fixes). * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903). * bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes). * bpf: Fix kfunc callback register type handling (git-fixes). * bpf: Fix prog_array_map_poke_run map poke update (git-fixes). * bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes). * bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git- fixes). * bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes). * bpf: Set uattr->batch.count as zero before batched update or deletion (git- fixes). * bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git- fixes). * bpf: enforce precision of R0 on callback return (git-fixes). * bpf: extract bpf_ctx_convert_map logic and make it more reusable (git- fixes). * bpf: fix control-flow graph checking in privileged mode (git-fixes). * bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes). * bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes). * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes). * bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git- fixes). * bpftool: Align output skeleton ELF code (git-fixes). * bpftool: Fix -Wcast-qual warning (git-fixes). * bpftool: Silence build warning about calloc() (git-fixes). * bpftool: mark orphaned programs during prog show (git-fixes). * btrfs: add a btrfs_finish_ordered_extent helper (git-fixes). * btrfs: add a is_data_bbio helper (git-fixes). * btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes). * btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321). * btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes). * btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes). * btrfs: factor out a can_finish_ordered_extent helper (git-fixes). * btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes). * btrfs: fix double inode unlock for direct IO sync writes (git-fixes). * btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes). * btrfs: fix leak of qgroup extent records after transaction abort (git- fixes). * btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git- fixes). * btrfs: limit write bios to a single ordered extent (git-fixes). * btrfs: make btrfs_finish_ordered_extent() return void (git-fixes). * btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes). * btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes). * btrfs: open code end_extent_writepage in end_bio_extent_writepage (git- fixes). * btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes). * btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes). * btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes). * btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes). * btrfs: remove btrfs_add_ordered_extent (git-fixes). * btrfs: rename err to ret in btrfs_direct_write() (git-fixes). * btrfs: uninline some static inline helpers from tree-log.h (git-fixes). * btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git- fixes). * btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes). * btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes). * btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete direct writes (git- fixes). * btrfs: use irq safe locking when running and adding delayed iputs (git- fixes). * cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand- mode (bsc#1229245). * cachefiles: add missing lock protection when polling (bsc#1229256). * cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244). * cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249). * cachefiles: cancel all requests for the object that is being dropped (bsc#1229255). * cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251). * cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246). * cachefiles: introduce object ondemand state (bsc#1229239). * cachefiles: make on-demand read killable (bsc#1229252). * cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243). * cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250). * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253). * cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248). * cachefiles: resend an open request if the read request's object is closed (bsc#1229241). * cachefiles: stop sending new request when dropping object (bsc#1229254). * can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes). * can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * ceph: periodically flush the cap releases (bsc#1230056). * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801). * cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254). * cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254). * cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254). * cgroup: Remove unnecessary list_empty() (bsc#1222254). * cgroup: preserve KABI of cgroup_root (bsc#1222254). * char: xillybus: Check USB endpoints when probing device (git-fixes). * char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes). * char: xillybus: Refine workqueue handling (git-fixes). * check-for-config-changes: ignore also GCC_ASM_GOTO_OUTPUT_BROKEN Mainline commit f2f6a8e88717 ("init/Kconfig: remove CONFIG_GCC_ASM_GOTO_OUTPUT_WORKAROUND") replaced GCC_ASM_GOTO_OUTPUT_WORKAROUND with GCC_ASM_GOTO_OUTPUT_BROKEN. Ignore both when checking config changes. * clk: en7523: fix rate divider for slic and spi clocks (git-fixes). * clk: qcom: Park shared RCGs upon registration (git-fixes). * clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git- fixes). * clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git- fixes). * clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git- fixes). * clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes). * clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes). * clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes). * clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes). * clocksource/drivers/sh_cmt: Address race condition for clock events (stable- fixes). * config.sh: generate and install compile_commands.json (bsc#1228971) This file contains the command line options used to compile every C file. It's useful for the livepatching team. * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * cxl/region: Move cxl_dpa_to_region() work to the region driver (bsc#1228472) * dev/parport: fix the array out-of-bounds risk (stable-fixes). * device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes). * dmaengine: dw: Add memory bus width verification (git-fixes). * dmaengine: dw: Add peripheral bus width verification (git-fixes). * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes). * driver core: Fix uevent_show() vs driver detach race (git-fixes). * drm/admgpu: fix dereferencing null pointer context (stable-fixes). * drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes). * drm/amd/display: Add null checker before passing variables (stable-fixes). * drm/amd/display: Adjust cursor position (git-fixes). * drm/amd/display: Check for NULL pointer (stable-fixes). * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable- fixes). * drm/amd/display: avoid using null object of framebuffer (git-fixes). * drm/amd/display: fix cursor offset on rotation 180 (git-fixes). * drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes). * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable- fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes). * drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable- fixes). * drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes). * drm/amdgpu: Actually check flags for all context ops (stable-fixes). * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes). * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes). * drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes). * drm/amdgpu: Validate TA binary size (stable-fixes). * drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * drm/amdgpu: fix potential resource leak warning (stable-fixes). * drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable- fixes). * drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes). * drm/client: fix null pointer dereference in drm_client_modeset_probe (git- fixes). * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes). * drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes). * drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes). * drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes). * drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes). * drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes). * drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git- fixes). * drm/lima: set gp bus_stop bit before hard reset (stable-fixes). * drm/mediatek/dp: Fix spurious kfree() (git-fixes). * drm/msm/dp: fix the max supported bpp logic (git-fixes). * drm/msm/dp: reset the link phy params before link training (git-fixes). * drm/msm/dpu: capture snapshot on the first commit_done timeout (stable- fixes). * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes). * drm/msm/dpu: do not play tricks with debug macros (git-fixes). * drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes). * drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes). * drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable- fixes). * drm/msm/dpu: take plane rotation into account for wide planes (git-fixes). * drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes). * drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable- fixes). * drm/msm/mdss: Rename path references to mdp_path (stable-fixes). * drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes). * drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes). * drm/nouveau: prime: fix refcount underflow (git-fixes). * drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes). * drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024). * drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes). * drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes). * drm/virtio: Fix type of dma-fence context variable (git-fixes). * drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes). * drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes). * drm/vmwgfx: Fix prime with external buffers (git-fixes). * efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes). * evm: do not copy up 'security.evm' xattr (git-fixes). * firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes). * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455). * fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456). * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git- fixes). * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git- fixes). * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git- fixes). * gfs2: setattr_chown: Add missing initialization (git-fixes). * gpio: mlxbf3: Support shutdown() function (git-fixes). * gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable- fixes). * gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes). * hwmon: (ltc2992) Avoid division by zero (stable-fixes). * hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes). * hwmon: (pc87360) Bounds check data->innr usage (stable-fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: riic: avoid potential division by zero (stable-fixes). * i2c: smbus: Improve handling of stuck alerts (git-fixes). * i2c: smbus: Send alert notifications to all devices if source not found (git-fixes). * i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes). * i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable- fixes). * i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable- fixes). * i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes). * ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737). * io_uring/advise: support 64-bit lengths (git-fixes). * io_uring: Drop per-ctx dummy_ubuf (git-fixes). * io_uring: Fix probe of disabled operations (git-fixes). * io_uring: fix io_match_task must_hold (git-fixes). * io_uring: tighten task exit cancellations (git-fixes). * iommu/amd: Convert comma to semicolon (git-fixes). * iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes). * iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git- fixes). * ip6_tunnel: Fix broken GRO (bsc#1229444). * ipv6: sr: fix incorrect unregister order (git-fixes). * irqdomain: Fixed unbalanced fwnode get and put (git-fixes). * jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes). * jfs: define xtree root and page independently (git-fixes). * jfs: fix null ptr deref in dtInsertEntry (git-fixes). * jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git- fixes). * jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes). * jump_label: Fix the fix, brown paper bags galore (git-fixes). * jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git- fixes). * kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes). * kABI workaround for sound core UMP conversion (stable-fixes). * kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783) * kabi/severity: add nvme common code The nvme common code is also allowed to change the data structures, there are only internal users. * kcov: properly check for softirq context (git-fixes). * kernel-binary: generate and install compile_commands.json (bsc#1228971) * kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134). * kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git- fixes). * kprobes: Fix to check symbol prefixes correctly (git-fixes). * kprobes: Prohibit probing on CFI preamble symbol (git-fixes). * kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168). * libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes). * libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git- fixes). * libbpf: Fix faccessat() usage on Android (git-fixes). * libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395). * md/md-bitmap: fix writing non bitmap pages (git-fixes). * md/raid1: set max_sectors during early return from choose_slow_rdev() (git- fixes). * md/raid1: support read error check (git-fixes). * md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes). * md/raid5: fix spares errors about rcu usage (git-fixes). * md/raid5: recheck if reshape has finished with device_lock held (git-fixes). * md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git- fixes). * md: add a mddev_add_trace_msg helper (git-fixes). * md: add check for sleepers in md_wakeup_thread() (git-fixes). * md: change the return value type of md_write_start to void (git-fixes). * md: do not account sync_io if iostats of the disk is disabled (git-fixes). * md: do not delete safemode_timer in mddev_suspend (git-fixes). * md: factor out a helper exceed_read_errors() to check read_errors (git- fixes). * md: fix a suspicious RCU usage warning (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: amphion: Remove lock in s_ctrl callback (stable-fixes). * media: drivers/media/dvb-core: copy user arrays safely (stable-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes). * media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes). * media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes). * media: uvcvideo: Ignore empty TS packets (stable-fixes). * media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes). * media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes). * memcg: protect concurrent access to mem_cgroup_idr (git-fixes). * memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes). * memory: tegra: Skip SID programming if SID registers are not set (stable- fixes). * minmax: add a few more MIN_T/MAX_T users (bsc#1229024). * minmax: avoid overly complicated constant expressions in VM code (bsc#1229024). * minmax: do not use max() in situations that want a C constant expression (bsc#1229024). * minmax: fix up min3() and max3() too (bsc#1229024). * minmax: improve macro expansion and type checking (bsc#1229024). * minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024). * minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024). * minmax: simplify min()/max()/clamp() implementation (bsc#1229024). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes). * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes). * mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes). * net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451). * net/iucv: fix use after free in iucv_sock_close() (bsc#1228973). * net/rds: fix possible cp null dereference (git-fixes). * net/sched: initialize noop_qdisc owner (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes). * net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757). * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: missing check virtio (git-fixes). * net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes). * net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes). * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462). * nfc: pn533: Add poll mod list filling check (git-fixes). * nfs: do not invalidate dentries on transient errors (git-fixes). * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * nfs: make the rpc_stat per net namespace (git-fixes). * nfs: pass explicit offset/count to trace events (git-fixes). * nfs: propagate readlink errors in nfs_symlink_filler (git-fixes). * nouveau/firmware: use dma non-coherent allocator (git-fixes). * nvme-multipath: find NUMA path only for online numa-node (git-fixes). * nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706). * nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706). * nvme-pci: Fix the instructions for disabling power management (git-fixes). * nvme-pci: add missing condition check for existence of mapped data (git- fixes). * nvme-pci: do not directly handle subsys reset fallout (bsc#1220066). * nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857). * nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857). * nvme-tcp: check for invalidated or revoked key (bsc#1221857). * nvme-tcp: sanitize TLS key handling (bsc#1221857). * nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857). * nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes). * nvme: avoid double free special payload (git-fixes). * nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git- fixes). * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * nvme: split off TLS sysfs attributes into a separate group (bsc#1221857). * nvme: tcp: remove unnecessary goto statement (bsc#1221857). * nvme_core: scan namespaces asynchronously (bsc#1224105). * nvmet-auth: fix nvmet_auth hash error handling (git-fixes). * nvmet: always initialize cqe.result (git-fixes). * nvmet: do not return 'reserved' for empty TSAS values (git-fixes). * nvmet: fix a possible leak when destroy a ctrl during qp establishment (git- fixes). * nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes). * pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git- fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779). * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779). * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779). * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779). * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779). * platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes). * platform/x86: lg-laptop: fix %s null argument warning (stable-fixes). * power: supply: axp288_charger: Fix constant_charge_voltage writes (git- fixes). * power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes). * power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869). * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869). * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869). * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869). * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869). * printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607). * reiserfs: fix uninit-value in comp_keys (git-fixes). * rtc: nct3018y: fix possible NULL dereference (stable-fixes). * s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171). * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173). * s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452). * s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174). * s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172). * s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172). * s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720). * s390/pkey: introduce dynamic debugging for pkey (bsc#1228720). * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169). * s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170). * samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes). * samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes). * sbitmap: use READ_ONCE to access map->word (stable-fixes). * scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857). * scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857). * scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857). * scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857). * scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857). * scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857). * scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857). * scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Indent help text (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes). * selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903). * selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes). * selftests/bpf: Add netkit to tc_redirect selftest (git-fixes). * selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes). * selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes). * selftests/bpf: Fix erroneous bitmask operation (git-fixes). * selftests/bpf: Fix issues in setup_classid_environment() (git-fixes). * selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes). * selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes). * selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes). * selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes). * selftests/bpf: Make linked_list failure test more robust (git-fixes). * selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git- fixes). * selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes). * selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes). * selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes). * selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git- fixes). * selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes). * selftests/bpf: satisfy compiler by having explicit return in btf test (git- fixes). * serial: core: check uartclk for zero to avoid divide by zero (stable-fixes). * soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes). * soc: qcom: pmic_glink: Actually communicate when remote goes down (git- fixes). * soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes). * spi: Add empty versions of ACPI functions (stable-fixes). * spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes). * spi: microchip-core: switch to use modern name (stable-fixes). * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes). * spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes). * squashfs: squashfs_read_data need to check if the length is 0 (git-fixes). * ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes). * staging: iio: resolver: ad2s1210: fix use before initialization (stable- fixes). * staging: ks7010: disable bh on tx_dev_lock (stable-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849). * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes). * swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git- fixes). * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes). * thermal/drivers/broadcom: Fix race between removal and clock disable (git- fixes). * thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix timing issue with parallel threads in perf bench wake-up- parallel (bsc#1227747). * tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes). * tools/resolve_btfids: Fix cross-compilation to non-host endianness (git- fixes). * tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git- fixes). * tools/resolve_btfids: fix build with musl libc (git-fixes). * trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes). * tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * tty: atmel_serial: use the correct RTS flag (git-fixes). * tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git- fixes). * usb: cdnsp: fix for Link TRB with TC (git-fixes). * usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes). * usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usb: gadget: core: Check for unset descriptor (git-fixes). * usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes). * usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes). * usb: gadget: u_serial: Set start_delayed during suspend (git-fixes). * usb: gadget: uvc: cleanup request when not in correct state (stable-fixes). * usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes). * usb: typec: fsa4480: Check if the chip is really there (git-fixes). * usb: typec: fsa4480: Relax CHIP_ID check (git-fixes). * usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes). * usb: typec: fsa4480: rework mux & switch setup to handle more states (git- fixes). * usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes). * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes). * vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * vhost/vsock: always initialize seqpacket_allow (git-fixes). * vhost: Release worker mutex during flushes (git-fixes). * vhost: Use virtqueue mutex for swapping worker (git-fixes). * virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes). * virtio-crypto: handle config changed by work queue (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtiofs: forbid newlines in tags (bsc#1229940). * wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable- fixes). * wifi: ath12k: fix soft lockup on suspend (git-fixes). * wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes). * wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes). * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes). * wifi: mac80211: use monitor sdata with driver only if desired (git-fixes). * wifi: mwifiex: duplicate static structs used in driver instances (git- fixes). * wifi: nl80211: disallow setting special AP channel widths (stable-fixes). * wifi: nl80211: do not give key data to userspace (stable-fixes). * wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes). * wifi: wfx: repair open network AP mode (git-fixes). * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454). * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454). * x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git- fixes). * x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes). * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes). * x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes). * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes). * x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git- fixes). * x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes). * x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes). * x86/numa: Introduce numa_fill_memblks() (git-fixes). * x86/pci: Skip early E820 check for ECAM region (git-fixes). * x86/xen: Convert comma to semicolon (git-fixes). * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes). * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * xfs: allow cross-linking special files without project quota (git-fixes). * xfs: allow symlinks with short remote targets (bsc#1229160). * xfs: allow unlinked symlinks and dirs with zero size (git-fixes). * xfs: attr forks require attr, not attr2 (git-fixes). * xfs: convert comma to semicolon (git-fixes). * xfs: do not use current->journal_info (git-fixes). * xfs: fix unlink vs cluster buffer instantiation race (git-fixes). * xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes). * xfs: journal geometry is not properly bounds checked (git-fixes). * xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes). * xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes). * xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git- fixes). * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes). * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes). * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-63=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-63=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-10.1 * kernel-source-rt-6.4.0-10.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-10.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-debuginfo-6.4.0-10.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-1-1.1 * kernel-livepatch-6_4_0-10-rt-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-1-1.1 * kernel-rt-debugsource-6.4.0-10.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-10.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-debuginfo-6.4.0-10.1 * kernel-rt-debugsource-6.4.0-10.1 * kernel-rt-devel-6.4.0-10.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52489.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52668.html * https://www.suse.com/security/cve/CVE-2023-52688.html * https://www.suse.com/security/cve/CVE-2023-52859.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2023-52886.html * https://www.suse.com/security/cve/CVE-2023-52887.html * https://www.suse.com/security/cve/CVE-2023-52889.html * https://www.suse.com/security/cve/CVE-2024-26590.html * https://www.suse.com/security/cve/CVE-2024-26631.html * https://www.suse.com/security/cve/CVE-2024-26637.html * https://www.suse.com/security/cve/CVE-2024-26668.html * https://www.suse.com/security/cve/CVE-2024-26669.html * https://www.suse.com/security/cve/CVE-2024-26677.html * https://www.suse.com/security/cve/CVE-2024-26682.html * https://www.suse.com/security/cve/CVE-2024-26683.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26809.html * https://www.suse.com/security/cve/CVE-2024-26812.html * https://www.suse.com/security/cve/CVE-2024-26835.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-26849.html * https://www.suse.com/security/cve/CVE-2024-26851.html * https://www.suse.com/security/cve/CVE-2024-26976.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-27011.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-27049.html * https://www.suse.com/security/cve/CVE-2024-27050.html * https://www.suse.com/security/cve/CVE-2024-27079.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-27433.html * https://www.suse.com/security/cve/CVE-2024-27437.html * https://www.suse.com/security/cve/CVE-2024-31076.html * https://www.suse.com/security/cve/CVE-2024-35855.html * https://www.suse.com/security/cve/CVE-2024-35897.html * https://www.suse.com/security/cve/CVE-2024-35902.html * https://www.suse.com/security/cve/CVE-2024-35913.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36270.html * https://www.suse.com/security/cve/CVE-2024-36286.html * https://www.suse.com/security/cve/CVE-2024-36288.html * https://www.suse.com/security/cve/CVE-2024-36489.html * https://www.suse.com/security/cve/CVE-2024-36881.html * https://www.suse.com/security/cve/CVE-2024-36907.html * https://www.suse.com/security/cve/CVE-2024-36929.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-36939.html * https://www.suse.com/security/cve/CVE-2024-36970.html * https://www.suse.com/security/cve/CVE-2024-36979.html * https://www.suse.com/security/cve/CVE-2024-38563.html * https://www.suse.com/security/cve/CVE-2024-38609.html * https://www.suse.com/security/cve/CVE-2024-38662.html * https://www.suse.com/security/cve/CVE-2024-39476.html * https://www.suse.com/security/cve/CVE-2024-39483.html * https://www.suse.com/security/cve/CVE-2024-39484.html * https://www.suse.com/security/cve/CVE-2024-39486.html * https://www.suse.com/security/cve/CVE-2024-39488.html * https://www.suse.com/security/cve/CVE-2024-39489.html * https://www.suse.com/security/cve/CVE-2024-39491.html * https://www.suse.com/security/cve/CVE-2024-39493.html * https://www.suse.com/security/cve/CVE-2024-39497.html * https://www.suse.com/security/cve/CVE-2024-39499.html * https://www.suse.com/security/cve/CVE-2024-39500.html * https://www.suse.com/security/cve/CVE-2024-39501.html * https://www.suse.com/security/cve/CVE-2024-39505.html * https://www.suse.com/security/cve/CVE-2024-39506.html * https://www.suse.com/security/cve/CVE-2024-39508.html * https://www.suse.com/security/cve/CVE-2024-39509.html * https://www.suse.com/security/cve/CVE-2024-39510.html * https://www.suse.com/security/cve/CVE-2024-40899.html * https://www.suse.com/security/cve/CVE-2024-40900.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-40903.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40905.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40911.html * https://www.suse.com/security/cve/CVE-2024-40912.html * https://www.suse.com/security/cve/CVE-2024-40913.html * https://www.suse.com/security/cve/CVE-2024-40916.html * https://www.suse.com/security/cve/CVE-2024-40920.html * https://www.suse.com/security/cve/CVE-2024-40921.html * https://www.suse.com/security/cve/CVE-2024-40922.html * https://www.suse.com/security/cve/CVE-2024-40924.html * https://www.suse.com/security/cve/CVE-2024-40926.html * https://www.suse.com/security/cve/CVE-2024-40927.html * https://www.suse.com/security/cve/CVE-2024-40929.html * https://www.suse.com/security/cve/CVE-2024-40930.html * https://www.suse.com/security/cve/CVE-2024-40932.html * https://www.suse.com/security/cve/CVE-2024-40934.html * https://www.suse.com/security/cve/CVE-2024-40936.html * https://www.suse.com/security/cve/CVE-2024-40938.html * https://www.suse.com/security/cve/CVE-2024-40939.html * https://www.suse.com/security/cve/CVE-2024-40941.html * https://www.suse.com/security/cve/CVE-2024-40942.html * https://www.suse.com/security/cve/CVE-2024-40943.html * https://www.suse.com/security/cve/CVE-2024-40944.html * https://www.suse.com/security/cve/CVE-2024-40945.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-40956.html * https://www.suse.com/security/cve/CVE-2024-40957.html * https://www.suse.com/security/cve/CVE-2024-40958.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-40962.html * https://www.suse.com/security/cve/CVE-2024-40964.html * https://www.suse.com/security/cve/CVE-2024-40967.html * https://www.suse.com/security/cve/CVE-2024-40976.html * https://www.suse.com/security/cve/CVE-2024-40977.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40981.html * https://www.suse.com/security/cve/CVE-2024-40982.html * https://www.suse.com/security/cve/CVE-2024-40984.html * https://www.suse.com/security/cve/CVE-2024-40987.html * https://www.suse.com/security/cve/CVE-2024-40988.html * https://www.suse.com/security/cve/CVE-2024-40989.html * https://www.suse.com/security/cve/CVE-2024-40990.html * https://www.suse.com/security/cve/CVE-2024-40992.html * https://www.suse.com/security/cve/CVE-2024-40994.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41001.html * https://www.suse.com/security/cve/CVE-2024-41002.html * https://www.suse.com/security/cve/CVE-2024-41004.html * https://www.suse.com/security/cve/CVE-2024-41007.html * https://www.suse.com/security/cve/CVE-2024-41009.html * https://www.suse.com/security/cve/CVE-2024-41010.html * https://www.suse.com/security/cve/CVE-2024-41012.html * https://www.suse.com/security/cve/CVE-2024-41015.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41020.html * https://www.suse.com/security/cve/CVE-2024-41022.html * https://www.suse.com/security/cve/CVE-2024-41024.html * https://www.suse.com/security/cve/CVE-2024-41025.html * https://www.suse.com/security/cve/CVE-2024-41028.html * https://www.suse.com/security/cve/CVE-2024-41032.html * https://www.suse.com/security/cve/CVE-2024-41035.html * https://www.suse.com/security/cve/CVE-2024-41036.html * https://www.suse.com/security/cve/CVE-2024-41037.html * https://www.suse.com/security/cve/CVE-2024-41038.html * https://www.suse.com/security/cve/CVE-2024-41039.html * https://www.suse.com/security/cve/CVE-2024-41040.html * https://www.suse.com/security/cve/CVE-2024-41041.html * https://www.suse.com/security/cve/CVE-2024-41044.html * https://www.suse.com/security/cve/CVE-2024-41045.html * https://www.suse.com/security/cve/CVE-2024-41048.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-41050.html * https://www.suse.com/security/cve/CVE-2024-41051.html * https://www.suse.com/security/cve/CVE-2024-41056.html * https://www.suse.com/security/cve/CVE-2024-41057.html * https://www.suse.com/security/cve/CVE-2024-41058.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41061.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41063.html * https://www.suse.com/security/cve/CVE-2024-41064.html * https://www.suse.com/security/cve/CVE-2024-41065.html * https://www.suse.com/security/cve/CVE-2024-41066.html * https://www.suse.com/security/cve/CVE-2024-41068.html * https://www.suse.com/security/cve/CVE-2024-41069.html * https://www.suse.com/security/cve/CVE-2024-41070.html * https://www.suse.com/security/cve/CVE-2024-41071.html * https://www.suse.com/security/cve/CVE-2024-41072.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41074.html * https://www.suse.com/security/cve/CVE-2024-41075.html * https://www.suse.com/security/cve/CVE-2024-41076.html * https://www.suse.com/security/cve/CVE-2024-41078.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41080.html * https://www.suse.com/security/cve/CVE-2024-41081.html * https://www.suse.com/security/cve/CVE-2024-41084.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-41088.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-41093.html * https://www.suse.com/security/cve/CVE-2024-41094.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-41096.html * https://www.suse.com/security/cve/CVE-2024-41097.html * https://www.suse.com/security/cve/CVE-2024-41098.html * https://www.suse.com/security/cve/CVE-2024-42064.html * https://www.suse.com/security/cve/CVE-2024-42069.html * https://www.suse.com/security/cve/CVE-2024-42070.html * https://www.suse.com/security/cve/CVE-2024-42073.html * https://www.suse.com/security/cve/CVE-2024-42074.html * https://www.suse.com/security/cve/CVE-2024-42076.html * https://www.suse.com/security/cve/CVE-2024-42077.html * https://www.suse.com/security/cve/CVE-2024-42079.html * https://www.suse.com/security/cve/CVE-2024-42080.html * https://www.suse.com/security/cve/CVE-2024-42082.html * https://www.suse.com/security/cve/CVE-2024-42085.html * https://www.suse.com/security/cve/CVE-2024-42086.html * https://www.suse.com/security/cve/CVE-2024-42087.html * https://www.suse.com/security/cve/CVE-2024-42089.html * https://www.suse.com/security/cve/CVE-2024-42090.html * https://www.suse.com/security/cve/CVE-2024-42092.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42095.html * https://www.suse.com/security/cve/CVE-2024-42096.html * https://www.suse.com/security/cve/CVE-2024-42097.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42101.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42105.html * https://www.suse.com/security/cve/CVE-2024-42106.html * https://www.suse.com/security/cve/CVE-2024-42107.html * https://www.suse.com/security/cve/CVE-2024-42109.html * https://www.suse.com/security/cve/CVE-2024-42110.html * https://www.suse.com/security/cve/CVE-2024-42113.html * https://www.suse.com/security/cve/CVE-2024-42114.html * https://www.suse.com/security/cve/CVE-2024-42115.html * https://www.suse.com/security/cve/CVE-2024-42117.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42121.html * https://www.suse.com/security/cve/CVE-2024-42122.html * https://www.suse.com/security/cve/CVE-2024-42124.html * https://www.suse.com/security/cve/CVE-2024-42125.html * https://www.suse.com/security/cve/CVE-2024-42126.html * https://www.suse.com/security/cve/CVE-2024-42127.html * https://www.suse.com/security/cve/CVE-2024-42130.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42132.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-42136.html * https://www.suse.com/security/cve/CVE-2024-42137.html * https://www.suse.com/security/cve/CVE-2024-42138.html * https://www.suse.com/security/cve/CVE-2024-42139.html * https://www.suse.com/security/cve/CVE-2024-42141.html * https://www.suse.com/security/cve/CVE-2024-42142.html * https://www.suse.com/security/cve/CVE-2024-42143.html * https://www.suse.com/security/cve/CVE-2024-42144.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42147.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-42152.html * https://www.suse.com/security/cve/CVE-2024-42153.html * https://www.suse.com/security/cve/CVE-2024-42155.html * https://www.suse.com/security/cve/CVE-2024-42156.html * https://www.suse.com/security/cve/CVE-2024-42157.html * https://www.suse.com/security/cve/CVE-2024-42158.html * https://www.suse.com/security/cve/CVE-2024-42159.html * https://www.suse.com/security/cve/CVE-2024-42161.html * https://www.suse.com/security/cve/CVE-2024-42162.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42224.html * https://www.suse.com/security/cve/CVE-2024-42225.html * https://www.suse.com/security/cve/CVE-2024-42226.html * https://www.suse.com/security/cve/CVE-2024-42227.html * https://www.suse.com/security/cve/CVE-2024-42228.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-42236.html * https://www.suse.com/security/cve/CVE-2024-42237.html * https://www.suse.com/security/cve/CVE-2024-42238.html * https://www.suse.com/security/cve/CVE-2024-42239.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-42241.html * https://www.suse.com/security/cve/CVE-2024-42244.html * https://www.suse.com/security/cve/CVE-2024-42245.html * https://www.suse.com/security/cve/CVE-2024-42246.html * https://www.suse.com/security/cve/CVE-2024-42247.html * https://www.suse.com/security/cve/CVE-2024-42250.html * https://www.suse.com/security/cve/CVE-2024-42253.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42268.html * https://www.suse.com/security/cve/CVE-2024-42269.html * https://www.suse.com/security/cve/CVE-2024-42270.html * https://www.suse.com/security/cve/CVE-2024-42271.html * https://www.suse.com/security/cve/CVE-2024-42274.html * https://www.suse.com/security/cve/CVE-2024-42276.html * https://www.suse.com/security/cve/CVE-2024-42277.html * https://www.suse.com/security/cve/CVE-2024-42278.html * https://www.suse.com/security/cve/CVE-2024-42279.html * https://www.suse.com/security/cve/CVE-2024-42280.html * https://www.suse.com/security/cve/CVE-2024-42281.html * https://www.suse.com/security/cve/CVE-2024-42283.html * https://www.suse.com/security/cve/CVE-2024-42284.html * https://www.suse.com/security/cve/CVE-2024-42285.html * https://www.suse.com/security/cve/CVE-2024-42286.html * https://www.suse.com/security/cve/CVE-2024-42287.html * https://www.suse.com/security/cve/CVE-2024-42288.html * https://www.suse.com/security/cve/CVE-2024-42289.html * https://www.suse.com/security/cve/CVE-2024-42290.html * https://www.suse.com/security/cve/CVE-2024-42291.html * https://www.suse.com/security/cve/CVE-2024-42292.html * https://www.suse.com/security/cve/CVE-2024-42295.html * https://www.suse.com/security/cve/CVE-2024-42298.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-42302.html * https://www.suse.com/security/cve/CVE-2024-42303.html * https://www.suse.com/security/cve/CVE-2024-42308.html * https://www.suse.com/security/cve/CVE-2024-42309.html * https://www.suse.com/security/cve/CVE-2024-42310.html * https://www.suse.com/security/cve/CVE-2024-42311.html * https://www.suse.com/security/cve/CVE-2024-42312.html * https://www.suse.com/security/cve/CVE-2024-42313.html * https://www.suse.com/security/cve/CVE-2024-42314.html * https://www.suse.com/security/cve/CVE-2024-42315.html * https://www.suse.com/security/cve/CVE-2024-42316.html * https://www.suse.com/security/cve/CVE-2024-42318.html * https://www.suse.com/security/cve/CVE-2024-42319.html * https://www.suse.com/security/cve/CVE-2024-42320.html * https://www.suse.com/security/cve/CVE-2024-42322.html * https://www.suse.com/security/cve/CVE-2024-43816.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43818.html * https://www.suse.com/security/cve/CVE-2024-43819.html * https://www.suse.com/security/cve/CVE-2024-43821.html * https://www.suse.com/security/cve/CVE-2024-43823.html * https://www.suse.com/security/cve/CVE-2024-43824.html * https://www.suse.com/security/cve/CVE-2024-43825.html * https://www.suse.com/security/cve/CVE-2024-43826.html * https://www.suse.com/security/cve/CVE-2024-43829.html * https://www.suse.com/security/cve/CVE-2024-43830.html * https://www.suse.com/security/cve/CVE-2024-43831.html * https://www.suse.com/security/cve/CVE-2024-43833.html * https://www.suse.com/security/cve/CVE-2024-43834.html * https://www.suse.com/security/cve/CVE-2024-43837.html * https://www.suse.com/security/cve/CVE-2024-43839.html * https://www.suse.com/security/cve/CVE-2024-43840.html * https://www.suse.com/security/cve/CVE-2024-43841.html * https://www.suse.com/security/cve/CVE-2024-43842.html * https://www.suse.com/security/cve/CVE-2024-43846.html * https://www.suse.com/security/cve/CVE-2024-43847.html * https://www.suse.com/security/cve/CVE-2024-43849.html * https://www.suse.com/security/cve/CVE-2024-43850.html * https://www.suse.com/security/cve/CVE-2024-43851.html * https://www.suse.com/security/cve/CVE-2024-43853.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-43855.html * https://www.suse.com/security/cve/CVE-2024-43856.html * https://www.suse.com/security/cve/CVE-2024-43858.html * https://www.suse.com/security/cve/CVE-2024-43860.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://www.suse.com/security/cve/CVE-2024-43863.html * https://www.suse.com/security/cve/CVE-2024-43864.html * https://www.suse.com/security/cve/CVE-2024-43866.html * https://www.suse.com/security/cve/CVE-2024-43867.html * https://www.suse.com/security/cve/CVE-2024-43871.html * https://www.suse.com/security/cve/CVE-2024-43872.html * https://www.suse.com/security/cve/CVE-2024-43873.html * https://www.suse.com/security/cve/CVE-2024-43874.html * https://www.suse.com/security/cve/CVE-2024-43875.html * https://www.suse.com/security/cve/CVE-2024-43876.html * https://www.suse.com/security/cve/CVE-2024-43877.html * https://www.suse.com/security/cve/CVE-2024-43879.html * https://www.suse.com/security/cve/CVE-2024-43880.html * https://www.suse.com/security/cve/CVE-2024-43881.html * https://www.suse.com/security/cve/CVE-2024-43882.html * https://www.suse.com/security/cve/CVE-2024-43883.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43885.html * https://www.suse.com/security/cve/CVE-2024-43889.html * https://www.suse.com/security/cve/CVE-2024-43892.html * https://www.suse.com/security/cve/CVE-2024-43893.html * https://www.suse.com/security/cve/CVE-2024-43894.html * https://www.suse.com/security/cve/CVE-2024-43895.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-43899.html * https://www.suse.com/security/cve/CVE-2024-43900.html * https://www.suse.com/security/cve/CVE-2024-43902.html * https://www.suse.com/security/cve/CVE-2024-43903.html * https://www.suse.com/security/cve/CVE-2024-43905.html * https://www.suse.com/security/cve/CVE-2024-43906.html * https://www.suse.com/security/cve/CVE-2024-43907.html * https://www.suse.com/security/cve/CVE-2024-43908.html * https://www.suse.com/security/cve/CVE-2024-43909.html * https://www.suse.com/security/cve/CVE-2024-43911.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-44931.html * https://www.suse.com/security/cve/CVE-2024-44938.html * https://www.suse.com/security/cve/CVE-2024-44939.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1193454 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1208783 * https://bugzilla.suse.com/show_bug.cgi?id=1213123 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220066 * https://bugzilla.suse.com/show_bug.cgi?id=1220252 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1221326 * https://bugzilla.suse.com/show_bug.cgi?id=1221630 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221652 * https://bugzilla.suse.com/show_bug.cgi?id=1221857 * https://bugzilla.suse.com/show_bug.cgi?id=1222254 * https://bugzilla.suse.com/show_bug.cgi?id=1222335 * https://bugzilla.suse.com/show_bug.cgi?id=1222350 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222387 * https://bugzilla.suse.com/show_bug.cgi?id=1222433 * https://bugzilla.suse.com/show_bug.cgi?id=1222434 * https://bugzilla.suse.com/show_bug.cgi?id=1222625 * https://bugzilla.suse.com/show_bug.cgi?id=1222633 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1222808 * https://bugzilla.suse.com/show_bug.cgi?id=1222967 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223053 * https://bugzilla.suse.com/show_bug.cgi?id=1223074 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223395 * https://bugzilla.suse.com/show_bug.cgi?id=1223635 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223742 * https://bugzilla.suse.com/show_bug.cgi?id=1223763 * https://bugzilla.suse.com/show_bug.cgi?id=1223767 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1223803 * https://bugzilla.suse.com/show_bug.cgi?id=1224105 * https://bugzilla.suse.com/show_bug.cgi?id=1224415 * https://bugzilla.suse.com/show_bug.cgi?id=1224485 * https://bugzilla.suse.com/show_bug.cgi?id=1224496 * https://bugzilla.suse.com/show_bug.cgi?id=1224510 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224631 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224690 * https://bugzilla.suse.com/show_bug.cgi?id=1224694 * https://bugzilla.suse.com/show_bug.cgi?id=1224700 * https://bugzilla.suse.com/show_bug.cgi?id=1224711 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225582 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225718 * https://bugzilla.suse.com/show_bug.cgi?id=1225751 * https://bugzilla.suse.com/show_bug.cgi?id=1225814 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1225838 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226031 * https://bugzilla.suse.com/show_bug.cgi?id=1226127 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226530 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226604 * https://bugzilla.suse.com/show_bug.cgi?id=1226743 * https://bugzilla.suse.com/show_bug.cgi?id=1226751 * https://bugzilla.suse.com/show_bug.cgi?id=1226765 * https://bugzilla.suse.com/show_bug.cgi?id=1226798 * https://bugzilla.suse.com/show_bug.cgi?id=1226801 * https://bugzilla.suse.com/show_bug.cgi?id=1226834 * https://bugzilla.suse.com/show_bug.cgi?id=1226874 * https://bugzilla.suse.com/show_bug.cgi?id=1226885 * https://bugzilla.suse.com/show_bug.cgi?id=1226920 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227182 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227437 * https://bugzilla.suse.com/show_bug.cgi?id=1227492 * https://bugzilla.suse.com/show_bug.cgi?id=1227493 * https://bugzilla.suse.com/show_bug.cgi?id=1227494 * https://bugzilla.suse.com/show_bug.cgi?id=1227618 * https://bugzilla.suse.com/show_bug.cgi?id=1227620 * https://bugzilla.suse.com/show_bug.cgi?id=1227623 * https://bugzilla.suse.com/show_bug.cgi?id=1227627 * https://bugzilla.suse.com/show_bug.cgi?id=1227634 * https://bugzilla.suse.com/show_bug.cgi?id=1227706 * https://bugzilla.suse.com/show_bug.cgi?id=1227722 * https://bugzilla.suse.com/show_bug.cgi?id=1227724 * https://bugzilla.suse.com/show_bug.cgi?id=1227725 * https://bugzilla.suse.com/show_bug.cgi?id=1227728 * https://bugzilla.suse.com/show_bug.cgi?id=1227729 * https://bugzilla.suse.com/show_bug.cgi?id=1227732 * https://bugzilla.suse.com/show_bug.cgi?id=1227733 * https://bugzilla.suse.com/show_bug.cgi?id=1227734 * https://bugzilla.suse.com/show_bug.cgi?id=1227747 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227754 * https://bugzilla.suse.com/show_bug.cgi?id=1227758 * https://bugzilla.suse.com/show_bug.cgi?id=1227760 * https://bugzilla.suse.com/show_bug.cgi?id=1227761 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1227766 * https://bugzilla.suse.com/show_bug.cgi?id=1227770 * https://bugzilla.suse.com/show_bug.cgi?id=1227771 * https://bugzilla.suse.com/show_bug.cgi?id=1227772 * https://bugzilla.suse.com/show_bug.cgi?id=1227774 * https://bugzilla.suse.com/show_bug.cgi?id=1227781 * https://bugzilla.suse.com/show_bug.cgi?id=1227784 * https://bugzilla.suse.com/show_bug.cgi?id=1227785 * https://bugzilla.suse.com/show_bug.cgi?id=1227787 * https://bugzilla.suse.com/show_bug.cgi?id=1227790 * https://bugzilla.suse.com/show_bug.cgi?id=1227791 * https://bugzilla.suse.com/show_bug.cgi?id=1227792 * https://bugzilla.suse.com/show_bug.cgi?id=1227796 * https://bugzilla.suse.com/show_bug.cgi?id=1227798 * https://bugzilla.suse.com/show_bug.cgi?id=1227799 * https://bugzilla.suse.com/show_bug.cgi?id=1227802 * https://bugzilla.suse.com/show_bug.cgi?id=1227808 * https://bugzilla.suse.com/show_bug.cgi?id=1227810 * https://bugzilla.suse.com/show_bug.cgi?id=1227811 * https://bugzilla.suse.com/show_bug.cgi?id=1227812 * https://bugzilla.suse.com/show_bug.cgi?id=1227815 * https://bugzilla.suse.com/show_bug.cgi?id=1227816 * https://bugzilla.suse.com/show_bug.cgi?id=1227818 * https://bugzilla.suse.com/show_bug.cgi?id=1227820 * https://bugzilla.suse.com/show_bug.cgi?id=1227823 * https://bugzilla.suse.com/show_bug.cgi?id=1227824 * https://bugzilla.suse.com/show_bug.cgi?id=1227826 * https://bugzilla.suse.com/show_bug.cgi?id=1227828 * https://bugzilla.suse.com/show_bug.cgi?id=1227829 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227833 * https://bugzilla.suse.com/show_bug.cgi?id=1227834 * https://bugzilla.suse.com/show_bug.cgi?id=1227839 * https://bugzilla.suse.com/show_bug.cgi?id=1227840 * https://bugzilla.suse.com/show_bug.cgi?id=1227846 * https://bugzilla.suse.com/show_bug.cgi?id=1227849 * https://bugzilla.suse.com/show_bug.cgi?id=1227851 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1227863 * https://bugzilla.suse.com/show_bug.cgi?id=1227864 * https://bugzilla.suse.com/show_bug.cgi?id=1227865 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227869 * https://bugzilla.suse.com/show_bug.cgi?id=1227870 * https://bugzilla.suse.com/show_bug.cgi?id=1227883 * https://bugzilla.suse.com/show_bug.cgi?id=1227884 * https://bugzilla.suse.com/show_bug.cgi?id=1227891 * https://bugzilla.suse.com/show_bug.cgi?id=1227893 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227950 * https://bugzilla.suse.com/show_bug.cgi?id=1227957 * https://bugzilla.suse.com/show_bug.cgi?id=1227981 * https://bugzilla.suse.com/show_bug.cgi?id=1228020 * https://bugzilla.suse.com/show_bug.cgi?id=1228021 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228235 * https://bugzilla.suse.com/show_bug.cgi?id=1228236 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1228321 * https://bugzilla.suse.com/show_bug.cgi?id=1228409 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228426 * https://bugzilla.suse.com/show_bug.cgi?id=1228427 * https://bugzilla.suse.com/show_bug.cgi?id=1228429 * https://bugzilla.suse.com/show_bug.cgi?id=1228446 * https://bugzilla.suse.com/show_bug.cgi?id=1228447 * https://bugzilla.suse.com/show_bug.cgi?id=1228449 * https://bugzilla.suse.com/show_bug.cgi?id=1228450 * https://bugzilla.suse.com/show_bug.cgi?id=1228452 * https://bugzilla.suse.com/show_bug.cgi?id=1228456 * https://bugzilla.suse.com/show_bug.cgi?id=1228457 * https://bugzilla.suse.com/show_bug.cgi?id=1228458 * https://bugzilla.suse.com/show_bug.cgi?id=1228459 * https://bugzilla.suse.com/show_bug.cgi?id=1228460 * https://bugzilla.suse.com/show_bug.cgi?id=1228462 * https://bugzilla.suse.com/show_bug.cgi?id=1228463 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1228468 * https://bugzilla.suse.com/show_bug.cgi?id=1228469 * https://bugzilla.suse.com/show_bug.cgi?id=1228470 * https://bugzilla.suse.com/show_bug.cgi?id=1228472 * https://bugzilla.suse.com/show_bug.cgi?id=1228479 * https://bugzilla.suse.com/show_bug.cgi?id=1228480 * https://bugzilla.suse.com/show_bug.cgi?id=1228481 * https://bugzilla.suse.com/show_bug.cgi?id=1228482 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228484 * https://bugzilla.suse.com/show_bug.cgi?id=1228485 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228489 * https://bugzilla.suse.com/show_bug.cgi?id=1228491 * https://bugzilla.suse.com/show_bug.cgi?id=1228492 * https://bugzilla.suse.com/show_bug.cgi?id=1228493 * https://bugzilla.suse.com/show_bug.cgi?id=1228494 * https://bugzilla.suse.com/show_bug.cgi?id=1228495 * https://bugzilla.suse.com/show_bug.cgi?id=1228496 * https://bugzilla.suse.com/show_bug.cgi?id=1228499 * https://bugzilla.suse.com/show_bug.cgi?id=1228500 * https://bugzilla.suse.com/show_bug.cgi?id=1228501 * https://bugzilla.suse.com/show_bug.cgi?id=1228502 * https://bugzilla.suse.com/show_bug.cgi?id=1228503 * https://bugzilla.suse.com/show_bug.cgi?id=1228505 * https://bugzilla.suse.com/show_bug.cgi?id=1228508 * https://bugzilla.suse.com/show_bug.cgi?id=1228509 * https://bugzilla.suse.com/show_bug.cgi?id=1228510 * https://bugzilla.suse.com/show_bug.cgi?id=1228511 * https://bugzilla.suse.com/show_bug.cgi?id=1228513 * https://bugzilla.suse.com/show_bug.cgi?id=1228515 * https://bugzilla.suse.com/show_bug.cgi?id=1228516 * https://bugzilla.suse.com/show_bug.cgi?id=1228518 * https://bugzilla.suse.com/show_bug.cgi?id=1228520 * https://bugzilla.suse.com/show_bug.cgi?id=1228525 * https://bugzilla.suse.com/show_bug.cgi?id=1228527 * https://bugzilla.suse.com/show_bug.cgi?id=1228530 * https://bugzilla.suse.com/show_bug.cgi?id=1228531 * https://bugzilla.suse.com/show_bug.cgi?id=1228539 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228563 * https://bugzilla.suse.com/show_bug.cgi?id=1228564 * https://bugzilla.suse.com/show_bug.cgi?id=1228565 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228568 * https://bugzilla.suse.com/show_bug.cgi?id=1228572 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228579 * https://bugzilla.suse.com/show_bug.cgi?id=1228580 * https://bugzilla.suse.com/show_bug.cgi?id=1228581 * https://bugzilla.suse.com/show_bug.cgi?id=1228582 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228586 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228590 * https://bugzilla.suse.com/show_bug.cgi?id=1228591 * https://bugzilla.suse.com/show_bug.cgi?id=1228599 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228616 * https://bugzilla.suse.com/show_bug.cgi?id=1228617 * https://bugzilla.suse.com/show_bug.cgi?id=1228625 * https://bugzilla.suse.com/show_bug.cgi?id=1228626 * https://bugzilla.suse.com/show_bug.cgi?id=1228633 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1228636 * https://bugzilla.suse.com/show_bug.cgi?id=1228640 * https://bugzilla.suse.com/show_bug.cgi?id=1228643 * https://bugzilla.suse.com/show_bug.cgi?id=1228644 * https://bugzilla.suse.com/show_bug.cgi?id=1228646 * https://bugzilla.suse.com/show_bug.cgi?id=1228649 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1228655 * https://bugzilla.suse.com/show_bug.cgi?id=1228656 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228660 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228665 * https://bugzilla.suse.com/show_bug.cgi?id=1228666 * https://bugzilla.suse.com/show_bug.cgi?id=1228667 * https://bugzilla.suse.com/show_bug.cgi?id=1228672 * https://bugzilla.suse.com/show_bug.cgi?id=1228673 * https://bugzilla.suse.com/show_bug.cgi?id=1228674 * https://bugzilla.suse.com/show_bug.cgi?id=1228677 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228687 * https://bugzilla.suse.com/show_bug.cgi?id=1228705 * https://bugzilla.suse.com/show_bug.cgi?id=1228706 * https://bugzilla.suse.com/show_bug.cgi?id=1228707 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228709 * https://bugzilla.suse.com/show_bug.cgi?id=1228710 * https://bugzilla.suse.com/show_bug.cgi?id=1228718 * https://bugzilla.suse.com/show_bug.cgi?id=1228720 * https://bugzilla.suse.com/show_bug.cgi?id=1228721 * https://bugzilla.suse.com/show_bug.cgi?id=1228722 * https://bugzilla.suse.com/show_bug.cgi?id=1228723 * https://bugzilla.suse.com/show_bug.cgi?id=1228724 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228727 * https://bugzilla.suse.com/show_bug.cgi?id=1228733 * https://bugzilla.suse.com/show_bug.cgi?id=1228737 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228748 * https://bugzilla.suse.com/show_bug.cgi?id=1228754 * https://bugzilla.suse.com/show_bug.cgi?id=1228756 * https://bugzilla.suse.com/show_bug.cgi?id=1228757 * https://bugzilla.suse.com/show_bug.cgi?id=1228758 * https://bugzilla.suse.com/show_bug.cgi?id=1228764 * https://bugzilla.suse.com/show_bug.cgi?id=1228766 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 * https://bugzilla.suse.com/show_bug.cgi?id=1228849 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1228959 * https://bugzilla.suse.com/show_bug.cgi?id=1228964 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1228967 * https://bugzilla.suse.com/show_bug.cgi?id=1228971 * https://bugzilla.suse.com/show_bug.cgi?id=1228973 * https://bugzilla.suse.com/show_bug.cgi?id=1228977 * https://bugzilla.suse.com/show_bug.cgi?id=1228978 * https://bugzilla.suse.com/show_bug.cgi?id=1228979 * https://bugzilla.suse.com/show_bug.cgi?id=1228986 * https://bugzilla.suse.com/show_bug.cgi?id=1228988 * https://bugzilla.suse.com/show_bug.cgi?id=1228989 * https://bugzilla.suse.com/show_bug.cgi?id=1228991 * https://bugzilla.suse.com/show_bug.cgi?id=1228992 * https://bugzilla.suse.com/show_bug.cgi?id=1229005 * https://bugzilla.suse.com/show_bug.cgi?id=1229024 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229045 * https://bugzilla.suse.com/show_bug.cgi?id=1229046 * https://bugzilla.suse.com/show_bug.cgi?id=1229054 * https://bugzilla.suse.com/show_bug.cgi?id=1229056 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229134 * https://bugzilla.suse.com/show_bug.cgi?id=1229136 * https://bugzilla.suse.com/show_bug.cgi?id=1229154 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229160 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229168 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229170 * https://bugzilla.suse.com/show_bug.cgi?id=1229171 * https://bugzilla.suse.com/show_bug.cgi?id=1229172 * https://bugzilla.suse.com/show_bug.cgi?id=1229173 * https://bugzilla.suse.com/show_bug.cgi?id=1229174 * https://bugzilla.suse.com/show_bug.cgi?id=1229239 * https://bugzilla.suse.com/show_bug.cgi?id=1229240 * https://bugzilla.suse.com/show_bug.cgi?id=1229241 * https://bugzilla.suse.com/show_bug.cgi?id=1229243 * https://bugzilla.suse.com/show_bug.cgi?id=1229244 * https://bugzilla.suse.com/show_bug.cgi?id=1229245 * https://bugzilla.suse.com/show_bug.cgi?id=1229246 * https://bugzilla.suse.com/show_bug.cgi?id=1229247 * https://bugzilla.suse.com/show_bug.cgi?id=1229248 * https://bugzilla.suse.com/show_bug.cgi?id=1229249 * https://bugzilla.suse.com/show_bug.cgi?id=1229250 * https://bugzilla.suse.com/show_bug.cgi?id=1229251 * https://bugzilla.suse.com/show_bug.cgi?id=1229252 * https://bugzilla.suse.com/show_bug.cgi?id=1229253 * https://bugzilla.suse.com/show_bug.cgi?id=1229254 * https://bugzilla.suse.com/show_bug.cgi?id=1229255 * https://bugzilla.suse.com/show_bug.cgi?id=1229256 * https://bugzilla.suse.com/show_bug.cgi?id=1229287 * https://bugzilla.suse.com/show_bug.cgi?id=1229290 * https://bugzilla.suse.com/show_bug.cgi?id=1229291 * https://bugzilla.suse.com/show_bug.cgi?id=1229292 * https://bugzilla.suse.com/show_bug.cgi?id=1229294 * https://bugzilla.suse.com/show_bug.cgi?id=1229296 * https://bugzilla.suse.com/show_bug.cgi?id=1229297 * https://bugzilla.suse.com/show_bug.cgi?id=1229298 * https://bugzilla.suse.com/show_bug.cgi?id=1229299 * https://bugzilla.suse.com/show_bug.cgi?id=1229301 * https://bugzilla.suse.com/show_bug.cgi?id=1229303 * https://bugzilla.suse.com/show_bug.cgi?id=1229304 * https://bugzilla.suse.com/show_bug.cgi?id=1229305 * https://bugzilla.suse.com/show_bug.cgi?id=1229307 * https://bugzilla.suse.com/show_bug.cgi?id=1229309 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229313 * https://bugzilla.suse.com/show_bug.cgi?id=1229314 * https://bugzilla.suse.com/show_bug.cgi?id=1229315 * https://bugzilla.suse.com/show_bug.cgi?id=1229316 * https://bugzilla.suse.com/show_bug.cgi?id=1229317 * https://bugzilla.suse.com/show_bug.cgi?id=1229318 * https://bugzilla.suse.com/show_bug.cgi?id=1229319 * https://bugzilla.suse.com/show_bug.cgi?id=1229320 * https://bugzilla.suse.com/show_bug.cgi?id=1229327 * https://bugzilla.suse.com/show_bug.cgi?id=1229341 * https://bugzilla.suse.com/show_bug.cgi?id=1229342 * https://bugzilla.suse.com/show_bug.cgi?id=1229344 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229346 * https://bugzilla.suse.com/show_bug.cgi?id=1229347 * https://bugzilla.suse.com/show_bug.cgi?id=1229349 * https://bugzilla.suse.com/show_bug.cgi?id=1229350 * https://bugzilla.suse.com/show_bug.cgi?id=1229351 * https://bugzilla.suse.com/show_bug.cgi?id=1229353 * https://bugzilla.suse.com/show_bug.cgi?id=1229354 * https://bugzilla.suse.com/show_bug.cgi?id=1229355 * https://bugzilla.suse.com/show_bug.cgi?id=1229356 * https://bugzilla.suse.com/show_bug.cgi?id=1229357 * https://bugzilla.suse.com/show_bug.cgi?id=1229358 * https://bugzilla.suse.com/show_bug.cgi?id=1229359 * https://bugzilla.suse.com/show_bug.cgi?id=1229360 * https://bugzilla.suse.com/show_bug.cgi?id=1229365 * https://bugzilla.suse.com/show_bug.cgi?id=1229366 * https://bugzilla.suse.com/show_bug.cgi?id=1229369 * https://bugzilla.suse.com/show_bug.cgi?id=1229370 * https://bugzilla.suse.com/show_bug.cgi?id=1229373 * https://bugzilla.suse.com/show_bug.cgi?id=1229374 * https://bugzilla.suse.com/show_bug.cgi?id=1229379 * https://bugzilla.suse.com/show_bug.cgi?id=1229381 * https://bugzilla.suse.com/show_bug.cgi?id=1229382 * https://bugzilla.suse.com/show_bug.cgi?id=1229383 * https://bugzilla.suse.com/show_bug.cgi?id=1229386 * https://bugzilla.suse.com/show_bug.cgi?id=1229388 * https://bugzilla.suse.com/show_bug.cgi?id=1229390 * https://bugzilla.suse.com/show_bug.cgi?id=1229391 * https://bugzilla.suse.com/show_bug.cgi?id=1229392 * https://bugzilla.suse.com/show_bug.cgi?id=1229395 * https://bugzilla.suse.com/show_bug.cgi?id=1229398 * https://bugzilla.suse.com/show_bug.cgi?id=1229399 * https://bugzilla.suse.com/show_bug.cgi?id=1229400 * https://bugzilla.suse.com/show_bug.cgi?id=1229402 * https://bugzilla.suse.com/show_bug.cgi?id=1229403 * https://bugzilla.suse.com/show_bug.cgi?id=1229404 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229409 * https://bugzilla.suse.com/show_bug.cgi?id=1229410 * https://bugzilla.suse.com/show_bug.cgi?id=1229411 * https://bugzilla.suse.com/show_bug.cgi?id=1229413 * https://bugzilla.suse.com/show_bug.cgi?id=1229414 * https://bugzilla.suse.com/show_bug.cgi?id=1229417 * https://bugzilla.suse.com/show_bug.cgi?id=1229444 * https://bugzilla.suse.com/show_bug.cgi?id=1229451 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229480 * https://bugzilla.suse.com/show_bug.cgi?id=1229481 * https://bugzilla.suse.com/show_bug.cgi?id=1229482 * https://bugzilla.suse.com/show_bug.cgi?id=1229484 * https://bugzilla.suse.com/show_bug.cgi?id=1229485 * https://bugzilla.suse.com/show_bug.cgi?id=1229486 * https://bugzilla.suse.com/show_bug.cgi?id=1229487 * https://bugzilla.suse.com/show_bug.cgi?id=1229488 * https://bugzilla.suse.com/show_bug.cgi?id=1229489 * https://bugzilla.suse.com/show_bug.cgi?id=1229490 * https://bugzilla.suse.com/show_bug.cgi?id=1229493 * https://bugzilla.suse.com/show_bug.cgi?id=1229495 * https://bugzilla.suse.com/show_bug.cgi?id=1229496 * https://bugzilla.suse.com/show_bug.cgi?id=1229497 * https://bugzilla.suse.com/show_bug.cgi?id=1229500 * https://bugzilla.suse.com/show_bug.cgi?id=1229503 * https://bugzilla.suse.com/show_bug.cgi?id=1229707 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229743 * https://bugzilla.suse.com/show_bug.cgi?id=1229746 * https://bugzilla.suse.com/show_bug.cgi?id=1229747 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229754 * https://bugzilla.suse.com/show_bug.cgi?id=1229755 * https://bugzilla.suse.com/show_bug.cgi?id=1229756 * https://bugzilla.suse.com/show_bug.cgi?id=1229759 * https://bugzilla.suse.com/show_bug.cgi?id=1229761 * https://bugzilla.suse.com/show_bug.cgi?id=1229767 * https://bugzilla.suse.com/show_bug.cgi?id=1229781 * https://bugzilla.suse.com/show_bug.cgi?id=1229784 * https://bugzilla.suse.com/show_bug.cgi?id=1229785 * https://bugzilla.suse.com/show_bug.cgi?id=1229787 * https://bugzilla.suse.com/show_bug.cgi?id=1229788 * https://bugzilla.suse.com/show_bug.cgi?id=1229789 * https://bugzilla.suse.com/show_bug.cgi?id=1229792 * https://bugzilla.suse.com/show_bug.cgi?id=1229820 * https://bugzilla.suse.com/show_bug.cgi?id=1229827 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229837 * https://bugzilla.suse.com/show_bug.cgi?id=1229940 * https://bugzilla.suse.com/show_bug.cgi?id=1230056 * https://jira.suse.com/browse/PED-10029 * https://jira.suse.com/browse/PED-10045 * https://jira.suse.com/browse/PED-10055 * https://jira.suse.com/browse/PED-10105 * https://jira.suse.com/browse/PED-10108 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8779 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:58:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:58:21 -0000 Subject: SUSE-SU-2025:20076-1: important: Security update for qemu Message-ID: <174902750184.627.10899941718705998137@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2025:20076-1 Release Date: 2025-02-03T09:05:12Z Rating: important References: * bsc#1224132 * bsc#1229007 * bsc#1229929 * bsc#1230140 * bsc#1230834 * bsc#1230915 * bsc#1231519 Cross-References: * CVE-2024-4693 * CVE-2024-7409 * CVE-2024-8354 * CVE-2024-8612 CVSS scores: * CVE-2024-4693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8612 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2024-8612 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has three fixes can now be installed. ## Description: This update for qemu fixes the following issues: * Bugfixes and CVEs: * hw/usb/hcd-ohci: Fix #1510, #303: pid not IN or OUT (bsc#1230834, CVE-2024-8354) * softmmu: Support concurrent bounce buffers (bsc#1230915, CVE-2024-8612) * system/physmem: Per-AddressSpace bounce buffering (bsc#1230915, CVE-2024-8612) * system/physmem: Propagate AddressSpace to MapClient helpers (bsc#1230915, CVE-2024-8612) * system/physmem: Replace qemu_mutex_lock() calls with QEMU_LOCK_GUARD (bsc#1230915, CVE-2024-8612) * Update version to 8.2.7 * Full changelog here: https://lore.kernel.org/qemu- devel/d9ff276f-f1ba-4e90-8343-a7a0dc2bf305 at tls.msk.ru/ * Fixes: bsc#1229007, CVE-2024-7409 bsc#1224132, CVE-2024-4693 * Some backports: gitlab: fix logic for changing docker tag on stable branches ui/sdl2: set swap interval explicitly when OpenGL is enabled hw/intc/arm_gic: fix spurious level triggered interrupts hw/audio/virtio- sound: fix heap buffer overflow tests/docker: update debian i686 and mipsel images to bookworm tests/docker: remove debian-armel-cross hw/display/vhost- user-gpu.c: fix vhost_user_gpu_chr_read() crypto: check gnutls & gcrypt support the requested pbkdf hash crypto: run qcrypto_pbkdf2_count_iters in a new thread softmmu/physmem: fix memory leak in dirty_memory_extend() target/ppc: Fix migration of CPUs with TLB_EMB TLB type gitlab: migrate the s390x custom machine to 22.04 target/hppa: Fix PSW V-bit packaging in cpu_hppa_get for hppa64 hw/audio/virtio-snd: fix invalid param check virtio- pci: Fix the use of an uninitialized irqfd * Fix bsc#1231519: * accel/kvm: check for KVM_CAP_READONLY_MEM on VM (bsc#1231519) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-93=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-ui-opengl-8.2.7-1.1 * qemu-ksm-8.2.7-1.1 * qemu-ui-spice-core-8.2.7-1.1 * qemu-hw-display-qxl-debuginfo-8.2.7-1.1 * qemu-hw-display-qxl-8.2.7-1.1 * qemu-img-8.2.7-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.7-1.1 * qemu-hw-usb-host-8.2.7-1.1 * qemu-block-rbd-debuginfo-8.2.7-1.1 * qemu-tools-8.2.7-1.1 * qemu-ui-spice-core-debuginfo-8.2.7-1.1 * qemu-pr-helper-8.2.7-1.1 * qemu-hw-usb-redirect-8.2.7-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.7-1.1 * qemu-hw-usb-host-debuginfo-8.2.7-1.1 * qemu-chardev-spice-8.2.7-1.1 * qemu-8.2.7-1.1 * qemu-audio-spice-8.2.7-1.1 * qemu-chardev-spice-debuginfo-8.2.7-1.1 * qemu-guest-agent-8.2.7-1.1 * qemu-img-debuginfo-8.2.7-1.1 * qemu-lang-8.2.7-1.1 * qemu-debuginfo-8.2.7-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.7-1.1 * qemu-block-iscsi-debuginfo-8.2.7-1.1 * qemu-tools-debuginfo-8.2.7-1.1 * qemu-block-ssh-debuginfo-8.2.7-1.1 * qemu-block-curl-debuginfo-8.2.7-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.7-1.1 * qemu-hw-display-virtio-gpu-8.2.7-1.1 * qemu-audio-spice-debuginfo-8.2.7-1.1 * qemu-block-iscsi-8.2.7-1.1 * qemu-block-ssh-8.2.7-1.1 * qemu-block-rbd-8.2.7-1.1 * qemu-hw-display-virtio-vga-8.2.7-1.1 * qemu-guest-agent-debuginfo-8.2.7-1.1 * qemu-ui-opengl-debuginfo-8.2.7-1.1 * qemu-debugsource-8.2.7-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.7-1.1 * qemu-block-curl-8.2.7-1.1 * qemu-pr-helper-debuginfo-8.2.7-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-x86-debuginfo-8.2.7-1.1 * qemu-accel-tcg-x86-8.2.7-1.1 * qemu-x86-8.2.7-1.1 * qemu-accel-tcg-x86-debuginfo-8.2.7-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-seabios-8.2.71.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.7-1.1 * qemu-vgabios-8.2.71.16.3_3_ga95067eb-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-8.2.7-1.1 * qemu-s390x-debuginfo-8.2.7-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-debuginfo-8.2.7-1.1 * qemu-arm-8.2.7-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4693.html * https://www.suse.com/security/cve/CVE-2024-7409.html * https://www.suse.com/security/cve/CVE-2024-8354.html * https://www.suse.com/security/cve/CVE-2024-8612.html * https://bugzilla.suse.com/show_bug.cgi?id=1224132 * https://bugzilla.suse.com/show_bug.cgi?id=1229007 * https://bugzilla.suse.com/show_bug.cgi?id=1229929 * https://bugzilla.suse.com/show_bug.cgi?id=1230140 * https://bugzilla.suse.com/show_bug.cgi?id=1230834 * https://bugzilla.suse.com/show_bug.cgi?id=1230915 * https://bugzilla.suse.com/show_bug.cgi?id=1231519 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:13 -0000 Subject: SUSE-SU-2025:20058-1: moderate: Security update for ucode-intel Message-ID: <174902767369.627.9584677227567093616@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20058-1 Release Date: 2025-02-03T08:57:28Z Rating: moderate References: * bsc#1230400 Cross-References: * CVE-2024-23984 * CVE-2024-24968 CVSS scores: * CVE-2024-23984 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-23984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-23984 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-23984 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-24968 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-24968 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-24968 ( NVD ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-24968 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20240910 release (bsc#1230400) * CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access. * CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access ### New Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products TWL N0 06-be-00/19 0000001a Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E ### Updated Platforms: Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000035 00000036 Core Gen12 ADL H0 06-97-05/07 00000035 00000036 Core Gen12 ADL L0 06-9a-03/80 00000433 00000434 Core Gen12 ADL R0 06-9a-04/80 00000433 00000434 Core Gen12 ADL-N N0 06-be-00/11 00000017 0000001a Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E MTL C0 06-aa-04/e6 0000001e 0000001f Core Ultra Processor RPL-E/HX/S B0 06-b7-01/32 00000123 00000129 Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004121 00004122 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000035 00000036 Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000035 00000036 Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004121 00004122 Core Gen13 ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-54=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20240910-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23984.html * https://www.suse.com/security/cve/CVE-2024-24968.html * https://bugzilla.suse.com/show_bug.cgi?id=1230400 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:02:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:02:04 -0000 Subject: SUSE-RU-2025:20048-1: critical: Recommended update for perl-Bootloader Message-ID: <174902772485.627.1358780931075230876@smelt2.prg2.suse.org> # Recommended update for perl-Bootloader Announcement ID: SUSE-RU-2025:20048-1 Release Date: 2025-02-03T08:56:21Z Rating: critical References: * bsc#1215064 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for perl-Bootloader fixes the following issues: * bootloader_entry script can have an optional 'force-default' argument (bsc#1215064) This fixes the %post section for kernel-rt. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-42=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * perl-Bootloader-1.6-3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:37 -0000 Subject: SUSE-SU-2025:20054-1: moderate: Security update for kubevirt Message-ID: <174902769781.627.10125521903180106991@smelt2.prg2.suse.org> # Security update for kubevirt Announcement ID: SUSE-SU-2025:20054-1 Release Date: 2025-02-03T08:56:36Z Rating: moderate References: * bsc#1220512 * bsc#1221538 * bsc#1223965 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has three fixes can now be installed. ## Description: This update for kubevirt fixes the following issues: * Update to version 1.3.1 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.3.1 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.3.0 * Fix DV error report via VM printable status * Fix permission error in storage migration tests * Add registry path for SLE15 SP7 * Bump to the latest tag 1.3.1-150600.5.9.1 * Use the images based on SLE15 SP6 BCI * Bump to the latest tag 1.2.2-150600.5.6.1 bsc#1221538; bsc#1220512; bsc#1223965 * Update to version 1.2.2 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.2 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.1 Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.0 * Pack configuration files for libvirt ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-49=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-49=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kubevirt-manifests-1.3.1-1.1 * kubevirt-virtctl-1.3.1-1.1 * kubevirt-virtctl-debuginfo-1.3.1-1.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kubevirt-tests-1.3.1-1.1 * kubevirt-tests-debuginfo-1.3.1-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220512 * https://bugzilla.suse.com/show_bug.cgi?id=1221538 * https://bugzilla.suse.com/show_bug.cgi?id=1223965 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:04 -0000 Subject: SUSE-SU-2025:20073-1: important: Security update for the Linux Kernel Message-ID: <174902760474.627.10321121751716918598@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20073-1 Release Date: 2025-02-03T09:04:19Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230413 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46794 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 162 vulnerabilities, contains two features and has 49 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * Drop mm patches that caused regressions (bsc#1230413) * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Move fixes into sorted section (bsc#1230119) * Move s390 kabi patch into the kabi section * Move upstreamed SCSI patches into sorted section * Move upstreamed input patch into sorted section * Move upstreamed kaslr patch into sorted section * Move upstreamed nvme patches into sorted section * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (stable-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kABI: Split kABI out of 'io_uring/kbuf: get rid of bl->is_ready' * kABI: Split kABI out of 'io_uring: Re-add dummy_ubuf for kABI purposes' * kABI: Split kABI out of io_uring/kbuf: protect io_buffer_list teardown with a reference * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-81=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-81=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-6.4.0-20.1 * kernel-macros-6.4.0-20.1 * kernel-devel-6.4.0-20.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-20.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-20.1 * kernel-default-debuginfo-6.4.0-20.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_3-debugsource-1-1.2 * kernel-livepatch-6_4_0-20-default-1-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-1-1.2 * kernel-default-livepatch-6.4.0-20.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-20.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-20.1 * kernel-kvmsmall-debugsource-6.4.0-20.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-17.1.1.51 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-20.1 * kernel-default-6.4.0-20.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-20.1 * kernel-64kb-devel-6.4.0-20.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-obs-build-6.4.0-20.1 * kernel-obs-build-debugsource-6.4.0-20.1 * kernel-default-debugsource-6.4.0-20.1 * kernel-syms-6.4.0-20.1 * kernel-default-devel-6.4.0-20.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:39 -0000 Subject: SUSE-SU-2025:20067-1: moderate: Security update for libdb-4_8 Message-ID: <174902763908.627.13781239291652820495@smelt2.prg2.suse.org> # Security update for libdb-4_8 Announcement ID: SUSE-SU-2025:20067-1 Release Date: 2025-02-03T09:01:27Z Rating: moderate References: * bsc#1174414 Cross-References: * CVE-2019-2708 CVSS scores: * CVE-2019-2708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2019-2708 ( NVD ): 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libdb-4_8 fixes the following issues: CVE-2019-2708: Fixed data store execution leading to partial DoS (bsc#1174414) Changes: * libdb: Data store execution leads to partial DoS * Backport the upsteam commits: * Fixed several possible crashes when running db_verify on a corrupted database. [#27864] * Fixed several possible hangs when running db_verify on a corrupted database. [#27864] * Added a warning message when attempting to verify a queue database which has many extent files. Verification will take a long time if there are many extent files. [#27864] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-118=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libdb-4_8-4.8.30-7.1 * libdb-4_8-debugsource-4.8.30-7.1 * libdb-4_8-debuginfo-4.8.30-7.1 ## References: * https://www.suse.com/security/cve/CVE-2019-2708.html * https://bugzilla.suse.com/show_bug.cgi?id=1174414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:59:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:59:26 -0000 Subject: SUSE-SU-2025:20046-1: important: Security update for runc Message-ID: <174902756696.655.13766994849175113343@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:20046-1 Release Date: 2025-02-03T08:56:20Z Rating: important References: * bsc#1192051 * bsc#1214960 * bsc#1221050 * bsc#1230092 Cross-References: * CVE-2024-45310 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.1.14. Upstream changelog is available from . * CVE-2024-45310: Fixed that runc can be tricked into creating empty files/directories on host ( bsc#1230092) Update to runc v1.1.13. Upstream changelog is available from . * Fixed a performance issue when running lots of containers, caused by systemd getting too many mount notifications. bsc#1214960 * Fixed -ENOSYS stub on ppc64le. bsc#1192051 bsc#1221050 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-62=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * runc-1.1.14-1.1 * runc-debuginfo-1.1.14-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://bugzilla.suse.com/show_bug.cgi?id=1192051 * https://bugzilla.suse.com/show_bug.cgi?id=1214960 * https://bugzilla.suse.com/show_bug.cgi?id=1221050 * https://bugzilla.suse.com/show_bug.cgi?id=1230092 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:11 -0000 Subject: SUSE-SU-2025:20059-1: moderate: Security update for libpcap Message-ID: <174902767144.627.2217608805040255088@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2025:20059-1 Release Date: 2025-02-03T08:57:44Z Rating: moderate References: * bsc#1230020 * bsc#1230034 Cross-References: * CVE-2023-7256 * CVE-2024-8006 CVSS scores: * CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2024-8006: Fixed NULL pointer dereference in pcap_findalldevs_ex() (bsc#1230034) * CVE-2023-7256: Fixed double free via addrinfo in sock_initaddress() (bsc#1230020) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-50=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.10.4-3.1 * libpcap-debugsource-1.10.4-3.1 * libpcap1-1.10.4-3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7256.html * https://www.suse.com/security/cve/CVE-2024-8006.html * https://bugzilla.suse.com/show_bug.cgi?id=1230020 * https://bugzilla.suse.com/show_bug.cgi?id=1230034 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:17 -0000 Subject: SUSE-SU-2025:20071-1: moderate: Security update for sevctl Message-ID: <174902761791.627.16055688110426862086@smelt2.prg2.suse.org> # Security update for sevctl Announcement ID: SUSE-SU-2025:20071-1 Release Date: 2025-02-03T09:03:35Z Rating: moderate References: * bsc#1218499 * bsc#1218502 * bsc#1229953 Cross-References: * CVE-2023-50711 CVSS scores: * CVE-2023-50711 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L * CVE-2023-50711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for sevctl fixes the following issues: Security issue fixed: * CVE-2023-50711: Fixed out of bounds memory accesses in a vendored dependency (bsc#1218502) Non-security issue fixed: * Update vendored dependencies and re-enable cargo update obs service (bsc#1229953) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-136=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * sevctl-0.4.3-2.1 * sevctl-debugsource-0.4.3-2.1 * sevctl-debuginfo-0.4.3-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50711.html * https://bugzilla.suse.com/show_bug.cgi?id=1218499 * https://bugzilla.suse.com/show_bug.cgi?id=1218502 * https://bugzilla.suse.com/show_bug.cgi?id=1229953 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:02:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:02:01 -0000 Subject: SUSE-SU-2025:20049-1: important: Security update for git Message-ID: <174902772121.627.3865722844580982383@smelt2.prg2.suse.org> # Security update for git Announcement ID: SUSE-SU-2025:20049-1 Release Date: 2025-02-03T08:56:21Z Rating: important References: * bsc#1042640 * bsc#1061041 * bsc#1069468 * bsc#1082023 * bsc#1216545 * bsc#1218588 * bsc#1218664 * bsc#1224168 * bsc#1224170 * bsc#1224171 * bsc#1224172 * bsc#1224173 * bsc#779536 * jsc#SLE-17838 Cross-References: * CVE-2005-4900 * CVE-2017-14867 * CVE-2024-32002 * CVE-2024-32004 * CVE-2024-32020 * CVE-2024-32021 * CVE-2024-32465 CVSS scores: * CVE-2005-4900 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2017-14867 ( SUSE ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2017-14867 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-32002 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-32002 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-32004 ( SUSE ): 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-32020 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L * CVE-2024-32021 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L * CVE-2024-32465 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities, contains one feature and has six fixes can now be installed. ## Description: This update for git fixes the following issues: git was updated to 2.45.1: * CVE-2024-32002: recursive clones on case-insensitive filesystems that support symbolic links are susceptible to case confusion (bsc#1224168) * CVE-2024-32004: arbitrary code execution during local clones (bsc#1224170) * CVE-2024-32020: file overwriting vulnerability during local clones (bsc#1224171) * CVE-2024-32021: git may create hardlinks to arbitrary user- readable files (bsc#1224172) * CVE-2024-32465: arbitrary code execution during clone operations (bsc#1224173) Update to 2.45.0: * Improved efficiency managing repositories with many references ("git init --ref-format=reftable") * "git checkout -p" and friends learned that that "@" is a synonym for "HEAD" * cli improvements handling refs * Expanded a number of commands and options, UI improvements * status.showUntrackedFiles now accepts "true" * git-cherry-pick(1) now automatically drops redundant commits with new --empty option * The userdiff patterns for C# has been updated. Update to 2.44.0: * "git checkout -B " now longer allows switching to a branch that is in use on another worktree. The users need to use "\--ignore-other- worktrees" option. * Faster server-side rebases with git replay * Faster pack generation with multi-pack reuse * rebase auto-squashing now works in non-interactive mode * pathspec now understands attr, e.g. ':(attr:~binary) for selecting non- binaries, or builtin_objectmode for selecting items by file mode or other properties * Many other cli UI and internal improvements and extensions * Do not replace apparmor configuration, fixes bsc#1216545 Update to 2.43.2: * https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.43.2.txt * Update to a new feature recently added, "git show-ref --exists". * Rename detection logic ignored the final line of a file if it is an incomplete line. * "git diff --no-rename A B" did not disable rename detection but did not trigger an error from the command line parser. * "git diff --no-index file1 file2" segfaulted while invoking the external diff driver, which has been corrected. * A failed "git tag -s" did not necessarily result in an error depending on the crypto backend, which has been corrected. * "git stash" sometimes was silent even when it failed due to unwritable index file, which has been corrected. * Recent conversion to allow more than 0/1 in GIT_FLUSH broke the mechanism by flipping what yes/no means by mistake, which has been corrected. Update to 2.43.1: * https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.43.1.txt * gitweb AppArmor profile: allow reading etc/gitweb-common.conf (bsc#1218664) * git moved to /usr/libexec/git/git, update AppArmor profile accordingly (bsc#1218588) Update to 2.43.0: * The "\--rfc" option of "git format-patch" used to be a valid way to override an earlier "\--subject-prefix=" on the command line and replace it with "[RFC PATCH]", but from this release, it merely prefixes the string "RFC " in front of the given subject prefix. If you are negatively affected by this change, please use "\--subject-prefix=PATCH --rfc" as a replacement. * In Git 2.42, "git rev-list --stdin" learned to take non-revisions (like "\--not") from the standard input, but the way such a "\--not" was handled was quite confusing, which has been rethought. The updated rule is that "\--not" given from the command line only affects revs given from the command line that comes but not revs read from the standard input, and "\--not" read from the standard input affects revs given from the standard input and not revs given from the command line. * A message written in olden time prevented a branch from getting checked out, saying it is already checked out elsewhere. But these days, we treat a branch that is being bisected or rebased just like a branch that is checked out and protect it from getting modified with the same codepath. The message has been rephrased to say that the branch is "in use" to avoid confusion. * Hourly and other schedules of "git maintenance" jobs are randomly distributed now. * "git cmd -h" learned to signal which options can be negated by listing such options like "\--[no-]opt". * The way authentication related data other than passwords (e.g., oauth token and password expiration data) are stored in libsecret keyrings has been rethought. * Update the libsecret and wincred credential helpers to correctly match which credential to erase; they erased the wrong entry in some cases. * Git GUI updates. * "git format-patch" learned a new "\--description-file" option that lets cover letter description to be fed; this can be used on detached HEAD where there is no branch description available, and also can override the branch description if there is one. * Use of the "\--max-pack-size" option to allow multiple packfiles to be created is now supported even when we are sending unreachable objects to cruft packs. * "git format-patch --rfc --subject-prefix=" used to ignore the "\--subject-prefix" option and used "[RFC PATCH]"; now we will add "RFC" prefix to whatever subject prefix is specified. * "git log --format" has been taught the %(decorate) placeholder for further customization over what the "\--decorate" option offers. * The default log message created by "git revert", when reverting a commit that records a revert, has been tweaked, to encourage people to describe complex "revert of revert of revert" situations better in their own words. * The command-line completion support (in contrib/) learned to complete "git commit --trailer=" for possible trailer keys. * "git update-index" learned the "\--show-index-version" option to inspect the index format version used by the on-disk index file. * "git diff" learned the "diff.statNameWidth" configuration variable, to give the default width for the name part in the "\--stat" output. * "git range-diff --notes=foo" compared "log --notes=foo --notes" of the two ranges, instead of using just the specified notes tree, which has been corrected to use only the specified notes tree. * The command line completion script (in contrib/) can be told to complete aliases by including ": git ;" in the alias to tell it that the alias should be completed in a similar way to how "git " is completed. The parsing code for the alias has been loosened to allow ';' without an extra space before it. * "git for-each-ref" and friends learned to apply mailmap to authorname and other fields in a more flexible way than using separate placeholder letters like %a[eElL] every time we want to come up with small variants. * "git repack" machinery learned to pay attention to the "\--filter=" option. * "git repack" learned the "\--max-cruft-size" option to prevent cruft packs from growing without bounds. * "git merge-tree" learned to take strategy backend specific options via the "-X" option, like "git merge" does. * "git log" and friends learned the "\--dd" option that is a short-hand for "\--diff-merges=first-parent -p". * The attribute subsystem learned to honor the "attr.tree" configuration variable that specifies which tree to read the .gitattributes files from. * "git merge-file" learns a mode to read three variants of the contents to be merged from blob objects. * see https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.43.0.txt Update 2.42.1: * Fix "git diff" exit code handling ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-48=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * perl-Git-2.45.1-1.1 * git-debugsource-2.45.1-1.1 * git-core-2.45.1-1.1 * git-2.45.1-1.1 * git-core-debuginfo-2.45.1-1.1 * git-debuginfo-2.45.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2005-4900.html * https://www.suse.com/security/cve/CVE-2017-14867.html * https://www.suse.com/security/cve/CVE-2024-32002.html * https://www.suse.com/security/cve/CVE-2024-32004.html * https://www.suse.com/security/cve/CVE-2024-32020.html * https://www.suse.com/security/cve/CVE-2024-32021.html * https://www.suse.com/security/cve/CVE-2024-32465.html * https://bugzilla.suse.com/show_bug.cgi?id=1042640 * https://bugzilla.suse.com/show_bug.cgi?id=1061041 * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1082023 * https://bugzilla.suse.com/show_bug.cgi?id=1216545 * https://bugzilla.suse.com/show_bug.cgi?id=1218588 * https://bugzilla.suse.com/show_bug.cgi?id=1218664 * https://bugzilla.suse.com/show_bug.cgi?id=1224168 * https://bugzilla.suse.com/show_bug.cgi?id=1224170 * https://bugzilla.suse.com/show_bug.cgi?id=1224171 * https://bugzilla.suse.com/show_bug.cgi?id=1224172 * https://bugzilla.suse.com/show_bug.cgi?id=1224173 * https://bugzilla.suse.com/show_bug.cgi?id=779536 * https://jira.suse.com/browse/SLE-17838 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:29 -0000 Subject: SUSE-RU-2025:20069-1: moderate: Recommended update for kernel-livepatch-tools Message-ID: <174902762908.627.7035381533321642824@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-tools Announcement ID: SUSE-RU-2025:20069-1 Release Date: 2025-02-03T09:02:05Z Rating: moderate References: * bsc#1223930 * bsc#1223966 * bsc#1231397 * bsc#1231422 Affected Products: * SUSE Linux Micro 6.0 An update that has four fixes can now be installed. ## Description: This update for kernel-livepatch-tools fixes the following issues: * Release version 1.5 * cache-cleaner: Correctly handle situation when there is no livepatch loaded (bsc#1231422) * klp-info-cache.service: Expand %%{_libexecdir} when setting ExecStart. The cache-cleaner script has been moved in SL Micro 6.0 (bsc#1231397) * klp.sh: Fix downgrade with skipped package version (bsc#1223966) * klp.sh: Exit with an error code when downgrade fails (bsc#1223930) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-70=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-livepatch-tools-1.5-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223930 * https://bugzilla.suse.com/show_bug.cgi?id=1223966 * https://bugzilla.suse.com/show_bug.cgi?id=1231397 * https://bugzilla.suse.com/show_bug.cgi?id=1231422 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:08 -0000 Subject: SUSE-SU-2025:20060-1: important: Security update for orc Message-ID: <174902766851.627.13099401224733210126@smelt2.prg2.suse.org> # Security update for orc Announcement ID: SUSE-SU-2025:20060-1 Release Date: 2025-02-03T08:57:45Z Rating: important References: * bsc#1228184 Cross-References: * CVE-2024-40897 CVSS scores: * CVE-2024-40897 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-40897 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for orc fixes the following issues: * CVE-2024-40897: Fixed a stack-based buffer overflow when formatting error messages (bsc#1228184) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-52=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * liborc-0_4-0-0.4.34-2.1 * liborc-0_4-0-debuginfo-0.4.34-2.1 * orc-debugsource-0.4.34-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40897.html * https://bugzilla.suse.com/show_bug.cgi?id=1228184 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:01 -0000 Subject: SUSE-RU-2025:20062-1: moderate: Recommended update for audit Message-ID: <174902766166.627.15962531925800114520@smelt2.prg2.suse.org> # Recommended update for audit Announcement ID: SUSE-RU-2025:20062-1 Release Date: 2025-02-03T08:58:51Z Rating: moderate References: * bsc#1215377 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for audit fixes the following issues: * Fix plugin termination when using systemd service units (bsc#1215377) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-77=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libaudit1-debuginfo-3.0.9-4.1 * libaudit1-3.0.9-4.1 * audit-debugsource-3.0.9-4.1 * libauparse0-debuginfo-3.0.9-4.1 * libauparse0-3.0.9-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215377 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:48 -0000 Subject: SUSE-SU-2025:20051-1: important: Security update for krb5 Message-ID: <174902770847.627.11192253038075170250@smelt2.prg2.suse.org> # Security update for krb5 Announcement ID: SUSE-SU-2025:20051-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1220770 * bsc#1220771 * bsc#1220772 * bsc#1227186 * bsc#1227187 Cross-References: * CVE-2024-26458 * CVE-2024-26461 * CVE-2024-26462 * CVE-2024-37370 * CVE-2024-37371 CVSS scores: * CVE-2024-26458 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26458 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26461 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26461 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26462 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26462 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26462 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37370 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-37370 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-37370 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37371 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37371 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-37371 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for krb5 fixes the following issues: * CVE-2024-37370: Confidential GSS krb5 wrap tokens with invalid plaintext Extra Count fields were erroneously accepted during unwrap (bsc#1227186) * CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187) * CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770) * CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771) * CVE-2024-26462: Fixed memory leak at /krb5/src/kdc/ndr.c (bsc#1220772) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-74=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-74=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * krb5-debuginfo-1.20.1-5.1 * krb5-1.20.1-5.1 * krb5-debugsource-1.20.1-5.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * krb5-mini-1.20.1-5.1 * krb5-mini-debugsource-1.20.1-5.1 * krb5-mini-debuginfo-1.20.1-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26458.html * https://www.suse.com/security/cve/CVE-2024-26461.html * https://www.suse.com/security/cve/CVE-2024-26462.html * https://www.suse.com/security/cve/CVE-2024-37370.html * https://www.suse.com/security/cve/CVE-2024-37371.html * https://bugzilla.suse.com/show_bug.cgi?id=1220770 * https://bugzilla.suse.com/show_bug.cgi?id=1220771 * https://bugzilla.suse.com/show_bug.cgi?id=1220772 * https://bugzilla.suse.com/show_bug.cgi?id=1227186 * https://bugzilla.suse.com/show_bug.cgi?id=1227187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:41 -0000 Subject: SUSE-SU-2025:20053-1: important: Security update for python-setuptools Message-ID: <174902770131.627.13646161453559671986@smelt2.prg2.suse.org> # Security update for python-setuptools Announcement ID: SUSE-SU-2025:20053-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1228105 Cross-References: * CVE-2024-6345 CVSS scores: * CVE-2024-6345 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-setuptools fixes the following issues: * CVE-2024-6345: Fixed code execution via download functions in the package_index module in pypa/setuptools (bsc#1228105) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-76=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-setuptools-69.0.2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6345.html * https://bugzilla.suse.com/show_bug.cgi?id=1228105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:32 -0000 Subject: SUSE-SU-2025:20068-1: moderate: Security update for tiff Message-ID: <174902763289.627.18397357851050550197@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:20068-1 Release Date: 2025-02-03T09:01:28Z Rating: moderate References: * bsc#1228924 Cross-References: * CVE-2024-7006 CVSS scores: * CVE-2024-7006 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2024-7006: Fix pointer deref in tif_dirinfo.c [bsc#1228924] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-89=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtiff6-4.6.0-4.1 * libtiff6-debuginfo-4.6.0-4.1 * tiff-debugsource-4.6.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7006.html * https://bugzilla.suse.com/show_bug.cgi?id=1228924 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:12 -0000 Subject: SUSE-SU-2025:20072-1: moderate: Security update for opensc Message-ID: <174902761248.627.14201694797615335419@smelt2.prg2.suse.org> # Security update for opensc Announcement ID: SUSE-SU-2025:20072-1 Release Date: 2025-02-03T09:03:35Z Rating: moderate References: * bsc#1230071 * bsc#1230072 * bsc#1230073 * bsc#1230074 * bsc#1230075 * bsc#1230076 * bsc#1230364 Cross-References: * CVE-2024-45615 * CVE-2024-45616 * CVE-2024-45617 * CVE-2024-45618 * CVE-2024-45619 * CVE-2024-45620 * CVE-2024-8443 CVSS scores: * CVE-2024-45615 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45615 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45615 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45615 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45616 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45616 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45617 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45617 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45618 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45618 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45619 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45619 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-45620 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45620 ( NVD ): 3.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-8443 ( SUSE ): 1.0 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-8443 ( SUSE ): 3.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-8443 ( NVD ): 2.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-8443 ( NVD ): 2.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves seven vulnerabilities can now be installed. ## Description: This update for opensc fixes the following issues: * CVE-2024-8443: Fixed heap buffer overflow in OpenPGP driver when generating key (bsc#1230364) * CVE-2024-45620: Fixed incorrect handling of the length of buffers or files in pkcs15init (bsc#1230076) * CVE-2024-45619: Fixed incorrect handling length of buffers or files in libopensc (bsc#1230075) * CVE-2024-45618: Fixed uninitialized values after incorrect or missing checking return values of functions in pkcs15init (bsc#1230074) * CVE-2024-45617: Fixed uninitialized values after incorrect or missing checking return values of functions in libopensc (bsc#1230073) * CVE-2024-45616: Fixed uninitialized values after incorrect check or usage of APDU response values in libopensc (bsc#1230072) * CVE-2024-45615: Fixed uninitialized values in libopensc and pkcs15init (bsc#1230071) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-137=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * opensc-0.24.0-3.1 * opensc-debugsource-0.24.0-3.1 * opensc-debuginfo-0.24.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45615.html * https://www.suse.com/security/cve/CVE-2024-45616.html * https://www.suse.com/security/cve/CVE-2024-45617.html * https://www.suse.com/security/cve/CVE-2024-45618.html * https://www.suse.com/security/cve/CVE-2024-45619.html * https://www.suse.com/security/cve/CVE-2024-45620.html * https://www.suse.com/security/cve/CVE-2024-8443.html * https://bugzilla.suse.com/show_bug.cgi?id=1230071 * https://bugzilla.suse.com/show_bug.cgi?id=1230072 * https://bugzilla.suse.com/show_bug.cgi?id=1230073 * https://bugzilla.suse.com/show_bug.cgi?id=1230074 * https://bugzilla.suse.com/show_bug.cgi?id=1230075 * https://bugzilla.suse.com/show_bug.cgi?id=1230076 * https://bugzilla.suse.com/show_bug.cgi?id=1230364 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:30 -0000 Subject: SUSE-SU-2025:20056-1: critical: Security update for docker Message-ID: <174902769060.627.9236405995646457406@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20056-1 Release Date: 2025-02-03T08:56:57Z Rating: critical References: * bsc#1210141 * bsc#1214855 * bsc#1215323 * bsc#1217513 * bsc#1219267 * bsc#1219268 * bsc#1219438 * bsc#1220339 * bsc#1221916 * bsc#1223409 * bsc#1228324 Cross-References: * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 * CVE-2024-41110 CVSS scores: * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has seven fixes can now be installed. ## Description: This update for docker fixes the following issues: Security fixes: * CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267) * CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268) * CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438) * CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324) Other changes: * Update to Docker 25.0.6-ce. * Fix BuildKit's symlink resolution logic to correctly handle non-lexical symlinks. (bsc#1221916) * Write volume options atomically so sudden system crashes won't result in future Docker starts failing due to empty files. (bsc#1214855) * Fixed world writable docker overlay files (bsc#1220339) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-64=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-debuginfo-25.0.6_ce-1.1 * docker-25.0.6_ce-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1210141 * https://bugzilla.suse.com/show_bug.cgi?id=1214855 * https://bugzilla.suse.com/show_bug.cgi?id=1215323 * https://bugzilla.suse.com/show_bug.cgi?id=1217513 * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 * https://bugzilla.suse.com/show_bug.cgi?id=1220339 * https://bugzilla.suse.com/show_bug.cgi?id=1221916 * https://bugzilla.suse.com/show_bug.cgi?id=1223409 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:49 -0000 Subject: SUSE-SU-2025:20065-1: important: Security update for python311 Message-ID: <174902764969.627.7982943844796344042@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:20065-1 Release Date: 2025-02-03T09:00:00Z Rating: important References: * bsc#1229596 * bsc#1229704 * bsc#1230227 Cross-References: * CVE-2024-6232 * CVE-2024-7592 * CVE-2024-8088 CVSS scores: * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: * CVE-2024-8088: Fixed a denial of service in zipfile (bsc#1229704) * CVE-2024-6232: Fixed a ReDos via excessive backtracking while parsing header values (bsc#1230227) * CVE-2024-7592: Fixed a denial of service in the http.cookies module (bsc#1229596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-87=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-3.11.8-4.1 * python311-base-3.11.8-4.1 * libpython3_11-1_0-debuginfo-3.11.8-4.1 * libpython3_11-1_0-3.11.8-4.1 * python311-debugsource-3.11.8-4.1 * python311-debuginfo-3.11.8-4.1 * python311-core-debugsource-3.11.8-4.1 * python311-base-debuginfo-3.11.8-4.1 * python311-curses-debuginfo-3.11.8-4.1 * python311-curses-3.11.8-4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6232.html * https://www.suse.com/security/cve/CVE-2024-7592.html * https://www.suse.com/security/cve/CVE-2024-8088.html * https://bugzilla.suse.com/show_bug.cgi?id=1229596 * https://bugzilla.suse.com/show_bug.cgi?id=1229704 * https://bugzilla.suse.com/show_bug.cgi?id=1230227 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 08:58:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 08:58:16 -0000 Subject: SUSE-SU-2025:20077-1: important: Security update for the Linux Kernel Message-ID: <174902749611.627.291000423187604462@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20077-1 Release Date: 2025-02-03T09:05:12Z Rating: important References: * bsc#1012628 * bsc#1183045 * bsc#1215199 * bsc#1216223 * bsc#1216776 * bsc#1220382 * bsc#1221527 * bsc#1221610 * bsc#1221650 * bsc#1222629 * bsc#1223600 * bsc#1223848 * bsc#1225487 * bsc#1225812 * bsc#1225903 * bsc#1226003 * bsc#1226507 * bsc#1226606 * bsc#1226666 * bsc#1226846 * bsc#1226860 * bsc#1227487 * bsc#1227694 * bsc#1227726 * bsc#1227819 * bsc#1227885 * bsc#1227890 * bsc#1227962 * bsc#1228090 * bsc#1228140 * bsc#1228244 * bsc#1228507 * bsc#1228771 * bsc#1229001 * bsc#1229004 * bsc#1229019 * bsc#1229086 * bsc#1229167 * bsc#1229169 * bsc#1229289 * bsc#1229334 * bsc#1229362 * bsc#1229363 * bsc#1229364 * bsc#1229371 * bsc#1229380 * bsc#1229389 * bsc#1229394 * bsc#1229429 * bsc#1229443 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229494 * bsc#1229585 * bsc#1229753 * bsc#1229764 * bsc#1229768 * bsc#1229790 * bsc#1229810 * bsc#1229899 * bsc#1229928 * bsc#1230015 * bsc#1230119 * bsc#1230123 * bsc#1230124 * bsc#1230125 * bsc#1230169 * bsc#1230170 * bsc#1230171 * bsc#1230173 * bsc#1230174 * bsc#1230175 * bsc#1230176 * bsc#1230178 * bsc#1230180 * bsc#1230181 * bsc#1230185 * bsc#1230191 * bsc#1230192 * bsc#1230193 * bsc#1230194 * bsc#1230195 * bsc#1230200 * bsc#1230204 * bsc#1230206 * bsc#1230207 * bsc#1230209 * bsc#1230211 * bsc#1230213 * bsc#1230217 * bsc#1230221 * bsc#1230224 * bsc#1230230 * bsc#1230232 * bsc#1230233 * bsc#1230240 * bsc#1230244 * bsc#1230245 * bsc#1230247 * bsc#1230248 * bsc#1230269 * bsc#1230270 * bsc#1230295 * bsc#1230340 * bsc#1230413 * bsc#1230426 * bsc#1230430 * bsc#1230431 * bsc#1230432 * bsc#1230433 * bsc#1230434 * bsc#1230435 * bsc#1230440 * bsc#1230441 * bsc#1230442 * bsc#1230444 * bsc#1230450 * bsc#1230451 * bsc#1230454 * bsc#1230455 * bsc#1230457 * bsc#1230459 * bsc#1230506 * bsc#1230507 * bsc#1230511 * bsc#1230515 * bsc#1230517 * bsc#1230518 * bsc#1230519 * bsc#1230520 * bsc#1230521 * bsc#1230524 * bsc#1230526 * bsc#1230533 * bsc#1230535 * bsc#1230539 * bsc#1230540 * bsc#1230549 * bsc#1230556 * bsc#1230562 * bsc#1230563 * bsc#1230564 * bsc#1230580 * bsc#1230582 * bsc#1230589 * bsc#1230602 * bsc#1230699 * bsc#1230700 * bsc#1230701 * bsc#1230702 * bsc#1230703 * bsc#1230704 * bsc#1230705 * bsc#1230706 * bsc#1230709 * bsc#1230711 * bsc#1230712 * bsc#1230715 * bsc#1230719 * bsc#1230722 * bsc#1230724 * bsc#1230725 * bsc#1230726 * bsc#1230727 * bsc#1230730 * bsc#1230731 * bsc#1230732 * bsc#1230747 * bsc#1230748 * bsc#1230749 * bsc#1230751 * bsc#1230752 * bsc#1230753 * bsc#1230756 * bsc#1230761 * bsc#1230766 * bsc#1230767 * bsc#1230768 * bsc#1230771 * bsc#1230772 * bsc#1230775 * bsc#1230776 * bsc#1230780 * bsc#1230783 * bsc#1230786 * bsc#1230787 * bsc#1230791 * bsc#1230794 * bsc#1230796 * bsc#1230802 * bsc#1230806 * bsc#1230808 * bsc#1230809 * bsc#1230810 * bsc#1230812 * bsc#1230813 * bsc#1230814 * bsc#1230815 * bsc#1230821 * bsc#1230825 * bsc#1230830 * bsc#1230831 * bsc#1230854 * bsc#1230948 * bsc#1231008 * bsc#1231035 * bsc#1231120 * bsc#1231146 * bsc#1231182 * bsc#1231183 * jsc#PED-10954 * jsc#PED-1706 * jsc#PED-9899 Cross-References: * CVE-2023-52610 * CVE-2023-52752 * CVE-2023-52915 * CVE-2023-52916 * CVE-2024-26640 * CVE-2024-26759 * CVE-2024-26804 * CVE-2024-36953 * CVE-2024-38538 * CVE-2024-38596 * CVE-2024-38632 * CVE-2024-40965 * CVE-2024-40973 * CVE-2024-40983 * CVE-2024-42154 * CVE-2024-42243 * CVE-2024-42252 * CVE-2024-42265 * CVE-2024-42294 * CVE-2024-42304 * CVE-2024-42305 * CVE-2024-42306 * CVE-2024-43828 * CVE-2024-43832 * CVE-2024-43835 * CVE-2024-43845 * CVE-2024-43870 * CVE-2024-43890 * CVE-2024-43898 * CVE-2024-43904 * CVE-2024-43914 * CVE-2024-44935 * CVE-2024-44944 * CVE-2024-44946 * CVE-2024-44947 * CVE-2024-44948 * CVE-2024-44950 * CVE-2024-44951 * CVE-2024-44952 * CVE-2024-44954 * CVE-2024-44960 * CVE-2024-44961 * CVE-2024-44962 * CVE-2024-44965 * CVE-2024-44967 * CVE-2024-44969 * CVE-2024-44970 * CVE-2024-44971 * CVE-2024-44977 * CVE-2024-44982 * CVE-2024-44984 * CVE-2024-44985 * CVE-2024-44986 * CVE-2024-44987 * CVE-2024-44988 * CVE-2024-44989 * CVE-2024-44990 * CVE-2024-44991 * CVE-2024-44997 * CVE-2024-44998 * CVE-2024-44999 * CVE-2024-45000 * CVE-2024-45001 * CVE-2024-45002 * CVE-2024-45003 * CVE-2024-45005 * CVE-2024-45006 * CVE-2024-45007 * CVE-2024-45008 * CVE-2024-45011 * CVE-2024-45012 * CVE-2024-45013 * CVE-2024-45015 * CVE-2024-45017 * CVE-2024-45018 * CVE-2024-45019 * CVE-2024-45020 * CVE-2024-45021 * CVE-2024-45022 * CVE-2024-45023 * CVE-2024-45026 * CVE-2024-45028 * CVE-2024-45029 * CVE-2024-45030 * CVE-2024-46672 * CVE-2024-46673 * CVE-2024-46674 * CVE-2024-46675 * CVE-2024-46676 * CVE-2024-46677 * CVE-2024-46679 * CVE-2024-46685 * CVE-2024-46686 * CVE-2024-46687 * CVE-2024-46689 * CVE-2024-46691 * CVE-2024-46692 * CVE-2024-46693 * CVE-2024-46694 * CVE-2024-46695 * CVE-2024-46702 * CVE-2024-46706 * CVE-2024-46707 * CVE-2024-46709 * CVE-2024-46710 * CVE-2024-46714 * CVE-2024-46715 * CVE-2024-46716 * CVE-2024-46717 * CVE-2024-46719 * CVE-2024-46720 * CVE-2024-46722 * CVE-2024-46723 * CVE-2024-46724 * CVE-2024-46725 * CVE-2024-46726 * CVE-2024-46728 * CVE-2024-46729 * CVE-2024-46730 * CVE-2024-46731 * CVE-2024-46732 * CVE-2024-46734 * CVE-2024-46735 * CVE-2024-46737 * CVE-2024-46738 * CVE-2024-46739 * CVE-2024-46741 * CVE-2024-46743 * CVE-2024-46744 * CVE-2024-46745 * CVE-2024-46746 * CVE-2024-46747 * CVE-2024-46749 * CVE-2024-46750 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-46753 * CVE-2024-46755 * CVE-2024-46756 * CVE-2024-46757 * CVE-2024-46758 * CVE-2024-46759 * CVE-2024-46760 * CVE-2024-46761 * CVE-2024-46767 * CVE-2024-46771 * CVE-2024-46772 * CVE-2024-46773 * CVE-2024-46774 * CVE-2024-46776 * CVE-2024-46778 * CVE-2024-46780 * CVE-2024-46781 * CVE-2024-46783 * CVE-2024-46784 * CVE-2024-46786 * CVE-2024-46787 * CVE-2024-46791 * CVE-2024-46794 * CVE-2024-46797 * CVE-2024-46798 * CVE-2024-46822 CVSS scores: * CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26759 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-42243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43845 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43890 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44954 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44960 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-44984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46675 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L * CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46676 ( SUSE ): 2.4 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-46702 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46724 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46734 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46738 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46739 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46741 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46743 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46744 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46747 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46749 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46753 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46756 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46756 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46757 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46757 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46758 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46758 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46759 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46760 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46774 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46786 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46787 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46787 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46794 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46794 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 162 vulnerabilities, contains three features and has 49 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). * CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269). * CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650). * CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340). * CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629). * CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606). * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). * CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001). * CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371). * CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394). * CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380). * CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810). * CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181). * CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209). * CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211). * CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240). * CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192). * CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193). * CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194). * CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169). * CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430). * CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431). * CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432). * CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434). * CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435). * CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455). * CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451). * CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518). * CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526). * CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520). * CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521). * CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704). * CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786). * CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). The following non-security bugs were fixed: * ABI: testing: fix admv8818 attr description (git-fixes). * ACPI: CPPC: Add helper to get the highest performance value (stable-fixes). * ACPI: CPPC: Fix MASK_VAL() usage (git-fixes). * ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git- fixes). * ACPI: processor: Fix memory leaks in error paths of processor_add() (stable- fixes). * ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes). * ACPI: sysfs: validate return type of _STR method (git-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ALSA: control: Apply sanity check of input values for user elements (stable- fixes). * ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes). * ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes). * ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes). * ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes). * ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes). * ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes). * ALSA: hda: cs35l41: fix module autoloading (git-fixes). * ARM: 9406/1: Fix callchain_trace() return value (git-fixes). * ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes). * ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git- fixes). * ASoC: cs42l42: Convert comma to semicolon (git-fixes). * ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes). * ASoC: intel: fix module autoloading (stable-fixes). * ASoC: meson: Remove unused declartion in header file (git-fixes). * ASoC: meson: axg-card: fix 'use-after-free' (git-fixes). * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes). * ASoC: soc-ac97: Fix the incorrect description (git-fixes). * ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes). * ASoC: tas2781-i2c: Get the right GPIO line (git-fixes). * ASoC: tda7419: fix module autoloading (stable-fixes). * ASoC: tegra: Fix CBB error during probe() (git-fixes). * ASoC: topology: Properly initialize soc_enum values (stable-fixes). * ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes). * ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes). * Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes). * Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes). * Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes). * Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes). * Bluetooth: hci_event: Use HCI error defines instead of magic values (stable- fixes). * Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes). * Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git- fixes). * Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962). * Documentation: ioctl: document 0x07 ioctl code (git-fixes). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Drivers: hv: vmbus: Fix the misplaced function description (git-fixes). * Drop mm patches that caused regressions (bsc#1230413) * Enable livepatching related packages on -RT (jsc#PED-1706) * HID: amd_sfh: free driver_data after destroying hid device (stable-fixes). * HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable- fixes). * HID: multitouch: Add support for GT7868Q (stable-fixes). * HID: wacom: Do not warn about dropped packets for first packet (git-fixes). * HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes). * IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes) * Input: adp5588-keys - fix check on return code (git-fixes). * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes). * Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes). * Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes). * Input: tsc2004/5 - fix reset handling on probe (git-fixes). * Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes). * Input: uinput - reject requests with unreasonable number of slots (stable- fixes). * KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes). * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * KVM: arm64: Block unsafe FF-A calls from the host (git-fixes). * KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes). * KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git- fixes). * KVM: arm64: Do not re-initialize the KVM lock (git-fixes). * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git- fixes). * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes). * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes). * Merge branch 'ALP-current' (0e26fa94003b) into 'ALP-current-RT' * Move fixes into sorted section (bsc#1230119) * Move s390 kabi patch into the kabi section * Move upstreamed SCSI patches into sorted section * Move upstreamed input patch into sorted section * Move upstreamed kaslr patch into sorted section * Move upstreamed nvme patches into sorted section * NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726). * NFSD: Fix frame size warning in svc_export_parse() (git-fixes). * NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes). * NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes). * No -rt specific changes this merge. * PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes). * PCI: Wait for Link before restoring Downstream Buses (git-fixes). * PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes). * PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes). * PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git- fixes). * PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes). * PCI: imx6: Fix missing call to phy_power_off() in error handling (git- fixes). * PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable- fixes). * PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes). * PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes). * PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/efa: Properly handle unexpected AQ completions (git-fixes) * RDMA/erdma: Return QP state in erdma_query_qp (git-fixes) * RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes) * RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes) * RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes) * RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git- fixes) * RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes) * RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes) * RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes) * RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes) * RDMA/hns: Optimize hem allocation performance (git-fixes) * RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes) * RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes) * RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes) * RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes) * RDMA/mlx5: Obtain upper net device only when needed (git-fixes) * RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes) * RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git- fixes) * Replace git-fixes tag by bsc#1226507, patches.suse/md-Don-t-wait-for- MD_RECOVERY_NEEDED-for-HOT_REMOVE_DISK-ioctl-a1fd.patch (bsc#1226507). * Resort io_uring kABI patches These ended up in the wrong section. Push them to the right place, next to the other io_uring kabi patches. * Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes). * Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes). * Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019) This reverts commit 571e4310e81312c847a5caee7e45e66aeea2a169. It breaks ACS on certain platforms. Even 6.11 is affected. So drop for now and investigate. * Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable- fixes). * Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" This reverts commit 16ad73a9f4c2888f3bc28513f5e9a88d753f8741. * Revert "mm/sparsemem: fix race in accessing memory_section->usage" This reverts commit 6aa8957889611fbe7f06353f917cfb3d9620a680. * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" This reverts commit 35f619d3c421219e07bc89d2d6a37fbff25519fe. * Split kabi part of dm_blk_ioctl-implement-path-failover-for-SG_IO.patch * Squashfs: sanity check symbolic link size (git-fixes). * USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes). * USB: serial: kobil_sct: restore initial terminal settings (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (git-fixes). * USB: serial: option: add MeiG Smart SRM825L (stable-fixes). * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * USB: usbtmc: prevent kernel-usb-infoleak (git-fixes). * Update patches.suse/af_unix-Fix-data-races-around-sk-sk_shutdown.patch (git- fixes bsc#1226846). * Update patches.suse/gfs2-Fix-NULL-pointer-dereference-in- gfs2_log_flush.patch (bsc#1230948) * Update patches.suse/powerpc-pseries-make-max-polling-consistent-for- long.patch (bsc#1215199 jsc#PED-10954). * Update patches.suse/security-integrity-fix-pointer-to-ESL-data-and-.patch (bsc#1012628 jsc#PED-5085 jsc#PED-10954). * VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes). * afs: Do not cross .backup mountpoint from backup volume (git-fixes). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585) * arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585) * arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes). * arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes). * arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git- fixes). * arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes). * arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git- fixes). * arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git- fixes). * arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes). * arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git- fixes). * arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: signal: Fix some under-bracketed UAPI macros (git-fixes). * arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585) * arm64: tlb: Fix TLBI RANGE operand (bsc#1229585) * arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585) * ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes). * ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git- fixes). * ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes). * ata: pata_macio: Use WARN instead of BUG (stable-fixes). * blacklist.conf: ("KVM: arm64: Use TLBI_TTL_UNKNOWN in __kvm_tlb_flush_vmid_range()") (bsc#1229585) * blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600). * blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600). * bpf, events: Use prog to emit ksymbol event for main program (git-fixes). * bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes). * btrfs: fix race between direct IO write and fsync when using same fd (git- fixes). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes). * can: bcm: Remove proc entry when dev is unregistered (git-fixes). * can: j1939: use correct function name in comment (git-fixes). * can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes). * can: m_can: Release irq on error in m_can_open (git-fixes). * can: m_can: enable NAPI before enabling interrupts (git-fixes). * can: m_can: m_can_close(): stop clocks after device has been shut down (git- fixes). * can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git- fixes). * can: mcp251xfd: clarify the meaning of timestamp (stable-fixes). * can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes). * can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes). * can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes). * can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes). * can: mcp251xfd: properly indent labels (stable-fixes). * can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes). * cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable- fixes). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes). * clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git- fixes). * clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes). * clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git- fixes). * clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes). * clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes). * clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes). * clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git- fixes). * clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes). * clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes). * cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable- fixes). * cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes). * cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes). * cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes). * crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes). * crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes). * crypto: iaa - Fix potential use after free bug (git-fixes). * crypto: qat - fix unintentional re-enabling of error interrupts (stable- fixes). * crypto: xor - fix template benchmarking (git-fixes). * cxl/core: Fix incorrect vendor debug UUID define (git-fixes). * cxl/pci: Fix to record only non-zero ranges (git-fixes). * devres: Initialize an uninitialized struct member (stable-fixes). * dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes). * dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes). * dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes). * dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes). * driver core: Fix a potential null-ptr-deref in module_add_driver() (git- fixes). * driver core: Fix error handling in driver API device_rename() (git-fixes). * driver: iio: add missing checks on iio_info's callback access (stable- fixes). * drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes). * drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes). * drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes). * drm/amd/amdgpu: Check tbo resource pointer (stable-fixes). * drm/amd/amdgpu: Properly tune the size of struct (git-fixes). * drm/amd/display: Add array index check for hdcp ddc access (stable-fixes). * drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes). * drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes). * drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes). * drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes). * drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes). * drm/amd/display: Check BIOS images before it is used (stable-fixes). * drm/amd/display: Check HDCP returned status (stable-fixes). * drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes). * drm/amd/display: Check denominator pbn_div before used (stable-fixes). * drm/amd/display: Check gpio_id before used as array index (stable-fixes). * drm/amd/display: Check index for aux_rd_interval before using (stable- fixes). * drm/amd/display: Check msg_id before processing transcation (stable-fixes). * drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes). * drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes). * drm/amd/display: Defer handling mst up request in resume (stable-fixes). * drm/amd/display: Disable error correction if it's not supported (stable- fixes). * drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes). * drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes). * drm/amd/display: Ensure index calculation will not overflow (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes). * drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes). * drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes). * drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes). * drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes). * drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes). * drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes). * drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes). * drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes). * drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes). * drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes). * drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable- fixes). * drm/amd/display: Solve mst monitors blank out problem after resume (git- fixes). * drm/amd/display: Spinlock before reading event (stable-fixes). * drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes). * drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes). * drm/amd/display: added NULL check at start of dc_validate_stream (stable- fixes). * drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git- fixes). * drm/amd/display: use preferred link settings for dp signal only (stable- fixes). * drm/amd/pm: Fix negative array index read (stable-fixes). * drm/amd/pm: check negtive return for table entries (stable-fixes). * drm/amd/pm: check specific index for aldebaran (stable-fixes). * drm/amd/pm: check specific index for smu13 (stable-fixes). * drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning (stable-fixes). * drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable- fixes). * drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable- fixes). * drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable- fixes). * drm/amd: Add gfx12 swizzle mode defs (stable-fixes). * drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes). * drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes). * drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes). * drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable- fixes). * drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes). * drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes). * drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes). * drm/amdgpu: Fix get each xcp macro (git-fixes). * drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes). * drm/amdgpu: Fix out-of-bounds write warning (stable-fixes). * drm/amdgpu: Fix smatch static checker warning (stable-fixes). * drm/amdgpu: Fix the uninitialized variable warning (stable-fixes). * drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable- fixes). * drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable- fixes). * drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes). * drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes). * drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes). * drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes). * drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes). * drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes). * drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes). * drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes). * drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes). * drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes). * drm/amdgpu: fix a possible null pointer dereference (git-fixes). * drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes). * drm/amdgpu: fix dereference after null check (stable-fixes). * drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix overflowed array index read warning (stable-fixes). * drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes). * drm/amdgpu: fix the waring dereferencing hive (stable-fixes). * drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes). * drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes). * drm/amdgpu: update type of buf size to u32 for eeprom functions (stable- fixes). * drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes). * drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes). * drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes). * drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes). * drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes). * drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes). * drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes). * drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes). * drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes). * drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git- fixes). * drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes). * drm/i915: Do not attempt to load the GSC multiple times (git-fixes). * drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes). * drm/mediatek: Set sensible cursor width/height values to fix crash (stable- fixes). * drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes). * drm/meson: plane: Add error handling (stable-fixes). * drm/msm/a5xx: disable preemption in submits by default (git-fixes). * drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes). * drm/msm/a5xx: properly clear preemption records on resume (git-fixes). * drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes). * drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes). * drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes). * drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes). * drm/msm: fix %s null argument error (git-fixes). * drm/nouveau/fb: restore init() for ramgp102 (git-fixes). * drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git- fixes). * drm/radeon: fix null pointer dereference in radeon_add_common_modes (git- fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git- fixes). * drm/rockchip: vop: Allow 4096px width scaling (git-fixes). * drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes). * drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes). * drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes). * drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes). * drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes). * drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes). * ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes). * erofs: fix incorrect symlink detection in fast symlink (git-fixes). * exfat: fix memory leak in exfat_load_bitmap() (git-fixes). * fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes). * firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * firmware_loader: Block path traversal (git-fixes). * fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602). * fuse: fix memory leak in fuse_create_open (bsc#1230124). * fuse: update stats for pages in dropped aux writeback list (bsc#1230125). * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123). * gpio: modepin: Enable module autoloading (git-fixes). * gpio: rockchip: fix OF node leak in probe() (git-fixes). * hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes). * hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes). * hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable- fixes). * hwmon: (max16065) Fix overflows seen when writing limits (git-fixes). * hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes). * hwmon: (ntc_thermistor) fix module autoloading (git-fixes). * hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes). * hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes). * hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git- fixes). * hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git- fixes). * hwrng: mtk - Use devm_pm_runtime_enable (git-fixes). * i2c: aspeed: Update the stop sw state when the bus recovery occurs (git- fixes). * i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes). * i2c: isch: Add missed 'else' (git-fixes). * i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes). * i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes). * i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable- fixes). * iio: adc: ad7124: fix chip ID mismatch (git-fixes). * iio: adc: ad7124: fix config comparison (git-fixes). * iio: adc: ad7606: fix oversampling gpio array (git-fixes). * iio: adc: ad7606: fix standby gpio state to match the documentation (git- fixes). * iio: adc: ad7606: remove frstdata check for serial mode (git-fixes). * iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes). * iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git- fixes). * iio: fix scale application in iio_convert_raw_to_processed_unlocked (git- fixes). * iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes). * ipmi: docs: do not advertise deprecated sysfs entries (git-fixes). * ipmi:ssif: Improve detecting during probing (bsc#1228771) * ipmi:ssif: Improve detecting during probing (bsc#1228771) Move patch into the sorted section. * ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206) * jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes). * kABI workaround for cros_ec stuff (git-fixes). * kABI: Workaround kABI change in patches.suse/iommu-dma-Trace-bounce-buffer- usage-when-mapping-buf.patch (git-fixes). * kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable- fixes). * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * leds: spi-byte: Call of_node_put() on error path (stable-fixes). * lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable- fixes). * lirc: rc_dev_get_from_fd(): fix file leak (git-fixes). * mailbox: bcm2835: Fix timeout during suspend mode (git-fixes). * mailbox: rockchip: fix a typo in module autoloading (git-fixes). * media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes). * media: ov5675: Fix power on/off delay timings (git-fixes). * media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes). * media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes). * media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes). * media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes). * media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes). * media: uvcvideo: Enforce alignment of frame and interval (stable-fixes). * media: venus: fix use after free bug in venus_remove due to race condition (git-fixes). * media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes). * media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes). * media: vivid: fix wrong sizeimage value for mplane (stable-fixes). * memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes). * memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes). * minmax: reduce min/max macro expansion in atomisp driver (git-fixes). * misc: fastrpc: Fix double free of 'buf' in error path (git-fixes). * mmc: core: apply SD quirks earlier during probe (git-fixes). * mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes). * mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes). * mmc: sdhci-of-aspeed: fix module autoloading (git-fixes). * module: Fix KCOV-ignored file name (git-fixes). * mtd: powernv: Add check devm_kasprintf() returned value (git-fixes). * mtd: slram: insert break after errors in parsing the map (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: phy: Fix missing of_node_put() for leds (git-fixes). * net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes). * net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes). * net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes). * nfsd: Do not leave work of closing files to a work queue (bsc#1228140). * nilfs2: determine empty node blocks as corrupted (git-fixes). * nilfs2: fix missing cleanup on rollforward recovery error (git-fixes). * nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes). * nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes). * nilfs2: fix state management in error path of log writing function (git- fixes). * nilfs2: protect references to superblock parameters exposed in sysfs (git- fixes). * nouveau: fix the fwsec sb verification register (git-fixes). * nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244). * nvme-multipath: system fails to create generic nvme device (bsc#1228244). * nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes). * nvme-pci: allocate tagset on reset if necessary (git-fixes). * nvme-tcp: fix link failure for TCP auth (git-fixes). * nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes). * nvme: clear caller pointer on identify failure (git-fixes). * nvme: fix namespace removal list (git-fixes). * nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes). * nvmet-tcp: do not continue for invalid icreq (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * nvmet-trace: avoid dereferencing pointer too early (git-fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes). * pcmcia: Use resource_size function on resource object (stable-fixes). * perf annotate: Introduce global annotation_options (git-fixes). * perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes). * perf annotate: Use global annotation_options (git-fixes). * perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes). * perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes). * perf intel-pt: Fix exclude_guest setting (git-fixes). * perf machine thread: Remove exited threads by default (git-fixes). * perf maps: Move symbol maps functions to maps.c (git-fixes). * perf pmu: Assume sysfs events are always the same case (git-fixes). * perf pmus: Fixes always false when compare duplicates aliases (git-fixes). * perf record: Lazy load kernel symbols (git-fixes). * perf report: Convert to the global annotation_options (git-fixes). * perf report: Fix condition in sort__sym_cmp() (git-fixes). * perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes). * perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes). * perf tool: fix dereferencing NULL al->maps (git-fixes). * perf tools: Add/use PMU reverse lookup from config to name (git-fixes). * perf tools: Use pmus to describe type from attribute (git-fixes). * perf top: Convert to the global annotation_options (git-fixes). * perf/core: Fix missing wakeup when waiting for context reference (git- fixes). * perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git- fixes). * perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes). * perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes). * perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes). * perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git- fixes). * perf/x86/intel/pt: Fix topa_entry base length (git-fixes). * perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git- fixes). * perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119). * perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes). * perf/x86/intel: Factor out the initialization code for SPR (git fixes). * perf/x86/intel: Limit the period on Haswell (git-fixes). * perf/x86/intel: Use the common uarch name for the shared functions (git fixes). * perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119). * perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119). * perf/x86/uncore: Cleanup unused unit structure (bsc#1230119). * perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119). * perf/x86/uncore: Save the unit control address of all units (bsc#1230119). * perf/x86/uncore: Support per PMU cpumask (bsc#1230119). * perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes). * perf/x86: Serialize set_attr_rdpmc() (git-fixes). * perf: Fix default aux_watermark calculation (git-fixes). * perf: Fix event leak upon exit (git-fixes). * perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes). * perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes). * perf: script: add raw|disasm arguments to --insn-trace option (git-fixes). * phy: zynqmp: Take the phy mutex in xlate (stable-fixes). * pinctrl: at91: make it work with current gpiolib (stable-fixes). * pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes). * pinctrl: single: fix missing error code in pcs_probe() (git-fixes). * platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable- fixes). * platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes). * platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes). * platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git- fixes). * platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes). * power: supply: axp20x_battery: Remove design from min and max voltage (git- fixes). * power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes). * power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes). * powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes). * powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656). * pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes). * regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes). * regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes). * regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes). * regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes). * regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes). * regulator: rt5120: Convert comma to semicolon (git-fixes). * regulator: wm831x-isink: Convert comma to semicolon (git-fixes). * remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes). * remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes). * remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes). * reset: berlin: fix OF node leak in probe() error path (git-fixes). * reset: k210: fix OF node leak in probe() error path (git-fixes). * resource: fix region_intersects() vs add_memory_driver_managed() (git- fixes). * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc * rtc: at91sam9: fix OF node leak in probe() error path (git-fixes). * s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694). * s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes). * s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562). * s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563). * s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564). * scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes). * scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). * scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899). * scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899). * scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848). * selftests: lib: remove strscpy test (git-fixes). * selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes). * soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes). * soc: versatile: integrator: fix OF node leak in probe() error path (git- fixes). * spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes). * spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: meson-spicc: convert comma to semicolon (git-fixes). * spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git- fixes). * spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9834: Validate frequency parameter value (git- fixes). * supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035) * thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes). * thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git- fixes). * thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git- fixes). * thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes). * tomoyo: fallback to realpath if symlink's pathname does not exist (git- fixes). * tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes). * tpm: Clean up TPM space after command failure (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usb: cdnsp: Fix incorrect usb_request status (git-fixes). * usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes). * usb: dwc2: drd: fix clock gating on USB role switch (git-fixes). * usb: dwc3: Avoid waking up gadget during startxfer (git-fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (git- fixes). * usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes). * usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes). * usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes). * usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes). * usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes). * usb: uas: set host status byte on data completion error (stable-fixes). * usbip: Do not submit special requests twice (stable-fixes). * usbnet: ipheth: add CDC NCM support (git-fixes). * usbnet: ipheth: do not stop RX on failing RX callback (git-fixes). * usbnet: ipheth: drop RX URBs with no payload (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes). * usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes). * usbnet: ipheth: race between ipheth_close and error handling (stable-fixes). * usbnet: ipheth: remove extraneous rx URB length check (git-fixes). * usbnet: ipheth: transmit URBs without trailing padding (git-fixes). * usbnet: modern method to get random MAC (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * virtio_net: Fix napi_skb_cache_put warning (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes). * wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: fix BSS chan info request WMI command (git-fixes). * wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes). * wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes). * wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes). * wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable- fixes). * wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcmfmac: introducing fwil query functions (git-fixes). * wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes). * wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes). * wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git- fixes). * wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git- fixes). * wifi: cfg80211: make hash table duplicates more survivable (stable-fixes). * wifi: cfg80211: restrict operation during radar detection (stable-fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: increase the time between ranging measurements (git- fixes). * wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes). * wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes). * wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes). * wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes). * wifi: mac80211: fix the comeback long retry times (git-fixes). * wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable- fixes). * wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git- fixes). * wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes). * wifi: mt76: mt7603: fix mixed declarations and code (git-fixes). * wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes). * wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git- fixes). * wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes). * wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes). * wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes). * wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes). * wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes). * wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes). * wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes). * wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes). * wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes). * wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes). * wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes). * wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes). * wifi: rtw88: 8822c: Fix reported RX band width (git-fixes). * wifi: rtw88: always wait for both firmware loading attempts (git-fixes). * wifi: rtw88: remove CPT execution branch never used (git-fixes). * wifi: rtw88: usb: schedule rx work after everything is set up (stable- fixes). * wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes). * wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes). * wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes). * x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527). * x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527). * x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527). * x86/pat: Restructure _lookup_address_cpa() (bsc#1221527). * xen/swiotlb: add alignment check for dma buffers (bsc#1229928). * xen/swiotlb: fix allocated size (git-fixes). * xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003). * xen: allow mapping ACPI data using a different physical address (bsc#1226003). * xen: introduce generic helper checking for memory map conflicts (bsc#1226003). * xen: move checks for e820 conflicts further up (bsc#1226003). * xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003). * xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003). * xen: use correct end address of kernel for conflict checking (bsc#1226003). * xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git- fixes). * xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git- fixes). * xz: cleanup CRC32 edits from 2018 (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-84=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-84=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-11.1 * kernel-source-rt-6.4.0-11.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-11.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-1-1.2 * kernel-rt-debugsource-6.4.0-11.1 * kernel-rt-debuginfo-6.4.0-11.1 * kernel-livepatch-6_4_0-11-rt-debuginfo-1-1.2 * kernel-rt-livepatch-6.4.0-11.1 * kernel-livepatch-6_4_0-11-rt-1-1.2 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-11.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-11.1 * kernel-rt-devel-debuginfo-6.4.0-11.1 * kernel-rt-debugsource-6.4.0-11.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52610.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52916.html * https://www.suse.com/security/cve/CVE-2024-26640.html * https://www.suse.com/security/cve/CVE-2024-26759.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-38538.html * https://www.suse.com/security/cve/CVE-2024-38596.html * https://www.suse.com/security/cve/CVE-2024-38632.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40973.html * https://www.suse.com/security/cve/CVE-2024-40983.html * https://www.suse.com/security/cve/CVE-2024-42154.html * https://www.suse.com/security/cve/CVE-2024-42243.html * https://www.suse.com/security/cve/CVE-2024-42252.html * https://www.suse.com/security/cve/CVE-2024-42265.html * https://www.suse.com/security/cve/CVE-2024-42294.html * https://www.suse.com/security/cve/CVE-2024-42304.html * https://www.suse.com/security/cve/CVE-2024-42305.html * https://www.suse.com/security/cve/CVE-2024-42306.html * https://www.suse.com/security/cve/CVE-2024-43828.html * https://www.suse.com/security/cve/CVE-2024-43832.html * https://www.suse.com/security/cve/CVE-2024-43835.html * https://www.suse.com/security/cve/CVE-2024-43845.html * https://www.suse.com/security/cve/CVE-2024-43870.html * https://www.suse.com/security/cve/CVE-2024-43890.html * https://www.suse.com/security/cve/CVE-2024-43898.html * https://www.suse.com/security/cve/CVE-2024-43904.html * https://www.suse.com/security/cve/CVE-2024-43914.html * https://www.suse.com/security/cve/CVE-2024-44935.html * https://www.suse.com/security/cve/CVE-2024-44944.html * https://www.suse.com/security/cve/CVE-2024-44946.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44948.html * https://www.suse.com/security/cve/CVE-2024-44950.html * https://www.suse.com/security/cve/CVE-2024-44951.html * https://www.suse.com/security/cve/CVE-2024-44952.html * https://www.suse.com/security/cve/CVE-2024-44954.html * https://www.suse.com/security/cve/CVE-2024-44960.html * https://www.suse.com/security/cve/CVE-2024-44961.html * https://www.suse.com/security/cve/CVE-2024-44962.html * https://www.suse.com/security/cve/CVE-2024-44965.html * https://www.suse.com/security/cve/CVE-2024-44967.html * https://www.suse.com/security/cve/CVE-2024-44969.html * https://www.suse.com/security/cve/CVE-2024-44970.html * https://www.suse.com/security/cve/CVE-2024-44971.html * https://www.suse.com/security/cve/CVE-2024-44977.html * https://www.suse.com/security/cve/CVE-2024-44982.html * https://www.suse.com/security/cve/CVE-2024-44984.html * https://www.suse.com/security/cve/CVE-2024-44985.html * https://www.suse.com/security/cve/CVE-2024-44986.html * https://www.suse.com/security/cve/CVE-2024-44987.html * https://www.suse.com/security/cve/CVE-2024-44988.html * https://www.suse.com/security/cve/CVE-2024-44989.html * https://www.suse.com/security/cve/CVE-2024-44990.html * https://www.suse.com/security/cve/CVE-2024-44991.html * https://www.suse.com/security/cve/CVE-2024-44997.html * https://www.suse.com/security/cve/CVE-2024-44998.html * https://www.suse.com/security/cve/CVE-2024-44999.html * https://www.suse.com/security/cve/CVE-2024-45000.html * https://www.suse.com/security/cve/CVE-2024-45001.html * https://www.suse.com/security/cve/CVE-2024-45002.html * https://www.suse.com/security/cve/CVE-2024-45003.html * https://www.suse.com/security/cve/CVE-2024-45005.html * https://www.suse.com/security/cve/CVE-2024-45006.html * https://www.suse.com/security/cve/CVE-2024-45007.html * https://www.suse.com/security/cve/CVE-2024-45008.html * https://www.suse.com/security/cve/CVE-2024-45011.html * https://www.suse.com/security/cve/CVE-2024-45012.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45015.html * https://www.suse.com/security/cve/CVE-2024-45017.html * https://www.suse.com/security/cve/CVE-2024-45018.html * https://www.suse.com/security/cve/CVE-2024-45019.html * https://www.suse.com/security/cve/CVE-2024-45020.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-45022.html * https://www.suse.com/security/cve/CVE-2024-45023.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-45028.html * https://www.suse.com/security/cve/CVE-2024-45029.html * https://www.suse.com/security/cve/CVE-2024-45030.html * https://www.suse.com/security/cve/CVE-2024-46672.html * https://www.suse.com/security/cve/CVE-2024-46673.html * https://www.suse.com/security/cve/CVE-2024-46674.html * https://www.suse.com/security/cve/CVE-2024-46675.html * https://www.suse.com/security/cve/CVE-2024-46676.html * https://www.suse.com/security/cve/CVE-2024-46677.html * https://www.suse.com/security/cve/CVE-2024-46679.html * https://www.suse.com/security/cve/CVE-2024-46685.html * https://www.suse.com/security/cve/CVE-2024-46686.html * https://www.suse.com/security/cve/CVE-2024-46687.html * https://www.suse.com/security/cve/CVE-2024-46689.html * https://www.suse.com/security/cve/CVE-2024-46691.html * https://www.suse.com/security/cve/CVE-2024-46692.html * https://www.suse.com/security/cve/CVE-2024-46693.html * https://www.suse.com/security/cve/CVE-2024-46694.html * https://www.suse.com/security/cve/CVE-2024-46695.html * https://www.suse.com/security/cve/CVE-2024-46702.html * https://www.suse.com/security/cve/CVE-2024-46706.html * https://www.suse.com/security/cve/CVE-2024-46707.html * https://www.suse.com/security/cve/CVE-2024-46709.html * https://www.suse.com/security/cve/CVE-2024-46710.html * https://www.suse.com/security/cve/CVE-2024-46714.html * https://www.suse.com/security/cve/CVE-2024-46715.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46717.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46720.html * https://www.suse.com/security/cve/CVE-2024-46722.html * https://www.suse.com/security/cve/CVE-2024-46723.html * https://www.suse.com/security/cve/CVE-2024-46724.html * https://www.suse.com/security/cve/CVE-2024-46725.html * https://www.suse.com/security/cve/CVE-2024-46726.html * https://www.suse.com/security/cve/CVE-2024-46728.html * https://www.suse.com/security/cve/CVE-2024-46729.html * https://www.suse.com/security/cve/CVE-2024-46730.html * https://www.suse.com/security/cve/CVE-2024-46731.html * https://www.suse.com/security/cve/CVE-2024-46732.html * https://www.suse.com/security/cve/CVE-2024-46734.html * https://www.suse.com/security/cve/CVE-2024-46735.html * https://www.suse.com/security/cve/CVE-2024-46737.html * https://www.suse.com/security/cve/CVE-2024-46738.html * https://www.suse.com/security/cve/CVE-2024-46739.html * https://www.suse.com/security/cve/CVE-2024-46741.html * https://www.suse.com/security/cve/CVE-2024-46743.html * https://www.suse.com/security/cve/CVE-2024-46744.html * https://www.suse.com/security/cve/CVE-2024-46745.html * https://www.suse.com/security/cve/CVE-2024-46746.html * https://www.suse.com/security/cve/CVE-2024-46747.html * https://www.suse.com/security/cve/CVE-2024-46749.html * https://www.suse.com/security/cve/CVE-2024-46750.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-46753.html * https://www.suse.com/security/cve/CVE-2024-46755.html * https://www.suse.com/security/cve/CVE-2024-46756.html * https://www.suse.com/security/cve/CVE-2024-46757.html * https://www.suse.com/security/cve/CVE-2024-46758.html * https://www.suse.com/security/cve/CVE-2024-46759.html * https://www.suse.com/security/cve/CVE-2024-46760.html * https://www.suse.com/security/cve/CVE-2024-46761.html * https://www.suse.com/security/cve/CVE-2024-46767.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46772.html * https://www.suse.com/security/cve/CVE-2024-46773.html * https://www.suse.com/security/cve/CVE-2024-46774.html * https://www.suse.com/security/cve/CVE-2024-46776.html * https://www.suse.com/security/cve/CVE-2024-46778.html * https://www.suse.com/security/cve/CVE-2024-46780.html * https://www.suse.com/security/cve/CVE-2024-46781.html * https://www.suse.com/security/cve/CVE-2024-46783.html * https://www.suse.com/security/cve/CVE-2024-46784.html * https://www.suse.com/security/cve/CVE-2024-46786.html * https://www.suse.com/security/cve/CVE-2024-46787.html * https://www.suse.com/security/cve/CVE-2024-46791.html * https://www.suse.com/security/cve/CVE-2024-46794.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46798.html * https://www.suse.com/security/cve/CVE-2024-46822.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221527 * https://bugzilla.suse.com/show_bug.cgi?id=1221610 * https://bugzilla.suse.com/show_bug.cgi?id=1221650 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223600 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1225487 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226507 * https://bugzilla.suse.com/show_bug.cgi?id=1226606 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1226860 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227694 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227819 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1227890 * https://bugzilla.suse.com/show_bug.cgi?id=1227962 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228140 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228507 * https://bugzilla.suse.com/show_bug.cgi?id=1228771 * https://bugzilla.suse.com/show_bug.cgi?id=1229001 * https://bugzilla.suse.com/show_bug.cgi?id=1229004 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229289 * https://bugzilla.suse.com/show_bug.cgi?id=1229334 * https://bugzilla.suse.com/show_bug.cgi?id=1229362 * https://bugzilla.suse.com/show_bug.cgi?id=1229363 * https://bugzilla.suse.com/show_bug.cgi?id=1229364 * https://bugzilla.suse.com/show_bug.cgi?id=1229371 * https://bugzilla.suse.com/show_bug.cgi?id=1229380 * https://bugzilla.suse.com/show_bug.cgi?id=1229389 * https://bugzilla.suse.com/show_bug.cgi?id=1229394 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229443 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229494 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229753 * https://bugzilla.suse.com/show_bug.cgi?id=1229764 * https://bugzilla.suse.com/show_bug.cgi?id=1229768 * https://bugzilla.suse.com/show_bug.cgi?id=1229790 * https://bugzilla.suse.com/show_bug.cgi?id=1229810 * https://bugzilla.suse.com/show_bug.cgi?id=1229899 * https://bugzilla.suse.com/show_bug.cgi?id=1229928 * https://bugzilla.suse.com/show_bug.cgi?id=1230015 * https://bugzilla.suse.com/show_bug.cgi?id=1230119 * https://bugzilla.suse.com/show_bug.cgi?id=1230123 * https://bugzilla.suse.com/show_bug.cgi?id=1230124 * https://bugzilla.suse.com/show_bug.cgi?id=1230125 * https://bugzilla.suse.com/show_bug.cgi?id=1230169 * https://bugzilla.suse.com/show_bug.cgi?id=1230170 * https://bugzilla.suse.com/show_bug.cgi?id=1230171 * https://bugzilla.suse.com/show_bug.cgi?id=1230173 * https://bugzilla.suse.com/show_bug.cgi?id=1230174 * https://bugzilla.suse.com/show_bug.cgi?id=1230175 * https://bugzilla.suse.com/show_bug.cgi?id=1230176 * https://bugzilla.suse.com/show_bug.cgi?id=1230178 * https://bugzilla.suse.com/show_bug.cgi?id=1230180 * https://bugzilla.suse.com/show_bug.cgi?id=1230181 * https://bugzilla.suse.com/show_bug.cgi?id=1230185 * https://bugzilla.suse.com/show_bug.cgi?id=1230191 * https://bugzilla.suse.com/show_bug.cgi?id=1230192 * https://bugzilla.suse.com/show_bug.cgi?id=1230193 * https://bugzilla.suse.com/show_bug.cgi?id=1230194 * https://bugzilla.suse.com/show_bug.cgi?id=1230195 * https://bugzilla.suse.com/show_bug.cgi?id=1230200 * https://bugzilla.suse.com/show_bug.cgi?id=1230204 * https://bugzilla.suse.com/show_bug.cgi?id=1230206 * https://bugzilla.suse.com/show_bug.cgi?id=1230207 * https://bugzilla.suse.com/show_bug.cgi?id=1230209 * https://bugzilla.suse.com/show_bug.cgi?id=1230211 * https://bugzilla.suse.com/show_bug.cgi?id=1230213 * https://bugzilla.suse.com/show_bug.cgi?id=1230217 * https://bugzilla.suse.com/show_bug.cgi?id=1230221 * https://bugzilla.suse.com/show_bug.cgi?id=1230224 * https://bugzilla.suse.com/show_bug.cgi?id=1230230 * https://bugzilla.suse.com/show_bug.cgi?id=1230232 * https://bugzilla.suse.com/show_bug.cgi?id=1230233 * https://bugzilla.suse.com/show_bug.cgi?id=1230240 * https://bugzilla.suse.com/show_bug.cgi?id=1230244 * https://bugzilla.suse.com/show_bug.cgi?id=1230245 * https://bugzilla.suse.com/show_bug.cgi?id=1230247 * https://bugzilla.suse.com/show_bug.cgi?id=1230248 * https://bugzilla.suse.com/show_bug.cgi?id=1230269 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230340 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://bugzilla.suse.com/show_bug.cgi?id=1230426 * https://bugzilla.suse.com/show_bug.cgi?id=1230430 * https://bugzilla.suse.com/show_bug.cgi?id=1230431 * https://bugzilla.suse.com/show_bug.cgi?id=1230432 * https://bugzilla.suse.com/show_bug.cgi?id=1230433 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230435 * https://bugzilla.suse.com/show_bug.cgi?id=1230440 * https://bugzilla.suse.com/show_bug.cgi?id=1230441 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230444 * https://bugzilla.suse.com/show_bug.cgi?id=1230450 * https://bugzilla.suse.com/show_bug.cgi?id=1230451 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230455 * https://bugzilla.suse.com/show_bug.cgi?id=1230457 * https://bugzilla.suse.com/show_bug.cgi?id=1230459 * https://bugzilla.suse.com/show_bug.cgi?id=1230506 * https://bugzilla.suse.com/show_bug.cgi?id=1230507 * https://bugzilla.suse.com/show_bug.cgi?id=1230511 * https://bugzilla.suse.com/show_bug.cgi?id=1230515 * https://bugzilla.suse.com/show_bug.cgi?id=1230517 * https://bugzilla.suse.com/show_bug.cgi?id=1230518 * https://bugzilla.suse.com/show_bug.cgi?id=1230519 * https://bugzilla.suse.com/show_bug.cgi?id=1230520 * https://bugzilla.suse.com/show_bug.cgi?id=1230521 * https://bugzilla.suse.com/show_bug.cgi?id=1230524 * https://bugzilla.suse.com/show_bug.cgi?id=1230526 * https://bugzilla.suse.com/show_bug.cgi?id=1230533 * https://bugzilla.suse.com/show_bug.cgi?id=1230535 * https://bugzilla.suse.com/show_bug.cgi?id=1230539 * https://bugzilla.suse.com/show_bug.cgi?id=1230540 * https://bugzilla.suse.com/show_bug.cgi?id=1230549 * https://bugzilla.suse.com/show_bug.cgi?id=1230556 * https://bugzilla.suse.com/show_bug.cgi?id=1230562 * https://bugzilla.suse.com/show_bug.cgi?id=1230563 * https://bugzilla.suse.com/show_bug.cgi?id=1230564 * https://bugzilla.suse.com/show_bug.cgi?id=1230580 * https://bugzilla.suse.com/show_bug.cgi?id=1230582 * https://bugzilla.suse.com/show_bug.cgi?id=1230589 * https://bugzilla.suse.com/show_bug.cgi?id=1230602 * https://bugzilla.suse.com/show_bug.cgi?id=1230699 * https://bugzilla.suse.com/show_bug.cgi?id=1230700 * https://bugzilla.suse.com/show_bug.cgi?id=1230701 * https://bugzilla.suse.com/show_bug.cgi?id=1230702 * https://bugzilla.suse.com/show_bug.cgi?id=1230703 * https://bugzilla.suse.com/show_bug.cgi?id=1230704 * https://bugzilla.suse.com/show_bug.cgi?id=1230705 * https://bugzilla.suse.com/show_bug.cgi?id=1230706 * https://bugzilla.suse.com/show_bug.cgi?id=1230709 * https://bugzilla.suse.com/show_bug.cgi?id=1230711 * https://bugzilla.suse.com/show_bug.cgi?id=1230712 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230719 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230724 * https://bugzilla.suse.com/show_bug.cgi?id=1230725 * https://bugzilla.suse.com/show_bug.cgi?id=1230726 * https://bugzilla.suse.com/show_bug.cgi?id=1230727 * https://bugzilla.suse.com/show_bug.cgi?id=1230730 * https://bugzilla.suse.com/show_bug.cgi?id=1230731 * https://bugzilla.suse.com/show_bug.cgi?id=1230732 * https://bugzilla.suse.com/show_bug.cgi?id=1230747 * https://bugzilla.suse.com/show_bug.cgi?id=1230748 * https://bugzilla.suse.com/show_bug.cgi?id=1230749 * https://bugzilla.suse.com/show_bug.cgi?id=1230751 * https://bugzilla.suse.com/show_bug.cgi?id=1230752 * https://bugzilla.suse.com/show_bug.cgi?id=1230753 * https://bugzilla.suse.com/show_bug.cgi?id=1230756 * https://bugzilla.suse.com/show_bug.cgi?id=1230761 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230767 * https://bugzilla.suse.com/show_bug.cgi?id=1230768 * https://bugzilla.suse.com/show_bug.cgi?id=1230771 * https://bugzilla.suse.com/show_bug.cgi?id=1230772 * https://bugzilla.suse.com/show_bug.cgi?id=1230775 * https://bugzilla.suse.com/show_bug.cgi?id=1230776 * https://bugzilla.suse.com/show_bug.cgi?id=1230780 * https://bugzilla.suse.com/show_bug.cgi?id=1230783 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230787 * https://bugzilla.suse.com/show_bug.cgi?id=1230791 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1230796 * https://bugzilla.suse.com/show_bug.cgi?id=1230802 * https://bugzilla.suse.com/show_bug.cgi?id=1230806 * https://bugzilla.suse.com/show_bug.cgi?id=1230808 * https://bugzilla.suse.com/show_bug.cgi?id=1230809 * https://bugzilla.suse.com/show_bug.cgi?id=1230810 * https://bugzilla.suse.com/show_bug.cgi?id=1230812 * https://bugzilla.suse.com/show_bug.cgi?id=1230813 * https://bugzilla.suse.com/show_bug.cgi?id=1230814 * https://bugzilla.suse.com/show_bug.cgi?id=1230815 * https://bugzilla.suse.com/show_bug.cgi?id=1230821 * https://bugzilla.suse.com/show_bug.cgi?id=1230825 * https://bugzilla.suse.com/show_bug.cgi?id=1230830 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230854 * https://bugzilla.suse.com/show_bug.cgi?id=1230948 * https://bugzilla.suse.com/show_bug.cgi?id=1231008 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231120 * https://bugzilla.suse.com/show_bug.cgi?id=1231146 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://jira.suse.com/browse/PED-10954 * https://jira.suse.com/browse/PED-1706 * https://jira.suse.com/browse/PED-9899 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:05 -0000 Subject: SUSE-RU-2025:20061-1: moderate: Recommended update for cockpit Message-ID: <174902766516.627.5440901001781060445@smelt2.prg2.suse.org> # Recommended update for cockpit Announcement ID: SUSE-RU-2025:20061-1 Release Date: 2025-02-03T08:57:56Z Rating: moderate References: * bsc#1221336 * bsc#1226050 * bsc#1227441 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for cockpit fixes the following issues: * Updated documentation to point at new links (bsc#1226050) * Removed additional hardcoded RH refs (bsc#1221336) * Use SUSE ID as branding instead of sle-micro (bsc#1227441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-66=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cockpit-ws-309-7.1 * cockpit-309-7.1 * cockpit-bridge-309-7.1 * cockpit-ws-debuginfo-309-7.1 * cockpit-debuginfo-309-7.1 * cockpit-bridge-debuginfo-309-7.1 * cockpit-debugsource-309-7.1 * SUSE Linux Micro 6.0 (noarch) * cockpit-system-309-7.1 * cockpit-networkmanager-309-7.1 * cockpit-storaged-309-7.1 * cockpit-selinux-309-7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221336 * https://bugzilla.suse.com/show_bug.cgi?id=1226050 * https://bugzilla.suse.com/show_bug.cgi?id=1227441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:58 -0000 Subject: SUSE-RU-2025:20063-1: critical: Recommended update for perl-Bootloader Message-ID: <174902765804.627.4670972167970723357@smelt2.prg2.suse.org> # Recommended update for perl-Bootloader Announcement ID: SUSE-RU-2025:20063-1 Release Date: 2025-02-03T08:59:05Z Rating: critical References: * bsc#1215064 * bsc#1221470 * bsc#1230070 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for perl-Bootloader fixes the following issues: * handle missing grub_installdevice on powerpc (bsc#1230070) * log grub2-install errors correctly (bsc#1221470) * skip warning about unsupported options when in compat mode * bootloader_entry script can have an optional 'force-default' argument (bsc#1215064) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-78=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * perl-Bootloader-1.8.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215064 * https://bugzilla.suse.com/show_bug.cgi?id=1221470 * https://bugzilla.suse.com/show_bug.cgi?id=1230070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:44 -0000 Subject: SUSE-RU-2025:20066-1: moderate: Recommended update for salt Message-ID: <174902764451.627.7501331566733929874@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20066-1 Release Date: 2025-02-03T09:01:09Z Rating: moderate References: * bsc#1219041 * bsc#1220357 * bsc#1226141 * bsc#1229109 * bsc#1229539 * bsc#1230322 Affected Products: * SUSE Linux Micro 6.0 An update that has six fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fix failing x509 tests with OpenSSL < 1.1 * Avoid explicit reading of /etc/salt/minion (bsc#1220357) * Allow NamedLoaderContexts to be returned from loader * Revert the change making reactor less blocking (bsc#1230322) * Use --cachedir for extension_modules in salt-call (bsc#1226141) * Prevent using SyncWrapper with no reason * Fix the SELinux context for Salt Minion service (bsc#1219041) * Set contextvars as a build requirement for package * Increase warn_until_date date for code we still support * The test_debian test now uses port 80 for ubuntu keyserver * Fix too frequent systemd service restart in test_system test * Avoid crash on wrong output of systemctl version (bsc#1229539) * Improve error handling with different OpenSSL versions * Remove redundant run_func from salt.master.MWorker._handle_aes * Fix cloud minion configuration for multiple masters (bsc#1229109) * Use Pygit2 id instead of deprecated oid in gitfs * Fix few failing tests to work with both Salt and Salt bundle * Skip testing unsupported OpenSSL crypto algorithms ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-88=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-3006.0-8.1 * salt-transactional-update-3006.0-8.1 * salt-minion-3006.0-8.1 * salt-master-3006.0-8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219041 * https://bugzilla.suse.com/show_bug.cgi?id=1220357 * https://bugzilla.suse.com/show_bug.cgi?id=1226141 * https://bugzilla.suse.com/show_bug.cgi?id=1229109 * https://bugzilla.suse.com/show_bug.cgi?id=1229539 * https://bugzilla.suse.com/show_bug.cgi?id=1230322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:23 -0000 Subject: SUSE-RU-2025:20070-1: moderate: Recommended update for regionServiceClientConfigEC2 Message-ID: <174902762397.627.2510565633409520870@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigEC2 Announcement ID: SUSE-RU-2025:20070-1 Release Date: 2025-02-03T09:02:47Z Rating: moderate References: * bsc#1217536 * bsc#1218656 * bsc#1228363 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for regionServiceClientConfigEC2 contains the following fixes: * Update to version 4.3.0 (bsc#1228363) * The IPv6 cert was switched up for the region server running in us-west-2 and as such the SSL handshake was failing. Drop the incorrect cert and add the correct cert. * Switch the patch syntax away form the deprecated shorthand macro * Version 4.2.0 Replace certs (length 4096): rgnsrv-ec2-cn-north1 -> 54.223.148.145 expires in 8 years rgnsrv-ec2-us-west2-2 -> 54.245.101.47 expires in 9 years Sidenote: We have one server with a short cert (2048) left; 34.197.223.242 expires in 2027 * Version 4.1.1 Add patch to not serve IPv6 addresses on SLES12 Related to bsc#1218656 * Update to version 4.1.1 (bsc#1217536) * Replace 54.247.166.75.pem and 54.253.118.149.pem old soon to expired certs with new generated ones that expire in 8 years and have longer length (4096) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-80=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * regionServiceClientConfigEC2-4.3.0-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217536 * https://bugzilla.suse.com/show_bug.cgi?id=1218656 * https://bugzilla.suse.com/show_bug.cgi?id=1228363 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:34 -0000 Subject: SUSE-SU-2025:20055-1: important: Security update for containerized-data-importer Message-ID: <174902769424.627.1428760911384630181@smelt2.prg2.suse.org> # Security update for containerized-data-importer Announcement ID: SUSE-SU-2025:20055-1 Release Date: 2025-02-03T08:56:47Z Rating: important References: * bsc#1224119 Cross-References: * CVE-2024-3727 CVSS scores: * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for containerized-data-importer fixes the following issues: * Update to version 1.60.1 Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.60.1 * Add registry path for SLE15 SP7 * Bump to the latest tag 1.60.1-150600.3.9.1 * Use the images based on SLE15 SP6 BCI * Bump to the latest tag 1.59.0-150600.3.6.1 * Update to version 1.59.0 Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.59.0 Release notes https://github.com/kubevirt/containerized-data- importer/releases/tag/v1.58.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-160=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * containerized-data-importer-manifests-1.60.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1224119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:00:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:00:53 -0000 Subject: SUSE-RU-2025:20064-1: moderate: Recommended update for elemental-operator, elemental Message-ID: <174902765336.627.10933621781880029562@smelt2.prg2.suse.org> # Recommended update for elemental-operator, elemental Announcement ID: SUSE-RU-2025:20064-1 Release Date: 2025-02-03T08:59:26Z Rating: moderate References: * bsc#1230904 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for elemental-operator, elemental contains the following fixes: elemental: \- Include net.ifnames=0 kernel parameter. (bsc#1230904) elemental-operator: \- Update to version 1.6.5: * Add SeedImage.status.checksumURL. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-68=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * elemental-2.1.3-1.1 * elemental-updater-2.1.3-1.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-support-1.6.5-1.1 * elemental-register-1.6.5-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230904 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:17 -0000 Subject: SUSE-SU-2025:20057-1: moderate: Security update for rust-keylime Message-ID: <174902767799.627.16091136840348486718@smelt2.prg2.suse.org> # Security update for rust-keylime Announcement ID: SUSE-SU-2025:20057-1 Release Date: 2025-02-03T08:57:20Z Rating: moderate References: * bsc#1223234 * bsc#1229952 * bsc#1230029 Cross-References: * CVE-2024-32650 * CVE-2024-43806 CVSS scores: * CVE-2024-32650 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43806 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for rust-keylime fixes the following issues: * Update vendored crates (CVE-2024-43806, bsc#1229952, bsc#1230029) * rustix 0.37.25 * rustix 0.38.34 * shlex 1.3.0 * Update to version 0.2.6+13: * Enable test functional/iak-idevid-persisted-and-protected * build(deps): bump uuid from 1.7.0 to 1.10.0 * build(deps): bump openssl from 0.10.64 to 0.10.66 * keylime-agent/src/revocation: Fix comment indentation * keylime/crypto: Fix indentation of documentation comment * build(deps): bump thiserror from 1.0.59 to 1.0.63 * build(deps): bump serde_json from 1.0.116 to 1.0.120 * dependabot: Extend to also monitor workflow actions * ci: Disable Packit CI on CentOS Stream 9 * ci: use CODECOV_TOKEN when submitting coverage data * revocation: Use into() for unfallible transformation * secure_mount: Fix possible infinite loop * error: Rename enum variants to avoid clippy warning * Update to version 0.2.6~0: * Bump version to 0.2.6 * build(deps): bump libc from 0.2.153 to 0.2.155 * build(deps): bump serde from 1.0.196 to 1.0.203 * rpm/fedora: Update rust macro usage * config: Support hostnames in registrar_ip option * added use of persisted IAK and IDevID and authorisation values * config changes * Adding /agent/info API to agent * Fix leftover 'unnecessary qualification' warnings on tests * Update to version 0.2.5~4: * Fix 'unnecessary qualification' warnings * fix IAK template to match IDevID * rpm: fix COPR RPMs build for centos-stream-10 * Build COPR RPMs for centos-stream-10 * Update to version 0.2.5~0: * Bump version to 0.2.5 * cargo: Relax required version for pest crate * build(deps): bump log from 0.4.20 to 0.4.21 * build(deps): bump thiserror from 1.0.56 to 1.0.59 * actix-web update moves rustls as feature (bsc#1223234, CVE-2024-32650) * Update to version 0.2.4~39: * build(deps): bump openssl from 0.10.63 to 0.10.64 * build(deps): bump h2 from 0.3.24 to 0.3.26 * build(deps): bump serde_json from 1.0.107 to 1.0.116 * build(deps): bump actix-web from 4.4.1 to 4.5.1 * crypto: Enable TLS 1.3 * build(deps): bump tempfile from 3.9.0 to 3.10.1 * build(deps): bump mio from 0.8.4 to 0.8.11 * enable hex values to be used for tpm_ownerpassword * config: Support IPv6 with or without brackets * keylime: Implement a simple IP parser to remove brackets * crypto: Implement CertificateBuilder to generate certificates * tests: Fix coverage download by supporting arbitrary URL * cargo: Add testing feature to keylime library * Set X509 SAN with local DNSname/IP/IPv6 * Include newest Node20 versions for Github actions * tpm: Add unit test for uncovered public functions * crypto: Implement ECC key generation support * crypto: Add test for match_cert_to_template() * Fix minor typo, format and remove end whitespaces * crypto: Make error types less specific * tests/run.sh: Run tarpaulin with a single thread * payloads: Remove explicit drop of channel transmitter * crypto: Move to keylime library * crypto: Add specific type for every possible error * tpm: Rename origin of error as source in structures * list_parser: Add source for error for backtrace * algorithms: Make errors more specific * typo fix for default path to measured boot log file * README: remove mentions of libarchive as a dependency * Dockerfile.wolfi: Update clang to version 17 * docker: Remove libarchive as a dependency * rpm: Remove libarchive from dependencies * cargo: Replace compress-tools with zip crate * cargo: Bump ahash to version 0.8.7 * build(deps): bump serde from 1.0.195 to 1.0.196 * build(deps): bump libc from 0.2.152 to 0.2.153 * build(deps): bump reqwest from 0.11.23 to 0.11.24 * docker: Install configuration file in the correct path * config: Make IAK/IDevID disabled by default * Update to version 0.2.4+git.1706692574.a744517: * Bump version to 0.2.4 * build(deps): bump uuid from 1.4.1 to 1.7.0 * keylime-agent.conf: Allow setting event logs paths * Mutable log paths: allow IMA and MBA log paths to be overridden by keylime configuration. * workflows: Update checkout action to version 4 * build(deps): bump serde from 1.0.188 to 1.0.195 * build(deps): bump pest_derive from 2.7.0 to 2.7.6 * build(deps): bump openssl from 0.10.62 to 0.10.63 * build(deps): bump config from 0.13.3 to 0.13.4 * build(deps): bump base64 from 0.21.4 to 0.21.7 * build(deps): bump tempfile from 3.8.0 to 3.9.0 * build(deps): bump pest from 2.7.0 to 2.7.6 * build(deps): bump actix-web from 4.4.0 to 4.4.1 * build(deps): bump reqwest from 0.11.22 to 0.11.23 * build(deps): bump h2 from 0.3.17 to 0.3.24 * build(deps): bump shlex from 1.1.0 to 1.3.0 * cargo: Bump tss-esapi to version 7.4.0 * workflows: Fix keylime-bot token usage * tpm: Add error context for every possible error * tpm: Add AlgorithmError to TpmError * detect idevid template from certificates * build(deps): bump wiremock from 0.5.18 to 0.5.22 * build(deps): bump thiserror from 1.0.48 to 1.0.56 * Make use of workspace dependencies * build(deps): bump openssl from 0.10.57 to 0.10.62 * packit: Bump Fedora version used for code coverage * Update to version 0.2.3+git.1701075380.a5dc985: * build(deps): bump actix-rt from 2.8.0 to 2.9.0 * Bump version to 0.2.3 * build(deps): bump reqwest from 0.11.20 to 0.11.22 * Bump configuration version and fix enable_iak_idevid * Enable test functional/iak-idevid-register-with-certificates * Update packit plan with new tests * Add certificates and certificate checking for IDevID and IAK keys (#669) * Update to version 0.2.2+git.1697658634.9c7c6fa: * build(deps): bump rustix from 0.37.11 to 0.37.25 * build(deps): bump tempfile from 3.6.0 to 3.8.0 * build(deps): bump base64 from 0.21.0 to 0.21.4 * build(deps): bump serde_json from 1.0.96 to 1.0.107 * build(deps): bump openssl from 0.10.55 to 0.10.57 * cargo: Bump serde to version 1.0.188 * tests: Fix tarpaulin issues with dropped -v option * build(deps): bump signal-hook from 0.3.15 to 0.3.17 * build(deps): bump actix-web from 4.3.1 to 4.4.0 * build(deps): bump thiserror from 1.0.40 to 1.0.48 * Remove private_in_public * Initial PR to add support for IDevID and IAK * build(deps): bump uuid from 1.3.1 to 1.4.1 * build(deps): bump log from 0.4.17 to 0.4.20 * build(deps): bump reqwest from 0.11.16 to 0.11.20 * Do not use too specific version on cargo audit workflow * Add workflow to run cargo-audit security audit * README: update dependencies for Debian and Ubuntu * Use latest versions of checkout/upload-artifacts * docker: Add 'keylime' system user * Use "currently" for swtpm emulator warning (#632) * Update container workflow actions versions * Build container image and push to quay.io * README: update requirements * Update to version 0.2.2+git.1689256829.3d2b627: * Bump version to 0.2.2 * build(deps): bump tempfile from 3.5.0 to 3.6.0 * removing SIGINT stop signals from Dockerfiles and systemd service, as well as adding SIGTERM to IMA emulator as shutdown signal * Update to version 0.2.1+git.1689167094.67ce0cf: * cargo: Bump serde to version 1.0.166 * build(deps): bump libc from 0.2.142 to 0.2.147 * adding release Dockerfiles in 3 flavours: fedora, distroless and wolfi * hash: add more configurable hash algorithm for public key digest * cargo: Update clap to version 4.3.11 * cargo: Bump tokio crate version to 1.28.2 * Add an example of IMA policy * main: Gracefully shutdown on SIGTERM or SIGINT * cargo: Bump proc-macro2 crate version * revocation: Parse revocation actions flexibly * crypto: Add unit tests for x509 functions * crypto: Make internal functions private * config: Add unit test for the list to files mapping * config: Make trusted_client_ca to accept lists * lib: Implement parser for lists from config file * build(deps): bump openssl from 0.10.48 to 0.10.55 * Add secure mount sanity test to packit testing. * [packit] Do not let COPR project expire * Recommends the IMA Policy subpackage only if SELinux is configured * Update to version 0.2.1+git.1685699835.3c9d17c: * Remove MOUNT_SECURE bool * rpm: Remove unused directory and add dependency for mount * keylime-agent/src: update API version to 2.1 to consistent with https://github.com/keylime/keylime/blob/master/docs/rest_apis.rst * docker/fedora/keylime_rust.Dockerfile: add the logic of cloning and compiling rust-keylime * [tests] Update test coverage task name regexp * [tests] Simply coverage file URL parsing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-65=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * rust-keylime-debuginfo-0.2.6+13-1.1 * rust-keylime-debugsource-0.2.6+13-1.1 * rust-keylime-0.2.6+13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32650.html * https://www.suse.com/security/cve/CVE-2024-43806.html * https://bugzilla.suse.com/show_bug.cgi?id=1223234 * https://bugzilla.suse.com/show_bug.cgi?id=1229952 * https://bugzilla.suse.com/show_bug.cgi?id=1230029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:07:02 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:07:02 -0000 Subject: SUSE-SU-2025:20029-1: moderate: Security update for curl Message-ID: <174902802200.655.15740181983487191213@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20029-1 Release Date: 2025-02-03T08:51:45Z Rating: moderate References: * bsc#1221665 * bsc#1221666 * bsc#1221667 * bsc#1221668 * bsc#1227888 * bsc#1228535 Cross-References: * CVE-2024-2004 * CVE-2024-2379 * CVE-2024-2398 * CVE-2024-2466 * CVE-2024-6197 * CVE-2024-7264 CVSS scores: * CVE-2024-2004 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N * CVE-2024-2004 ( NVD ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N * CVE-2024-2379 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-2379 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-2398 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2466 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-6197 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7264 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-7264 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-7264 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: Security issues fixed: * CVE-2024-7264: ASN.1 date parser overread (bsc#1228535) * CVE-2024-6197: Freeing stack buffer in utf8asn1str (bsc#1227888) * CVE-2024-2379: QUIC certificate check bypass with wolfSSL (bsc#1221666) * CVE-2024-2466: TLS certificate check bypass with mbedTLS (bsc#1221668) * CVE-2024-2004: Usage of disabled protocol (bsc#1221665) * CVE-2024-2398: HTTP/2 push headers memory-leak (bsc#1221667) Non-security issue fixed: * Fixed various TLS related issues including FTP over SSL transmission timeouts. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-30=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * curl-debugsource-8.6.0-3.1 * curl-8.6.0-3.1 * libcurl4-debuginfo-8.6.0-3.1 * curl-debuginfo-8.6.0-3.1 * libcurl4-8.6.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2004.html * https://www.suse.com/security/cve/CVE-2024-2379.html * https://www.suse.com/security/cve/CVE-2024-2398.html * https://www.suse.com/security/cve/CVE-2024-2466.html * https://www.suse.com/security/cve/CVE-2024-6197.html * https://www.suse.com/security/cve/CVE-2024-7264.html * https://bugzilla.suse.com/show_bug.cgi?id=1221665 * https://bugzilla.suse.com/show_bug.cgi?id=1221666 * https://bugzilla.suse.com/show_bug.cgi?id=1221667 * https://bugzilla.suse.com/show_bug.cgi?id=1221668 * https://bugzilla.suse.com/show_bug.cgi?id=1227888 * https://bugzilla.suse.com/show_bug.cgi?id=1228535 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:03 -0000 Subject: SUSE-SU-2025:20038-1: important: Security update for glibc Message-ID: <174902796324.655.8720550555450707062@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20038-1 Release Date: 2025-02-03T08:53:22Z Rating: important References: * bsc#1221482 * bsc#1221940 * bsc#1222992 * bsc#1223423 * bsc#1223424 * bsc#1223425 * bsc#1228041 Cross-References: * CVE-2024-2961 * CVE-2024-33599 * CVE-2024-33600 * CVE-2024-33601 * CVE-2024-33602 CVSS scores: * CVE-2024-2961 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-2961 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2024-33599 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-33599 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-33600 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33600 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33601 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33601 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-33602 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-33602 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities and has two fixes can now be installed. ## Description: This update for glibc fixes the following issues: Fixed security issues: * CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) * CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bsc#1223423) * CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response (bsc#1223424) * CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bsc#1223424) * CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (bsc#1223425) * CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992) Fixed non-security issues: * Add workaround for invalid use of libc_nonshared.a with non-SUSE libc (bsc#1221482) * Fix segfault in wcsncmp (bsc#1228041) * Also include stat64 in the 32-bit libc_nonshared.a workaround (bsc#1221482) * Avoid creating ULP prologue for _start routine (bsc#1221940) * Also add libc_nonshared.a workaround to 32-bit x86 compat package (bsc#1221482) * malloc: Use __get_nprocs on arena_get2 * linux: Use rseq area unconditionally in sched_getcpu ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-32=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * glibc-2.38-7.1 * glibc-locale-base-2.38-7.1 * glibc-locale-base-debuginfo-2.38-7.1 * glibc-locale-2.38-7.1 * glibc-devel-debuginfo-2.38-7.1 * glibc-debugsource-2.38-7.1 * glibc-devel-2.38-7.1 * glibc-debuginfo-2.38-7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2961.html * https://www.suse.com/security/cve/CVE-2024-33599.html * https://www.suse.com/security/cve/CVE-2024-33600.html * https://www.suse.com/security/cve/CVE-2024-33601.html * https://www.suse.com/security/cve/CVE-2024-33602.html * https://bugzilla.suse.com/show_bug.cgi?id=1221482 * https://bugzilla.suse.com/show_bug.cgi?id=1221940 * https://bugzilla.suse.com/show_bug.cgi?id=1222992 * https://bugzilla.suse.com/show_bug.cgi?id=1223423 * https://bugzilla.suse.com/show_bug.cgi?id=1223424 * https://bugzilla.suse.com/show_bug.cgi?id=1223425 * https://bugzilla.suse.com/show_bug.cgi?id=1228041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:05:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:05:26 -0000 Subject: SUSE-SU-2025:20044-1: important: Security update for the Linux Kernel Message-ID: <174902792675.655.16254735798223711481@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20044-1 Release Date: 2025-02-03T08:54:38Z Rating: important References: * bsc#1012628 * bsc#1193454 * bsc#1194869 * bsc#1205462 * bsc#1208783 * bsc#1213123 * bsc#1214285 * bsc#1215199 * bsc#1220066 * bsc#1220252 * bsc#1220877 * bsc#1221326 * bsc#1221630 * bsc#1221645 * bsc#1221652 * bsc#1221857 * bsc#1222254 * bsc#1222335 * bsc#1222350 * bsc#1222364 * bsc#1222372 * bsc#1222387 * bsc#1222433 * bsc#1222434 * bsc#1222625 * bsc#1222633 * bsc#1222634 * bsc#1222808 * bsc#1222967 * bsc#1222973 * bsc#1223053 * bsc#1223074 * bsc#1223191 * bsc#1223395 * bsc#1223635 * bsc#1223720 * bsc#1223731 * bsc#1223742 * bsc#1223763 * bsc#1223767 * bsc#1223777 * bsc#1223803 * bsc#1224105 * bsc#1224415 * bsc#1224485 * bsc#1224496 * bsc#1224510 * bsc#1224535 * bsc#1224631 * bsc#1224636 * bsc#1224690 * bsc#1224694 * bsc#1224700 * bsc#1224711 * bsc#1225475 * bsc#1225582 * bsc#1225607 * bsc#1225718 * bsc#1225751 * bsc#1225814 * bsc#1225832 * bsc#1225838 * bsc#1225903 * bsc#1226031 * bsc#1226127 * bsc#1226502 * bsc#1226530 * bsc#1226588 * bsc#1226604 * bsc#1226743 * bsc#1226751 * bsc#1226765 * bsc#1226798 * bsc#1226801 * bsc#1226834 * bsc#1226874 * bsc#1226885 * bsc#1226920 * bsc#1227149 * bsc#1227182 * bsc#1227383 * bsc#1227437 * bsc#1227492 * bsc#1227493 * bsc#1227494 * bsc#1227618 * bsc#1227620 * bsc#1227623 * bsc#1227627 * bsc#1227634 * bsc#1227706 * bsc#1227722 * bsc#1227724 * bsc#1227725 * bsc#1227728 * bsc#1227729 * bsc#1227732 * bsc#1227733 * bsc#1227734 * bsc#1227747 * bsc#1227750 * bsc#1227754 * bsc#1227758 * bsc#1227760 * bsc#1227761 * bsc#1227764 * bsc#1227766 * bsc#1227770 * bsc#1227771 * bsc#1227772 * bsc#1227774 * bsc#1227781 * bsc#1227784 * bsc#1227785 * bsc#1227787 * bsc#1227790 * bsc#1227791 * bsc#1227792 * bsc#1227796 * bsc#1227798 * bsc#1227799 * bsc#1227802 * bsc#1227808 * bsc#1227810 * bsc#1227811 * bsc#1227812 * bsc#1227815 * bsc#1227816 * bsc#1227818 * bsc#1227820 * bsc#1227823 * bsc#1227824 * bsc#1227826 * bsc#1227828 * bsc#1227829 * bsc#1227830 * bsc#1227832 * bsc#1227833 * bsc#1227834 * bsc#1227839 * bsc#1227840 * bsc#1227846 * bsc#1227849 * bsc#1227851 * bsc#1227853 * bsc#1227863 * bsc#1227864 * bsc#1227865 * bsc#1227867 * bsc#1227869 * bsc#1227870 * bsc#1227883 * bsc#1227884 * bsc#1227891 * bsc#1227893 * bsc#1227929 * bsc#1227950 * bsc#1227957 * bsc#1227981 * bsc#1228020 * bsc#1228021 * bsc#1228192 * bsc#1228235 * bsc#1228236 * bsc#1228247 * bsc#1228321 * bsc#1228409 * bsc#1228410 * bsc#1228426 * bsc#1228427 * bsc#1228429 * bsc#1228446 * bsc#1228447 * bsc#1228449 * bsc#1228450 * bsc#1228452 * bsc#1228456 * bsc#1228457 * bsc#1228458 * bsc#1228459 * bsc#1228460 * bsc#1228462 * bsc#1228463 * bsc#1228466 * bsc#1228467 * bsc#1228468 * bsc#1228469 * bsc#1228470 * bsc#1228472 * bsc#1228479 * bsc#1228480 * bsc#1228481 * bsc#1228482 * bsc#1228483 * bsc#1228484 * bsc#1228485 * bsc#1228486 * bsc#1228487 * bsc#1228489 * bsc#1228491 * bsc#1228492 * bsc#1228493 * bsc#1228494 * bsc#1228495 * bsc#1228496 * bsc#1228499 * bsc#1228500 * bsc#1228501 * bsc#1228502 * bsc#1228503 * bsc#1228505 * bsc#1228508 * bsc#1228509 * bsc#1228510 * bsc#1228511 * bsc#1228513 * bsc#1228515 * bsc#1228516 * bsc#1228518 * bsc#1228520 * bsc#1228525 * bsc#1228527 * bsc#1228530 * bsc#1228531 * bsc#1228539 * bsc#1228561 * bsc#1228563 * bsc#1228564 * bsc#1228565 * bsc#1228567 * bsc#1228568 * bsc#1228572 * bsc#1228576 * bsc#1228579 * bsc#1228580 * bsc#1228581 * bsc#1228582 * bsc#1228584 * bsc#1228586 * bsc#1228588 * bsc#1228590 * bsc#1228591 * bsc#1228599 * bsc#1228615 * bsc#1228616 * bsc#1228617 * bsc#1228625 * bsc#1228626 * bsc#1228633 * bsc#1228635 * bsc#1228636 * bsc#1228640 * bsc#1228643 * bsc#1228644 * bsc#1228646 * bsc#1228649 * bsc#1228650 * bsc#1228654 * bsc#1228655 * bsc#1228656 * bsc#1228658 * bsc#1228660 * bsc#1228662 * bsc#1228665 * bsc#1228666 * bsc#1228667 * bsc#1228672 * bsc#1228673 * bsc#1228674 * bsc#1228677 * bsc#1228680 * bsc#1228687 * bsc#1228705 * bsc#1228706 * bsc#1228707 * bsc#1228708 * bsc#1228709 * bsc#1228710 * bsc#1228718 * bsc#1228720 * bsc#1228721 * bsc#1228722 * bsc#1228723 * bsc#1228724 * bsc#1228726 * bsc#1228727 * bsc#1228733 * bsc#1228737 * bsc#1228743 * bsc#1228748 * bsc#1228754 * bsc#1228756 * bsc#1228757 * bsc#1228758 * bsc#1228764 * bsc#1228766 * bsc#1228779 * bsc#1228801 * bsc#1228849 * bsc#1228850 * bsc#1228857 * bsc#1228959 * bsc#1228964 * bsc#1228966 * bsc#1228967 * bsc#1228971 * bsc#1228973 * bsc#1228977 * bsc#1228978 * bsc#1228979 * bsc#1228986 * bsc#1228988 * bsc#1228989 * bsc#1228991 * bsc#1228992 * bsc#1229005 * bsc#1229024 * bsc#1229042 * bsc#1229045 * bsc#1229046 * bsc#1229054 * bsc#1229056 * bsc#1229086 * bsc#1229134 * bsc#1229136 * bsc#1229154 * bsc#1229156 * bsc#1229160 * bsc#1229167 * bsc#1229168 * bsc#1229169 * bsc#1229170 * bsc#1229171 * bsc#1229172 * bsc#1229173 * bsc#1229174 * bsc#1229239 * bsc#1229240 * bsc#1229241 * bsc#1229243 * bsc#1229244 * bsc#1229245 * bsc#1229246 * bsc#1229247 * bsc#1229248 * bsc#1229249 * bsc#1229250 * bsc#1229251 * bsc#1229252 * bsc#1229253 * bsc#1229254 * bsc#1229255 * bsc#1229256 * bsc#1229287 * bsc#1229290 * bsc#1229291 * bsc#1229292 * bsc#1229294 * bsc#1229296 * bsc#1229297 * bsc#1229298 * bsc#1229299 * bsc#1229301 * bsc#1229303 * bsc#1229304 * bsc#1229305 * bsc#1229307 * bsc#1229309 * bsc#1229312 * bsc#1229313 * bsc#1229314 * bsc#1229315 * bsc#1229316 * bsc#1229317 * bsc#1229318 * bsc#1229319 * bsc#1229320 * bsc#1229327 * bsc#1229341 * bsc#1229342 * bsc#1229344 * bsc#1229345 * bsc#1229346 * bsc#1229347 * bsc#1229349 * bsc#1229350 * bsc#1229351 * bsc#1229353 * bsc#1229354 * bsc#1229355 * bsc#1229356 * bsc#1229357 * bsc#1229358 * bsc#1229359 * bsc#1229360 * bsc#1229365 * bsc#1229366 * bsc#1229369 * bsc#1229370 * bsc#1229373 * bsc#1229374 * bsc#1229379 * bsc#1229381 * bsc#1229382 * bsc#1229383 * bsc#1229386 * bsc#1229388 * bsc#1229390 * bsc#1229391 * bsc#1229392 * bsc#1229395 * bsc#1229398 * bsc#1229399 * bsc#1229400 * bsc#1229402 * bsc#1229403 * bsc#1229404 * bsc#1229407 * bsc#1229409 * bsc#1229410 * bsc#1229411 * bsc#1229413 * bsc#1229414 * bsc#1229417 * bsc#1229444 * bsc#1229451 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229480 * bsc#1229481 * bsc#1229482 * bsc#1229484 * bsc#1229485 * bsc#1229486 * bsc#1229487 * bsc#1229488 * bsc#1229489 * bsc#1229490 * bsc#1229493 * bsc#1229495 * bsc#1229496 * bsc#1229497 * bsc#1229500 * bsc#1229503 * bsc#1229707 * bsc#1229739 * bsc#1229743 * bsc#1229746 * bsc#1229747 * bsc#1229752 * bsc#1229754 * bsc#1229755 * bsc#1229756 * bsc#1229759 * bsc#1229761 * bsc#1229767 * bsc#1229781 * bsc#1229784 * bsc#1229785 * bsc#1229787 * bsc#1229788 * bsc#1229789 * bsc#1229792 * bsc#1229820 * bsc#1229827 * bsc#1229830 * bsc#1229837 * bsc#1229940 * bsc#1230056 * jsc#PED-10029 * jsc#PED-10045 * jsc#PED-10055 * jsc#PED-10105 * jsc#PED-10108 * jsc#PED-8491 * jsc#PED-8779 * jsc#PED-8954 Cross-References: * CVE-2023-52489 * CVE-2023-52581 * CVE-2023-52668 * CVE-2023-52688 * CVE-2023-52859 * CVE-2023-52885 * CVE-2023-52886 * CVE-2023-52887 * CVE-2023-52889 * CVE-2024-26590 * CVE-2024-26631 * CVE-2024-26637 * CVE-2024-26668 * CVE-2024-26669 * CVE-2024-26677 * CVE-2024-26682 * CVE-2024-26683 * CVE-2024-26735 * CVE-2024-26808 * CVE-2024-26809 * CVE-2024-26812 * CVE-2024-26835 * CVE-2024-26837 * CVE-2024-26849 * CVE-2024-26851 * CVE-2024-26976 * CVE-2024-27010 * CVE-2024-27011 * CVE-2024-27024 * CVE-2024-27049 * CVE-2024-27050 * CVE-2024-27079 * CVE-2024-27403 * CVE-2024-27433 * CVE-2024-27437 * CVE-2024-31076 * CVE-2024-35855 * CVE-2024-35897 * CVE-2024-35902 * CVE-2024-35913 * CVE-2024-35939 * CVE-2024-35949 * CVE-2024-36270 * CVE-2024-36286 * CVE-2024-36288 * CVE-2024-36489 * CVE-2024-36881 * CVE-2024-36907 * CVE-2024-36929 * CVE-2024-36933 * CVE-2024-36939 * CVE-2024-36970 * CVE-2024-36979 * CVE-2024-38563 * CVE-2024-38609 * CVE-2024-38662 * CVE-2024-39476 * CVE-2024-39483 * CVE-2024-39484 * CVE-2024-39486 * CVE-2024-39488 * CVE-2024-39489 * CVE-2024-39491 * CVE-2024-39493 * CVE-2024-39497 * CVE-2024-39499 * CVE-2024-39500 * CVE-2024-39501 * CVE-2024-39505 * CVE-2024-39506 * CVE-2024-39508 * CVE-2024-39509 * CVE-2024-39510 * CVE-2024-40899 * CVE-2024-40900 * CVE-2024-40902 * CVE-2024-40903 * CVE-2024-40904 * CVE-2024-40905 * CVE-2024-40909 * CVE-2024-40910 * CVE-2024-40911 * CVE-2024-40912 * CVE-2024-40913 * CVE-2024-40916 * CVE-2024-40920 * CVE-2024-40921 * CVE-2024-40922 * CVE-2024-40924 * CVE-2024-40926 * CVE-2024-40927 * CVE-2024-40929 * CVE-2024-40930 * CVE-2024-40932 * CVE-2024-40934 * CVE-2024-40936 * CVE-2024-40938 * CVE-2024-40939 * CVE-2024-40941 * CVE-2024-40942 * CVE-2024-40943 * CVE-2024-40944 * CVE-2024-40945 * CVE-2024-40954 * CVE-2024-40956 * CVE-2024-40957 * CVE-2024-40958 * CVE-2024-40959 * CVE-2024-40962 * CVE-2024-40964 * CVE-2024-40967 * CVE-2024-40976 * CVE-2024-40977 * CVE-2024-40978 * CVE-2024-40981 * CVE-2024-40982 * CVE-2024-40984 * CVE-2024-40987 * CVE-2024-40988 * CVE-2024-40989 * CVE-2024-40990 * CVE-2024-40992 * CVE-2024-40994 * CVE-2024-40995 * CVE-2024-40997 * CVE-2024-41000 * CVE-2024-41001 * CVE-2024-41002 * CVE-2024-41004 * CVE-2024-41007 * CVE-2024-41009 * CVE-2024-41010 * CVE-2024-41012 * CVE-2024-41015 * CVE-2024-41016 * CVE-2024-41020 * CVE-2024-41022 * CVE-2024-41024 * CVE-2024-41025 * CVE-2024-41028 * CVE-2024-41032 * CVE-2024-41035 * CVE-2024-41036 * CVE-2024-41037 * CVE-2024-41038 * CVE-2024-41039 * CVE-2024-41040 * CVE-2024-41041 * CVE-2024-41044 * CVE-2024-41045 * CVE-2024-41048 * CVE-2024-41049 * CVE-2024-41050 * CVE-2024-41051 * CVE-2024-41056 * CVE-2024-41057 * CVE-2024-41058 * CVE-2024-41059 * CVE-2024-41060 * CVE-2024-41061 * CVE-2024-41062 * CVE-2024-41063 * CVE-2024-41064 * CVE-2024-41065 * CVE-2024-41066 * CVE-2024-41068 * CVE-2024-41069 * CVE-2024-41070 * CVE-2024-41071 * CVE-2024-41072 * CVE-2024-41073 * CVE-2024-41074 * CVE-2024-41075 * CVE-2024-41076 * CVE-2024-41078 * CVE-2024-41079 * CVE-2024-41080 * CVE-2024-41081 * CVE-2024-41084 * CVE-2024-41087 * CVE-2024-41088 * CVE-2024-41089 * CVE-2024-41092 * CVE-2024-41093 * CVE-2024-41094 * CVE-2024-41095 * CVE-2024-41096 * CVE-2024-41097 * CVE-2024-41098 * CVE-2024-42064 * CVE-2024-42069 * CVE-2024-42070 * CVE-2024-42073 * CVE-2024-42074 * CVE-2024-42076 * CVE-2024-42077 * CVE-2024-42079 * CVE-2024-42080 * CVE-2024-42082 * CVE-2024-42085 * CVE-2024-42086 * CVE-2024-42087 * CVE-2024-42089 * CVE-2024-42090 * CVE-2024-42092 * CVE-2024-42093 * CVE-2024-42095 * CVE-2024-42096 * CVE-2024-42097 * CVE-2024-42098 * CVE-2024-42101 * CVE-2024-42104 * CVE-2024-42105 * CVE-2024-42106 * CVE-2024-42107 * CVE-2024-42109 * CVE-2024-42110 * CVE-2024-42113 * CVE-2024-42114 * CVE-2024-42115 * CVE-2024-42117 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42121 * CVE-2024-42122 * CVE-2024-42124 * CVE-2024-42125 * CVE-2024-42126 * CVE-2024-42127 * CVE-2024-42130 * CVE-2024-42131 * CVE-2024-42132 * CVE-2024-42133 * CVE-2024-42136 * CVE-2024-42137 * CVE-2024-42138 * CVE-2024-42139 * CVE-2024-42141 * CVE-2024-42142 * CVE-2024-42143 * CVE-2024-42144 * CVE-2024-42145 * CVE-2024-42147 * CVE-2024-42148 * CVE-2024-42152 * CVE-2024-42153 * CVE-2024-42155 * CVE-2024-42156 * CVE-2024-42157 * CVE-2024-42158 * CVE-2024-42159 * CVE-2024-42161 * CVE-2024-42162 * CVE-2024-42223 * CVE-2024-42224 * CVE-2024-42225 * CVE-2024-42226 * CVE-2024-42227 * CVE-2024-42228 * CVE-2024-42229 * CVE-2024-42230 * CVE-2024-42232 * CVE-2024-42236 * CVE-2024-42237 * CVE-2024-42238 * CVE-2024-42239 * CVE-2024-42240 * CVE-2024-42241 * CVE-2024-42244 * CVE-2024-42245 * CVE-2024-42246 * CVE-2024-42247 * CVE-2024-42250 * CVE-2024-42253 * CVE-2024-42259 * CVE-2024-42268 * CVE-2024-42269 * CVE-2024-42270 * CVE-2024-42271 * CVE-2024-42274 * CVE-2024-42276 * CVE-2024-42277 * CVE-2024-42278 * CVE-2024-42279 * CVE-2024-42280 * CVE-2024-42281 * CVE-2024-42283 * CVE-2024-42284 * CVE-2024-42285 * CVE-2024-42286 * CVE-2024-42287 * CVE-2024-42288 * CVE-2024-42289 * CVE-2024-42290 * CVE-2024-42291 * CVE-2024-42292 * CVE-2024-42295 * CVE-2024-42298 * CVE-2024-42301 * CVE-2024-42302 * CVE-2024-42303 * CVE-2024-42308 * CVE-2024-42309 * CVE-2024-42310 * CVE-2024-42311 * CVE-2024-42312 * CVE-2024-42313 * CVE-2024-42314 * CVE-2024-42315 * CVE-2024-42316 * CVE-2024-42318 * CVE-2024-42319 * CVE-2024-42320 * CVE-2024-42322 * CVE-2024-43816 * CVE-2024-43817 * CVE-2024-43818 * CVE-2024-43819 * CVE-2024-43821 * CVE-2024-43823 * CVE-2024-43824 * CVE-2024-43825 * CVE-2024-43826 * CVE-2024-43829 * CVE-2024-43830 * CVE-2024-43831 * CVE-2024-43833 * CVE-2024-43834 * CVE-2024-43837 * CVE-2024-43839 * CVE-2024-43840 * CVE-2024-43841 * CVE-2024-43842 * CVE-2024-43846 * CVE-2024-43847 * CVE-2024-43849 * CVE-2024-43850 * CVE-2024-43851 * CVE-2024-43853 * CVE-2024-43854 * CVE-2024-43855 * CVE-2024-43856 * CVE-2024-43858 * CVE-2024-43860 * CVE-2024-43861 * CVE-2024-43863 * CVE-2024-43864 * CVE-2024-43866 * CVE-2024-43867 * CVE-2024-43871 * CVE-2024-43872 * CVE-2024-43873 * CVE-2024-43874 * CVE-2024-43875 * CVE-2024-43876 * CVE-2024-43877 * CVE-2024-43879 * CVE-2024-43880 * CVE-2024-43881 * CVE-2024-43882 * CVE-2024-43883 * CVE-2024-43884 * CVE-2024-43885 * CVE-2024-43889 * CVE-2024-43892 * CVE-2024-43893 * CVE-2024-43894 * CVE-2024-43895 * CVE-2024-43897 * CVE-2024-43899 * CVE-2024-43900 * CVE-2024-43902 * CVE-2024-43903 * CVE-2024-43905 * CVE-2024-43906 * CVE-2024-43907 * CVE-2024-43908 * CVE-2024-43909 * CVE-2024-43911 * CVE-2024-43912 * CVE-2024-44931 * CVE-2024-44938 * CVE-2024-44939 CVSS scores: * CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52489 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52887 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-26837 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27024 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41020 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41022 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41024 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41028 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41057 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41057 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41058 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41063 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41065 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42086 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42093 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42097 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42105 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42133 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42136 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42143 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-42144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42155 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42236 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42253 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42271 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42274 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43881 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43883 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43885 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44938 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 383 vulnerabilities, contains eight features and has 87 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 kernel was updated to receive various security bugfixes. This release includes the first live patch. The following security bugs were fixed: * CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326). * CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287,). * CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252). * CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350). * CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ("rxrpc: Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633). * CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808). * CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26837: net: bridge: switchdev: Skip MDB replays of deferred events on offload (bsc#1222973). * CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742). * CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711). * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-36881: mm/userfaultfd: reset ptes when close() for wr-protected ones (bsc#1225718). * CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-36979: net: bridge: mst: fix vlan use-after-free syzbot reported a suspicious rcu usage[1] in bridge's mst code. (bsc#1226604). * CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798). * CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781). * CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784). * CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840). * CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810). * CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811). * CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812). * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823). * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021). * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460). * CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496). * CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518). * CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499). * CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468). * CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462). * CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459). * CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643). * CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646). * CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457). * CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672). * CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42109: netfilter: nf_tables: unconditionall (bsc#1228505). * CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568). * CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500). * CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503). * CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157 git-fixes). * CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-42159: scsi: mpi3mr: sanitise num_phys (bsc#1228754). * CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756). * CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986). * CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one movable task" (bsc#1228978). * CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init(). (bsc#1229402). * CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init(). (bsc#1229404). * CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379). * CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42308: Update DRM patch reference (bsc#1229411) * CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353). * CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316). * CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342). * CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496). * CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827). Additional CVEs were previously fixed and are only mentioned in the metadata. The following non-security bugs were fixed: * ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes). * ACPI: battery: create alarm sysfs attribute atomically (stable-fixes). * ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git- fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes). * ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes). * ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable- fixes). * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes). * ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes). * ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable- fixes). * ALSA: hda/tas2781: Use correct endian conversion (git-fixes). * ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes). * ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git- fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Skip event type filtering for UMP events (git-fixes). * ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes). * ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes). * ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes). * ALSA: timer: Relax start tick time check for slave timer elements (git- fixes). * ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable- fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable- fixes). * ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes). * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes). * ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: amd: Fix for acp init sequence (git-fixes). * ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes). * ASoC: SOF: mediatek: Add missing board compatible (stable-fixes). * ASoC: allow module autoloading for table board_ids (stable-fixes). * ASoC: allow module autoloading for table db1200_pids (stable-fixes). * ASoC: amd: acp: fix module autoloading (git-fixes). * ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable- fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes). * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Add error handling to pair_device() (git-fixes). * Bluetooth: SMP: Fix assumption of Central always being Initiator (git- fixes). * Bluetooth: bnep: Fix out-of-bound access (stable-fixes). * Bluetooth: btintel: Fail setup on error (git-fixes). * Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable- fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable- fixes). * Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes). * Bluetooth: hci_core: Fix LE quote calculation (git-fixes). * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes). * Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes). * Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes). * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git- fixes). * Drop libata patch that caused a regression (bsc#1229054) * HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * Input: MT - limit max slots (stable-fixes). * Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056). * Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes). * Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes). * KVM: Always flush async #PF workqueue when vCPU is being destroyed (git- fixes). * KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git- fixes). * KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869). * KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199). * KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes). * KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes). * KVM: Stop processing _all_ memslots when "null" mmu_notifier handler is found (git-fixes). * KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes). * KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes). * KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git- fixes). * KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git- fixes). * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes). * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git- fixes). * KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes). * KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes). * KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes) * KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes). * KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes). * KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes). * KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes). * KVM: arm64: vgic-v4: Restore pending state on host userspace write (git- fixes). * KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes). * KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes). * KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes). * KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes). * KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes). * KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes). * KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes). * KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * KVM: s390: fix validity interception issue when gisa is switched off (git- fixes bsc#1229167). * KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes). * KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes). * Move upstreamed powerpc patches into sorted section * Move upstreamed sound patches into sorted section * Moved upstreamed ASoC patch into sorted section * NFSD: Support write delegations in LAYOUTGET (git-fixes). * NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes). * PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes). * RDMA/cache: Release GID table even if leak is detected (git-fixes) * RDMA/device: Return error earlier if port in not valid (git-fixes) * RDMA/hns: Check atomic wr length (git-fixes) * RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes) * RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes) * RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes) * RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes) * RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes) * RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes) * RDMA/hns: Fix unmatch exception handling when init eq table fails (git- fixes) * RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes) * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes). * RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes) * RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes) * RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes) * RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes) * RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes) * Revert "ALSA: firewire-lib: obsolete workqueue for period update" (bsc#1208783). * Revert "ALSA: firewire-lib: operate for period elapse event in process context" (bsc#1208783). * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes). * Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git- fixes). * Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes). * Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD" (git-fixes). * Revert "usb: gadget: uvc: cleanup request when not in correct state" (stable-fixes). * Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes). * SUNRPC: Fix a race to wake a sync task (git-fixes). * SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * Squashfs: fix variable overflow triggered by sysbot (git-fixes). * USB: serial: debug: do not echo input by default (stable-fixes). * Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834) * Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920) * Update patch references for ASoC regression fixes (bsc#1229045 bsc#1229046) * afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes). * apparmor: unpack transition table if dfa is not present (bsc#1226031). * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: barrier: Restore spec_bar() macro (git-fixes) * arm64: cputype: Add Cortex-A720 definitions (git-fixes) * arm64: cputype: Add Cortex-A725 definitions (git-fixes) * arm64: cputype: Add Cortex-X1C definitions (git-fixes) * arm64: cputype: Add Cortex-X3 definitions (git-fixes) * arm64: cputype: Add Cortex-X4 definitions (git-fixes) * arm64: cputype: Add Cortex-X925 definitions (git-fixes) * arm64: cputype: Add Neoverse-V3 definitions (git-fixes) * arm64: dts: imx8mp: Add NPU Node (git-fixes) * arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes) * arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes) * arm64: dts: imx8mp: add HDMI power-domains (git-fixes) * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes) * arm64: errata: Expand speculative SSBS workaround (git-fixes) * arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files. * arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git- fixes) * ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable- fixes). * ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable- fixes). * blacklist.conf: Add libata upstream revert entry (bsc#1229054) * bnxt_re: Fix imm_data endianness (git-fixes) * bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes) * bpf, lpm: Fix check prefixlen before walking trie (git-fixes). * bpf/tests: Remove duplicate JSGT tests (git-fixes). * bpf: Add crosstask check to __bpf_get_stack (git-fixes). * bpf: Detect IP == ksym.end as part of BPF program (git-fixes). * bpf: Ensure proper register state printing for cond jumps (git-fixes). * bpf: Fix a few selftest failures due to llvm18 change (git-fixes). * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903). * bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes). * bpf: Fix kfunc callback register type handling (git-fixes). * bpf: Fix prog_array_map_poke_run map poke update (git-fixes). * bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes). * bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git- fixes). * bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes). * bpf: Set uattr->batch.count as zero before batched update or deletion (git- fixes). * bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git- fixes). * bpf: enforce precision of R0 on callback return (git-fixes). * bpf: extract bpf_ctx_convert_map logic and make it more reusable (git- fixes). * bpf: fix control-flow graph checking in privileged mode (git-fixes). * bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes). * bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes). * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes). * bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git- fixes). * bpftool: Align output skeleton ELF code (git-fixes). * bpftool: Fix -Wcast-qual warning (git-fixes). * bpftool: Silence build warning about calloc() (git-fixes). * bpftool: mark orphaned programs during prog show (git-fixes). * btrfs: add a btrfs_finish_ordered_extent helper (git-fixes). * btrfs: add a is_data_bbio helper (git-fixes). * btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes). * btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321). * btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes). * btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes). * btrfs: factor out a can_finish_ordered_extent helper (git-fixes). * btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes). * btrfs: fix double inode unlock for direct IO sync writes (git-fixes). * btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes). * btrfs: fix leak of qgroup extent records after transaction abort (git- fixes). * btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git- fixes). * btrfs: limit write bios to a single ordered extent (git-fixes). * btrfs: make btrfs_finish_ordered_extent() return void (git-fixes). * btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes). * btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes). * btrfs: open code end_extent_writepage in end_bio_extent_writepage (git- fixes). * btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes). * btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes). * btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes). * btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes). * btrfs: remove btrfs_add_ordered_extent (git-fixes). * btrfs: rename err to ret in btrfs_direct_write() (git-fixes). * btrfs: uninline some static inline helpers from tree-log.h (git-fixes). * btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git- fixes). * btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes). * btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes). * btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete direct writes (git- fixes). * btrfs: use irq safe locking when running and adding delayed iputs (git- fixes). * cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand- mode (bsc#1229245). * cachefiles: add missing lock protection when polling (bsc#1229256). * cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244). * cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249). * cachefiles: cancel all requests for the object that is being dropped (bsc#1229255). * cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251). * cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246). * cachefiles: introduce object ondemand state (bsc#1229239). * cachefiles: make on-demand read killable (bsc#1229252). * cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243). * cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250). * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253). * cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248). * cachefiles: resend an open request if the read request's object is closed (bsc#1229241). * cachefiles: stop sending new request when dropping object (bsc#1229254). * can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes). * can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * ceph: periodically flush the cap releases (bsc#1230056). * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801). * cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254). * cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254). * cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254). * cgroup: Remove unnecessary list_empty() (bsc#1222254). * cgroup: preserve KABI of cgroup_root (bsc#1222254). * char: xillybus: Check USB endpoints when probing device (git-fixes). * char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes). * char: xillybus: Refine workqueue handling (git-fixes). * clk: en7523: fix rate divider for slic and spi clocks (git-fixes). * clk: qcom: Park shared RCGs upon registration (git-fixes). * clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git- fixes). * clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git- fixes). * clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git- fixes). * clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes). * clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes). * clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes). * clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes). * clocksource/drivers/sh_cmt: Address race condition for clock events (stable- fixes). * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * cxl/region: Move cxl_dpa_to_region() work to the region driver (bsc#1228472) * dev/parport: fix the array out-of-bounds risk (stable-fixes). * device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes). * dmaengine: dw: Add memory bus width verification (git-fixes). * dmaengine: dw: Add peripheral bus width verification (git-fixes). * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes). * driver core: Fix uevent_show() vs driver detach race (git-fixes). * drm/admgpu: fix dereferencing null pointer context (stable-fixes). * drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes). * drm/amd/display: Add null checker before passing variables (stable-fixes). * drm/amd/display: Adjust cursor position (git-fixes). * drm/amd/display: Check for NULL pointer (stable-fixes). * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable- fixes). * drm/amd/display: avoid using null object of framebuffer (git-fixes). * drm/amd/display: fix cursor offset on rotation 180 (git-fixes). * drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes). * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable- fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes). * drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable- fixes). * drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes). * drm/amdgpu: Actually check flags for all context ops (stable-fixes). * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes). * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes). * drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes). * drm/amdgpu: Validate TA binary size (stable-fixes). * drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * drm/amdgpu: fix potential resource leak warning (stable-fixes). * drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable- fixes). * drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes). * drm/client: fix null pointer dereference in drm_client_modeset_probe (git- fixes). * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes). * drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes). * drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes). * drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes). * drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes). * drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes). * drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git- fixes). * drm/lima: set gp bus_stop bit before hard reset (stable-fixes). * drm/mediatek/dp: Fix spurious kfree() (git-fixes). * drm/msm/dp: fix the max supported bpp logic (git-fixes). * drm/msm/dp: reset the link phy params before link training (git-fixes). * drm/msm/dpu: capture snapshot on the first commit_done timeout (stable- fixes). * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes). * drm/msm/dpu: do not play tricks with debug macros (git-fixes). * drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes). * drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes). * drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable- fixes). * drm/msm/dpu: take plane rotation into account for wide planes (git-fixes). * drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes). * drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable- fixes). * drm/msm/mdss: Rename path references to mdp_path (stable-fixes). * drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes). * drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes). * drm/nouveau: prime: fix refcount underflow (git-fixes). * drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes). * drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024). * drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes). * drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes). * drm/virtio: Fix type of dma-fence context variable (git-fixes). * drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes). * drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes). * drm/vmwgfx: Fix prime with external buffers (git-fixes). * efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes). * evm: do not copy up 'security.evm' xattr (git-fixes). * firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes). * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455). * fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456). * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git- fixes). * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git- fixes). * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git- fixes). * gfs2: setattr_chown: Add missing initialization (git-fixes). * gpio: mlxbf3: Support shutdown() function (git-fixes). * gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable- fixes). * gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes). * hwmon: (ltc2992) Avoid division by zero (stable-fixes). * hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes). * hwmon: (pc87360) Bounds check data->innr usage (stable-fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: riic: avoid potential division by zero (stable-fixes). * i2c: smbus: Improve handling of stuck alerts (git-fixes). * i2c: smbus: Send alert notifications to all devices if source not found (git-fixes). * i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes). * i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable- fixes). * i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable- fixes). * i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes). * ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737). * io_uring/advise: support 64-bit lengths (git-fixes). * io_uring: Drop per-ctx dummy_ubuf (git-fixes). * io_uring: Fix probe of disabled operations (git-fixes). * io_uring: fix io_match_task must_hold (git-fixes). * io_uring: tighten task exit cancellations (git-fixes). * iommu/amd: Convert comma to semicolon (git-fixes). * iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes). * iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git- fixes). * ip6_tunnel: Fix broken GRO (bsc#1229444). * ipv6: sr: fix incorrect unregister order (git-fixes). * irqdomain: Fixed unbalanced fwnode get and put (git-fixes). * jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes). * jfs: define xtree root and page independently (git-fixes). * jfs: fix null ptr deref in dtInsertEntry (git-fixes). * jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git- fixes). * jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes). * jump_label: Fix the fix, brown paper bags galore (git-fixes). * jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git- fixes). * kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes). * kABI workaround for sound core UMP conversion (stable-fixes). * kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783) * kcov: properly check for softirq context (git-fixes). * kernel-binary: generate and install compile_commands.json (bsc#1228971) * kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134). * kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git- fixes). * kprobes: Fix to check symbol prefixes correctly (git-fixes). * kprobes: Prohibit probing on CFI preamble symbol (git-fixes). * kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168). * libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes). * libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git- fixes). * libbpf: Fix faccessat() usage on Android (git-fixes). * libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395). * md/md-bitmap: fix writing non bitmap pages (git-fixes). * md/raid1: set max_sectors during early return from choose_slow_rdev() (git- fixes). * md/raid1: support read error check (git-fixes). * md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes). * md/raid5: fix spares errors about rcu usage (git-fixes). * md/raid5: recheck if reshape has finished with device_lock held (git-fixes). * md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git- fixes). * md: add a mddev_add_trace_msg helper (git-fixes). * md: add check for sleepers in md_wakeup_thread() (git-fixes). * md: change the return value type of md_write_start to void (git-fixes). * md: do not account sync_io if iostats of the disk is disabled (git-fixes). * md: do not delete safemode_timer in mddev_suspend (git-fixes). * md: factor out a helper exceed_read_errors() to check read_errors (git- fixes). * md: fix a suspicious RCU usage warning (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: amphion: Remove lock in s_ctrl callback (stable-fixes). * media: drivers/media/dvb-core: copy user arrays safely (stable-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes). * media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes). * media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes). * media: uvcvideo: Ignore empty TS packets (stable-fixes). * media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes). * media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes). * memcg: protect concurrent access to mem_cgroup_idr (git-fixes). * memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes). * memory: tegra: Skip SID programming if SID registers are not set (stable- fixes). * minmax: add a few more MIN_T/MAX_T users (bsc#1229024). * minmax: avoid overly complicated constant expressions in VM code (bsc#1229024). * minmax: do not use max() in situations that want a C constant expression (bsc#1229024). * minmax: fix up min3() and max3() too (bsc#1229024). * minmax: improve macro expansion and type checking (bsc#1229024). * minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024). * minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024). * minmax: simplify min()/max()/clamp() implementation (bsc#1229024). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes). * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes). * mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes). * net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451). * net/iucv: fix use after free in iucv_sock_close() (bsc#1228973). * net/rds: fix possible cp null dereference (git-fixes). * net/sched: initialize noop_qdisc owner (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes). * net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757). * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: missing check virtio (git-fixes). * net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes). * net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes). * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462). * nfc: pn533: Add poll mod list filling check (git-fixes). * nfs: do not invalidate dentries on transient errors (git-fixes). * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * nfs: make the rpc_stat per net namespace (git-fixes). * nfs: pass explicit offset/count to trace events (git-fixes). * nfs: propagate readlink errors in nfs_symlink_filler (git-fixes). * nouveau/firmware: use dma non-coherent allocator (git-fixes). * nvme-multipath: find NUMA path only for online numa-node (git-fixes). * nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706). * nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706). * nvme-pci: Fix the instructions for disabling power management (git-fixes). * nvme-pci: add missing condition check for existence of mapped data (git- fixes). * nvme-pci: do not directly handle subsys reset fallout (bsc#1220066). * nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857). * nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857). * nvme-tcp: check for invalidated or revoked key (bsc#1221857). * nvme-tcp: sanitize TLS key handling (bsc#1221857). * nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857). * nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes). * nvme: avoid double free special payload (git-fixes). * nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git- fixes). * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * nvme: split off TLS sysfs attributes into a separate group (bsc#1221857). * nvme: tcp: remove unnecessary goto statement (bsc#1221857). * nvme_core: scan namespaces asynchronously (bsc#1224105). * nvmet-auth: fix nvmet_auth hash error handling (git-fixes). * nvmet: always initialize cqe.result (git-fixes). * nvmet: do not return 'reserved' for empty TSAS values (git-fixes). * nvmet: fix a possible leak when destroy a ctrl during qp establishment (git- fixes). * nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes). * pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git- fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779). * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779). * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779). * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779). * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779). * platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes). * platform/x86: lg-laptop: fix %s null argument warning (stable-fixes). * power: supply: axp288_charger: Fix constant_charge_voltage writes (git- fixes). * power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes). * power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869). * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869). * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869). * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869). * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869). * printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607). * reiserfs: fix uninit-value in comp_keys (git-fixes). * rtc: nct3018y: fix possible NULL dereference (stable-fixes). * s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171). * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173). * s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452). * s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174). * s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172). * s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172). * s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720). * s390/pkey: introduce dynamic debugging for pkey (bsc#1228720). * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169). * s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170). * samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes). * samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes). * sbitmap: use READ_ONCE to access map->word (stable-fixes). * scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857). * scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857). * scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857). * scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857). * scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857). * scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857). * scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857). * scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Indent help text (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes). * selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903). * selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes). * selftests/bpf: Add netkit to tc_redirect selftest (git-fixes). * selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes). * selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes). * selftests/bpf: Fix erroneous bitmask operation (git-fixes). * selftests/bpf: Fix issues in setup_classid_environment() (git-fixes). * selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes). * selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes). * selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes). * selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes). * selftests/bpf: Make linked_list failure test more robust (git-fixes). * selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git- fixes). * selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes). * selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes). * selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes). * selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git- fixes). * selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes). * selftests/bpf: satisfy compiler by having explicit return in btf test (git- fixes). * serial: core: check uartclk for zero to avoid divide by zero (stable-fixes). * soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes). * soc: qcom: pmic_glink: Actually communicate when remote goes down (git- fixes). * soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes). * spi: Add empty versions of ACPI functions (stable-fixes). * spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes). * spi: microchip-core: switch to use modern name (stable-fixes). * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes). * spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes). * squashfs: squashfs_read_data need to check if the length is 0 (git-fixes). * ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes). * staging: iio: resolver: ad2s1210: fix use before initialization (stable- fixes). * staging: ks7010: disable bh on tx_dev_lock (stable-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849). * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes). * swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git- fixes). * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes). * thermal/drivers/broadcom: Fix race between removal and clock disable (git- fixes). * thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix timing issue with parallel threads in perf bench wake-up- parallel (bsc#1227747). * tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes). * tools/resolve_btfids: Fix cross-compilation to non-host endianness (git- fixes). * tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git- fixes). * tools/resolve_btfids: fix build with musl libc (git-fixes). * trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes). * tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * tty: atmel_serial: use the correct RTS flag (git-fixes). * tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git- fixes). * usb: cdnsp: fix for Link TRB with TC (git-fixes). * usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes). * usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usb: gadget: core: Check for unset descriptor (git-fixes). * usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes). * usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes). * usb: gadget: u_serial: Set start_delayed during suspend (git-fixes). * usb: gadget: uvc: cleanup request when not in correct state (stable-fixes). * usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes). * usb: typec: fsa4480: Check if the chip is really there (git-fixes). * usb: typec: fsa4480: Relax CHIP_ID check (git-fixes). * usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes). * usb: typec: fsa4480: rework mux & switch setup to handle more states (git- fixes). * usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes). * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes). * vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * vhost/vsock: always initialize seqpacket_allow (git-fixes). * vhost: Release worker mutex during flushes (git-fixes). * vhost: Use virtqueue mutex for swapping worker (git-fixes). * virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes). * virtio-crypto: handle config changed by work queue (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtiofs: forbid newlines in tags (bsc#1229940). * wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable- fixes). * wifi: ath12k: fix soft lockup on suspend (git-fixes). * wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes). * wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes). * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes). * wifi: mac80211: use monitor sdata with driver only if desired (git-fixes). * wifi: mwifiex: duplicate static structs used in driver instances (git- fixes). * wifi: nl80211: disallow setting special AP channel widths (stable-fixes). * wifi: nl80211: do not give key data to userspace (stable-fixes). * wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes). * wifi: wfx: repair open network AP mode (git-fixes). * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454). * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454). * x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git- fixes). * x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes). * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes). * x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes). * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes). * x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git- fixes). * x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes). * x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes). * x86/numa: Introduce numa_fill_memblks() (git-fixes). * x86/pci: Skip early E820 check for ECAM region (git-fixes). * x86/xen: Convert comma to semicolon (git-fixes). * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes). * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * xfs: allow cross-linking special files without project quota (git-fixes). * xfs: allow symlinks with short remote targets (bsc#1229160). * xfs: allow unlinked symlinks and dirs with zero size (git-fixes). * xfs: attr forks require attr, not attr2 (git-fixes). * xfs: convert comma to semicolon (git-fixes). * xfs: do not use current->journal_info (git-fixes). * xfs: fix unlink vs cluster buffer instantiation race (git-fixes). * xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes). * xfs: journal geometry is not properly bounds checked (git-fixes). * xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes). * xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes). * xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git- fixes). * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes). * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes). * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-61=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-61=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-6.4.0-19.1 * kernel-devel-6.4.0-19.1 * kernel-macros-6.4.0-19.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-19.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-19.1 * kernel-default-debuginfo-6.4.0-19.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-default-livepatch-6.4.0-19.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-1-1.1 * kernel-livepatch-6_4_0-19-default-1-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-1-1.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-19.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-19.1 * kernel-kvmsmall-debugsource-6.4.0-19.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-17.1.1.51 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-default-6.4.0-19.1 * kernel-64kb-6.4.0-19.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-devel-6.4.0-19.1 * kernel-64kb-debugsource-6.4.0-19.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-obs-build-debugsource-6.4.0-19.1 * kernel-default-debugsource-6.4.0-19.1 * kernel-syms-6.4.0-19.1 * kernel-default-devel-6.4.0-19.1 * kernel-obs-build-6.4.0-19.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-19.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52489.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52668.html * https://www.suse.com/security/cve/CVE-2023-52688.html * https://www.suse.com/security/cve/CVE-2023-52859.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2023-52886.html * https://www.suse.com/security/cve/CVE-2023-52887.html * https://www.suse.com/security/cve/CVE-2023-52889.html * https://www.suse.com/security/cve/CVE-2024-26590.html * https://www.suse.com/security/cve/CVE-2024-26631.html * https://www.suse.com/security/cve/CVE-2024-26637.html * https://www.suse.com/security/cve/CVE-2024-26668.html * https://www.suse.com/security/cve/CVE-2024-26669.html * https://www.suse.com/security/cve/CVE-2024-26677.html * https://www.suse.com/security/cve/CVE-2024-26682.html * https://www.suse.com/security/cve/CVE-2024-26683.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26809.html * https://www.suse.com/security/cve/CVE-2024-26812.html * https://www.suse.com/security/cve/CVE-2024-26835.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-26849.html * https://www.suse.com/security/cve/CVE-2024-26851.html * https://www.suse.com/security/cve/CVE-2024-26976.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-27011.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-27049.html * https://www.suse.com/security/cve/CVE-2024-27050.html * https://www.suse.com/security/cve/CVE-2024-27079.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-27433.html * https://www.suse.com/security/cve/CVE-2024-27437.html * https://www.suse.com/security/cve/CVE-2024-31076.html * https://www.suse.com/security/cve/CVE-2024-35855.html * https://www.suse.com/security/cve/CVE-2024-35897.html * https://www.suse.com/security/cve/CVE-2024-35902.html * https://www.suse.com/security/cve/CVE-2024-35913.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36270.html * https://www.suse.com/security/cve/CVE-2024-36286.html * https://www.suse.com/security/cve/CVE-2024-36288.html * https://www.suse.com/security/cve/CVE-2024-36489.html * https://www.suse.com/security/cve/CVE-2024-36881.html * https://www.suse.com/security/cve/CVE-2024-36907.html * https://www.suse.com/security/cve/CVE-2024-36929.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-36939.html * https://www.suse.com/security/cve/CVE-2024-36970.html * https://www.suse.com/security/cve/CVE-2024-36979.html * https://www.suse.com/security/cve/CVE-2024-38563.html * https://www.suse.com/security/cve/CVE-2024-38609.html * https://www.suse.com/security/cve/CVE-2024-38662.html * https://www.suse.com/security/cve/CVE-2024-39476.html * https://www.suse.com/security/cve/CVE-2024-39483.html * https://www.suse.com/security/cve/CVE-2024-39484.html * https://www.suse.com/security/cve/CVE-2024-39486.html * https://www.suse.com/security/cve/CVE-2024-39488.html * https://www.suse.com/security/cve/CVE-2024-39489.html * https://www.suse.com/security/cve/CVE-2024-39491.html * https://www.suse.com/security/cve/CVE-2024-39493.html * https://www.suse.com/security/cve/CVE-2024-39497.html * https://www.suse.com/security/cve/CVE-2024-39499.html * https://www.suse.com/security/cve/CVE-2024-39500.html * https://www.suse.com/security/cve/CVE-2024-39501.html * https://www.suse.com/security/cve/CVE-2024-39505.html * https://www.suse.com/security/cve/CVE-2024-39506.html * https://www.suse.com/security/cve/CVE-2024-39508.html * https://www.suse.com/security/cve/CVE-2024-39509.html * https://www.suse.com/security/cve/CVE-2024-39510.html * https://www.suse.com/security/cve/CVE-2024-40899.html * https://www.suse.com/security/cve/CVE-2024-40900.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-40903.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40905.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40911.html * https://www.suse.com/security/cve/CVE-2024-40912.html * https://www.suse.com/security/cve/CVE-2024-40913.html * https://www.suse.com/security/cve/CVE-2024-40916.html * https://www.suse.com/security/cve/CVE-2024-40920.html * https://www.suse.com/security/cve/CVE-2024-40921.html * https://www.suse.com/security/cve/CVE-2024-40922.html * https://www.suse.com/security/cve/CVE-2024-40924.html * https://www.suse.com/security/cve/CVE-2024-40926.html * https://www.suse.com/security/cve/CVE-2024-40927.html * https://www.suse.com/security/cve/CVE-2024-40929.html * https://www.suse.com/security/cve/CVE-2024-40930.html * https://www.suse.com/security/cve/CVE-2024-40932.html * https://www.suse.com/security/cve/CVE-2024-40934.html * https://www.suse.com/security/cve/CVE-2024-40936.html * https://www.suse.com/security/cve/CVE-2024-40938.html * https://www.suse.com/security/cve/CVE-2024-40939.html * https://www.suse.com/security/cve/CVE-2024-40941.html * https://www.suse.com/security/cve/CVE-2024-40942.html * https://www.suse.com/security/cve/CVE-2024-40943.html * https://www.suse.com/security/cve/CVE-2024-40944.html * https://www.suse.com/security/cve/CVE-2024-40945.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-40956.html * https://www.suse.com/security/cve/CVE-2024-40957.html * https://www.suse.com/security/cve/CVE-2024-40958.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-40962.html * https://www.suse.com/security/cve/CVE-2024-40964.html * https://www.suse.com/security/cve/CVE-2024-40967.html * https://www.suse.com/security/cve/CVE-2024-40976.html * https://www.suse.com/security/cve/CVE-2024-40977.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40981.html * https://www.suse.com/security/cve/CVE-2024-40982.html * https://www.suse.com/security/cve/CVE-2024-40984.html * https://www.suse.com/security/cve/CVE-2024-40987.html * https://www.suse.com/security/cve/CVE-2024-40988.html * https://www.suse.com/security/cve/CVE-2024-40989.html * https://www.suse.com/security/cve/CVE-2024-40990.html * https://www.suse.com/security/cve/CVE-2024-40992.html * https://www.suse.com/security/cve/CVE-2024-40994.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41001.html * https://www.suse.com/security/cve/CVE-2024-41002.html * https://www.suse.com/security/cve/CVE-2024-41004.html * https://www.suse.com/security/cve/CVE-2024-41007.html * https://www.suse.com/security/cve/CVE-2024-41009.html * https://www.suse.com/security/cve/CVE-2024-41010.html * https://www.suse.com/security/cve/CVE-2024-41012.html * https://www.suse.com/security/cve/CVE-2024-41015.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41020.html * https://www.suse.com/security/cve/CVE-2024-41022.html * https://www.suse.com/security/cve/CVE-2024-41024.html * https://www.suse.com/security/cve/CVE-2024-41025.html * https://www.suse.com/security/cve/CVE-2024-41028.html * https://www.suse.com/security/cve/CVE-2024-41032.html * https://www.suse.com/security/cve/CVE-2024-41035.html * https://www.suse.com/security/cve/CVE-2024-41036.html * https://www.suse.com/security/cve/CVE-2024-41037.html * https://www.suse.com/security/cve/CVE-2024-41038.html * https://www.suse.com/security/cve/CVE-2024-41039.html * https://www.suse.com/security/cve/CVE-2024-41040.html * https://www.suse.com/security/cve/CVE-2024-41041.html * https://www.suse.com/security/cve/CVE-2024-41044.html * https://www.suse.com/security/cve/CVE-2024-41045.html * https://www.suse.com/security/cve/CVE-2024-41048.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-41050.html * https://www.suse.com/security/cve/CVE-2024-41051.html * https://www.suse.com/security/cve/CVE-2024-41056.html * https://www.suse.com/security/cve/CVE-2024-41057.html * https://www.suse.com/security/cve/CVE-2024-41058.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41061.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41063.html * https://www.suse.com/security/cve/CVE-2024-41064.html * https://www.suse.com/security/cve/CVE-2024-41065.html * https://www.suse.com/security/cve/CVE-2024-41066.html * https://www.suse.com/security/cve/CVE-2024-41068.html * https://www.suse.com/security/cve/CVE-2024-41069.html * https://www.suse.com/security/cve/CVE-2024-41070.html * https://www.suse.com/security/cve/CVE-2024-41071.html * https://www.suse.com/security/cve/CVE-2024-41072.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41074.html * https://www.suse.com/security/cve/CVE-2024-41075.html * https://www.suse.com/security/cve/CVE-2024-41076.html * https://www.suse.com/security/cve/CVE-2024-41078.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41080.html * https://www.suse.com/security/cve/CVE-2024-41081.html * https://www.suse.com/security/cve/CVE-2024-41084.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-41088.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-41093.html * https://www.suse.com/security/cve/CVE-2024-41094.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-41096.html * https://www.suse.com/security/cve/CVE-2024-41097.html * https://www.suse.com/security/cve/CVE-2024-41098.html * https://www.suse.com/security/cve/CVE-2024-42064.html * https://www.suse.com/security/cve/CVE-2024-42069.html * https://www.suse.com/security/cve/CVE-2024-42070.html * https://www.suse.com/security/cve/CVE-2024-42073.html * https://www.suse.com/security/cve/CVE-2024-42074.html * https://www.suse.com/security/cve/CVE-2024-42076.html * https://www.suse.com/security/cve/CVE-2024-42077.html * https://www.suse.com/security/cve/CVE-2024-42079.html * https://www.suse.com/security/cve/CVE-2024-42080.html * https://www.suse.com/security/cve/CVE-2024-42082.html * https://www.suse.com/security/cve/CVE-2024-42085.html * https://www.suse.com/security/cve/CVE-2024-42086.html * https://www.suse.com/security/cve/CVE-2024-42087.html * https://www.suse.com/security/cve/CVE-2024-42089.html * https://www.suse.com/security/cve/CVE-2024-42090.html * https://www.suse.com/security/cve/CVE-2024-42092.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42095.html * https://www.suse.com/security/cve/CVE-2024-42096.html * https://www.suse.com/security/cve/CVE-2024-42097.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42101.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42105.html * https://www.suse.com/security/cve/CVE-2024-42106.html * https://www.suse.com/security/cve/CVE-2024-42107.html * https://www.suse.com/security/cve/CVE-2024-42109.html * https://www.suse.com/security/cve/CVE-2024-42110.html * https://www.suse.com/security/cve/CVE-2024-42113.html * https://www.suse.com/security/cve/CVE-2024-42114.html * https://www.suse.com/security/cve/CVE-2024-42115.html * https://www.suse.com/security/cve/CVE-2024-42117.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42121.html * https://www.suse.com/security/cve/CVE-2024-42122.html * https://www.suse.com/security/cve/CVE-2024-42124.html * https://www.suse.com/security/cve/CVE-2024-42125.html * https://www.suse.com/security/cve/CVE-2024-42126.html * https://www.suse.com/security/cve/CVE-2024-42127.html * https://www.suse.com/security/cve/CVE-2024-42130.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42132.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-42136.html * https://www.suse.com/security/cve/CVE-2024-42137.html * https://www.suse.com/security/cve/CVE-2024-42138.html * https://www.suse.com/security/cve/CVE-2024-42139.html * https://www.suse.com/security/cve/CVE-2024-42141.html * https://www.suse.com/security/cve/CVE-2024-42142.html * https://www.suse.com/security/cve/CVE-2024-42143.html * https://www.suse.com/security/cve/CVE-2024-42144.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42147.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-42152.html * https://www.suse.com/security/cve/CVE-2024-42153.html * https://www.suse.com/security/cve/CVE-2024-42155.html * https://www.suse.com/security/cve/CVE-2024-42156.html * https://www.suse.com/security/cve/CVE-2024-42157.html * https://www.suse.com/security/cve/CVE-2024-42158.html * https://www.suse.com/security/cve/CVE-2024-42159.html * https://www.suse.com/security/cve/CVE-2024-42161.html * https://www.suse.com/security/cve/CVE-2024-42162.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42224.html * https://www.suse.com/security/cve/CVE-2024-42225.html * https://www.suse.com/security/cve/CVE-2024-42226.html * https://www.suse.com/security/cve/CVE-2024-42227.html * https://www.suse.com/security/cve/CVE-2024-42228.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-42236.html * https://www.suse.com/security/cve/CVE-2024-42237.html * https://www.suse.com/security/cve/CVE-2024-42238.html * https://www.suse.com/security/cve/CVE-2024-42239.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-42241.html * https://www.suse.com/security/cve/CVE-2024-42244.html * https://www.suse.com/security/cve/CVE-2024-42245.html * https://www.suse.com/security/cve/CVE-2024-42246.html * https://www.suse.com/security/cve/CVE-2024-42247.html * https://www.suse.com/security/cve/CVE-2024-42250.html * https://www.suse.com/security/cve/CVE-2024-42253.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42268.html * https://www.suse.com/security/cve/CVE-2024-42269.html * https://www.suse.com/security/cve/CVE-2024-42270.html * https://www.suse.com/security/cve/CVE-2024-42271.html * https://www.suse.com/security/cve/CVE-2024-42274.html * https://www.suse.com/security/cve/CVE-2024-42276.html * https://www.suse.com/security/cve/CVE-2024-42277.html * https://www.suse.com/security/cve/CVE-2024-42278.html * https://www.suse.com/security/cve/CVE-2024-42279.html * https://www.suse.com/security/cve/CVE-2024-42280.html * https://www.suse.com/security/cve/CVE-2024-42281.html * https://www.suse.com/security/cve/CVE-2024-42283.html * https://www.suse.com/security/cve/CVE-2024-42284.html * https://www.suse.com/security/cve/CVE-2024-42285.html * https://www.suse.com/security/cve/CVE-2024-42286.html * https://www.suse.com/security/cve/CVE-2024-42287.html * https://www.suse.com/security/cve/CVE-2024-42288.html * https://www.suse.com/security/cve/CVE-2024-42289.html * https://www.suse.com/security/cve/CVE-2024-42290.html * https://www.suse.com/security/cve/CVE-2024-42291.html * https://www.suse.com/security/cve/CVE-2024-42292.html * https://www.suse.com/security/cve/CVE-2024-42295.html * https://www.suse.com/security/cve/CVE-2024-42298.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-42302.html * https://www.suse.com/security/cve/CVE-2024-42303.html * https://www.suse.com/security/cve/CVE-2024-42308.html * https://www.suse.com/security/cve/CVE-2024-42309.html * https://www.suse.com/security/cve/CVE-2024-42310.html * https://www.suse.com/security/cve/CVE-2024-42311.html * https://www.suse.com/security/cve/CVE-2024-42312.html * https://www.suse.com/security/cve/CVE-2024-42313.html * https://www.suse.com/security/cve/CVE-2024-42314.html * https://www.suse.com/security/cve/CVE-2024-42315.html * https://www.suse.com/security/cve/CVE-2024-42316.html * https://www.suse.com/security/cve/CVE-2024-42318.html * https://www.suse.com/security/cve/CVE-2024-42319.html * https://www.suse.com/security/cve/CVE-2024-42320.html * https://www.suse.com/security/cve/CVE-2024-42322.html * https://www.suse.com/security/cve/CVE-2024-43816.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43818.html * https://www.suse.com/security/cve/CVE-2024-43819.html * https://www.suse.com/security/cve/CVE-2024-43821.html * https://www.suse.com/security/cve/CVE-2024-43823.html * https://www.suse.com/security/cve/CVE-2024-43824.html * https://www.suse.com/security/cve/CVE-2024-43825.html * https://www.suse.com/security/cve/CVE-2024-43826.html * https://www.suse.com/security/cve/CVE-2024-43829.html * https://www.suse.com/security/cve/CVE-2024-43830.html * https://www.suse.com/security/cve/CVE-2024-43831.html * https://www.suse.com/security/cve/CVE-2024-43833.html * https://www.suse.com/security/cve/CVE-2024-43834.html * https://www.suse.com/security/cve/CVE-2024-43837.html * https://www.suse.com/security/cve/CVE-2024-43839.html * https://www.suse.com/security/cve/CVE-2024-43840.html * https://www.suse.com/security/cve/CVE-2024-43841.html * https://www.suse.com/security/cve/CVE-2024-43842.html * https://www.suse.com/security/cve/CVE-2024-43846.html * https://www.suse.com/security/cve/CVE-2024-43847.html * https://www.suse.com/security/cve/CVE-2024-43849.html * https://www.suse.com/security/cve/CVE-2024-43850.html * https://www.suse.com/security/cve/CVE-2024-43851.html * https://www.suse.com/security/cve/CVE-2024-43853.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-43855.html * https://www.suse.com/security/cve/CVE-2024-43856.html * https://www.suse.com/security/cve/CVE-2024-43858.html * https://www.suse.com/security/cve/CVE-2024-43860.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://www.suse.com/security/cve/CVE-2024-43863.html * https://www.suse.com/security/cve/CVE-2024-43864.html * https://www.suse.com/security/cve/CVE-2024-43866.html * https://www.suse.com/security/cve/CVE-2024-43867.html * https://www.suse.com/security/cve/CVE-2024-43871.html * https://www.suse.com/security/cve/CVE-2024-43872.html * https://www.suse.com/security/cve/CVE-2024-43873.html * https://www.suse.com/security/cve/CVE-2024-43874.html * https://www.suse.com/security/cve/CVE-2024-43875.html * https://www.suse.com/security/cve/CVE-2024-43876.html * https://www.suse.com/security/cve/CVE-2024-43877.html * https://www.suse.com/security/cve/CVE-2024-43879.html * https://www.suse.com/security/cve/CVE-2024-43880.html * https://www.suse.com/security/cve/CVE-2024-43881.html * https://www.suse.com/security/cve/CVE-2024-43882.html * https://www.suse.com/security/cve/CVE-2024-43883.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43885.html * https://www.suse.com/security/cve/CVE-2024-43889.html * https://www.suse.com/security/cve/CVE-2024-43892.html * https://www.suse.com/security/cve/CVE-2024-43893.html * https://www.suse.com/security/cve/CVE-2024-43894.html * https://www.suse.com/security/cve/CVE-2024-43895.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-43899.html * https://www.suse.com/security/cve/CVE-2024-43900.html * https://www.suse.com/security/cve/CVE-2024-43902.html * https://www.suse.com/security/cve/CVE-2024-43903.html * https://www.suse.com/security/cve/CVE-2024-43905.html * https://www.suse.com/security/cve/CVE-2024-43906.html * https://www.suse.com/security/cve/CVE-2024-43907.html * https://www.suse.com/security/cve/CVE-2024-43908.html * https://www.suse.com/security/cve/CVE-2024-43909.html * https://www.suse.com/security/cve/CVE-2024-43911.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-44931.html * https://www.suse.com/security/cve/CVE-2024-44938.html * https://www.suse.com/security/cve/CVE-2024-44939.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1193454 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1208783 * https://bugzilla.suse.com/show_bug.cgi?id=1213123 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220066 * https://bugzilla.suse.com/show_bug.cgi?id=1220252 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1221326 * https://bugzilla.suse.com/show_bug.cgi?id=1221630 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221652 * https://bugzilla.suse.com/show_bug.cgi?id=1221857 * https://bugzilla.suse.com/show_bug.cgi?id=1222254 * https://bugzilla.suse.com/show_bug.cgi?id=1222335 * https://bugzilla.suse.com/show_bug.cgi?id=1222350 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222387 * https://bugzilla.suse.com/show_bug.cgi?id=1222433 * https://bugzilla.suse.com/show_bug.cgi?id=1222434 * https://bugzilla.suse.com/show_bug.cgi?id=1222625 * https://bugzilla.suse.com/show_bug.cgi?id=1222633 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1222808 * https://bugzilla.suse.com/show_bug.cgi?id=1222967 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223053 * https://bugzilla.suse.com/show_bug.cgi?id=1223074 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223395 * https://bugzilla.suse.com/show_bug.cgi?id=1223635 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223742 * https://bugzilla.suse.com/show_bug.cgi?id=1223763 * https://bugzilla.suse.com/show_bug.cgi?id=1223767 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1223803 * https://bugzilla.suse.com/show_bug.cgi?id=1224105 * https://bugzilla.suse.com/show_bug.cgi?id=1224415 * https://bugzilla.suse.com/show_bug.cgi?id=1224485 * https://bugzilla.suse.com/show_bug.cgi?id=1224496 * https://bugzilla.suse.com/show_bug.cgi?id=1224510 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224631 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224690 * https://bugzilla.suse.com/show_bug.cgi?id=1224694 * https://bugzilla.suse.com/show_bug.cgi?id=1224700 * https://bugzilla.suse.com/show_bug.cgi?id=1224711 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225582 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225718 * https://bugzilla.suse.com/show_bug.cgi?id=1225751 * https://bugzilla.suse.com/show_bug.cgi?id=1225814 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1225838 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226031 * https://bugzilla.suse.com/show_bug.cgi?id=1226127 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226530 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226604 * https://bugzilla.suse.com/show_bug.cgi?id=1226743 * https://bugzilla.suse.com/show_bug.cgi?id=1226751 * https://bugzilla.suse.com/show_bug.cgi?id=1226765 * https://bugzilla.suse.com/show_bug.cgi?id=1226798 * https://bugzilla.suse.com/show_bug.cgi?id=1226801 * https://bugzilla.suse.com/show_bug.cgi?id=1226834 * https://bugzilla.suse.com/show_bug.cgi?id=1226874 * https://bugzilla.suse.com/show_bug.cgi?id=1226885 * https://bugzilla.suse.com/show_bug.cgi?id=1226920 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227182 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227437 * https://bugzilla.suse.com/show_bug.cgi?id=1227492 * https://bugzilla.suse.com/show_bug.cgi?id=1227493 * https://bugzilla.suse.com/show_bug.cgi?id=1227494 * https://bugzilla.suse.com/show_bug.cgi?id=1227618 * https://bugzilla.suse.com/show_bug.cgi?id=1227620 * https://bugzilla.suse.com/show_bug.cgi?id=1227623 * https://bugzilla.suse.com/show_bug.cgi?id=1227627 * https://bugzilla.suse.com/show_bug.cgi?id=1227634 * https://bugzilla.suse.com/show_bug.cgi?id=1227706 * https://bugzilla.suse.com/show_bug.cgi?id=1227722 * https://bugzilla.suse.com/show_bug.cgi?id=1227724 * https://bugzilla.suse.com/show_bug.cgi?id=1227725 * https://bugzilla.suse.com/show_bug.cgi?id=1227728 * https://bugzilla.suse.com/show_bug.cgi?id=1227729 * https://bugzilla.suse.com/show_bug.cgi?id=1227732 * https://bugzilla.suse.com/show_bug.cgi?id=1227733 * https://bugzilla.suse.com/show_bug.cgi?id=1227734 * https://bugzilla.suse.com/show_bug.cgi?id=1227747 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227754 * https://bugzilla.suse.com/show_bug.cgi?id=1227758 * https://bugzilla.suse.com/show_bug.cgi?id=1227760 * https://bugzilla.suse.com/show_bug.cgi?id=1227761 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1227766 * https://bugzilla.suse.com/show_bug.cgi?id=1227770 * https://bugzilla.suse.com/show_bug.cgi?id=1227771 * https://bugzilla.suse.com/show_bug.cgi?id=1227772 * https://bugzilla.suse.com/show_bug.cgi?id=1227774 * https://bugzilla.suse.com/show_bug.cgi?id=1227781 * https://bugzilla.suse.com/show_bug.cgi?id=1227784 * https://bugzilla.suse.com/show_bug.cgi?id=1227785 * https://bugzilla.suse.com/show_bug.cgi?id=1227787 * https://bugzilla.suse.com/show_bug.cgi?id=1227790 * https://bugzilla.suse.com/show_bug.cgi?id=1227791 * https://bugzilla.suse.com/show_bug.cgi?id=1227792 * https://bugzilla.suse.com/show_bug.cgi?id=1227796 * https://bugzilla.suse.com/show_bug.cgi?id=1227798 * https://bugzilla.suse.com/show_bug.cgi?id=1227799 * https://bugzilla.suse.com/show_bug.cgi?id=1227802 * https://bugzilla.suse.com/show_bug.cgi?id=1227808 * https://bugzilla.suse.com/show_bug.cgi?id=1227810 * https://bugzilla.suse.com/show_bug.cgi?id=1227811 * https://bugzilla.suse.com/show_bug.cgi?id=1227812 * https://bugzilla.suse.com/show_bug.cgi?id=1227815 * https://bugzilla.suse.com/show_bug.cgi?id=1227816 * https://bugzilla.suse.com/show_bug.cgi?id=1227818 * https://bugzilla.suse.com/show_bug.cgi?id=1227820 * https://bugzilla.suse.com/show_bug.cgi?id=1227823 * https://bugzilla.suse.com/show_bug.cgi?id=1227824 * https://bugzilla.suse.com/show_bug.cgi?id=1227826 * https://bugzilla.suse.com/show_bug.cgi?id=1227828 * https://bugzilla.suse.com/show_bug.cgi?id=1227829 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227833 * https://bugzilla.suse.com/show_bug.cgi?id=1227834 * https://bugzilla.suse.com/show_bug.cgi?id=1227839 * https://bugzilla.suse.com/show_bug.cgi?id=1227840 * https://bugzilla.suse.com/show_bug.cgi?id=1227846 * https://bugzilla.suse.com/show_bug.cgi?id=1227849 * https://bugzilla.suse.com/show_bug.cgi?id=1227851 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1227863 * https://bugzilla.suse.com/show_bug.cgi?id=1227864 * https://bugzilla.suse.com/show_bug.cgi?id=1227865 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227869 * https://bugzilla.suse.com/show_bug.cgi?id=1227870 * https://bugzilla.suse.com/show_bug.cgi?id=1227883 * https://bugzilla.suse.com/show_bug.cgi?id=1227884 * https://bugzilla.suse.com/show_bug.cgi?id=1227891 * https://bugzilla.suse.com/show_bug.cgi?id=1227893 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227950 * https://bugzilla.suse.com/show_bug.cgi?id=1227957 * https://bugzilla.suse.com/show_bug.cgi?id=1227981 * https://bugzilla.suse.com/show_bug.cgi?id=1228020 * https://bugzilla.suse.com/show_bug.cgi?id=1228021 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228235 * https://bugzilla.suse.com/show_bug.cgi?id=1228236 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1228321 * https://bugzilla.suse.com/show_bug.cgi?id=1228409 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228426 * https://bugzilla.suse.com/show_bug.cgi?id=1228427 * https://bugzilla.suse.com/show_bug.cgi?id=1228429 * https://bugzilla.suse.com/show_bug.cgi?id=1228446 * https://bugzilla.suse.com/show_bug.cgi?id=1228447 * https://bugzilla.suse.com/show_bug.cgi?id=1228449 * https://bugzilla.suse.com/show_bug.cgi?id=1228450 * https://bugzilla.suse.com/show_bug.cgi?id=1228452 * https://bugzilla.suse.com/show_bug.cgi?id=1228456 * https://bugzilla.suse.com/show_bug.cgi?id=1228457 * https://bugzilla.suse.com/show_bug.cgi?id=1228458 * https://bugzilla.suse.com/show_bug.cgi?id=1228459 * https://bugzilla.suse.com/show_bug.cgi?id=1228460 * https://bugzilla.suse.com/show_bug.cgi?id=1228462 * https://bugzilla.suse.com/show_bug.cgi?id=1228463 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1228467 * https://bugzilla.suse.com/show_bug.cgi?id=1228468 * https://bugzilla.suse.com/show_bug.cgi?id=1228469 * https://bugzilla.suse.com/show_bug.cgi?id=1228470 * https://bugzilla.suse.com/show_bug.cgi?id=1228472 * https://bugzilla.suse.com/show_bug.cgi?id=1228479 * https://bugzilla.suse.com/show_bug.cgi?id=1228480 * https://bugzilla.suse.com/show_bug.cgi?id=1228481 * https://bugzilla.suse.com/show_bug.cgi?id=1228482 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228484 * https://bugzilla.suse.com/show_bug.cgi?id=1228485 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228489 * https://bugzilla.suse.com/show_bug.cgi?id=1228491 * https://bugzilla.suse.com/show_bug.cgi?id=1228492 * https://bugzilla.suse.com/show_bug.cgi?id=1228493 * https://bugzilla.suse.com/show_bug.cgi?id=1228494 * https://bugzilla.suse.com/show_bug.cgi?id=1228495 * https://bugzilla.suse.com/show_bug.cgi?id=1228496 * https://bugzilla.suse.com/show_bug.cgi?id=1228499 * https://bugzilla.suse.com/show_bug.cgi?id=1228500 * https://bugzilla.suse.com/show_bug.cgi?id=1228501 * https://bugzilla.suse.com/show_bug.cgi?id=1228502 * https://bugzilla.suse.com/show_bug.cgi?id=1228503 * https://bugzilla.suse.com/show_bug.cgi?id=1228505 * https://bugzilla.suse.com/show_bug.cgi?id=1228508 * https://bugzilla.suse.com/show_bug.cgi?id=1228509 * https://bugzilla.suse.com/show_bug.cgi?id=1228510 * https://bugzilla.suse.com/show_bug.cgi?id=1228511 * https://bugzilla.suse.com/show_bug.cgi?id=1228513 * https://bugzilla.suse.com/show_bug.cgi?id=1228515 * https://bugzilla.suse.com/show_bug.cgi?id=1228516 * https://bugzilla.suse.com/show_bug.cgi?id=1228518 * https://bugzilla.suse.com/show_bug.cgi?id=1228520 * https://bugzilla.suse.com/show_bug.cgi?id=1228525 * https://bugzilla.suse.com/show_bug.cgi?id=1228527 * https://bugzilla.suse.com/show_bug.cgi?id=1228530 * https://bugzilla.suse.com/show_bug.cgi?id=1228531 * https://bugzilla.suse.com/show_bug.cgi?id=1228539 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228563 * https://bugzilla.suse.com/show_bug.cgi?id=1228564 * https://bugzilla.suse.com/show_bug.cgi?id=1228565 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228568 * https://bugzilla.suse.com/show_bug.cgi?id=1228572 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228579 * https://bugzilla.suse.com/show_bug.cgi?id=1228580 * https://bugzilla.suse.com/show_bug.cgi?id=1228581 * https://bugzilla.suse.com/show_bug.cgi?id=1228582 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228586 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228590 * https://bugzilla.suse.com/show_bug.cgi?id=1228591 * https://bugzilla.suse.com/show_bug.cgi?id=1228599 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228616 * https://bugzilla.suse.com/show_bug.cgi?id=1228617 * https://bugzilla.suse.com/show_bug.cgi?id=1228625 * https://bugzilla.suse.com/show_bug.cgi?id=1228626 * https://bugzilla.suse.com/show_bug.cgi?id=1228633 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1228636 * https://bugzilla.suse.com/show_bug.cgi?id=1228640 * https://bugzilla.suse.com/show_bug.cgi?id=1228643 * https://bugzilla.suse.com/show_bug.cgi?id=1228644 * https://bugzilla.suse.com/show_bug.cgi?id=1228646 * https://bugzilla.suse.com/show_bug.cgi?id=1228649 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1228655 * https://bugzilla.suse.com/show_bug.cgi?id=1228656 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228660 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228665 * https://bugzilla.suse.com/show_bug.cgi?id=1228666 * https://bugzilla.suse.com/show_bug.cgi?id=1228667 * https://bugzilla.suse.com/show_bug.cgi?id=1228672 * https://bugzilla.suse.com/show_bug.cgi?id=1228673 * https://bugzilla.suse.com/show_bug.cgi?id=1228674 * https://bugzilla.suse.com/show_bug.cgi?id=1228677 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228687 * https://bugzilla.suse.com/show_bug.cgi?id=1228705 * https://bugzilla.suse.com/show_bug.cgi?id=1228706 * https://bugzilla.suse.com/show_bug.cgi?id=1228707 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228709 * https://bugzilla.suse.com/show_bug.cgi?id=1228710 * https://bugzilla.suse.com/show_bug.cgi?id=1228718 * https://bugzilla.suse.com/show_bug.cgi?id=1228720 * https://bugzilla.suse.com/show_bug.cgi?id=1228721 * https://bugzilla.suse.com/show_bug.cgi?id=1228722 * https://bugzilla.suse.com/show_bug.cgi?id=1228723 * https://bugzilla.suse.com/show_bug.cgi?id=1228724 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228727 * https://bugzilla.suse.com/show_bug.cgi?id=1228733 * https://bugzilla.suse.com/show_bug.cgi?id=1228737 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228748 * https://bugzilla.suse.com/show_bug.cgi?id=1228754 * https://bugzilla.suse.com/show_bug.cgi?id=1228756 * https://bugzilla.suse.com/show_bug.cgi?id=1228757 * https://bugzilla.suse.com/show_bug.cgi?id=1228758 * https://bugzilla.suse.com/show_bug.cgi?id=1228764 * https://bugzilla.suse.com/show_bug.cgi?id=1228766 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 * https://bugzilla.suse.com/show_bug.cgi?id=1228849 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1228959 * https://bugzilla.suse.com/show_bug.cgi?id=1228964 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1228967 * https://bugzilla.suse.com/show_bug.cgi?id=1228971 * https://bugzilla.suse.com/show_bug.cgi?id=1228973 * https://bugzilla.suse.com/show_bug.cgi?id=1228977 * https://bugzilla.suse.com/show_bug.cgi?id=1228978 * https://bugzilla.suse.com/show_bug.cgi?id=1228979 * https://bugzilla.suse.com/show_bug.cgi?id=1228986 * https://bugzilla.suse.com/show_bug.cgi?id=1228988 * https://bugzilla.suse.com/show_bug.cgi?id=1228989 * https://bugzilla.suse.com/show_bug.cgi?id=1228991 * https://bugzilla.suse.com/show_bug.cgi?id=1228992 * https://bugzilla.suse.com/show_bug.cgi?id=1229005 * https://bugzilla.suse.com/show_bug.cgi?id=1229024 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229045 * https://bugzilla.suse.com/show_bug.cgi?id=1229046 * https://bugzilla.suse.com/show_bug.cgi?id=1229054 * https://bugzilla.suse.com/show_bug.cgi?id=1229056 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229134 * https://bugzilla.suse.com/show_bug.cgi?id=1229136 * https://bugzilla.suse.com/show_bug.cgi?id=1229154 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229160 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229168 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229170 * https://bugzilla.suse.com/show_bug.cgi?id=1229171 * https://bugzilla.suse.com/show_bug.cgi?id=1229172 * https://bugzilla.suse.com/show_bug.cgi?id=1229173 * https://bugzilla.suse.com/show_bug.cgi?id=1229174 * https://bugzilla.suse.com/show_bug.cgi?id=1229239 * https://bugzilla.suse.com/show_bug.cgi?id=1229240 * https://bugzilla.suse.com/show_bug.cgi?id=1229241 * https://bugzilla.suse.com/show_bug.cgi?id=1229243 * https://bugzilla.suse.com/show_bug.cgi?id=1229244 * https://bugzilla.suse.com/show_bug.cgi?id=1229245 * https://bugzilla.suse.com/show_bug.cgi?id=1229246 * https://bugzilla.suse.com/show_bug.cgi?id=1229247 * https://bugzilla.suse.com/show_bug.cgi?id=1229248 * https://bugzilla.suse.com/show_bug.cgi?id=1229249 * https://bugzilla.suse.com/show_bug.cgi?id=1229250 * https://bugzilla.suse.com/show_bug.cgi?id=1229251 * https://bugzilla.suse.com/show_bug.cgi?id=1229252 * https://bugzilla.suse.com/show_bug.cgi?id=1229253 * https://bugzilla.suse.com/show_bug.cgi?id=1229254 * https://bugzilla.suse.com/show_bug.cgi?id=1229255 * https://bugzilla.suse.com/show_bug.cgi?id=1229256 * https://bugzilla.suse.com/show_bug.cgi?id=1229287 * https://bugzilla.suse.com/show_bug.cgi?id=1229290 * https://bugzilla.suse.com/show_bug.cgi?id=1229291 * https://bugzilla.suse.com/show_bug.cgi?id=1229292 * https://bugzilla.suse.com/show_bug.cgi?id=1229294 * https://bugzilla.suse.com/show_bug.cgi?id=1229296 * https://bugzilla.suse.com/show_bug.cgi?id=1229297 * https://bugzilla.suse.com/show_bug.cgi?id=1229298 * https://bugzilla.suse.com/show_bug.cgi?id=1229299 * https://bugzilla.suse.com/show_bug.cgi?id=1229301 * https://bugzilla.suse.com/show_bug.cgi?id=1229303 * https://bugzilla.suse.com/show_bug.cgi?id=1229304 * https://bugzilla.suse.com/show_bug.cgi?id=1229305 * https://bugzilla.suse.com/show_bug.cgi?id=1229307 * https://bugzilla.suse.com/show_bug.cgi?id=1229309 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229313 * https://bugzilla.suse.com/show_bug.cgi?id=1229314 * https://bugzilla.suse.com/show_bug.cgi?id=1229315 * https://bugzilla.suse.com/show_bug.cgi?id=1229316 * https://bugzilla.suse.com/show_bug.cgi?id=1229317 * https://bugzilla.suse.com/show_bug.cgi?id=1229318 * https://bugzilla.suse.com/show_bug.cgi?id=1229319 * https://bugzilla.suse.com/show_bug.cgi?id=1229320 * https://bugzilla.suse.com/show_bug.cgi?id=1229327 * https://bugzilla.suse.com/show_bug.cgi?id=1229341 * https://bugzilla.suse.com/show_bug.cgi?id=1229342 * https://bugzilla.suse.com/show_bug.cgi?id=1229344 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229346 * https://bugzilla.suse.com/show_bug.cgi?id=1229347 * https://bugzilla.suse.com/show_bug.cgi?id=1229349 * https://bugzilla.suse.com/show_bug.cgi?id=1229350 * https://bugzilla.suse.com/show_bug.cgi?id=1229351 * https://bugzilla.suse.com/show_bug.cgi?id=1229353 * https://bugzilla.suse.com/show_bug.cgi?id=1229354 * https://bugzilla.suse.com/show_bug.cgi?id=1229355 * https://bugzilla.suse.com/show_bug.cgi?id=1229356 * https://bugzilla.suse.com/show_bug.cgi?id=1229357 * https://bugzilla.suse.com/show_bug.cgi?id=1229358 * https://bugzilla.suse.com/show_bug.cgi?id=1229359 * https://bugzilla.suse.com/show_bug.cgi?id=1229360 * https://bugzilla.suse.com/show_bug.cgi?id=1229365 * https://bugzilla.suse.com/show_bug.cgi?id=1229366 * https://bugzilla.suse.com/show_bug.cgi?id=1229369 * https://bugzilla.suse.com/show_bug.cgi?id=1229370 * https://bugzilla.suse.com/show_bug.cgi?id=1229373 * https://bugzilla.suse.com/show_bug.cgi?id=1229374 * https://bugzilla.suse.com/show_bug.cgi?id=1229379 * https://bugzilla.suse.com/show_bug.cgi?id=1229381 * https://bugzilla.suse.com/show_bug.cgi?id=1229382 * https://bugzilla.suse.com/show_bug.cgi?id=1229383 * https://bugzilla.suse.com/show_bug.cgi?id=1229386 * https://bugzilla.suse.com/show_bug.cgi?id=1229388 * https://bugzilla.suse.com/show_bug.cgi?id=1229390 * https://bugzilla.suse.com/show_bug.cgi?id=1229391 * https://bugzilla.suse.com/show_bug.cgi?id=1229392 * https://bugzilla.suse.com/show_bug.cgi?id=1229395 * https://bugzilla.suse.com/show_bug.cgi?id=1229398 * https://bugzilla.suse.com/show_bug.cgi?id=1229399 * https://bugzilla.suse.com/show_bug.cgi?id=1229400 * https://bugzilla.suse.com/show_bug.cgi?id=1229402 * https://bugzilla.suse.com/show_bug.cgi?id=1229403 * https://bugzilla.suse.com/show_bug.cgi?id=1229404 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229409 * https://bugzilla.suse.com/show_bug.cgi?id=1229410 * https://bugzilla.suse.com/show_bug.cgi?id=1229411 * https://bugzilla.suse.com/show_bug.cgi?id=1229413 * https://bugzilla.suse.com/show_bug.cgi?id=1229414 * https://bugzilla.suse.com/show_bug.cgi?id=1229417 * https://bugzilla.suse.com/show_bug.cgi?id=1229444 * https://bugzilla.suse.com/show_bug.cgi?id=1229451 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229480 * https://bugzilla.suse.com/show_bug.cgi?id=1229481 * https://bugzilla.suse.com/show_bug.cgi?id=1229482 * https://bugzilla.suse.com/show_bug.cgi?id=1229484 * https://bugzilla.suse.com/show_bug.cgi?id=1229485 * https://bugzilla.suse.com/show_bug.cgi?id=1229486 * https://bugzilla.suse.com/show_bug.cgi?id=1229487 * https://bugzilla.suse.com/show_bug.cgi?id=1229488 * https://bugzilla.suse.com/show_bug.cgi?id=1229489 * https://bugzilla.suse.com/show_bug.cgi?id=1229490 * https://bugzilla.suse.com/show_bug.cgi?id=1229493 * https://bugzilla.suse.com/show_bug.cgi?id=1229495 * https://bugzilla.suse.com/show_bug.cgi?id=1229496 * https://bugzilla.suse.com/show_bug.cgi?id=1229497 * https://bugzilla.suse.com/show_bug.cgi?id=1229500 * https://bugzilla.suse.com/show_bug.cgi?id=1229503 * https://bugzilla.suse.com/show_bug.cgi?id=1229707 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229743 * https://bugzilla.suse.com/show_bug.cgi?id=1229746 * https://bugzilla.suse.com/show_bug.cgi?id=1229747 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229754 * https://bugzilla.suse.com/show_bug.cgi?id=1229755 * https://bugzilla.suse.com/show_bug.cgi?id=1229756 * https://bugzilla.suse.com/show_bug.cgi?id=1229759 * https://bugzilla.suse.com/show_bug.cgi?id=1229761 * https://bugzilla.suse.com/show_bug.cgi?id=1229767 * https://bugzilla.suse.com/show_bug.cgi?id=1229781 * https://bugzilla.suse.com/show_bug.cgi?id=1229784 * https://bugzilla.suse.com/show_bug.cgi?id=1229785 * https://bugzilla.suse.com/show_bug.cgi?id=1229787 * https://bugzilla.suse.com/show_bug.cgi?id=1229788 * https://bugzilla.suse.com/show_bug.cgi?id=1229789 * https://bugzilla.suse.com/show_bug.cgi?id=1229792 * https://bugzilla.suse.com/show_bug.cgi?id=1229820 * https://bugzilla.suse.com/show_bug.cgi?id=1229827 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229837 * https://bugzilla.suse.com/show_bug.cgi?id=1229940 * https://bugzilla.suse.com/show_bug.cgi?id=1230056 * https://jira.suse.com/browse/PED-10029 * https://jira.suse.com/browse/PED-10045 * https://jira.suse.com/browse/PED-10055 * https://jira.suse.com/browse/PED-10105 * https://jira.suse.com/browse/PED-10108 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8779 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:32 -0000 Subject: SUSE-SU-2025:20032-1: moderate: Security update for avahi Message-ID: <174902799220.655.10190524069601613330@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2025:20032-1 Release Date: 2025-02-03T08:52:10Z Rating: moderate References: * bsc#1216594 * bsc#1216598 * bsc#1226586 Cross-References: * CVE-2023-38469 * CVE-2023-38471 CVSS scores: * CVE-2023-38469 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38469 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38471 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38471 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for avahi fixes the following issues: Security issues fixed: * CVE-2023-38471: Extract host name using avahi_unescape_label (bsc#1216594). * CVE-2023-38469: Reject overly long TXT resource records (bsc#1216598). Non-security issue fixed: * no longer supply bogus services to callbacks (bsc#1226586). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-35=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * avahi-debuginfo-0.8-5.1 * libavahi-client3-debuginfo-0.8-5.1 * libavahi-client3-0.8-5.1 * libavahi-common3-debuginfo-0.8-5.1 * libavahi-core7-debuginfo-0.8-5.1 * avahi-debugsource-0.8-5.1 * libavahi-core7-0.8-5.1 * avahi-0.8-5.1 * libavahi-common3-0.8-5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38469.html * https://www.suse.com/security/cve/CVE-2023-38471.html * https://bugzilla.suse.com/show_bug.cgi?id=1216594 * https://bugzilla.suse.com/show_bug.cgi?id=1216598 * https://bugzilla.suse.com/show_bug.cgi?id=1226586 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:43 -0000 Subject: SUSE-SU-2025:20052-1: important: Security update for gtk3 Message-ID: <174902770364.627.6426962719301137116@smelt2.prg2.suse.org> # Security update for gtk3 Announcement ID: SUSE-SU-2025:20052-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1228120 Cross-References: * CVE-2024-6655 CVSS scores: * CVE-2024-6655 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6655 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for gtk3 fixes the following issues: * CVE-2024-6655: Fixed library injection from current working directory (bsc#1228120). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-75=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * gtk3-schema-3.24.37+70-6.1 * gtk3-data-3.24.37+70-6.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gtk3-tools-3.24.37+70-6.1 * libgtk-3-0-debuginfo-3.24.37+70-6.1 * typelib-1_0-Gtk-3_0-3.24.37+70-6.1 * gtk3-tools-debuginfo-3.24.37+70-6.1 * libgtk-3-0-3.24.37+70-6.1 * gtk3-debugsource-3.24.37+70-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-6655.html * https://bugzilla.suse.com/show_bug.cgi?id=1228120 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:01:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:01:51 -0000 Subject: SUSE-SU-2025:20050-1: important: Security update for libarchive Message-ID: <174902771122.627.7825093569360231295@smelt2.prg2.suse.org> # Security update for libarchive Announcement ID: SUSE-SU-2025:20050-1 Release Date: 2025-02-03T08:56:22Z Rating: important References: * bsc#1225971 * bsc#1225972 Cross-References: * CVE-2024-20696 * CVE-2024-20697 CVSS scores: * CVE-2024-20696 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20696 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-20697 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for libarchive fixes the following issues: * CVE-2024-20696: Fixed out-of-bounds access in in copy_from_lzss_window_to_unp() (bsc#1225971) * CVE-2024-20697: Fixed heap based buffer overflow in rar e8 filter (bsc#1225972) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-47=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libarchive13-debuginfo-3.6.2-3.1 * libarchive-debugsource-3.6.2-3.1 * libarchive13-3.6.2-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20696.html * https://www.suse.com/security/cve/CVE-2024-20697.html * https://bugzilla.suse.com/show_bug.cgi?id=1225971 * https://bugzilla.suse.com/show_bug.cgi?id=1225972 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:05:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:05:37 -0000 Subject: SUSE-SU-2025:20042-1: important: Security update for selinux-policy Message-ID: <174902793776.655.8727169155919433663@smelt2.prg2.suse.org> # Security update for selinux-policy Announcement ID: SUSE-SU-2025:20042-1 Release Date: 2025-02-03T08:54:23Z Rating: important References: * bsc#1210717 * bsc#1215405 * bsc#1225984 * bsc#1227930 * bsc#1228247 * bsc#1229132 Affected Products: * SUSE Linux Micro 6.0 An update that has six fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: Update to version 20230523+git25.ad22dd7f: * Backport wtmpdb label change to have the same wtmpdb label as in SL Micro 6.1 (bsc#1229132) * Add auth_rw_wtmpdb_login_records to domains using auth_manage_login_records * Add auth_rw_wtmpdb_login_records to modules * Allow xdm_t to read-write to wtmpdb (bsc#1225984) * Introduce types for wtmpdb and rw interface * Introduce wtmp_file_type attribute * Revert "Add policy for wtmpdb (bsc#1210717)" Update to version 20230523+git18.f44daf8a: * Provide type for sysstat lock files (bsc#1228247) Update to version 20230523+git16.0849f54c: * allow firewalld access to /dev/random and write HW acceleration logs (bsc#1215405, bsc#1227930) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-43=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * selinux-policy-devel-20230523+git25.ad22dd7f-1.1 * selinux-policy-20230523+git25.ad22dd7f-1.1 * selinux-policy-targeted-20230523+git25.ad22dd7f-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1210717 * https://bugzilla.suse.com/show_bug.cgi?id=1215405 * https://bugzilla.suse.com/show_bug.cgi?id=1225984 * https://bugzilla.suse.com/show_bug.cgi?id=1227930 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1229132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:08:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:08:32 -0000 Subject: SUSE-SU-2025:20047-1: important: Security update for the Linux Kernel Message-ID: <174902811248.627.6227473340141388668@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20047-1 Release Date: 2025-02-03T08:56:20Z Rating: important References: * bsc#1012628 * bsc#1193454 * bsc#1194869 * bsc#1205462 * bsc#1208783 * bsc#1213123 * bsc#1214285 * bsc#1215199 * bsc#1220066 * bsc#1220252 * bsc#1220877 * bsc#1221326 * bsc#1221630 * bsc#1221645 * bsc#1221652 * bsc#1221857 * bsc#1222254 * bsc#1222335 * bsc#1222350 * bsc#1222364 * bsc#1222372 * bsc#1222387 * bsc#1222433 * bsc#1222434 * bsc#1222625 * bsc#1222633 * bsc#1222634 * bsc#1222808 * bsc#1222967 * bsc#1222973 * bsc#1223053 * bsc#1223074 * bsc#1223191 * bsc#1223395 * bsc#1223635 * bsc#1223720 * bsc#1223731 * bsc#1223742 * bsc#1223763 * bsc#1223767 * bsc#1223777 * bsc#1223803 * bsc#1224105 * bsc#1224415 * bsc#1224485 * bsc#1224496 * bsc#1224510 * bsc#1224535 * bsc#1224631 * bsc#1224636 * bsc#1224690 * bsc#1224694 * bsc#1224700 * bsc#1224711 * bsc#1225475 * bsc#1225582 * bsc#1225607 * bsc#1225718 * bsc#1225751 * bsc#1225814 * bsc#1225832 * bsc#1225838 * bsc#1225903 * bsc#1226031 * bsc#1226127 * bsc#1226502 * bsc#1226530 * bsc#1226588 * bsc#1226604 * bsc#1226743 * bsc#1226751 * bsc#1226765 * bsc#1226798 * bsc#1226801 * bsc#1226834 * bsc#1226874 * bsc#1226885 * bsc#1226920 * bsc#1227149 * bsc#1227182 * bsc#1227383 * bsc#1227437 * bsc#1227492 * bsc#1227493 * bsc#1227494 * bsc#1227618 * bsc#1227620 * bsc#1227623 * bsc#1227627 * bsc#1227634 * bsc#1227706 * bsc#1227722 * bsc#1227724 * bsc#1227725 * bsc#1227728 * bsc#1227729 * bsc#1227732 * bsc#1227733 * bsc#1227734 * bsc#1227747 * bsc#1227750 * bsc#1227754 * bsc#1227758 * bsc#1227760 * bsc#1227761 * bsc#1227764 * bsc#1227766 * bsc#1227770 * bsc#1227771 * bsc#1227772 * bsc#1227774 * bsc#1227781 * bsc#1227784 * bsc#1227785 * bsc#1227787 * bsc#1227790 * bsc#1227791 * bsc#1227792 * bsc#1227796 * bsc#1227798 * bsc#1227799 * bsc#1227802 * bsc#1227808 * bsc#1227810 * bsc#1227811 * bsc#1227812 * bsc#1227815 * bsc#1227816 * bsc#1227818 * bsc#1227820 * bsc#1227823 * bsc#1227824 * bsc#1227826 * bsc#1227828 * bsc#1227829 * bsc#1227830 * bsc#1227832 * bsc#1227833 * bsc#1227834 * bsc#1227839 * bsc#1227840 * bsc#1227846 * bsc#1227849 * bsc#1227851 * bsc#1227853 * bsc#1227863 * bsc#1227864 * bsc#1227865 * bsc#1227867 * bsc#1227869 * bsc#1227870 * bsc#1227883 * bsc#1227884 * bsc#1227891 * bsc#1227893 * bsc#1227929 * bsc#1227950 * bsc#1227957 * bsc#1227981 * bsc#1228020 * bsc#1228021 * bsc#1228192 * bsc#1228235 * bsc#1228236 * bsc#1228247 * bsc#1228321 * bsc#1228409 * bsc#1228410 * bsc#1228426 * bsc#1228427 * bsc#1228429 * bsc#1228446 * bsc#1228447 * bsc#1228449 * bsc#1228450 * bsc#1228452 * bsc#1228456 * bsc#1228457 * bsc#1228458 * bsc#1228459 * bsc#1228460 * bsc#1228462 * bsc#1228463 * bsc#1228466 * bsc#1228468 * bsc#1228469 * bsc#1228470 * bsc#1228472 * bsc#1228479 * bsc#1228480 * bsc#1228481 * bsc#1228482 * bsc#1228483 * bsc#1228484 * bsc#1228485 * bsc#1228486 * bsc#1228487 * bsc#1228489 * bsc#1228491 * bsc#1228492 * bsc#1228493 * bsc#1228494 * bsc#1228495 * bsc#1228496 * bsc#1228499 * bsc#1228500 * bsc#1228501 * bsc#1228502 * bsc#1228503 * bsc#1228505 * bsc#1228508 * bsc#1228509 * bsc#1228510 * bsc#1228511 * bsc#1228513 * bsc#1228515 * bsc#1228516 * bsc#1228518 * bsc#1228520 * bsc#1228525 * bsc#1228527 * bsc#1228530 * bsc#1228531 * bsc#1228539 * bsc#1228561 * bsc#1228563 * bsc#1228564 * bsc#1228565 * bsc#1228567 * bsc#1228568 * bsc#1228572 * bsc#1228576 * bsc#1228579 * bsc#1228580 * bsc#1228581 * bsc#1228582 * bsc#1228584 * bsc#1228586 * bsc#1228588 * bsc#1228590 * bsc#1228591 * bsc#1228599 * bsc#1228615 * bsc#1228616 * bsc#1228617 * bsc#1228625 * bsc#1228626 * bsc#1228633 * bsc#1228635 * bsc#1228636 * bsc#1228640 * bsc#1228643 * bsc#1228644 * bsc#1228646 * bsc#1228649 * bsc#1228650 * bsc#1228654 * bsc#1228655 * bsc#1228656 * bsc#1228658 * bsc#1228660 * bsc#1228662 * bsc#1228665 * bsc#1228666 * bsc#1228667 * bsc#1228672 * bsc#1228673 * bsc#1228674 * bsc#1228677 * bsc#1228680 * bsc#1228687 * bsc#1228705 * bsc#1228706 * bsc#1228707 * bsc#1228708 * bsc#1228709 * bsc#1228710 * bsc#1228718 * bsc#1228720 * bsc#1228721 * bsc#1228722 * bsc#1228723 * bsc#1228724 * bsc#1228726 * bsc#1228727 * bsc#1228733 * bsc#1228737 * bsc#1228743 * bsc#1228748 * bsc#1228754 * bsc#1228756 * bsc#1228757 * bsc#1228758 * bsc#1228764 * bsc#1228766 * bsc#1228779 * bsc#1228801 * bsc#1228849 * bsc#1228850 * bsc#1228857 * bsc#1228959 * bsc#1228964 * bsc#1228966 * bsc#1228967 * bsc#1228971 * bsc#1228973 * bsc#1228977 * bsc#1228978 * bsc#1228979 * bsc#1228986 * bsc#1228988 * bsc#1228989 * bsc#1228991 * bsc#1228992 * bsc#1229005 * bsc#1229024 * bsc#1229025 * bsc#1229042 * bsc#1229045 * bsc#1229046 * bsc#1229054 * bsc#1229056 * bsc#1229086 * bsc#1229134 * bsc#1229136 * bsc#1229154 * bsc#1229156 * bsc#1229160 * bsc#1229167 * bsc#1229168 * bsc#1229169 * bsc#1229170 * bsc#1229171 * bsc#1229172 * bsc#1229173 * bsc#1229174 * bsc#1229239 * bsc#1229240 * bsc#1229241 * bsc#1229243 * bsc#1229244 * bsc#1229245 * bsc#1229246 * bsc#1229247 * bsc#1229248 * bsc#1229249 * bsc#1229250 * bsc#1229251 * bsc#1229252 * bsc#1229253 * bsc#1229254 * bsc#1229255 * bsc#1229256 * bsc#1229287 * bsc#1229290 * bsc#1229291 * bsc#1229292 * bsc#1229294 * bsc#1229296 * bsc#1229297 * bsc#1229298 * bsc#1229299 * bsc#1229301 * bsc#1229303 * bsc#1229304 * bsc#1229305 * bsc#1229307 * bsc#1229309 * bsc#1229312 * bsc#1229313 * bsc#1229314 * bsc#1229315 * bsc#1229316 * bsc#1229317 * bsc#1229318 * bsc#1229319 * bsc#1229320 * bsc#1229327 * bsc#1229341 * bsc#1229342 * bsc#1229344 * bsc#1229345 * bsc#1229346 * bsc#1229347 * bsc#1229349 * bsc#1229350 * bsc#1229351 * bsc#1229353 * bsc#1229354 * bsc#1229355 * bsc#1229356 * bsc#1229357 * bsc#1229358 * bsc#1229359 * bsc#1229360 * bsc#1229365 * bsc#1229366 * bsc#1229369 * bsc#1229370 * bsc#1229373 * bsc#1229374 * bsc#1229379 * bsc#1229381 * bsc#1229382 * bsc#1229383 * bsc#1229386 * bsc#1229388 * bsc#1229390 * bsc#1229391 * bsc#1229392 * bsc#1229395 * bsc#1229398 * bsc#1229399 * bsc#1229400 * bsc#1229402 * bsc#1229403 * bsc#1229404 * bsc#1229407 * bsc#1229409 * bsc#1229410 * bsc#1229411 * bsc#1229413 * bsc#1229414 * bsc#1229417 * bsc#1229444 * bsc#1229451 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229480 * bsc#1229481 * bsc#1229482 * bsc#1229484 * bsc#1229485 * bsc#1229486 * bsc#1229487 * bsc#1229488 * bsc#1229489 * bsc#1229490 * bsc#1229493 * bsc#1229495 * bsc#1229496 * bsc#1229497 * bsc#1229500 * bsc#1229503 * bsc#1229707 * bsc#1229739 * bsc#1229743 * bsc#1229746 * bsc#1229747 * bsc#1229752 * bsc#1229754 * bsc#1229755 * bsc#1229756 * bsc#1229759 * bsc#1229761 * bsc#1229767 * bsc#1229781 * bsc#1229784 * bsc#1229785 * bsc#1229787 * bsc#1229788 * bsc#1229789 * bsc#1229792 * bsc#1229820 * bsc#1229827 * bsc#1229830 * bsc#1229837 * bsc#1229940 * bsc#1230056 * jsc#PED-10029 * jsc#PED-10045 * jsc#PED-10055 * jsc#PED-10105 * jsc#PED-10108 * jsc#PED-8491 * jsc#PED-8779 * jsc#PED-8954 Cross-References: * CVE-2023-52489 * CVE-2023-52581 * CVE-2023-52668 * CVE-2023-52688 * CVE-2023-52859 * CVE-2023-52885 * CVE-2023-52886 * CVE-2023-52887 * CVE-2023-52889 * CVE-2024-26590 * CVE-2024-26631 * CVE-2024-26637 * CVE-2024-26668 * CVE-2024-26669 * CVE-2024-26677 * CVE-2024-26682 * CVE-2024-26683 * CVE-2024-26735 * CVE-2024-26808 * CVE-2024-26809 * CVE-2024-26812 * CVE-2024-26835 * CVE-2024-26837 * CVE-2024-26849 * CVE-2024-26851 * CVE-2024-26976 * CVE-2024-27010 * CVE-2024-27011 * CVE-2024-27024 * CVE-2024-27049 * CVE-2024-27050 * CVE-2024-27079 * CVE-2024-27403 * CVE-2024-27433 * CVE-2024-27437 * CVE-2024-31076 * CVE-2024-35855 * CVE-2024-35897 * CVE-2024-35902 * CVE-2024-35913 * CVE-2024-35939 * CVE-2024-35949 * CVE-2024-36270 * CVE-2024-36286 * CVE-2024-36288 * CVE-2024-36489 * CVE-2024-36881 * CVE-2024-36907 * CVE-2024-36929 * CVE-2024-36933 * CVE-2024-36939 * CVE-2024-36970 * CVE-2024-36979 * CVE-2024-38563 * CVE-2024-38609 * CVE-2024-38662 * CVE-2024-39476 * CVE-2024-39483 * CVE-2024-39484 * CVE-2024-39486 * CVE-2024-39488 * CVE-2024-39489 * CVE-2024-39491 * CVE-2024-39493 * CVE-2024-39497 * CVE-2024-39499 * CVE-2024-39500 * CVE-2024-39501 * CVE-2024-39505 * CVE-2024-39506 * CVE-2024-39508 * CVE-2024-39509 * CVE-2024-39510 * CVE-2024-40899 * CVE-2024-40900 * CVE-2024-40902 * CVE-2024-40903 * CVE-2024-40904 * CVE-2024-40905 * CVE-2024-40909 * CVE-2024-40910 * CVE-2024-40911 * CVE-2024-40912 * CVE-2024-40913 * CVE-2024-40916 * CVE-2024-40920 * CVE-2024-40921 * CVE-2024-40922 * CVE-2024-40924 * CVE-2024-40926 * CVE-2024-40927 * CVE-2024-40929 * CVE-2024-40930 * CVE-2024-40932 * CVE-2024-40934 * CVE-2024-40936 * CVE-2024-40938 * CVE-2024-40939 * CVE-2024-40941 * CVE-2024-40942 * CVE-2024-40943 * CVE-2024-40944 * CVE-2024-40945 * CVE-2024-40954 * CVE-2024-40956 * CVE-2024-40957 * CVE-2024-40958 * CVE-2024-40959 * CVE-2024-40962 * CVE-2024-40964 * CVE-2024-40967 * CVE-2024-40976 * CVE-2024-40977 * CVE-2024-40978 * CVE-2024-40981 * CVE-2024-40982 * CVE-2024-40984 * CVE-2024-40987 * CVE-2024-40988 * CVE-2024-40989 * CVE-2024-40990 * CVE-2024-40992 * CVE-2024-40994 * CVE-2024-40995 * CVE-2024-40997 * CVE-2024-41000 * CVE-2024-41001 * CVE-2024-41002 * CVE-2024-41004 * CVE-2024-41007 * CVE-2024-41009 * CVE-2024-41010 * CVE-2024-41012 * CVE-2024-41015 * CVE-2024-41016 * CVE-2024-41020 * CVE-2024-41022 * CVE-2024-41024 * CVE-2024-41025 * CVE-2024-41028 * CVE-2024-41032 * CVE-2024-41035 * CVE-2024-41036 * CVE-2024-41037 * CVE-2024-41038 * CVE-2024-41039 * CVE-2024-41040 * CVE-2024-41041 * CVE-2024-41044 * CVE-2024-41045 * CVE-2024-41048 * CVE-2024-41049 * CVE-2024-41050 * CVE-2024-41051 * CVE-2024-41056 * CVE-2024-41057 * CVE-2024-41058 * CVE-2024-41059 * CVE-2024-41060 * CVE-2024-41061 * CVE-2024-41062 * CVE-2024-41063 * CVE-2024-41064 * CVE-2024-41065 * CVE-2024-41066 * CVE-2024-41068 * CVE-2024-41069 * CVE-2024-41070 * CVE-2024-41071 * CVE-2024-41072 * CVE-2024-41073 * CVE-2024-41074 * CVE-2024-41075 * CVE-2024-41076 * CVE-2024-41078 * CVE-2024-41079 * CVE-2024-41080 * CVE-2024-41081 * CVE-2024-41084 * CVE-2024-41087 * CVE-2024-41088 * CVE-2024-41089 * CVE-2024-41092 * CVE-2024-41093 * CVE-2024-41094 * CVE-2024-41095 * CVE-2024-41096 * CVE-2024-41097 * CVE-2024-41098 * CVE-2024-42064 * CVE-2024-42069 * CVE-2024-42070 * CVE-2024-42073 * CVE-2024-42074 * CVE-2024-42076 * CVE-2024-42077 * CVE-2024-42079 * CVE-2024-42080 * CVE-2024-42082 * CVE-2024-42085 * CVE-2024-42086 * CVE-2024-42087 * CVE-2024-42089 * CVE-2024-42090 * CVE-2024-42092 * CVE-2024-42093 * CVE-2024-42095 * CVE-2024-42096 * CVE-2024-42097 * CVE-2024-42098 * CVE-2024-42101 * CVE-2024-42104 * CVE-2024-42105 * CVE-2024-42106 * CVE-2024-42107 * CVE-2024-42109 * CVE-2024-42110 * CVE-2024-42113 * CVE-2024-42114 * CVE-2024-42115 * CVE-2024-42117 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42121 * CVE-2024-42122 * CVE-2024-42124 * CVE-2024-42125 * CVE-2024-42126 * CVE-2024-42127 * CVE-2024-42130 * CVE-2024-42131 * CVE-2024-42132 * CVE-2024-42133 * CVE-2024-42136 * CVE-2024-42137 * CVE-2024-42138 * CVE-2024-42139 * CVE-2024-42141 * CVE-2024-42142 * CVE-2024-42143 * CVE-2024-42144 * CVE-2024-42145 * CVE-2024-42147 * CVE-2024-42148 * CVE-2024-42152 * CVE-2024-42153 * CVE-2024-42155 * CVE-2024-42156 * CVE-2024-42157 * CVE-2024-42158 * CVE-2024-42159 * CVE-2024-42161 * CVE-2024-42162 * CVE-2024-42223 * CVE-2024-42224 * CVE-2024-42225 * CVE-2024-42226 * CVE-2024-42227 * CVE-2024-42228 * CVE-2024-42229 * CVE-2024-42230 * CVE-2024-42232 * CVE-2024-42236 * CVE-2024-42237 * CVE-2024-42238 * CVE-2024-42239 * CVE-2024-42240 * CVE-2024-42241 * CVE-2024-42244 * CVE-2024-42245 * CVE-2024-42246 * CVE-2024-42247 * CVE-2024-42250 * CVE-2024-42253 * CVE-2024-42259 * CVE-2024-42268 * CVE-2024-42269 * CVE-2024-42270 * CVE-2024-42271 * CVE-2024-42274 * CVE-2024-42276 * CVE-2024-42277 * CVE-2024-42278 * CVE-2024-42279 * CVE-2024-42280 * CVE-2024-42281 * CVE-2024-42283 * CVE-2024-42284 * CVE-2024-42285 * CVE-2024-42286 * CVE-2024-42287 * CVE-2024-42288 * CVE-2024-42289 * CVE-2024-42290 * CVE-2024-42291 * CVE-2024-42292 * CVE-2024-42295 * CVE-2024-42298 * CVE-2024-42301 * CVE-2024-42302 * CVE-2024-42303 * CVE-2024-42308 * CVE-2024-42309 * CVE-2024-42310 * CVE-2024-42311 * CVE-2024-42312 * CVE-2024-42313 * CVE-2024-42314 * CVE-2024-42315 * CVE-2024-42316 * CVE-2024-42318 * CVE-2024-42319 * CVE-2024-42320 * CVE-2024-42322 * CVE-2024-43816 * CVE-2024-43817 * CVE-2024-43818 * CVE-2024-43819 * CVE-2024-43821 * CVE-2024-43823 * CVE-2024-43824 * CVE-2024-43825 * CVE-2024-43826 * CVE-2024-43829 * CVE-2024-43830 * CVE-2024-43831 * CVE-2024-43833 * CVE-2024-43834 * CVE-2024-43837 * CVE-2024-43839 * CVE-2024-43840 * CVE-2024-43841 * CVE-2024-43842 * CVE-2024-43846 * CVE-2024-43847 * CVE-2024-43849 * CVE-2024-43850 * CVE-2024-43851 * CVE-2024-43853 * CVE-2024-43854 * CVE-2024-43855 * CVE-2024-43856 * CVE-2024-43858 * CVE-2024-43860 * CVE-2024-43861 * CVE-2024-43863 * CVE-2024-43864 * CVE-2024-43866 * CVE-2024-43867 * CVE-2024-43871 * CVE-2024-43872 * CVE-2024-43873 * CVE-2024-43874 * CVE-2024-43875 * CVE-2024-43876 * CVE-2024-43877 * CVE-2024-43879 * CVE-2024-43880 * CVE-2024-43881 * CVE-2024-43882 * CVE-2024-43883 * CVE-2024-43884 * CVE-2024-43885 * CVE-2024-43889 * CVE-2024-43892 * CVE-2024-43893 * CVE-2024-43894 * CVE-2024-43895 * CVE-2024-43897 * CVE-2024-43899 * CVE-2024-43900 * CVE-2024-43902 * CVE-2024-43903 * CVE-2024-43905 * CVE-2024-43906 * CVE-2024-43907 * CVE-2024-43908 * CVE-2024-43909 * CVE-2024-43911 * CVE-2024-43912 * CVE-2024-44931 * CVE-2024-44938 * CVE-2024-44939 CVSS scores: * CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52489 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52887 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-26837 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27024 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41020 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41022 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41024 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41028 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41057 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41057 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41058 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41063 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41065 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42086 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42093 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42097 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42105 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42133 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42136 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42143 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-42144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42155 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42236 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42253 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42271 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42274 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43881 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43883 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43885 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44938 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 383 vulnerabilities, contains eight features and has 87 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326). * CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287). * CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252). * CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350). * CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633). * CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808). * CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973). * CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742). * CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711). * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for wr-protected (bsc#1225718). * CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604). * CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798). * CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781). * CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784). * CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840). * CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810). * CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811). * CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812). * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823). * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021). * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460). * CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496). * CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518). * CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499). * CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468). * CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462). * CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459). * CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643). * CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646). * CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457). * CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672). * CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work before notifier (bsc#1228505). * CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568). * CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500). * CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503). * CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727). * CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754). * CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756). * CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986). * CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one movable task" (bsc#1228978). * CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init() (bsc#1229402). * CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init() (bsc#1229404). * CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379). * CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353). * CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316). * CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342). * CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496). * CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827). The following non-security bugs were fixed: * ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes). * ACPI: battery: create alarm sysfs attribute atomically (stable-fixes). * ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git- fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes). * ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes). * ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable- fixes). * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes). * ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes). * ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable- fixes). * ALSA: hda/tas2781: Use correct endian conversion (git-fixes). * ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes). * ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git- fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Skip event type filtering for UMP events (git-fixes). * ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes). * ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes). * ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes). * ALSA: timer: Relax start tick time check for slave timer elements (git- fixes). * ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable- fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable- fixes). * ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes). * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes). * ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: amd: Fix for acp init sequence (git-fixes). * ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes). * ASoC: SOF: mediatek: Add missing board compatible (stable-fixes). * ASoC: allow module autoloading for table board_ids (stable-fixes). * ASoC: allow module autoloading for table db1200_pids (stable-fixes). * ASoC: amd: acp: fix module autoloading (git-fixes). * ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable- fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes). * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Add error handling to pair_device() (git-fixes). * Bluetooth: SMP: Fix assumption of Central always being Initiator (git- fixes). * Bluetooth: bnep: Fix out-of-bound access (stable-fixes). * Bluetooth: btintel: Fail setup on error (git-fixes). * Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable- fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable- fixes). * Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes). * Bluetooth: hci_core: Fix LE quote calculation (git-fixes). * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes). * Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes). * Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes). * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git- fixes). * Drop libata patch that caused a regression (bsc#1229054) * Fix build errors without patches.kabi (bsc#1226502) * HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * Input: MT - limit max slots (stable-fixes). * Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056). * Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes). * Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes). * KVM: Always flush async #PF workqueue when vCPU is being destroyed (git- fixes). * KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git- fixes). * KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869). * KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199). * KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes). * KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes). * KVM: Stop processing _all_ memslots when "null" mmu_notifier handler is found (git-fixes). * KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes). * KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes). * KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git- fixes). * KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git- fixes). * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes). * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git- fixes). * KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes). * KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes). * KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes) * KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes). * KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes). * KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes). * KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes). * KVM: arm64: vgic-v4: Restore pending state on host userspace write (git- fixes). * KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes). * KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes). * KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes). * KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes). * KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes). * KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes). * KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes). * KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * KVM: s390: fix validity interception issue when gisa is switched off (git- fixes bsc#1229167). * KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes). * KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes). * Move upstreamed powerpc patches into sorted section * Move upstreamed sound patches into sorted section * Moved upstreamed ASoC patch into sorted section * NFSD: Support write delegations in LAYOUTGET (git-fixes). * NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes). * PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes). * RDMA/cache: Release GID table even if leak is detected (git-fixes) * RDMA/device: Return error earlier if port in not valid (git-fixes) * RDMA/hns: Check atomic wr length (git-fixes) * RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes) * RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes) * RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes) * RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes) * RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes) * RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes) * RDMA/hns: Fix unmatch exception handling when init eq table fails (git- fixes) * RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes) * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes). * RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes) * RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes) * RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes) * RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes) * RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes) * README.BRANCH: Add Petr Tesarik as branch maintainer * Revert "ALSA: firewire-lib: obsolete workqueue for period update" (bsc#1208783). * Revert "ALSA: firewire-lib: operate for period elapse event in process context" (bsc#1208783). * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes). * Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git- fixes). * Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes). * Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD" (git-fixes). * Revert "usb: gadget: uvc: cleanup request when not in correct state" (stable-fixes). * Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes). * SUNRPC: Fix a race to wake a sync task (git-fixes). * SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * Squashfs: fix variable overflow triggered by sysbot (git-fixes). * USB: serial: debug: do not echo input by default (stable-fixes). * Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834) * Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920) * Update patch refefernce for MFD patch (jsc#PED-10029) * Update patch reference for MD patch (jsc#PED-10029 jsc#PED-10045) * Update patch reference for SPI patch (jsc#PED-10105) * Update patch reference for iwlwifi fix (jsc#PED-10055) * Update patch reference of USB patch (jsc#PED-10108) * Update patch references for ASoC regression fixes (bsc#1229045 bsc#1229046) * afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes). * apparmor: unpack transition table if dfa is not present (bsc#1226031). * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: barrier: Restore spec_bar() macro (git-fixes) * arm64: cputype: Add Cortex-A720 definitions (git-fixes) * arm64: cputype: Add Cortex-A725 definitions (git-fixes) * arm64: cputype: Add Cortex-X1C definitions (git-fixes) * arm64: cputype: Add Cortex-X3 definitions (git-fixes) * arm64: cputype: Add Cortex-X4 definitions (git-fixes) * arm64: cputype: Add Cortex-X925 definitions (git-fixes) * arm64: cputype: Add Neoverse-V3 definitions (git-fixes) * arm64: dts: imx8mp: Add NPU Node (git-fixes) * arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes) * arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes) * arm64: dts: imx8mp: add HDMI power-domains (git-fixes) * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes) * arm64: errata: Expand speculative SSBS workaround (git-fixes) * arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files. * arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git- fixes) * ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable- fixes). * ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable- fixes). * blacklist.conf: Add libata upstream revert entry (bsc#1229054) * blacklist.conf: printk/sysctl: breaks kernel without pre-requisite patches (bsc#1229025) * bnxt_re: Fix imm_data endianness (git-fixes) * bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes) * bpf, lpm: Fix check prefixlen before walking trie (git-fixes). * bpf/tests: Remove duplicate JSGT tests (git-fixes). * bpf: Add crosstask check to __bpf_get_stack (git-fixes). * bpf: Detect IP == ksym.end as part of BPF program (git-fixes). * bpf: Ensure proper register state printing for cond jumps (git-fixes). * bpf: Fix a few selftest failures due to llvm18 change (git-fixes). * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903). * bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes). * bpf: Fix kfunc callback register type handling (git-fixes). * bpf: Fix prog_array_map_poke_run map poke update (git-fixes). * bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes). * bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git- fixes). * bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes). * bpf: Set uattr->batch.count as zero before batched update or deletion (git- fixes). * bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git- fixes). * bpf: enforce precision of R0 on callback return (git-fixes). * bpf: extract bpf_ctx_convert_map logic and make it more reusable (git- fixes). * bpf: fix control-flow graph checking in privileged mode (git-fixes). * bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes). * bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes). * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes). * bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git- fixes). * bpftool: Align output skeleton ELF code (git-fixes). * bpftool: Fix -Wcast-qual warning (git-fixes). * bpftool: Silence build warning about calloc() (git-fixes). * bpftool: mark orphaned programs during prog show (git-fixes). * btrfs: add a btrfs_finish_ordered_extent helper (git-fixes). * btrfs: add a is_data_bbio helper (git-fixes). * btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes). * btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321). * btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes). * btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes). * btrfs: factor out a can_finish_ordered_extent helper (git-fixes). * btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes). * btrfs: fix double inode unlock for direct IO sync writes (git-fixes). * btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes). * btrfs: fix leak of qgroup extent records after transaction abort (git- fixes). * btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git- fixes). * btrfs: limit write bios to a single ordered extent (git-fixes). * btrfs: make btrfs_finish_ordered_extent() return void (git-fixes). * btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes). * btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes). * btrfs: open code end_extent_writepage in end_bio_extent_writepage (git- fixes). * btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes). * btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes). * btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes). * btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes). * btrfs: remove btrfs_add_ordered_extent (git-fixes). * btrfs: rename err to ret in btrfs_direct_write() (git-fixes). * btrfs: uninline some static inline helpers from tree-log.h (git-fixes). * btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git- fixes). * btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes). * btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes). * btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete direct writes (git- fixes). * btrfs: use irq safe locking when running and adding delayed iputs (git- fixes). * cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand- mode (bsc#1229245). * cachefiles: add missing lock protection when polling (bsc#1229256). * cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244). * cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249). * cachefiles: cancel all requests for the object that is being dropped (bsc#1229255). * cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251). * cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246). * cachefiles: introduce object ondemand state (bsc#1229239). * cachefiles: make on-demand read killable (bsc#1229252). * cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243). * cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250). * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253). * cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248). * cachefiles: resend an open request if the read request's object is closed (bsc#1229241). * cachefiles: stop sending new request when dropping object (bsc#1229254). * can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes). * can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * ceph: periodically flush the cap releases (bsc#1230056). * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801). * cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254). * cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254). * cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254). * cgroup: Remove unnecessary list_empty() (bsc#1222254). * cgroup: preserve KABI of cgroup_root (bsc#1222254). * char: xillybus: Check USB endpoints when probing device (git-fixes). * char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes). * char: xillybus: Refine workqueue handling (git-fixes). * check-for-config-changes: ignore also GCC_ASM_GOTO_OUTPUT_BROKEN Mainline commit f2f6a8e88717 ("init/Kconfig: remove CONFIG_GCC_ASM_GOTO_OUTPUT_WORKAROUND") replaced GCC_ASM_GOTO_OUTPUT_WORKAROUND with GCC_ASM_GOTO_OUTPUT_BROKEN. Ignore both when checking config changes. * clk: en7523: fix rate divider for slic and spi clocks (git-fixes). * clk: qcom: Park shared RCGs upon registration (git-fixes). * clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git- fixes). * clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git- fixes). * clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git- fixes). * clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes). * clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes). * clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes). * clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes). * clocksource/drivers/sh_cmt: Address race condition for clock events (stable- fixes). * config.sh: generate and install compile_commands.json (bsc#1228971) This file contains the command line options used to compile every C file. It's useful for the livepatching team. * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * cxl/region: Move cxl_dpa_to_region() work to the region driver (bsc#1228472) * dev/parport: fix the array out-of-bounds risk (stable-fixes). * device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes). * dmaengine: dw: Add memory bus width verification (git-fixes). * dmaengine: dw: Add peripheral bus width verification (git-fixes). * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes). * driver core: Fix uevent_show() vs driver detach race (git-fixes). * drm/admgpu: fix dereferencing null pointer context (stable-fixes). * drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes). * drm/amd/display: Add null checker before passing variables (stable-fixes). * drm/amd/display: Adjust cursor position (git-fixes). * drm/amd/display: Check for NULL pointer (stable-fixes). * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable- fixes). * drm/amd/display: avoid using null object of framebuffer (git-fixes). * drm/amd/display: fix cursor offset on rotation 180 (git-fixes). * drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes). * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable- fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes). * drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable- fixes). * drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes). * drm/amdgpu: Actually check flags for all context ops (stable-fixes). * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes). * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes). * drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes). * drm/amdgpu: Validate TA binary size (stable-fixes). * drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * drm/amdgpu: fix potential resource leak warning (stable-fixes). * drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable- fixes). * drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes). * drm/client: fix null pointer dereference in drm_client_modeset_probe (git- fixes). * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes). * drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes). * drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes). * drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes). * drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes). * drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes). * drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git- fixes). * drm/lima: set gp bus_stop bit before hard reset (stable-fixes). * drm/mediatek/dp: Fix spurious kfree() (git-fixes). * drm/msm/dp: fix the max supported bpp logic (git-fixes). * drm/msm/dp: reset the link phy params before link training (git-fixes). * drm/msm/dpu: capture snapshot on the first commit_done timeout (stable- fixes). * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes). * drm/msm/dpu: do not play tricks with debug macros (git-fixes). * drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes). * drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes). * drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable- fixes). * drm/msm/dpu: take plane rotation into account for wide planes (git-fixes). * drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes). * drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable- fixes). * drm/msm/mdss: Rename path references to mdp_path (stable-fixes). * drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes). * drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes). * drm/nouveau: prime: fix refcount underflow (git-fixes). * drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes). * drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024). * drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes). * drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes). * drm/virtio: Fix type of dma-fence context variable (git-fixes). * drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes). * drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes). * drm/vmwgfx: Fix prime with external buffers (git-fixes). * efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes). * evm: do not copy up 'security.evm' xattr (git-fixes). * firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes). * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455). * fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456). * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git- fixes). * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git- fixes). * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git- fixes). * gfs2: setattr_chown: Add missing initialization (git-fixes). * gpio: mlxbf3: Support shutdown() function (git-fixes). * gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable- fixes). * gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes). * hwmon: (ltc2992) Avoid division by zero (stable-fixes). * hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes). * hwmon: (pc87360) Bounds check data->innr usage (stable-fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: riic: avoid potential division by zero (stable-fixes). * i2c: smbus: Improve handling of stuck alerts (git-fixes). * i2c: smbus: Send alert notifications to all devices if source not found (git-fixes). * i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes). * i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable- fixes). * i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable- fixes). * i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes). * ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737). * io_uring/advise: support 64-bit lengths (git-fixes). * io_uring: Drop per-ctx dummy_ubuf (git-fixes). * io_uring: Fix probe of disabled operations (git-fixes). * io_uring: fix io_match_task must_hold (git-fixes). * io_uring: tighten task exit cancellations (git-fixes). * iommu/amd: Convert comma to semicolon (git-fixes). * iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes). * iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git- fixes). * ip6_tunnel: Fix broken GRO (bsc#1229444). * ipv6: sr: fix incorrect unregister order (git-fixes). * irqdomain: Fixed unbalanced fwnode get and put (git-fixes). * jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes). * jfs: define xtree root and page independently (git-fixes). * jfs: fix null ptr deref in dtInsertEntry (git-fixes). * jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git- fixes). * jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes). * jump_label: Fix the fix, brown paper bags galore (git-fixes). * jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git- fixes). * kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes). * kABI workaround for sound core UMP conversion (stable-fixes). * kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783) * kabi/severity: add nvme common code The nvme common code is also allowed to change the data structures, there are only internal users. * kcov: properly check for softirq context (git-fixes). * kernel-binary: generate and install compile_commands.json (bsc#1228971) * kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134). * kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git- fixes). * kprobes: Fix to check symbol prefixes correctly (git-fixes). * kprobes: Prohibit probing on CFI preamble symbol (git-fixes). * kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168). * libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes). * libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git- fixes). * libbpf: Fix faccessat() usage on Android (git-fixes). * libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395). * md/md-bitmap: fix writing non bitmap pages (git-fixes). * md/raid1: set max_sectors during early return from choose_slow_rdev() (git- fixes). * md/raid1: support read error check (git-fixes). * md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes). * md/raid5: fix spares errors about rcu usage (git-fixes). * md/raid5: recheck if reshape has finished with device_lock held (git-fixes). * md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git- fixes). * md: add a mddev_add_trace_msg helper (git-fixes). * md: add check for sleepers in md_wakeup_thread() (git-fixes). * md: change the return value type of md_write_start to void (git-fixes). * md: do not account sync_io if iostats of the disk is disabled (git-fixes). * md: do not delete safemode_timer in mddev_suspend (git-fixes). * md: factor out a helper exceed_read_errors() to check read_errors (git- fixes). * md: fix a suspicious RCU usage warning (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: amphion: Remove lock in s_ctrl callback (stable-fixes). * media: drivers/media/dvb-core: copy user arrays safely (stable-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes). * media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes). * media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes). * media: uvcvideo: Ignore empty TS packets (stable-fixes). * media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes). * media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes). * memcg: protect concurrent access to mem_cgroup_idr (git-fixes). * memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes). * memory: tegra: Skip SID programming if SID registers are not set (stable- fixes). * minmax: add a few more MIN_T/MAX_T users (bsc#1229024). * minmax: avoid overly complicated constant expressions in VM code (bsc#1229024). * minmax: do not use max() in situations that want a C constant expression (bsc#1229024). * minmax: fix up min3() and max3() too (bsc#1229024). * minmax: improve macro expansion and type checking (bsc#1229024). * minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024). * minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024). * minmax: simplify min()/max()/clamp() implementation (bsc#1229024). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes). * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes). * mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes). * net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451). * net/iucv: fix use after free in iucv_sock_close() (bsc#1228973). * net/rds: fix possible cp null dereference (git-fixes). * net/sched: initialize noop_qdisc owner (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes). * net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757). * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: missing check virtio (git-fixes). * net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes). * net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes). * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462). * nfc: pn533: Add poll mod list filling check (git-fixes). * nfs: do not invalidate dentries on transient errors (git-fixes). * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * nfs: make the rpc_stat per net namespace (git-fixes). * nfs: pass explicit offset/count to trace events (git-fixes). * nfs: propagate readlink errors in nfs_symlink_filler (git-fixes). * nouveau/firmware: use dma non-coherent allocator (git-fixes). * nvme-multipath: find NUMA path only for online numa-node (git-fixes). * nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706). * nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706). * nvme-pci: Fix the instructions for disabling power management (git-fixes). * nvme-pci: add missing condition check for existence of mapped data (git- fixes). * nvme-pci: do not directly handle subsys reset fallout (bsc#1220066). * nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857). * nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857). * nvme-tcp: check for invalidated or revoked key (bsc#1221857). * nvme-tcp: sanitize TLS key handling (bsc#1221857). * nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857). * nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes). * nvme: avoid double free special payload (git-fixes). * nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git- fixes). * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * nvme: split off TLS sysfs attributes into a separate group (bsc#1221857). * nvme: tcp: remove unnecessary goto statement (bsc#1221857). * nvme_core: scan namespaces asynchronously (bsc#1224105). * nvmet-auth: fix nvmet_auth hash error handling (git-fixes). * nvmet: always initialize cqe.result (git-fixes). * nvmet: do not return 'reserved' for empty TSAS values (git-fixes). * nvmet: fix a possible leak when destroy a ctrl during qp establishment (git- fixes). * nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes). * pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git- fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779). * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779). * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779). * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779). * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779). * platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes). * platform/x86: lg-laptop: fix %s null argument warning (stable-fixes). * power: supply: axp288_charger: Fix constant_charge_voltage writes (git- fixes). * power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes). * power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869). * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869). * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869). * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869). * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869). * printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607). * reiserfs: fix uninit-value in comp_keys (git-fixes). * rtc: nct3018y: fix possible NULL dereference (stable-fixes). * s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171). * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173). * s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452). * s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174). * s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172). * s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172). * s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720). * s390/pkey: introduce dynamic debugging for pkey (bsc#1228720). * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169). * s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170). * samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes). * samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes). * sbitmap: use READ_ONCE to access map->word (stable-fixes). * scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857). * scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857). * scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857). * scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857). * scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857). * scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857). * scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857). * scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Indent help text (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes). * selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903). * selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes). * selftests/bpf: Add netkit to tc_redirect selftest (git-fixes). * selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes). * selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes). * selftests/bpf: Fix erroneous bitmask operation (git-fixes). * selftests/bpf: Fix issues in setup_classid_environment() (git-fixes). * selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes). * selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes). * selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes). * selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes). * selftests/bpf: Make linked_list failure test more robust (git-fixes). * selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git- fixes). * selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes). * selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes). * selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes). * selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git- fixes). * selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes). * selftests/bpf: satisfy compiler by having explicit return in btf test (git- fixes). * serial: core: check uartclk for zero to avoid divide by zero (stable-fixes). * soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes). * soc: qcom: pmic_glink: Actually communicate when remote goes down (git- fixes). * soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes). * spi: Add empty versions of ACPI functions (stable-fixes). * spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes). * spi: microchip-core: switch to use modern name (stable-fixes). * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes). * spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes). * squashfs: squashfs_read_data need to check if the length is 0 (git-fixes). * ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes). * staging: iio: resolver: ad2s1210: fix use before initialization (stable- fixes). * staging: ks7010: disable bh on tx_dev_lock (stable-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849). * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes). * swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git- fixes). * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes). * thermal/drivers/broadcom: Fix race between removal and clock disable (git- fixes). * thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix timing issue with parallel threads in perf bench wake-up- parallel (bsc#1227747). * tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes). * tools/resolve_btfids: Fix cross-compilation to non-host endianness (git- fixes). * tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git- fixes). * tools/resolve_btfids: fix build with musl libc (git-fixes). * trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes). * tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * tty: atmel_serial: use the correct RTS flag (git-fixes). * tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git- fixes). * usb: cdnsp: fix for Link TRB with TC (git-fixes). * usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes). * usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usb: gadget: core: Check for unset descriptor (git-fixes). * usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes). * usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes). * usb: gadget: u_serial: Set start_delayed during suspend (git-fixes). * usb: gadget: uvc: cleanup request when not in correct state (stable-fixes). * usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes). * usb: typec: fsa4480: Check if the chip is really there (git-fixes). * usb: typec: fsa4480: Relax CHIP_ID check (git-fixes). * usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes). * usb: typec: fsa4480: rework mux & switch setup to handle more states (git- fixes). * usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes). * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes). * vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * vhost/vsock: always initialize seqpacket_allow (git-fixes). * vhost: Release worker mutex during flushes (git-fixes). * vhost: Use virtqueue mutex for swapping worker (git-fixes). * virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes). * virtio-crypto: handle config changed by work queue (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtiofs: forbid newlines in tags (bsc#1229940). * wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable- fixes). * wifi: ath12k: fix soft lockup on suspend (git-fixes). * wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes). * wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes). * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes). * wifi: mac80211: use monitor sdata with driver only if desired (git-fixes). * wifi: mwifiex: duplicate static structs used in driver instances (git- fixes). * wifi: nl80211: disallow setting special AP channel widths (stable-fixes). * wifi: nl80211: do not give key data to userspace (stable-fixes). * wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes). * wifi: wfx: repair open network AP mode (git-fixes). * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454). * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454). * x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git- fixes). * x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes). * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes). * x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes). * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes). * x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git- fixes). * x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes). * x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes). * x86/numa: Introduce numa_fill_memblks() (git-fixes). * x86/pci: Skip early E820 check for ECAM region (git-fixes). * x86/xen: Convert comma to semicolon (git-fixes). * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes). * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * xfs: allow cross-linking special files without project quota (git-fixes). * xfs: allow symlinks with short remote targets (bsc#1229160). * xfs: allow unlinked symlinks and dirs with zero size (git-fixes). * xfs: attr forks require attr, not attr2 (git-fixes). * xfs: convert comma to semicolon (git-fixes). * xfs: do not use current->journal_info (git-fixes). * xfs: fix unlink vs cluster buffer instantiation race (git-fixes). * xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes). * xfs: journal geometry is not properly bounds checked (git-fixes). * xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes). * xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes). * xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git- fixes). * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes). * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes). * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-63=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-63=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-10.1 * kernel-source-rt-6.4.0-10.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-10.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-debuginfo-6.4.0-10.1 * kernel-livepatch-6_4_0-10-rt-1-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-1-1.1 * kernel-rt-debugsource-6.4.0-10.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-1-1.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-10.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-debuginfo-6.4.0-10.1 * kernel-rt-devel-6.4.0-10.1 * kernel-rt-debugsource-6.4.0-10.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52489.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52668.html * https://www.suse.com/security/cve/CVE-2023-52688.html * https://www.suse.com/security/cve/CVE-2023-52859.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2023-52886.html * https://www.suse.com/security/cve/CVE-2023-52887.html * https://www.suse.com/security/cve/CVE-2023-52889.html * https://www.suse.com/security/cve/CVE-2024-26590.html * https://www.suse.com/security/cve/CVE-2024-26631.html * https://www.suse.com/security/cve/CVE-2024-26637.html * https://www.suse.com/security/cve/CVE-2024-26668.html * https://www.suse.com/security/cve/CVE-2024-26669.html * https://www.suse.com/security/cve/CVE-2024-26677.html * https://www.suse.com/security/cve/CVE-2024-26682.html * https://www.suse.com/security/cve/CVE-2024-26683.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26809.html * https://www.suse.com/security/cve/CVE-2024-26812.html * https://www.suse.com/security/cve/CVE-2024-26835.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-26849.html * https://www.suse.com/security/cve/CVE-2024-26851.html * https://www.suse.com/security/cve/CVE-2024-26976.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-27011.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-27049.html * https://www.suse.com/security/cve/CVE-2024-27050.html * https://www.suse.com/security/cve/CVE-2024-27079.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-27433.html * https://www.suse.com/security/cve/CVE-2024-27437.html * https://www.suse.com/security/cve/CVE-2024-31076.html * https://www.suse.com/security/cve/CVE-2024-35855.html * https://www.suse.com/security/cve/CVE-2024-35897.html * https://www.suse.com/security/cve/CVE-2024-35902.html * https://www.suse.com/security/cve/CVE-2024-35913.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36270.html * https://www.suse.com/security/cve/CVE-2024-36286.html * https://www.suse.com/security/cve/CVE-2024-36288.html * https://www.suse.com/security/cve/CVE-2024-36489.html * https://www.suse.com/security/cve/CVE-2024-36881.html * https://www.suse.com/security/cve/CVE-2024-36907.html * https://www.suse.com/security/cve/CVE-2024-36929.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-36939.html * https://www.suse.com/security/cve/CVE-2024-36970.html * https://www.suse.com/security/cve/CVE-2024-36979.html * https://www.suse.com/security/cve/CVE-2024-38563.html * https://www.suse.com/security/cve/CVE-2024-38609.html * https://www.suse.com/security/cve/CVE-2024-38662.html * https://www.suse.com/security/cve/CVE-2024-39476.html * https://www.suse.com/security/cve/CVE-2024-39483.html * https://www.suse.com/security/cve/CVE-2024-39484.html * https://www.suse.com/security/cve/CVE-2024-39486.html * https://www.suse.com/security/cve/CVE-2024-39488.html * https://www.suse.com/security/cve/CVE-2024-39489.html * https://www.suse.com/security/cve/CVE-2024-39491.html * https://www.suse.com/security/cve/CVE-2024-39493.html * https://www.suse.com/security/cve/CVE-2024-39497.html * https://www.suse.com/security/cve/CVE-2024-39499.html * https://www.suse.com/security/cve/CVE-2024-39500.html * https://www.suse.com/security/cve/CVE-2024-39501.html * https://www.suse.com/security/cve/CVE-2024-39505.html * https://www.suse.com/security/cve/CVE-2024-39506.html * https://www.suse.com/security/cve/CVE-2024-39508.html * https://www.suse.com/security/cve/CVE-2024-39509.html * https://www.suse.com/security/cve/CVE-2024-39510.html * https://www.suse.com/security/cve/CVE-2024-40899.html * https://www.suse.com/security/cve/CVE-2024-40900.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-40903.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40905.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40911.html * https://www.suse.com/security/cve/CVE-2024-40912.html * https://www.suse.com/security/cve/CVE-2024-40913.html * https://www.suse.com/security/cve/CVE-2024-40916.html * https://www.suse.com/security/cve/CVE-2024-40920.html * https://www.suse.com/security/cve/CVE-2024-40921.html * https://www.suse.com/security/cve/CVE-2024-40922.html * https://www.suse.com/security/cve/CVE-2024-40924.html * https://www.suse.com/security/cve/CVE-2024-40926.html * https://www.suse.com/security/cve/CVE-2024-40927.html * https://www.suse.com/security/cve/CVE-2024-40929.html * https://www.suse.com/security/cve/CVE-2024-40930.html * https://www.suse.com/security/cve/CVE-2024-40932.html * https://www.suse.com/security/cve/CVE-2024-40934.html * https://www.suse.com/security/cve/CVE-2024-40936.html * https://www.suse.com/security/cve/CVE-2024-40938.html * https://www.suse.com/security/cve/CVE-2024-40939.html * https://www.suse.com/security/cve/CVE-2024-40941.html * https://www.suse.com/security/cve/CVE-2024-40942.html * https://www.suse.com/security/cve/CVE-2024-40943.html * https://www.suse.com/security/cve/CVE-2024-40944.html * https://www.suse.com/security/cve/CVE-2024-40945.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-40956.html * https://www.suse.com/security/cve/CVE-2024-40957.html * https://www.suse.com/security/cve/CVE-2024-40958.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-40962.html * https://www.suse.com/security/cve/CVE-2024-40964.html * https://www.suse.com/security/cve/CVE-2024-40967.html * https://www.suse.com/security/cve/CVE-2024-40976.html * https://www.suse.com/security/cve/CVE-2024-40977.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40981.html * https://www.suse.com/security/cve/CVE-2024-40982.html * https://www.suse.com/security/cve/CVE-2024-40984.html * https://www.suse.com/security/cve/CVE-2024-40987.html * https://www.suse.com/security/cve/CVE-2024-40988.html * https://www.suse.com/security/cve/CVE-2024-40989.html * https://www.suse.com/security/cve/CVE-2024-40990.html * https://www.suse.com/security/cve/CVE-2024-40992.html * https://www.suse.com/security/cve/CVE-2024-40994.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41001.html * https://www.suse.com/security/cve/CVE-2024-41002.html * https://www.suse.com/security/cve/CVE-2024-41004.html * https://www.suse.com/security/cve/CVE-2024-41007.html * https://www.suse.com/security/cve/CVE-2024-41009.html * https://www.suse.com/security/cve/CVE-2024-41010.html * https://www.suse.com/security/cve/CVE-2024-41012.html * https://www.suse.com/security/cve/CVE-2024-41015.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41020.html * https://www.suse.com/security/cve/CVE-2024-41022.html * https://www.suse.com/security/cve/CVE-2024-41024.html * https://www.suse.com/security/cve/CVE-2024-41025.html * https://www.suse.com/security/cve/CVE-2024-41028.html * https://www.suse.com/security/cve/CVE-2024-41032.html * https://www.suse.com/security/cve/CVE-2024-41035.html * https://www.suse.com/security/cve/CVE-2024-41036.html * https://www.suse.com/security/cve/CVE-2024-41037.html * https://www.suse.com/security/cve/CVE-2024-41038.html * https://www.suse.com/security/cve/CVE-2024-41039.html * https://www.suse.com/security/cve/CVE-2024-41040.html * https://www.suse.com/security/cve/CVE-2024-41041.html * https://www.suse.com/security/cve/CVE-2024-41044.html * https://www.suse.com/security/cve/CVE-2024-41045.html * https://www.suse.com/security/cve/CVE-2024-41048.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-41050.html * https://www.suse.com/security/cve/CVE-2024-41051.html * https://www.suse.com/security/cve/CVE-2024-41056.html * https://www.suse.com/security/cve/CVE-2024-41057.html * https://www.suse.com/security/cve/CVE-2024-41058.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41061.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41063.html * https://www.suse.com/security/cve/CVE-2024-41064.html * https://www.suse.com/security/cve/CVE-2024-41065.html * https://www.suse.com/security/cve/CVE-2024-41066.html * https://www.suse.com/security/cve/CVE-2024-41068.html * https://www.suse.com/security/cve/CVE-2024-41069.html * https://www.suse.com/security/cve/CVE-2024-41070.html * https://www.suse.com/security/cve/CVE-2024-41071.html * https://www.suse.com/security/cve/CVE-2024-41072.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41074.html * https://www.suse.com/security/cve/CVE-2024-41075.html * https://www.suse.com/security/cve/CVE-2024-41076.html * https://www.suse.com/security/cve/CVE-2024-41078.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41080.html * https://www.suse.com/security/cve/CVE-2024-41081.html * https://www.suse.com/security/cve/CVE-2024-41084.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-41088.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-41093.html * https://www.suse.com/security/cve/CVE-2024-41094.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-41096.html * https://www.suse.com/security/cve/CVE-2024-41097.html * https://www.suse.com/security/cve/CVE-2024-41098.html * https://www.suse.com/security/cve/CVE-2024-42064.html * https://www.suse.com/security/cve/CVE-2024-42069.html * https://www.suse.com/security/cve/CVE-2024-42070.html * https://www.suse.com/security/cve/CVE-2024-42073.html * https://www.suse.com/security/cve/CVE-2024-42074.html * https://www.suse.com/security/cve/CVE-2024-42076.html * https://www.suse.com/security/cve/CVE-2024-42077.html * https://www.suse.com/security/cve/CVE-2024-42079.html * https://www.suse.com/security/cve/CVE-2024-42080.html * https://www.suse.com/security/cve/CVE-2024-42082.html * https://www.suse.com/security/cve/CVE-2024-42085.html * https://www.suse.com/security/cve/CVE-2024-42086.html * https://www.suse.com/security/cve/CVE-2024-42087.html * https://www.suse.com/security/cve/CVE-2024-42089.html * https://www.suse.com/security/cve/CVE-2024-42090.html * https://www.suse.com/security/cve/CVE-2024-42092.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42095.html * https://www.suse.com/security/cve/CVE-2024-42096.html * https://www.suse.com/security/cve/CVE-2024-42097.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42101.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42105.html * https://www.suse.com/security/cve/CVE-2024-42106.html * https://www.suse.com/security/cve/CVE-2024-42107.html * https://www.suse.com/security/cve/CVE-2024-42109.html * https://www.suse.com/security/cve/CVE-2024-42110.html * https://www.suse.com/security/cve/CVE-2024-42113.html * https://www.suse.com/security/cve/CVE-2024-42114.html * https://www.suse.com/security/cve/CVE-2024-42115.html * https://www.suse.com/security/cve/CVE-2024-42117.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42121.html * https://www.suse.com/security/cve/CVE-2024-42122.html * https://www.suse.com/security/cve/CVE-2024-42124.html * https://www.suse.com/security/cve/CVE-2024-42125.html * https://www.suse.com/security/cve/CVE-2024-42126.html * https://www.suse.com/security/cve/CVE-2024-42127.html * https://www.suse.com/security/cve/CVE-2024-42130.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42132.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-42136.html * https://www.suse.com/security/cve/CVE-2024-42137.html * https://www.suse.com/security/cve/CVE-2024-42138.html * https://www.suse.com/security/cve/CVE-2024-42139.html * https://www.suse.com/security/cve/CVE-2024-42141.html * https://www.suse.com/security/cve/CVE-2024-42142.html * https://www.suse.com/security/cve/CVE-2024-42143.html * https://www.suse.com/security/cve/CVE-2024-42144.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42147.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-42152.html * https://www.suse.com/security/cve/CVE-2024-42153.html * https://www.suse.com/security/cve/CVE-2024-42155.html * https://www.suse.com/security/cve/CVE-2024-42156.html * https://www.suse.com/security/cve/CVE-2024-42157.html * https://www.suse.com/security/cve/CVE-2024-42158.html * https://www.suse.com/security/cve/CVE-2024-42159.html * https://www.suse.com/security/cve/CVE-2024-42161.html * https://www.suse.com/security/cve/CVE-2024-42162.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42224.html * https://www.suse.com/security/cve/CVE-2024-42225.html * https://www.suse.com/security/cve/CVE-2024-42226.html * https://www.suse.com/security/cve/CVE-2024-42227.html * https://www.suse.com/security/cve/CVE-2024-42228.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-42236.html * https://www.suse.com/security/cve/CVE-2024-42237.html * https://www.suse.com/security/cve/CVE-2024-42238.html * https://www.suse.com/security/cve/CVE-2024-42239.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-42241.html * https://www.suse.com/security/cve/CVE-2024-42244.html * https://www.suse.com/security/cve/CVE-2024-42245.html * https://www.suse.com/security/cve/CVE-2024-42246.html * https://www.suse.com/security/cve/CVE-2024-42247.html * https://www.suse.com/security/cve/CVE-2024-42250.html * https://www.suse.com/security/cve/CVE-2024-42253.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42268.html * https://www.suse.com/security/cve/CVE-2024-42269.html * https://www.suse.com/security/cve/CVE-2024-42270.html * https://www.suse.com/security/cve/CVE-2024-42271.html * https://www.suse.com/security/cve/CVE-2024-42274.html * https://www.suse.com/security/cve/CVE-2024-42276.html * https://www.suse.com/security/cve/CVE-2024-42277.html * https://www.suse.com/security/cve/CVE-2024-42278.html * https://www.suse.com/security/cve/CVE-2024-42279.html * https://www.suse.com/security/cve/CVE-2024-42280.html * https://www.suse.com/security/cve/CVE-2024-42281.html * https://www.suse.com/security/cve/CVE-2024-42283.html * https://www.suse.com/security/cve/CVE-2024-42284.html * https://www.suse.com/security/cve/CVE-2024-42285.html * https://www.suse.com/security/cve/CVE-2024-42286.html * https://www.suse.com/security/cve/CVE-2024-42287.html * https://www.suse.com/security/cve/CVE-2024-42288.html * https://www.suse.com/security/cve/CVE-2024-42289.html * https://www.suse.com/security/cve/CVE-2024-42290.html * https://www.suse.com/security/cve/CVE-2024-42291.html * https://www.suse.com/security/cve/CVE-2024-42292.html * https://www.suse.com/security/cve/CVE-2024-42295.html * https://www.suse.com/security/cve/CVE-2024-42298.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-42302.html * https://www.suse.com/security/cve/CVE-2024-42303.html * https://www.suse.com/security/cve/CVE-2024-42308.html * https://www.suse.com/security/cve/CVE-2024-42309.html * https://www.suse.com/security/cve/CVE-2024-42310.html * https://www.suse.com/security/cve/CVE-2024-42311.html * https://www.suse.com/security/cve/CVE-2024-42312.html * https://www.suse.com/security/cve/CVE-2024-42313.html * https://www.suse.com/security/cve/CVE-2024-42314.html * https://www.suse.com/security/cve/CVE-2024-42315.html * https://www.suse.com/security/cve/CVE-2024-42316.html * https://www.suse.com/security/cve/CVE-2024-42318.html * https://www.suse.com/security/cve/CVE-2024-42319.html * https://www.suse.com/security/cve/CVE-2024-42320.html * https://www.suse.com/security/cve/CVE-2024-42322.html * https://www.suse.com/security/cve/CVE-2024-43816.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43818.html * https://www.suse.com/security/cve/CVE-2024-43819.html * https://www.suse.com/security/cve/CVE-2024-43821.html * https://www.suse.com/security/cve/CVE-2024-43823.html * https://www.suse.com/security/cve/CVE-2024-43824.html * https://www.suse.com/security/cve/CVE-2024-43825.html * https://www.suse.com/security/cve/CVE-2024-43826.html * https://www.suse.com/security/cve/CVE-2024-43829.html * https://www.suse.com/security/cve/CVE-2024-43830.html * https://www.suse.com/security/cve/CVE-2024-43831.html * https://www.suse.com/security/cve/CVE-2024-43833.html * https://www.suse.com/security/cve/CVE-2024-43834.html * https://www.suse.com/security/cve/CVE-2024-43837.html * https://www.suse.com/security/cve/CVE-2024-43839.html * https://www.suse.com/security/cve/CVE-2024-43840.html * https://www.suse.com/security/cve/CVE-2024-43841.html * https://www.suse.com/security/cve/CVE-2024-43842.html * https://www.suse.com/security/cve/CVE-2024-43846.html * https://www.suse.com/security/cve/CVE-2024-43847.html * https://www.suse.com/security/cve/CVE-2024-43849.html * https://www.suse.com/security/cve/CVE-2024-43850.html * https://www.suse.com/security/cve/CVE-2024-43851.html * https://www.suse.com/security/cve/CVE-2024-43853.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-43855.html * https://www.suse.com/security/cve/CVE-2024-43856.html * https://www.suse.com/security/cve/CVE-2024-43858.html * https://www.suse.com/security/cve/CVE-2024-43860.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://www.suse.com/security/cve/CVE-2024-43863.html * https://www.suse.com/security/cve/CVE-2024-43864.html * https://www.suse.com/security/cve/CVE-2024-43866.html * https://www.suse.com/security/cve/CVE-2024-43867.html * https://www.suse.com/security/cve/CVE-2024-43871.html * https://www.suse.com/security/cve/CVE-2024-43872.html * https://www.suse.com/security/cve/CVE-2024-43873.html * https://www.suse.com/security/cve/CVE-2024-43874.html * https://www.suse.com/security/cve/CVE-2024-43875.html * https://www.suse.com/security/cve/CVE-2024-43876.html * https://www.suse.com/security/cve/CVE-2024-43877.html * https://www.suse.com/security/cve/CVE-2024-43879.html * https://www.suse.com/security/cve/CVE-2024-43880.html * https://www.suse.com/security/cve/CVE-2024-43881.html * https://www.suse.com/security/cve/CVE-2024-43882.html * https://www.suse.com/security/cve/CVE-2024-43883.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43885.html * https://www.suse.com/security/cve/CVE-2024-43889.html * https://www.suse.com/security/cve/CVE-2024-43892.html * https://www.suse.com/security/cve/CVE-2024-43893.html * https://www.suse.com/security/cve/CVE-2024-43894.html * https://www.suse.com/security/cve/CVE-2024-43895.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-43899.html * https://www.suse.com/security/cve/CVE-2024-43900.html * https://www.suse.com/security/cve/CVE-2024-43902.html * https://www.suse.com/security/cve/CVE-2024-43903.html * https://www.suse.com/security/cve/CVE-2024-43905.html * https://www.suse.com/security/cve/CVE-2024-43906.html * https://www.suse.com/security/cve/CVE-2024-43907.html * https://www.suse.com/security/cve/CVE-2024-43908.html * https://www.suse.com/security/cve/CVE-2024-43909.html * https://www.suse.com/security/cve/CVE-2024-43911.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-44931.html * https://www.suse.com/security/cve/CVE-2024-44938.html * https://www.suse.com/security/cve/CVE-2024-44939.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1193454 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1208783 * https://bugzilla.suse.com/show_bug.cgi?id=1213123 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220066 * https://bugzilla.suse.com/show_bug.cgi?id=1220252 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1221326 * https://bugzilla.suse.com/show_bug.cgi?id=1221630 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221652 * https://bugzilla.suse.com/show_bug.cgi?id=1221857 * https://bugzilla.suse.com/show_bug.cgi?id=1222254 * https://bugzilla.suse.com/show_bug.cgi?id=1222335 * https://bugzilla.suse.com/show_bug.cgi?id=1222350 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222387 * https://bugzilla.suse.com/show_bug.cgi?id=1222433 * https://bugzilla.suse.com/show_bug.cgi?id=1222434 * https://bugzilla.suse.com/show_bug.cgi?id=1222625 * https://bugzilla.suse.com/show_bug.cgi?id=1222633 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1222808 * https://bugzilla.suse.com/show_bug.cgi?id=1222967 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223053 * https://bugzilla.suse.com/show_bug.cgi?id=1223074 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223395 * https://bugzilla.suse.com/show_bug.cgi?id=1223635 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223742 * https://bugzilla.suse.com/show_bug.cgi?id=1223763 * https://bugzilla.suse.com/show_bug.cgi?id=1223767 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1223803 * https://bugzilla.suse.com/show_bug.cgi?id=1224105 * https://bugzilla.suse.com/show_bug.cgi?id=1224415 * https://bugzilla.suse.com/show_bug.cgi?id=1224485 * https://bugzilla.suse.com/show_bug.cgi?id=1224496 * https://bugzilla.suse.com/show_bug.cgi?id=1224510 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224631 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224690 * https://bugzilla.suse.com/show_bug.cgi?id=1224694 * https://bugzilla.suse.com/show_bug.cgi?id=1224700 * https://bugzilla.suse.com/show_bug.cgi?id=1224711 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225582 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225718 * https://bugzilla.suse.com/show_bug.cgi?id=1225751 * https://bugzilla.suse.com/show_bug.cgi?id=1225814 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1225838 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226031 * https://bugzilla.suse.com/show_bug.cgi?id=1226127 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226530 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226604 * https://bugzilla.suse.com/show_bug.cgi?id=1226743 * https://bugzilla.suse.com/show_bug.cgi?id=1226751 * https://bugzilla.suse.com/show_bug.cgi?id=1226765 * https://bugzilla.suse.com/show_bug.cgi?id=1226798 * https://bugzilla.suse.com/show_bug.cgi?id=1226801 * https://bugzilla.suse.com/show_bug.cgi?id=1226834 * https://bugzilla.suse.com/show_bug.cgi?id=1226874 * https://bugzilla.suse.com/show_bug.cgi?id=1226885 * https://bugzilla.suse.com/show_bug.cgi?id=1226920 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227182 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227437 * https://bugzilla.suse.com/show_bug.cgi?id=1227492 * https://bugzilla.suse.com/show_bug.cgi?id=1227493 * https://bugzilla.suse.com/show_bug.cgi?id=1227494 * https://bugzilla.suse.com/show_bug.cgi?id=1227618 * https://bugzilla.suse.com/show_bug.cgi?id=1227620 * https://bugzilla.suse.com/show_bug.cgi?id=1227623 * https://bugzilla.suse.com/show_bug.cgi?id=1227627 * https://bugzilla.suse.com/show_bug.cgi?id=1227634 * https://bugzilla.suse.com/show_bug.cgi?id=1227706 * https://bugzilla.suse.com/show_bug.cgi?id=1227722 * https://bugzilla.suse.com/show_bug.cgi?id=1227724 * https://bugzilla.suse.com/show_bug.cgi?id=1227725 * https://bugzilla.suse.com/show_bug.cgi?id=1227728 * https://bugzilla.suse.com/show_bug.cgi?id=1227729 * https://bugzilla.suse.com/show_bug.cgi?id=1227732 * https://bugzilla.suse.com/show_bug.cgi?id=1227733 * https://bugzilla.suse.com/show_bug.cgi?id=1227734 * https://bugzilla.suse.com/show_bug.cgi?id=1227747 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227754 * https://bugzilla.suse.com/show_bug.cgi?id=1227758 * https://bugzilla.suse.com/show_bug.cgi?id=1227760 * https://bugzilla.suse.com/show_bug.cgi?id=1227761 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1227766 * https://bugzilla.suse.com/show_bug.cgi?id=1227770 * https://bugzilla.suse.com/show_bug.cgi?id=1227771 * https://bugzilla.suse.com/show_bug.cgi?id=1227772 * https://bugzilla.suse.com/show_bug.cgi?id=1227774 * https://bugzilla.suse.com/show_bug.cgi?id=1227781 * https://bugzilla.suse.com/show_bug.cgi?id=1227784 * https://bugzilla.suse.com/show_bug.cgi?id=1227785 * https://bugzilla.suse.com/show_bug.cgi?id=1227787 * https://bugzilla.suse.com/show_bug.cgi?id=1227790 * https://bugzilla.suse.com/show_bug.cgi?id=1227791 * https://bugzilla.suse.com/show_bug.cgi?id=1227792 * https://bugzilla.suse.com/show_bug.cgi?id=1227796 * https://bugzilla.suse.com/show_bug.cgi?id=1227798 * https://bugzilla.suse.com/show_bug.cgi?id=1227799 * https://bugzilla.suse.com/show_bug.cgi?id=1227802 * https://bugzilla.suse.com/show_bug.cgi?id=1227808 * https://bugzilla.suse.com/show_bug.cgi?id=1227810 * https://bugzilla.suse.com/show_bug.cgi?id=1227811 * https://bugzilla.suse.com/show_bug.cgi?id=1227812 * https://bugzilla.suse.com/show_bug.cgi?id=1227815 * https://bugzilla.suse.com/show_bug.cgi?id=1227816 * https://bugzilla.suse.com/show_bug.cgi?id=1227818 * https://bugzilla.suse.com/show_bug.cgi?id=1227820 * https://bugzilla.suse.com/show_bug.cgi?id=1227823 * https://bugzilla.suse.com/show_bug.cgi?id=1227824 * https://bugzilla.suse.com/show_bug.cgi?id=1227826 * https://bugzilla.suse.com/show_bug.cgi?id=1227828 * https://bugzilla.suse.com/show_bug.cgi?id=1227829 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227833 * https://bugzilla.suse.com/show_bug.cgi?id=1227834 * https://bugzilla.suse.com/show_bug.cgi?id=1227839 * https://bugzilla.suse.com/show_bug.cgi?id=1227840 * https://bugzilla.suse.com/show_bug.cgi?id=1227846 * https://bugzilla.suse.com/show_bug.cgi?id=1227849 * https://bugzilla.suse.com/show_bug.cgi?id=1227851 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1227863 * https://bugzilla.suse.com/show_bug.cgi?id=1227864 * https://bugzilla.suse.com/show_bug.cgi?id=1227865 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227869 * https://bugzilla.suse.com/show_bug.cgi?id=1227870 * https://bugzilla.suse.com/show_bug.cgi?id=1227883 * https://bugzilla.suse.com/show_bug.cgi?id=1227884 * https://bugzilla.suse.com/show_bug.cgi?id=1227891 * https://bugzilla.suse.com/show_bug.cgi?id=1227893 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227950 * https://bugzilla.suse.com/show_bug.cgi?id=1227957 * https://bugzilla.suse.com/show_bug.cgi?id=1227981 * https://bugzilla.suse.com/show_bug.cgi?id=1228020 * https://bugzilla.suse.com/show_bug.cgi?id=1228021 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228235 * https://bugzilla.suse.com/show_bug.cgi?id=1228236 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1228321 * https://bugzilla.suse.com/show_bug.cgi?id=1228409 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228426 * https://bugzilla.suse.com/show_bug.cgi?id=1228427 * https://bugzilla.suse.com/show_bug.cgi?id=1228429 * https://bugzilla.suse.com/show_bug.cgi?id=1228446 * https://bugzilla.suse.com/show_bug.cgi?id=1228447 * https://bugzilla.suse.com/show_bug.cgi?id=1228449 * https://bugzilla.suse.com/show_bug.cgi?id=1228450 * https://bugzilla.suse.com/show_bug.cgi?id=1228452 * https://bugzilla.suse.com/show_bug.cgi?id=1228456 * https://bugzilla.suse.com/show_bug.cgi?id=1228457 * https://bugzilla.suse.com/show_bug.cgi?id=1228458 * https://bugzilla.suse.com/show_bug.cgi?id=1228459 * https://bugzilla.suse.com/show_bug.cgi?id=1228460 * https://bugzilla.suse.com/show_bug.cgi?id=1228462 * https://bugzilla.suse.com/show_bug.cgi?id=1228463 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1228468 * https://bugzilla.suse.com/show_bug.cgi?id=1228469 * https://bugzilla.suse.com/show_bug.cgi?id=1228470 * https://bugzilla.suse.com/show_bug.cgi?id=1228472 * https://bugzilla.suse.com/show_bug.cgi?id=1228479 * https://bugzilla.suse.com/show_bug.cgi?id=1228480 * https://bugzilla.suse.com/show_bug.cgi?id=1228481 * https://bugzilla.suse.com/show_bug.cgi?id=1228482 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228484 * https://bugzilla.suse.com/show_bug.cgi?id=1228485 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228489 * https://bugzilla.suse.com/show_bug.cgi?id=1228491 * https://bugzilla.suse.com/show_bug.cgi?id=1228492 * https://bugzilla.suse.com/show_bug.cgi?id=1228493 * https://bugzilla.suse.com/show_bug.cgi?id=1228494 * https://bugzilla.suse.com/show_bug.cgi?id=1228495 * https://bugzilla.suse.com/show_bug.cgi?id=1228496 * https://bugzilla.suse.com/show_bug.cgi?id=1228499 * https://bugzilla.suse.com/show_bug.cgi?id=1228500 * https://bugzilla.suse.com/show_bug.cgi?id=1228501 * https://bugzilla.suse.com/show_bug.cgi?id=1228502 * https://bugzilla.suse.com/show_bug.cgi?id=1228503 * https://bugzilla.suse.com/show_bug.cgi?id=1228505 * https://bugzilla.suse.com/show_bug.cgi?id=1228508 * https://bugzilla.suse.com/show_bug.cgi?id=1228509 * https://bugzilla.suse.com/show_bug.cgi?id=1228510 * https://bugzilla.suse.com/show_bug.cgi?id=1228511 * https://bugzilla.suse.com/show_bug.cgi?id=1228513 * https://bugzilla.suse.com/show_bug.cgi?id=1228515 * https://bugzilla.suse.com/show_bug.cgi?id=1228516 * https://bugzilla.suse.com/show_bug.cgi?id=1228518 * https://bugzilla.suse.com/show_bug.cgi?id=1228520 * https://bugzilla.suse.com/show_bug.cgi?id=1228525 * https://bugzilla.suse.com/show_bug.cgi?id=1228527 * https://bugzilla.suse.com/show_bug.cgi?id=1228530 * https://bugzilla.suse.com/show_bug.cgi?id=1228531 * https://bugzilla.suse.com/show_bug.cgi?id=1228539 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228563 * https://bugzilla.suse.com/show_bug.cgi?id=1228564 * https://bugzilla.suse.com/show_bug.cgi?id=1228565 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228568 * https://bugzilla.suse.com/show_bug.cgi?id=1228572 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228579 * https://bugzilla.suse.com/show_bug.cgi?id=1228580 * https://bugzilla.suse.com/show_bug.cgi?id=1228581 * https://bugzilla.suse.com/show_bug.cgi?id=1228582 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228586 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228590 * https://bugzilla.suse.com/show_bug.cgi?id=1228591 * https://bugzilla.suse.com/show_bug.cgi?id=1228599 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228616 * https://bugzilla.suse.com/show_bug.cgi?id=1228617 * https://bugzilla.suse.com/show_bug.cgi?id=1228625 * https://bugzilla.suse.com/show_bug.cgi?id=1228626 * https://bugzilla.suse.com/show_bug.cgi?id=1228633 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1228636 * https://bugzilla.suse.com/show_bug.cgi?id=1228640 * https://bugzilla.suse.com/show_bug.cgi?id=1228643 * https://bugzilla.suse.com/show_bug.cgi?id=1228644 * https://bugzilla.suse.com/show_bug.cgi?id=1228646 * https://bugzilla.suse.com/show_bug.cgi?id=1228649 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1228655 * https://bugzilla.suse.com/show_bug.cgi?id=1228656 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228660 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228665 * https://bugzilla.suse.com/show_bug.cgi?id=1228666 * https://bugzilla.suse.com/show_bug.cgi?id=1228667 * https://bugzilla.suse.com/show_bug.cgi?id=1228672 * https://bugzilla.suse.com/show_bug.cgi?id=1228673 * https://bugzilla.suse.com/show_bug.cgi?id=1228674 * https://bugzilla.suse.com/show_bug.cgi?id=1228677 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228687 * https://bugzilla.suse.com/show_bug.cgi?id=1228705 * https://bugzilla.suse.com/show_bug.cgi?id=1228706 * https://bugzilla.suse.com/show_bug.cgi?id=1228707 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228709 * https://bugzilla.suse.com/show_bug.cgi?id=1228710 * https://bugzilla.suse.com/show_bug.cgi?id=1228718 * https://bugzilla.suse.com/show_bug.cgi?id=1228720 * https://bugzilla.suse.com/show_bug.cgi?id=1228721 * https://bugzilla.suse.com/show_bug.cgi?id=1228722 * https://bugzilla.suse.com/show_bug.cgi?id=1228723 * https://bugzilla.suse.com/show_bug.cgi?id=1228724 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228727 * https://bugzilla.suse.com/show_bug.cgi?id=1228733 * https://bugzilla.suse.com/show_bug.cgi?id=1228737 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228748 * https://bugzilla.suse.com/show_bug.cgi?id=1228754 * https://bugzilla.suse.com/show_bug.cgi?id=1228756 * https://bugzilla.suse.com/show_bug.cgi?id=1228757 * https://bugzilla.suse.com/show_bug.cgi?id=1228758 * https://bugzilla.suse.com/show_bug.cgi?id=1228764 * https://bugzilla.suse.com/show_bug.cgi?id=1228766 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 * https://bugzilla.suse.com/show_bug.cgi?id=1228849 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1228959 * https://bugzilla.suse.com/show_bug.cgi?id=1228964 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1228967 * https://bugzilla.suse.com/show_bug.cgi?id=1228971 * https://bugzilla.suse.com/show_bug.cgi?id=1228973 * https://bugzilla.suse.com/show_bug.cgi?id=1228977 * https://bugzilla.suse.com/show_bug.cgi?id=1228978 * https://bugzilla.suse.com/show_bug.cgi?id=1228979 * https://bugzilla.suse.com/show_bug.cgi?id=1228986 * https://bugzilla.suse.com/show_bug.cgi?id=1228988 * https://bugzilla.suse.com/show_bug.cgi?id=1228989 * https://bugzilla.suse.com/show_bug.cgi?id=1228991 * https://bugzilla.suse.com/show_bug.cgi?id=1228992 * https://bugzilla.suse.com/show_bug.cgi?id=1229005 * https://bugzilla.suse.com/show_bug.cgi?id=1229024 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229045 * https://bugzilla.suse.com/show_bug.cgi?id=1229046 * https://bugzilla.suse.com/show_bug.cgi?id=1229054 * https://bugzilla.suse.com/show_bug.cgi?id=1229056 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229134 * https://bugzilla.suse.com/show_bug.cgi?id=1229136 * https://bugzilla.suse.com/show_bug.cgi?id=1229154 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229160 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229168 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229170 * https://bugzilla.suse.com/show_bug.cgi?id=1229171 * https://bugzilla.suse.com/show_bug.cgi?id=1229172 * https://bugzilla.suse.com/show_bug.cgi?id=1229173 * https://bugzilla.suse.com/show_bug.cgi?id=1229174 * https://bugzilla.suse.com/show_bug.cgi?id=1229239 * https://bugzilla.suse.com/show_bug.cgi?id=1229240 * https://bugzilla.suse.com/show_bug.cgi?id=1229241 * https://bugzilla.suse.com/show_bug.cgi?id=1229243 * https://bugzilla.suse.com/show_bug.cgi?id=1229244 * https://bugzilla.suse.com/show_bug.cgi?id=1229245 * https://bugzilla.suse.com/show_bug.cgi?id=1229246 * https://bugzilla.suse.com/show_bug.cgi?id=1229247 * https://bugzilla.suse.com/show_bug.cgi?id=1229248 * https://bugzilla.suse.com/show_bug.cgi?id=1229249 * https://bugzilla.suse.com/show_bug.cgi?id=1229250 * https://bugzilla.suse.com/show_bug.cgi?id=1229251 * https://bugzilla.suse.com/show_bug.cgi?id=1229252 * https://bugzilla.suse.com/show_bug.cgi?id=1229253 * https://bugzilla.suse.com/show_bug.cgi?id=1229254 * https://bugzilla.suse.com/show_bug.cgi?id=1229255 * https://bugzilla.suse.com/show_bug.cgi?id=1229256 * https://bugzilla.suse.com/show_bug.cgi?id=1229287 * https://bugzilla.suse.com/show_bug.cgi?id=1229290 * https://bugzilla.suse.com/show_bug.cgi?id=1229291 * https://bugzilla.suse.com/show_bug.cgi?id=1229292 * https://bugzilla.suse.com/show_bug.cgi?id=1229294 * https://bugzilla.suse.com/show_bug.cgi?id=1229296 * https://bugzilla.suse.com/show_bug.cgi?id=1229297 * https://bugzilla.suse.com/show_bug.cgi?id=1229298 * https://bugzilla.suse.com/show_bug.cgi?id=1229299 * https://bugzilla.suse.com/show_bug.cgi?id=1229301 * https://bugzilla.suse.com/show_bug.cgi?id=1229303 * https://bugzilla.suse.com/show_bug.cgi?id=1229304 * https://bugzilla.suse.com/show_bug.cgi?id=1229305 * https://bugzilla.suse.com/show_bug.cgi?id=1229307 * https://bugzilla.suse.com/show_bug.cgi?id=1229309 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229313 * https://bugzilla.suse.com/show_bug.cgi?id=1229314 * https://bugzilla.suse.com/show_bug.cgi?id=1229315 * https://bugzilla.suse.com/show_bug.cgi?id=1229316 * https://bugzilla.suse.com/show_bug.cgi?id=1229317 * https://bugzilla.suse.com/show_bug.cgi?id=1229318 * https://bugzilla.suse.com/show_bug.cgi?id=1229319 * https://bugzilla.suse.com/show_bug.cgi?id=1229320 * https://bugzilla.suse.com/show_bug.cgi?id=1229327 * https://bugzilla.suse.com/show_bug.cgi?id=1229341 * https://bugzilla.suse.com/show_bug.cgi?id=1229342 * https://bugzilla.suse.com/show_bug.cgi?id=1229344 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229346 * https://bugzilla.suse.com/show_bug.cgi?id=1229347 * https://bugzilla.suse.com/show_bug.cgi?id=1229349 * https://bugzilla.suse.com/show_bug.cgi?id=1229350 * https://bugzilla.suse.com/show_bug.cgi?id=1229351 * https://bugzilla.suse.com/show_bug.cgi?id=1229353 * https://bugzilla.suse.com/show_bug.cgi?id=1229354 * https://bugzilla.suse.com/show_bug.cgi?id=1229355 * https://bugzilla.suse.com/show_bug.cgi?id=1229356 * https://bugzilla.suse.com/show_bug.cgi?id=1229357 * https://bugzilla.suse.com/show_bug.cgi?id=1229358 * https://bugzilla.suse.com/show_bug.cgi?id=1229359 * https://bugzilla.suse.com/show_bug.cgi?id=1229360 * https://bugzilla.suse.com/show_bug.cgi?id=1229365 * https://bugzilla.suse.com/show_bug.cgi?id=1229366 * https://bugzilla.suse.com/show_bug.cgi?id=1229369 * https://bugzilla.suse.com/show_bug.cgi?id=1229370 * https://bugzilla.suse.com/show_bug.cgi?id=1229373 * https://bugzilla.suse.com/show_bug.cgi?id=1229374 * https://bugzilla.suse.com/show_bug.cgi?id=1229379 * https://bugzilla.suse.com/show_bug.cgi?id=1229381 * https://bugzilla.suse.com/show_bug.cgi?id=1229382 * https://bugzilla.suse.com/show_bug.cgi?id=1229383 * https://bugzilla.suse.com/show_bug.cgi?id=1229386 * https://bugzilla.suse.com/show_bug.cgi?id=1229388 * https://bugzilla.suse.com/show_bug.cgi?id=1229390 * https://bugzilla.suse.com/show_bug.cgi?id=1229391 * https://bugzilla.suse.com/show_bug.cgi?id=1229392 * https://bugzilla.suse.com/show_bug.cgi?id=1229395 * https://bugzilla.suse.com/show_bug.cgi?id=1229398 * https://bugzilla.suse.com/show_bug.cgi?id=1229399 * https://bugzilla.suse.com/show_bug.cgi?id=1229400 * https://bugzilla.suse.com/show_bug.cgi?id=1229402 * https://bugzilla.suse.com/show_bug.cgi?id=1229403 * https://bugzilla.suse.com/show_bug.cgi?id=1229404 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229409 * https://bugzilla.suse.com/show_bug.cgi?id=1229410 * https://bugzilla.suse.com/show_bug.cgi?id=1229411 * https://bugzilla.suse.com/show_bug.cgi?id=1229413 * https://bugzilla.suse.com/show_bug.cgi?id=1229414 * https://bugzilla.suse.com/show_bug.cgi?id=1229417 * https://bugzilla.suse.com/show_bug.cgi?id=1229444 * https://bugzilla.suse.com/show_bug.cgi?id=1229451 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229480 * https://bugzilla.suse.com/show_bug.cgi?id=1229481 * https://bugzilla.suse.com/show_bug.cgi?id=1229482 * https://bugzilla.suse.com/show_bug.cgi?id=1229484 * https://bugzilla.suse.com/show_bug.cgi?id=1229485 * https://bugzilla.suse.com/show_bug.cgi?id=1229486 * https://bugzilla.suse.com/show_bug.cgi?id=1229487 * https://bugzilla.suse.com/show_bug.cgi?id=1229488 * https://bugzilla.suse.com/show_bug.cgi?id=1229489 * https://bugzilla.suse.com/show_bug.cgi?id=1229490 * https://bugzilla.suse.com/show_bug.cgi?id=1229493 * https://bugzilla.suse.com/show_bug.cgi?id=1229495 * https://bugzilla.suse.com/show_bug.cgi?id=1229496 * https://bugzilla.suse.com/show_bug.cgi?id=1229497 * https://bugzilla.suse.com/show_bug.cgi?id=1229500 * https://bugzilla.suse.com/show_bug.cgi?id=1229503 * https://bugzilla.suse.com/show_bug.cgi?id=1229707 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229743 * https://bugzilla.suse.com/show_bug.cgi?id=1229746 * https://bugzilla.suse.com/show_bug.cgi?id=1229747 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229754 * https://bugzilla.suse.com/show_bug.cgi?id=1229755 * https://bugzilla.suse.com/show_bug.cgi?id=1229756 * https://bugzilla.suse.com/show_bug.cgi?id=1229759 * https://bugzilla.suse.com/show_bug.cgi?id=1229761 * https://bugzilla.suse.com/show_bug.cgi?id=1229767 * https://bugzilla.suse.com/show_bug.cgi?id=1229781 * https://bugzilla.suse.com/show_bug.cgi?id=1229784 * https://bugzilla.suse.com/show_bug.cgi?id=1229785 * https://bugzilla.suse.com/show_bug.cgi?id=1229787 * https://bugzilla.suse.com/show_bug.cgi?id=1229788 * https://bugzilla.suse.com/show_bug.cgi?id=1229789 * https://bugzilla.suse.com/show_bug.cgi?id=1229792 * https://bugzilla.suse.com/show_bug.cgi?id=1229820 * https://bugzilla.suse.com/show_bug.cgi?id=1229827 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229837 * https://bugzilla.suse.com/show_bug.cgi?id=1229940 * https://bugzilla.suse.com/show_bug.cgi?id=1230056 * https://jira.suse.com/browse/PED-10029 * https://jira.suse.com/browse/PED-10045 * https://jira.suse.com/browse/PED-10055 * https://jira.suse.com/browse/PED-10105 * https://jira.suse.com/browse/PED-10108 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8779 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:05:52 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:05:52 -0000 Subject: SUSE-RU-2025:20040-1: moderate: Recommended update for kernel-livepatch-tools Message-ID: <174902795201.655.4672617829917480824@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-tools Announcement ID: SUSE-RU-2025:20040-1 Release Date: 2025-02-03T08:53:49Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for kernel-livepatch-tools fixes the following issues: kernel-livepatch-tools is released in version 1.4. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-34=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-livepatch-tools-1.4-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:05:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:05:55 -0000 Subject: SUSE-SU-2025:20039-1: moderate: Security update for keepalived Message-ID: <174902795598.655.12874870199677147828@smelt2.prg2.suse.org> # Security update for keepalived Announcement ID: SUSE-SU-2025:20039-1 Release Date: 2025-02-03T08:53:39Z Rating: moderate References: * bsc#1228123 Cross-References: * CVE-2024-41184 CVSS scores: * CVE-2024-41184 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for keepalived fixes the following issues: * CVE-2024-41184: Fixed integer overflow in vrrp_ipsets_handler (bsc#1228123) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-72=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * keepalived-debuginfo-2.2.8-2.1 * keepalived-2.2.8-2.1 * keepalived-debugsource-2.2.8-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41184.html * https://bugzilla.suse.com/show_bug.cgi?id=1228123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:05:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:05:49 -0000 Subject: SUSE-SU-2025:20041-1: critical: Security update for systemd Message-ID: <174902794971.655.3220406432818318244@smelt2.prg2.suse.org> # Security update for systemd Announcement ID: SUSE-SU-2025:20041-1 Release Date: 2025-02-03T08:54:03Z Rating: critical References: * bsc#1200723 * bsc#1204968 * bsc#1213873 * bsc#1218110 * bsc#1221906 * bsc#1226414 * bsc#1226415 * bsc#1228091 * bsc#1228223 * bsc#1228809 * bsc#1229518 * jsc#PED-5659 Cross-References: * CVE-2022-3821 CVSS scores: * CVE-2022-3821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability, contains one feature and has 10 fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Import commit 0512d0d1fc0b54a84964281708036a46ab39c153 0512d0d1fc cgroup: Rename effective limits internal table (jsc#PED-5659) 765846b70b cgroup: Restrict effective limits with global resource provision (jsc#PED-5659) e29909088b test: Add effective cgroup limits testing (jsc#PED-5659) beacac6df0 test: Convert rlimit test to subtest of generic limit testing (jsc#PED-5659) e3b789e512 cgroup: Add EffectiveMemoryMax=, EffectiveMemoryHigh= and EffectiveTasksMax= properties (jsc#PED-5659) 5aa063ae16 bus-print-properties: prettify more unset properties a53122c9bd bus-print-properties: ignore CGROUP_LIMIT_MAX for Memory*{Current, Peak} 8418791441 cgroup: rename TasksMax structure to CGroupTasksMax * Don't try to restart the udev socket units anymore (bsc#1228809) There's currently no way to restart a socket activable service and its socket units "atomically" and safely. * Make the 32bit version of libudev.so available again (bsc#1228223) The symlink for building 32bit applications was mistakenly dropped when the content of libudev-devel was merged into systemd-devel. Provide the 32bit flavor of systemd-devel again, which should restore the plug and play support in Wine for 32bit windows applications. * Import commit up to 5aa182660dff86fe9d5cba61b0c6542bb2f2db23 (merge of v254.17) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-73=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-73=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-journal-remote-254.18-1.1 * systemd-portable-254.18-1.1 * systemd-journal-remote-debuginfo-254.18-1.1 * systemd-portable-debuginfo-254.18-1.1 * libudev1-debuginfo-254.18-1.1 * systemd-experimental-254.18-1.1 * libsystemd0-254.18-1.1 * libudev1-254.18-1.1 * systemd-debuginfo-254.18-1.1 * systemd-experimental-debuginfo-254.18-1.1 * systemd-254.18-1.1 * systemd-debugsource-254.18-1.1 * systemd-container-254.18-1.1 * udev-254.18-1.1 * udev-debuginfo-254.18-1.1 * systemd-coredump-254.18-1.1 * libsystemd0-debuginfo-254.18-1.1 * systemd-coredump-debuginfo-254.18-1.1 * systemd-container-debuginfo-254.18-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-devel-254.18-1.1 * systemd-debugsource-254.18-1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3821.html * https://bugzilla.suse.com/show_bug.cgi?id=1200723 * https://bugzilla.suse.com/show_bug.cgi?id=1204968 * https://bugzilla.suse.com/show_bug.cgi?id=1213873 * https://bugzilla.suse.com/show_bug.cgi?id=1218110 * https://bugzilla.suse.com/show_bug.cgi?id=1221906 * https://bugzilla.suse.com/show_bug.cgi?id=1226414 * https://bugzilla.suse.com/show_bug.cgi?id=1226415 * https://bugzilla.suse.com/show_bug.cgi?id=1228091 * https://bugzilla.suse.com/show_bug.cgi?id=1228223 * https://bugzilla.suse.com/show_bug.cgi?id=1228809 * https://bugzilla.suse.com/show_bug.cgi?id=1229518 * https://jira.suse.com/browse/PED-5659 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:08:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:08:40 -0000 Subject: SUSE-SU-2025:20046-1: important: Security update for runc Message-ID: <174902812072.627.1701259626548946970@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:20046-1 Release Date: 2025-02-03T08:56:20Z Rating: important References: * bsc#1192051 * bsc#1214960 * bsc#1221050 * bsc#1230092 Cross-References: * CVE-2024-45310 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.1.14. Upstream changelog is available from . * CVE-2024-45310: Fixed that runc can be tricked into creating empty files/directories on host ( bsc#1230092) Update to runc v1.1.13. Upstream changelog is available from . * Fixed a performance issue when running lots of containers, caused by systemd getting too many mount notifications. bsc#1214960 * Fixed -ENOSYS stub on ppc64le. bsc#1192051 bsc#1221050 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-62=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * runc-debuginfo-1.1.14-1.1 * runc-1.1.14-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://bugzilla.suse.com/show_bug.cgi?id=1192051 * https://bugzilla.suse.com/show_bug.cgi?id=1214960 * https://bugzilla.suse.com/show_bug.cgi?id=1221050 * https://bugzilla.suse.com/show_bug.cgi?id=1230092 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:05:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:05:31 -0000 Subject: SUSE-SU-2025:20043-1: moderate: Security update for libxml2 Message-ID: <174902793146.655.15398303056907425589@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20043-1 Release Date: 2025-02-03T08:54:24Z Rating: moderate References: * bsc#1224282 Cross-References: * CVE-2024-34459 CVSS scores: * CVE-2024-34459 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-34459: Fixed buffer over-read in (bsc#1224282) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-45=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxml2-tools-2.11.6-3.1 * libxml2-2-2.11.6-3.1 * libxml2-2-debuginfo-2.11.6-3.1 * libxml2-tools-debuginfo-2.11.6-3.1 * libxml2-debugsource-2.11.6-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34459.html * https://bugzilla.suse.com/show_bug.cgi?id=1224282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:34 -0000 Subject: SUSE-SU-2025:20031-1: low: Security update for glib2 Message-ID: <174902799446.655.2464820298475636051@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20031-1 Release Date: 2025-02-03T08:51:58Z Rating: low References: * bsc#1224044 Cross-References: * CVE-2024-34397 CVSS scores: * CVE-2024-34397 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-34397 ( NVD ): 5.2 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * Fixed a possible use after free regression introduced by CVE-2024-34397 patch (bsc#1224044). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-27=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * glib2-debugsource-2.76.2-5.1 * libgio-2_0-0-debuginfo-2.76.2-5.1 * libgmodule-2_0-0-2.76.2-5.1 * libgio-2_0-0-2.76.2-5.1 * libgmodule-2_0-0-debuginfo-2.76.2-5.1 * libgobject-2_0-0-2.76.2-5.1 * libglib-2_0-0-2.76.2-5.1 * glib2-tools-2.76.2-5.1 * libglib-2_0-0-debuginfo-2.76.2-5.1 * libgobject-2_0-0-debuginfo-2.76.2-5.1 * glib2-tools-debuginfo-2.76.2-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34397.html * https://bugzilla.suse.com/show_bug.cgi?id=1224044 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:55 -0000 Subject: SUSE-SU-2025:20030-1: critical: Security update for mozilla-nss Message-ID: <174902801597.655.9381887645398163684@smelt2.prg2.suse.org> # Security update for mozilla-nss Announcement ID: SUSE-SU-2025:20030-1 Release Date: 2025-02-03T08:51:45Z Rating: critical References: * bsc#1214980 * bsc#1216198 * bsc#1222804 * bsc#1222807 * bsc#1222811 * bsc#1222813 * bsc#1222814 * bsc#1222821 * bsc#1222822 * bsc#1222826 * bsc#1222828 * bsc#1222830 * bsc#1222833 * bsc#1222834 * bsc#1223724 * bsc#1224113 * bsc#1224115 * bsc#1224116 * bsc#1224118 * bsc#1227918 * jsc#PED-6358 Cross-References: * CVE-2023-5388 CVSS scores: * CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-5388 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability, contains one feature and has 19 fixes can now be installed. ## Description: This update for mozilla-nss fixes the following issues: * update to NSS 3.101.2 * ChaChaXor to return after the function * update to NSS 3.101.1 * missing sqlite header. * GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME. * update to NSS 3.101 * add diagnostic assertions for SFTKObject refcount. * freeing the slot in DeleteCertAndKey if authentication failed * fix formatting issues. * Add Firmaprofesional CA Root-A Web to NSS. * remove invalid acvp fuzz test vectors. * pad short P-384 and P-521 signatures gtests. * remove unused FreeBL ECC code. * pad short P-384 and P-521 signatures. * be less strict about ECDSA private key length. * Integrate HACL* P-521. * Integrate HACL* P-384. * memory leak in create_objects_from_handles. * ensure all input is consumed in a few places in mozilla::pkix * SMIME/CMS and PKCS #12 do not integrate with modern NSS policy * clean up escape handling * Use lib::pkix as default validator instead of the old-one * Need to add high level support for PQ signing. * Certificate Compression: changing the allocation/freeing of buffer + Improving the documentation * SMIME/CMS and PKCS #12 do not integrate with modern NSS policy * Allow for non-full length ecdsa signature when using softoken * Modification of .taskcluster.yml due to mozlint indent defects * Implement support for PBMAC1 in PKCS#12 * disable VLA warnings for fuzz builds. * remove redundant AllocItem implementation. * add PK11_ReadDistrustAfterAttribute. * Clang-formatting of SEC_GetMgfTypeByOidTag update * Set SEC_ERROR_LIBRARY_FAILURE on self-test failure * sftk_getParameters(): Fix fallback to default variable after error with configfile. * Switch to the mozillareleases/image_builder image * update to NSS 3.100 * merge pk11_kyberSlotList into pk11_ecSlotList for faster Xyber operations. * remove ckcapi. * avoid a potential PK11GenericObject memory leak. * Remove incomplete ESDH code. * Decrypt RSA OAEP encrypted messages. * Fix certutil CRLDP URI code. * Don't set CKA_DERIVE for CKK_EC_EDWARDS private keys. * Add ability to encrypt and decrypt CMS messages using ECDH. * Correct Templates for key agreement in smime/cmsasn.c. * Moving the decodedCert allocation to NSS. * Allow developers to speed up repeated local execution of NSS tests that depend on certificates. * update to NSS 3.99 * Removing check for message len in ed25519 * add ed25519 to SECU_ecName2params. * add EdDSA wycheproof tests. * nss/lib layer code for EDDSA. * Adding EdDSA implementation. * Exporting Certificate Compression types * Updating ACVP docker to rust 1.74 * Updating HACL* to 0f136f28935822579c244f287e1d2a1908a7e552 * Add NSS_CMSRecipient_IsSupported. * update to NSS 3.98 * CVE-2023-5388: Timing attack against RSA decryption in TLS * Certificate Compression: enabling the check that the compression was advertised * Move Windows workers to nss-1/b-win2022-alpha * Remove Email trust bit from OISTE WISeKey Global Root GC CA * Replace `distutils.spawn.find_executable` with `shutil.which` within `mach` in `nss` * Certificate Compression: Updating nss_bogo_shim to support Certificate compression * TLS Certificate Compression (RFC 8879) Implementation * Add valgrind annotations to freebl kyber operations for constant-time execution tests * Set nssckbi version number to 2.66 * Add Telekom Security roots * Add D-Trust 2022 S/MIME roots * Remove expired Security Communication RootCA1 root * move keys to a slot that supports concatenation in PK11_ConcatSymKeys * remove unmaintained tls-interop tests * bogo: add support for the -ipv6 and -shim-id shim flags * bogo: add support for the -curves shim flag and update Kyber expectations * bogo: adjust expectation for a key usage bit test * mozpkix: add option to ignore invalid subject alternative names * Fix selfserv not stripping `publicname:` from -X value * take ownership of ecckilla shims * add valgrind annotations to freebl/ec.c * PR_INADDR_ANY needs PR_htonl before assignment to inet.ip * Update zlib to 1.3.1 * update to NSS 3.97 * make Xyber768d00 opt-in by policy * add libssl support for xyber768d00 * add PK11_ConcatSymKeys * add Kyber and a PKCS#11 KEM interface to softoken * add a FreeBL API for Kyber * part 2: vendor github.com/pq-crystals/kyber/commit/e0d1c6ff * part 1: add a script for vendoring kyber from pq-crystals repo * Removing the calls to RSA Blind from loader.* * fix worker type for level3 mac tasks * RSA Blind implementation * Remove DSA selftests * read KWP testvectors from JSON * Backed out changeset dcb174139e4f * Fix CKM_PBE_SHA1_DES2_EDE_CBC derivation * Wrap CC shell commands in gyp expansions * update to NSS 3.96.1 * Use pypi dependencies for MacOS worker in ./build_gyp.sh * p7sign: add -a hash and -u certusage (also p7verify cleanups) * add a defensive check for large ssl_DefSend return values * Add dependency to the taskcluster script for Darwin * Upgrade version of the MacOS worker for the CI * update to NSS 3.95 * Bump builtins version number. * Remove Email trust bit from Autoridad de Certificacion Firmaprofesional CIF A62634068 root cert. * Remove 4 DigiCert (Symantec/Verisign) Root Certificates * Remove 3 TrustCor Root Certificates from NSS. * Remove Camerfirma root certificates from NSS. * Remove old Autoridad de Certificacion Firmaprofesional Certificate. * Add four Commscope root certificates to NSS. * Add TrustAsia Global Root CA G3 and G4 root certificates. * Include P-384 and P-521 Scalar Validation from HACL* * Include P-256 Scalar Validation from HACL*. * After the HACL 256 ECC patch, NSS incorrectly encodes 256 ECC without DER wrapping at the softoken level * Add means to provide library parameters to C_Initialize * clang format * add OSXSAVE and XCR0 tests to AVX2 detection. * Typo in ssl3_AppendHandshakeNumber * Introducing input check of ssl3_AppendHandshakeNumber * Fix Invalid casts in instance.c * update to NSS 3.94 * Updated code and commit ID for HACL* * update ACVP fuzzed test vector: refuzzed with current NSS * Softoken C_ calls should use system FIPS setting to select NSC_ or FC_ variants * NSS needs a database tool that can dump the low level representation of the database * declare string literals using char in pkixnames_tests.cpp * avoid implicit conversion for ByteString * update rust version for acvp docker * Moving the init function of the mpi_ints before clean-up in ec.c * P-256 ECDH and ECDSA from HACL* * Add ACVP test vectors to the repository * Stop relying on std::basic_string * Transpose the PPC_ABI check from Makefile to gyp * Update to NSS 3.93: * Update zlib in NSS to 1.3. * softoken: iterate hashUpdate calls for long inputs. * regenerate NameConstraints test certificates (bsc#1214980). * update to NSS 3.92 * Set nssckbi version number to 2.62 * Add 4 Atos TrustedRoot Root CA certificates to NSS * Add 4 SSL.com Root CA certificates * Add Sectigo E46 and R46 Root CA certificates * Add LAWtrust Root CA2 (4096) * Remove E-Tugra Certification Authority root * Remove Camerfirma Chambers of Commerce Root. * Remove Hongkong Post Root CA 1 * Remove E-Tugra Global Root CA ECC v3 and RSA v3 * Avoid redefining BYTE_ORDER on hppa Linux * update to NSS 3.91 * Implementation of the HW support check for ADX instruction * Removing the support of Curve25519 * Fix comment about the addition of ticketSupportsEarlyData * Adding args to enable-legacy-db build * dbtests.sh failure in "certutil dump keys with explicit default trust flags" * Initialize flags in slot structures * Improve the length check of RSA input to avoid heap overflow * Followup Fixes * avoid processing unexpected inputs by checking for m_exptmod base sign * add a limit check on order_k to avoid infinite loop * Update HACL* to commit 5f6051d2 * add SHA3 to cryptohi and softoken * HACL SHA3 * Disabling ASM C25519 for A but X86_64 * update to NSS 3.90.3 * GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME. * clean up escape handling. * remove redundant AllocItem implementation. * Disable ASM support for Curve25519. * Disable ASM support for Curve25519 for all but X86_64. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-59=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.101.2-1.1 * mozilla-nss-tools-debuginfo-3.101.2-1.1 * mozilla-nss-debugsource-3.101.2-1.1 * mozilla-nss-certs-debuginfo-3.101.2-1.1 * mozilla-nss-3.101.2-1.1 * libsoftokn3-3.101.2-1.1 * mozilla-nss-tools-3.101.2-1.1 * libfreebl3-3.101.2-1.1 * libsoftokn3-debuginfo-3.101.2-1.1 * mozilla-nss-debuginfo-3.101.2-1.1 * mozilla-nss-certs-3.101.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5388.html * https://bugzilla.suse.com/show_bug.cgi?id=1214980 * https://bugzilla.suse.com/show_bug.cgi?id=1216198 * https://bugzilla.suse.com/show_bug.cgi?id=1222804 * https://bugzilla.suse.com/show_bug.cgi?id=1222807 * https://bugzilla.suse.com/show_bug.cgi?id=1222811 * https://bugzilla.suse.com/show_bug.cgi?id=1222813 * https://bugzilla.suse.com/show_bug.cgi?id=1222814 * https://bugzilla.suse.com/show_bug.cgi?id=1222821 * https://bugzilla.suse.com/show_bug.cgi?id=1222822 * https://bugzilla.suse.com/show_bug.cgi?id=1222826 * https://bugzilla.suse.com/show_bug.cgi?id=1222828 * https://bugzilla.suse.com/show_bug.cgi?id=1222830 * https://bugzilla.suse.com/show_bug.cgi?id=1222833 * https://bugzilla.suse.com/show_bug.cgi?id=1222834 * https://bugzilla.suse.com/show_bug.cgi?id=1223724 * https://bugzilla.suse.com/show_bug.cgi?id=1224113 * https://bugzilla.suse.com/show_bug.cgi?id=1224115 * https://bugzilla.suse.com/show_bug.cgi?id=1224116 * https://bugzilla.suse.com/show_bug.cgi?id=1224118 * https://bugzilla.suse.com/show_bug.cgi?id=1227918 * https://jira.suse.com/browse/PED-6358 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:06 -0000 Subject: SUSE-SU-2025:20037-1: moderate: Security update for python-urllib3 Message-ID: <174902796651.655.15806048947299220273@smelt2.prg2.suse.org> # Security update for python-urllib3 Announcement ID: SUSE-SU-2025:20037-1 Release Date: 2025-02-03T08:53:14Z Rating: moderate References: * bsc#1226469 Cross-References: * CVE-2024-37891 CVSS scores: * CVE-2024-37891 ( SUSE ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-urllib3 fixes the following issues: * CVE-2024-37891: Fixed issue where proxy-authorization request header was not stripped during cross-origin redirects (bsc#1226469) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-36=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-urllib3-2.1.0-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37891.html * https://bugzilla.suse.com/show_bug.cgi?id=1226469 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:43 -0000 Subject: SUSE-SU-2025:20019-1: important: Security update for skopeo Message-ID: <174902830370.1737.16739900490442095573@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20019-1 Release Date: 2025-02-03T08:48:40Z Rating: important References: * bsc#1219563 * bsc#1224123 Cross-References: * CVE-2024-28180 * CVE-2024-3727 CVSS scores: * CVE-2024-28180 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-28180 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-28180 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for skopeo fixes the following issues: * Update to version 1.14.4: * CVE-2024-3727: digest type does not guarantee valid type (bsc#1224123) * Packit: update packit targets * Bump gopkg.in/go-jose to v2.6.3 * Bump ocicrypt and go-jose CVE-2024-28180 * Freeze the fedora-minimal image reference at Fedora 38 * Bump c/common to v0.57.4 * Bump google.golang.org/protobuf to v1.33.0 * Bump Skopeo to v1.14.3-dev * Update to version 1.14.2: * Bump c/image to v5.29.2, c/common to v0.57.3 (fixes bsc#1219563) * Update to version 1.14.1: * fix(deps): update module github.com/containers/common to v0.57.2 * fix(deps): update module github.com/containers/image/v5 to v5.29.1 * chore(deps): update dependency containers/automation_images to v20240102 * Fix libsubid detection * fix(deps): update module golang.org/x/term to v0.16.0 * fix(deps): update golang.org/x/exp digest to 02704c9 * chore(deps): update dependency containers/automation_images to v20231208 * [skip-ci] Update actions/stale action to v9 * fix(deps): update module github.com/containers/common to v0.57.1 * fix(deps): update golang.org/x/exp digest to 6522937 * fix(deps): update module golang.org/x/term to v0.15.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-21=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * skopeo-1.14.4-1.1 * skopeo-debuginfo-1.14.4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28180.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1219563 * https://bugzilla.suse.com/show_bug.cgi?id=1224123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:50 -0000 Subject: SUSE-SU-2025:20018-1: moderate: Security update for kernel-firmware Message-ID: <174902831040.1737.1238152341430936584@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2025:20018-1 Release Date: 2025-02-03T08:48:39Z Rating: moderate References: * bsc#1219458 * bsc#1222319 * bsc#1225600 * bsc#1225601 Cross-References: * CVE-2023-38417 * CVE-2023-47210 CVSS scores: * CVE-2023-38417 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47210 ( SUSE ): 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has two fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: Update to version 20240712: * amdgpu: update DMCUB to v0.0.225.0 for Various AMDGPU Asics * qcom: add gpu firmwares for x1e80100 chipset (bsc#1219458) * linux-firmware: add firmware for qat_402xx devices * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update SDMA 6.0.3 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update vega20 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update SDMA 6.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update PSP 13.0.11 firmware * amdgpu: update GC 11.0.4 firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update SDMA 6.0.1 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VPE 6.1.1 firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update SDMA 6.1.1 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update SDMA 6.1.0 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update SMU 13.0.7 firmware * amdgpu: update SDMA 6.0.2 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update raven2 firmware * amdgpu: update aldebaran firmware * linux-firmware: Update AMD cpu microcode * linux-firmware: Add ISH firmware file for Intel Lunar Lake platform * amdgpu: update DMCUB to v0.0.224.0 for Various AMDGPU Asics * cirrus: cs35l41: Update various firmware for ASUS laptops using CS35L41 * amdgpu: Update ISP FW for isp v4.1.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-20=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-firmware-mediatek-20240728-1.1 * kernel-firmware-mellanox-20240728-1.1 * kernel-firmware-atheros-20240728-1.1 * kernel-firmware-chelsio-20240728-1.1 * kernel-firmware-prestera-20240728-1.1 * kernel-firmware-brcm-20240728-1.1 * kernel-firmware-radeon-20240728-1.1 * kernel-firmware-sound-20240728-1.1 * kernel-firmware-i915-20240728-1.1 * kernel-firmware-platform-20240728-1.1 * kernel-firmware-nvidia-20240728-1.1 * kernel-firmware-iwlwifi-20240728-1.1 * kernel-firmware-ath11k-20240728-1.1 * kernel-firmware-ath10k-20240728-1.1 * kernel-firmware-liquidio-20240728-1.1 * kernel-firmware-ueagle-20240728-1.1 * kernel-firmware-marvell-20240728-1.1 * kernel-firmware-mwifiex-20240728-1.1 * kernel-firmware-intel-20240728-1.1 * kernel-firmware-nfp-20240728-1.1 * kernel-firmware-ath12k-20240728-1.1 * kernel-firmware-dpaa2-20240728-1.1 * kernel-firmware-realtek-20240728-1.1 * kernel-firmware-network-20240728-1.1 * ucode-amd-20240728-1.1 * kernel-firmware-qcom-20240728-1.1 * kernel-firmware-all-20240728-1.1 * kernel-firmware-bluetooth-20240728-1.1 * kernel-firmware-bnx2-20240728-1.1 * kernel-firmware-usb-network-20240728-1.1 * kernel-firmware-media-20240728-1.1 * kernel-firmware-ti-20240728-1.1 * kernel-firmware-amdgpu-20240728-1.1 * kernel-firmware-qlogic-20240728-1.1 * kernel-firmware-serial-20240728-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38417.html * https://www.suse.com/security/cve/CVE-2023-47210.html * https://bugzilla.suse.com/show_bug.cgi?id=1219458 * https://bugzilla.suse.com/show_bug.cgi?id=1222319 * https://bugzilla.suse.com/show_bug.cgi?id=1225600 * https://bugzilla.suse.com/show_bug.cgi?id=1225601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:21 -0000 Subject: SUSE-SU-2025:20025-1: important: Security update for python311, python-rpm-macros Message-ID: <174902828105.1737.5580614124996670568@smelt2.prg2.suse.org> # Security update for python311, python-rpm-macros Announcement ID: SUSE-SU-2025:20025-1 Release Date: 2025-02-03T08:50:41Z Rating: important References: * bsc#1174091 * bsc#1189495 * bsc#1221854 * bsc#1226447 * bsc#1226448 * bsc#1227378 * bsc#1228780 * bsc#831629 Cross-References: * CVE-2019-20907 * CVE-2019-9947 * CVE-2020-15523 * CVE-2020-15801 * CVE-2022-25236 * CVE-2023-52425 * CVE-2024-0397 * CVE-2024-0450 * CVE-2024-4032 * CVE-2024-6923 CVSS scores: * CVE-2019-20907 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2019-20907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-9947 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2020-15523 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-15801 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0397 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0397 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-0450 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0450 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-6923 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for python311, python-rpm-macros fixes the following issues: python311: \- CVE-2024-0450: Fixed zipfile module vulnerability with "quoted- overlap" zipbomb (bsc#1221854) \- CVE-2024-4032: Fixed incorrect IPv4 and IPv6 private ranges (bsc#1226448) \- CVE-2024-0397: Fixed memory race condition in ssl.SSLContext certificate store methods (bsc#1226447) \- CVE-2024-6923: Prevent email header injection due to unquoted newlines (bsc#1228780) \- Fixed executable bits for /usr/bin/idle* (bsc#1227378). python-rpm-macros: * Update to version 20240618.c146b29: * Add %FLAVOR_pytest and %FLAVOR_pyunittest variants * Update to version 20240618.1e386da: * Fix python_clone sed regex * Update to version 20240614.02920b8: * Make sure that RPM_BUILD_ROOT env is set * don't eliminate any cmdline arguments in the shebang line * Create python313 macros * Update to version 20240415.c664b45: * Fix typo 310 -> 312 in default-prjconf * Update to version 20240202.501440e: * SPEC0: Drop python39, add python312 to buildset (#169) * Update to version 20231220.98427f3: * fix python2_compile macro * Update to version 20231207.46c2ec3: * make FLAVOR_compile compatible with python2 * Update to version 20231204.dd64e74: * Combine fix_shebang in one line * New macro FLAVOR_fix_shebang_path * Use realpath in %python_clone macro shebang replacement * Compile and fix_shebang in %python_install macros * Update to version 20231010.0a1f0d9: * Revert "Compile and fix_shebang in %python_install macros" * gh#openSUSE/python-rpm-macros#163 * Update to version 20231010.a32e110: * Compile and fix_shebang in %python_install macros * Update to version 20231005.bf2d3ab: * Fix shebang also in sbin with macro _fix_shebang ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-23=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-23=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-curses-3.11.8-3.1 * libpython3_11-1_0-debuginfo-3.11.8-3.1 * python311-base-debuginfo-3.11.8-3.1 * python311-curses-debuginfo-3.11.8-3.1 * libpython3_11-1_0-3.11.8-3.1 * python311-core-debugsource-3.11.8-3.1 * python311-3.11.8-3.1 * python311-base-3.11.8-3.1 * python311-debuginfo-3.11.8-3.1 * python311-debugsource-3.11.8-3.1 * SUSE Linux Micro Extras 6.0 (noarch) * python-rpm-macros-20240618.c146b29-1.1 ## References: * https://www.suse.com/security/cve/CVE-2019-20907.html * https://www.suse.com/security/cve/CVE-2019-9947.html * https://www.suse.com/security/cve/CVE-2020-15523.html * https://www.suse.com/security/cve/CVE-2020-15801.html * https://www.suse.com/security/cve/CVE-2022-25236.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2024-0397.html * https://www.suse.com/security/cve/CVE-2024-0450.html * https://www.suse.com/security/cve/CVE-2024-4032.html * https://www.suse.com/security/cve/CVE-2024-6923.html * https://bugzilla.suse.com/show_bug.cgi?id=1174091 * https://bugzilla.suse.com/show_bug.cgi?id=1189495 * https://bugzilla.suse.com/show_bug.cgi?id=1221854 * https://bugzilla.suse.com/show_bug.cgi?id=1226447 * https://bugzilla.suse.com/show_bug.cgi?id=1226448 * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1228780 * https://bugzilla.suse.com/show_bug.cgi?id=831629 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:12 -0000 Subject: SUSE-SU-2025:20036-1: important: Security update for qemu Message-ID: <174902797298.655.4465364424462936862@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2025:20036-1 Release Date: 2025-02-03T08:53:01Z Rating: important References: * bsc#1221812 * bsc#1227322 * bsc#1229007 Cross-References: * CVE-2024-4467 * CVE-2024-7409 CVSS scores: * CVE-2024-4467 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-4467 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-7409 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for qemu fixes the following issues: * Fix bsc#1221812: * block: Reschedule query-block during qcow2 invalidation (bsc#1221812) * Fix bsc#1229007, CVE-2024-7409: * nbd/server: CVE-2024-7409: Close stray clients at server-stop (bsc#1229007) * nbd/server: CVE-2024-7409: Drop non-negotiating clients (bsc#1229007) * nbd/server: CVE-2024-7409: Cap default max-connections to 100 (bsc#1229007) * nbd/server: Plumb in new args to nbd_client_add() (bsc#1229007, CVE-2024-7409) * nbd: Minor style and typo fixes (bsc#1229007, CVE-2024-7409) * Update to version 8.2.6: Full backport lists (from the various releases) here: https://lore.kernel.org/qemu- devel/1721203806.547734.831464.nullmailer at tls.msk.ru/ Some of the upstream backports are: hw/nvme: fix number of PIDs for FDP RUH update sphinx/qapidoc: Fix to generate doc for explicit, unboxed arguments char- stdio: Restore blocking mode of stdout on exit virtio: remove virtio_tswap16s() call in vring_packed_event_read() virtio-pci: Fix the failure process in kvm_virtio_pci_vector_use_one() block: Parse filenames only when explicitly requested iotests/270: Don't store data-file with json: prefix in image iotests/244: Don't store data-file with protocol in image qcow2: Don't open data_file with BDRV_O_NO_IO (bsc#1227322, CVE-2024-4467) target/arm: Fix FJCVTZS vs flush-to-zero target/arm: Fix VCMLA Dd, Dn, Dm[idx] i386/cpu: fixup number of addressable IDs for processor cores in the physical package tests: Update our CI to use CentOS Stream 9 instead of 8 migration: Fix file migration with fdset tcg/loongarch64: Fix tcg_out_movi vs some pcrel pointers target/sparc: use signed denominator in sdiv helper linux-user: Make TARGET_NR_setgroups affect only the current thread accel/tcg: Fix typo causing tb->page_addr[1] to not be recorded stdvga: fix screen blanking hw/audio/virtio-snd: Always use little endian audio format ui/gtk: Draw guest frame at refresh cycle virtio-net: drop too short packets early target/i386: fix size of EBP writeback in gen_enter() ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-60=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-hw-display-virtio-vga-8.2.6-1.1 * qemu-hw-usb-redirect-8.2.6-1.1 * qemu-debuginfo-8.2.6-1.1 * qemu-audio-spice-debuginfo-8.2.6-1.1 * qemu-hw-display-virtio-gpu-8.2.6-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.6-1.1 * qemu-ui-spice-core-8.2.6-1.1 * qemu-block-curl-debuginfo-8.2.6-1.1 * qemu-pr-helper-8.2.6-1.1 * qemu-tools-debuginfo-8.2.6-1.1 * qemu-ui-spice-core-debuginfo-8.2.6-1.1 * qemu-pr-helper-debuginfo-8.2.6-1.1 * qemu-img-8.2.6-1.1 * qemu-lang-8.2.6-1.1 * qemu-hw-display-qxl-debuginfo-8.2.6-1.1 * qemu-hw-display-qxl-8.2.6-1.1 * qemu-chardev-spice-debuginfo-8.2.6-1.1 * qemu-hw-usb-host-8.2.6-1.1 * qemu-block-iscsi-8.2.6-1.1 * qemu-block-ssh-8.2.6-1.1 * qemu-block-ssh-debuginfo-8.2.6-1.1 * qemu-8.2.6-1.1 * qemu-block-iscsi-debuginfo-8.2.6-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.6-1.1 * qemu-tools-8.2.6-1.1 * qemu-hw-usb-host-debuginfo-8.2.6-1.1 * qemu-ui-opengl-8.2.6-1.1 * qemu-audio-spice-8.2.6-1.1 * qemu-guest-agent-8.2.6-1.1 * qemu-chardev-spice-8.2.6-1.1 * qemu-ksm-8.2.6-1.1 * qemu-debugsource-8.2.6-1.1 * qemu-img-debuginfo-8.2.6-1.1 * qemu-block-curl-8.2.6-1.1 * qemu-ui-opengl-debuginfo-8.2.6-1.1 * qemu-block-rbd-debuginfo-8.2.6-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.6-1.1 * qemu-block-rbd-8.2.6-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.6-1.1 * qemu-guest-agent-debuginfo-8.2.6-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.6-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-x86-8.2.6-1.1 * qemu-x86-debuginfo-8.2.6-1.1 * qemu-accel-tcg-x86-8.2.6-1.1 * qemu-accel-tcg-x86-debuginfo-8.2.6-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-vgabios-8.2.61.16.3_3_ga95067eb-1.1 * qemu-seabios-8.2.61.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.6-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-debuginfo-8.2.6-1.1 * qemu-s390x-8.2.6-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-debuginfo-8.2.6-1.1 * qemu-arm-8.2.6-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4467.html * https://www.suse.com/security/cve/CVE-2024-7409.html * https://bugzilla.suse.com/show_bug.cgi?id=1221812 * https://bugzilla.suse.com/show_bug.cgi?id=1227322 * https://bugzilla.suse.com/show_bug.cgi?id=1229007 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:22 -0000 Subject: SUSE-SU-2025:20034-1: moderate: Security update for python-requests Message-ID: <174902798259.655.13077328109549386925@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:20034-1 Release Date: 2025-02-03T08:52:32Z Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * Update to 2.32.2 * To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is considered deprecated in all versions of Requests>=2.32.0. * Update to 2.32.1 * Fixed an issue where setting verify=False on the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, regardless of the value of verify. (bsc#1224788, CVE-2024-35195) * verify=True now reuses a global SSLContext which should improve request time variance between first and subsequent requests. * Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their vendoring surface area. * Requests has officially added support for CPython 3.12 and dropped support for CPython 3.7. * Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system using hatchling. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-28=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-requests-2.32.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:08:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:08:50 -0000 Subject: SUSE-SU-2025:20045-1: important: Security update for expat Message-ID: <174902813015.627.12035204237185525168@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:20045-1 Release Date: 2025-02-03T08:54:50Z Rating: important References: * bsc#1221289 * bsc#1229930 * bsc#1229931 * bsc#1229932 Cross-References: * CVE-2024-28757 * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 CVSS scores: * CVE-2024-28757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-45492: detect integer overflow in function nextScaffoldPart (bsc#1229932) * CVE-2024-45491: detect integer overflow in dtdCopy (bsc#1229931) * CVE-2024-45490: reject negative len for XML_ParseBuffer (bsc#1229930) * CVE-2024-28757: XML Entity Expansion attack when there is isolated use of external parsers (bsc#1221289) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-44=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * expat-debugsource-2.5.0-3.1 * libexpat1-debuginfo-2.5.0-3.1 * libexpat1-2.5.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28757.html * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://bugzilla.suse.com/show_bug.cgi?id=1221289 * https://bugzilla.suse.com/show_bug.cgi?id=1229930 * https://bugzilla.suse.com/show_bug.cgi?id=1229931 * https://bugzilla.suse.com/show_bug.cgi?id=1229932 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:29 -0000 Subject: SUSE-RU-2025:20023-1: moderate: Recommended update for elemental-system-agent, elemental, systemd-presets-branding-Elemental, elemental-toolkit, elemental-agent, elemental-operator Message-ID: <174902828932.1737.5804181168662813896@smelt2.prg2.suse.org> # Recommended update for elemental-system-agent, elemental, systemd-presets- branding-Elemental, elemental-toolkit, elemental-agent, elemental-operator Announcement ID: SUSE-RU-2025:20023-1 Release Date: 2025-02-03T08:50:21Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for elemental-system-agent, elemental, systemd-presets-branding- Elemental, elemental-toolkit, elemental-agent, elemental-operator fixes the following issues: elemental: \- Update to version v2.1.2 * Fix grub2-x86_64-efi installation * Removing syslinux from base image * Workaround to remove any pre-existing Elemental initrd elemental-agent: \- Update to version 0.5.0+git20240729.4482c01: * Fix rke2 cluster class (#80) * Fix rootfs layout (#76) * Exclude cloud-config-defaults feature (#75) * Use toolkit nightly builds (#74) * Align images to Elemental dev (#73) * Only use essential elemental services (#71) * Actualyze elemental init arguments and improve iso build setup (#70) * Fix missing mtools dependency (#68) * Unify root password * Prevent associating multiple ElementalHosts (#65) * Remove CodeQL github action workaround (#66) * upgrade elemental-toolkit to 2.1.0 version (#61) * tests: align Ginkgo version in the Makefile (#63) * Dockerfiles: ensure /usr/libexec is present on the image FS (#64) * minor/setup_kind_cluster.sh: print the command to write the my-config.yaml (#62) * Fix RKE2 ClusterClass and RKE2 default registration method (#60) * Remove unused Codecov config (#59) * Actualize RKE2 templates (#58) * Remove CodeCov action (#57) * Update codeql action (#56) * Display host phases (#51) * Bump CAPI version (#54) * Print test agent config by default (#55) * Deprecate release-action (#53) * Display association status (#49) * Add registration ready condition (#50) * Prevent kubelet and containerd from running in Recovery (#43) * Mitigate time sync issues on JWT validation (#41) * Improve kubeadm image (#39) \- Update to version 0.5.0+git20240319.13ad570: * Update dependencies and fix CodeQL failure (#36) * Update to go 1.22 (#32) * Update k3s provider urls (#34) * Remove tumbleweed dracut patches (#33) * Refer to CONTROL_PLANE_ENDPOINT_HOST * Update metadata.yaml * Update quickstart (#30) * Remove uninitialized taint from nodes (#29) * Set providerid on nodes (#22) * Bump yip to v1.4.10 \- Initial version 0.5.0 elemental-operator: \- Update to version 1.6.4: * register: always register when called (#816) * Update to version 1.6.3: * Backport to v1.6.x (#796) * Enable PR workflow for v1.6 maintenance branch * Add toggle to automatically delete no longer in sync versions (#780) (#783) * [v1.6.x] Add managedosversion finalizer (#775 & #784) (#782) * Ensure re-sync is triggered * [v1.6.x][BACKPORT] operator: fix ManagedOSVersionChannel sync (#771) * Use YAML content for Elemental Agent config (#765) (#770) * Allow yip configs (#751) (#762) * Update deployment.yaml (#757) (#761) * Flag no longer in sync ManagedOSVersions (#750) (#752) * Let elemental-register digest system hardware data (#748) (#749) * register: don't send new Disks and Controllers data (#741) * Added the ability to create a node reset marker for unmanaged hosts (#731) (#737) * Update to version 1.6.2: * chart: add chart name and version to the operator deployment (#694) * Add Metadata CRD (#717) elemental-system-agent: \- Update to version 0.3.7: * Add support for CATTLE_AGENT_VAR_DIR in suc plan * add the step for creating GH release, and fix typo in filename * Migrate from Drone to GitHub Action * Version bump for Alpine and Kubectl * Add support for CATTLE_AGENT_STRICT_VERIFY|STRICT_VERIFY environment variables to ensure kubeconfig CA data is valid (#171) elemental-toolkit: \- Update to version 2.1.1: * [backport] Disable boot entry if efivars is read-only (#2059) (#2145) * [backport] CI refactor to v2.1.x branch (#2146) * Remove pre-existing Elemental initrds systemd-presets-branding-Elemental: \- Include elemental-register.timer as service enabled by default ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-16=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * elemental-2.1.1-1.1 * elemental-updater-2.1.1-1.1 * systemd-presets-branding-Elemental-20240807-1.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-toolkit-2.1.1-1.1 * elemental-system-agent-0.3.7-1.1 * elemental-register-1.6.4-1.1 * elemental-support-1.6.4-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:01 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:01 -0000 Subject: SUSE-RU-2025:20016-1: critical: Recommended update for python-azure-agent Message-ID: <174902832122.1737.16180478425722238669@smelt2.prg2.suse.org> # Recommended update for python-azure-agent Announcement ID: SUSE-RU-2025:20016-1 Release Date: 2025-02-03T08:48:39Z Rating: critical References: * bsc#1222620 * bsc#1225946 * bsc#1227106 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for python-azure-agent fixes the following issues: * Set Provisioning.Agent parameter to 'cloud-init' in SLE Micro >= 5.5 (bsc#1227106). * Do not require wicked in non-SUSE build environments * Apply python3 interpreter patch in non SLE build environments (bcs#1227067) * Properly handle SELinux context (bsc#1225946) * Preserve an existing config file on upgrade (bsc#1222620) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-15=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python-azure-agent-config-micro-2.9.1.1-2.1 * python-azure-agent-2.9.1.1-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222620 * https://bugzilla.suse.com/show_bug.cgi?id=1225946 * https://bugzilla.suse.com/show_bug.cgi?id=1227106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:48 -0000 Subject: SUSE-SU-2025:20010-1: moderate: Security update for wget Message-ID: <174902836815.1737.3863370990061624379@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2025:20010-1 Release Date: 2025-02-03T08:47:43Z Rating: moderate References: * bsc#1226419 Cross-References: * CVE-2024-38428 CVSS scores: * CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-38428 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-38428 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419) * Update to GNU wget 1.24.5: * Fix how subdomain matches are checked for HSTS. * Wget will now also parse the srcset attribute in HTML tags * Support reading fetchmail style "user" and "passwd" fields from netrc * In some cases, prevent the confusing "Cannot write to... (success)" error messages * Support extremely fast download speeds (TB/s) * Ensure that CSS URLs are corectly quoted * libproxy support is now upstream- drop wget-libproxy.patch ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-11=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * wget-debuginfo-1.24.5-1.1 * wget-1.24.5-1.1 * wget-debugsource-1.24.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38428.html * https://bugzilla.suse.com/show_bug.cgi?id=1226419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:30 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:30 -0000 Subject: SUSE-SU-2025:20013-1: moderate: Security update for podman Message-ID: <174902835088.1737.9485888375164611735@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20013-1 Release Date: 2025-02-03T08:48:39Z Rating: moderate References: * bsc#1227052 Cross-References: * CVE-2024-1753 * CVE-2024-24786 * CVE-2024-3727 * CVE-2024-6104 CVSS scores: * CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-1753 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24786 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2024-6104: Fixed dependency issue with go-retryablehttp: url might write sensitive information to log file (bsc#1227052). * Update to version 4.9.5: * Bump to v4.9.5 * Update release notes for v4.9.5 * fix "concurrent map writes" in network ls compat endpoint * [v4.9] Fix for CVE-2024-3727 * Disable failing bud test * CI Maintenance: Disable machine tests * [CI:DOCS] Allow downgrade of WiX * [CI:DOCS] Force WiX 3.11 * [CI:DOCS] Fix windows installer action * Bump to v4.9.5-dev * Bump to v4.9.4 * Update release notes for v4.9.4 * [v4.9] Bump Buildah to v1.33.7, CVE-2024-1753, CVE-2024-24786 * Add farm command to commands list * Bump to FreeBSD 13.3 (13.2 vanished) * Update health-start-periods docs * Don't update health check status during initialDelaySeconds * image scp: don't require port for ssh URL * Ignore docker's end point config when the final network mode isn't bridge. * Fix running container from docker client with rootful in rootless podman. * [skip-ci] Packit: remove koji and bodhi tasks for v4.9 * Bump to v4.9.4-dev * Remove gitleaks scanning ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-46=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-1.1 * podman-remote-debuginfo-4.9.5-1.1 * podman-remote-4.9.5-1.1 * podman-4.9.5-1.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1753.html * https://www.suse.com/security/cve/CVE-2024-24786.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://bugzilla.suse.com/show_bug.cgi?id=1227052 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:42 -0000 Subject: SUSE-SU-2025:20011-1: critical: Security update for qemu Message-ID: <174902836240.1737.17847874048707198542@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2025:20011-1 Release Date: 2025-02-03T08:47:43Z Rating: critical References: * bsc#1084909 * bsc#1220065 * bsc#1220310 * bsc#1222218 * bsc#1222841 * bsc#1222843 * bsc#1222845 * bsc#1224179 Cross-References: * CVE-2024-26328 * CVE-2024-3446 * CVE-2024-3447 * CVE-2024-3567 CVSS scores: * CVE-2024-26328 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-26328 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-26328 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-3446 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-3446 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-3447 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-3447 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-3567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has four fixes can now be installed. ## Description: This update for qemu fixes the following issues: * Update to version 8.2.5: * target/loongarch: fix a wrong print in cpu dump * ui/sdl2: Allow host to power down screen * target/i386: fix SSE and SSE2 feature check * target/i386: fix xsave.flat from kvm-unit-tests * disas/riscv: Decode all of the pmpcfg and pmpaddr CSRs * target/riscv/kvm.c: Fix the hart bit setting of AIA * target/riscv: rvzicbo: Fixup CBO extension register calculation * target/riscv: do not set mtval2 for non guest-page faults * target/riscv: prioritize pmp errors in raise_mmu_exception() * target/riscv: rvv: Remove redudant SEW checking for vector fp narrow/widen instructions * target/riscv: rvv: Check single width operator for vfncvt.rod.f.f.w * target/riscv: rvv: Check single width operator for vector fp widen instructions * target/riscv: rvv: Fix Zvfhmin checking for vfwcvt.f.f.v and vfncvt.f.f.w instructions * target/riscv/cpu.c: fix Zvkb extension config * target/riscv: Fix the element agnostic function problem * target/riscv/kvm: tolerate KVM disable ext errors * hw/intc/riscv_aplic: APLICs should add child earlier than realize * iotests: test NBD+TLS+iothread * qio: Inherit follow_coroutine_ctx across TLS * target/arm: Disable SVE extensions when SVE is disabled * hw/intc/arm_gic: Fix handling of NS view of GICC_APR * hvf: arm: Fix encodings for ID_AA64PFR1_EL1 and debug System registers * gitlab: use 'setarch -R' to workaround tsan bug * gitlab: use $MAKE instead of 'make' * dockerfiles: add 'MAKE' env variable to remaining containers * gitlab: Update msys2-64bit runner tags * target/i386: no single-step exception after MOV or POP SS * Update to version 8.2.4. * target/sh4: Fix SUBV opcode * target/sh4: Fix ADDV opcode * hw/arm/npcm7xx: Store derivative OTP fuse key in little endian * hw/dmax/xlnx_dpdma: fix handling of address_extension descriptor fields * hw/ufs: Fix buffer overflow bug * tests/avocado: update sunxi kernel from armbian to 6.6.16 * target/loongarch/cpu.c: typo fix: expection * backends/cryptodev-builtin: Fix local_error leaks * nbd/server: Mark negotiation functions as coroutine_fn * nbd/server: do not poll within a coroutine context * linux-user: do_setsockopt: fix SOL_ALG.ALG_SET_KEY * target/riscv/kvm: change timer regs size to u64 * target/riscv/kvm: change KVM_REG_RISCV_FP_D to u64 * target/riscv/kvm: change KVM_REG_RISCV_FP_F to u32 * Update to version 8.2.3. * Update version for 8.2.3 release * ppc/spapr: Initialize max_cpus limit to SPAPR_IRQ_NR_IPIS. * ppc/spapr: Introduce SPAPR_IRQ_NR_IPIS to refer IRQ range for CPU IPIs. * hw/pci-host/ppc440_pcix: Do not expose a bridge device on PCI bus * hw/isa/vt82c686: Keep track of PIRQ/PINT pins separately * virtio-pci: fix use of a released vector * linux-user/x86_64: Handle the vsyscall page in open_self_maps_{2,4} * hw/audio/virtio-snd: Remove unused assignment * hw/net/net_tx_pkt: Fix overrun in update_sctp_checksum() * hw/sd/sdhci: Do not update TRNMOD when Command Inhibit (DAT) is set * hw/net/lan9118: Fix overflow in MIL TX FIFO * hw/net/lan9118: Replace magic '2048' value by MIL_TXFIFO_SIZE definition * backends/cryptodev: Do not abort for invalid session ID * hw/misc/applesmc: Fix memory leak in reset() handler * hw/block/nand: Fix out-of-bound access in NAND block buffer * hw/block/nand: Have blk_load() take unsigned offset and return boolean * hw/block/nand: Factor nand_load_iolen() method out * qemu-options: Fix CXL Fixed Memory Window interleave-granularity typo * hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs * hw/char/virtio-serial-bus: Protect from DMA re-entrancy bugs * hw/display/virtio-gpu: Protect from DMA re-entrancy bugs * mirror: Don't call job_pause_point() under graph lock (bsc#1224179) * Backports and bugfixes: * hw/net/net_tx_pkt: Fix overrun in update_sctp_checksum() (bsc#1222841, CVE-2024-3567) * hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs (bsc#1222843, CVE-2024-3446) * hw/char/virtio-serial-bus: Protect from DMA re-entrancy bugs (bsc#1222843, CVE-2024-3446) * hw/display/virtio-gpu: Protect from DMA re-entrancy bugs (bsc#1222843, CVE-2024-3446) * hw/virtio: Introduce virtio_bh_new_guarded() helper (bsc#1222843, CVE-2024-3446) * hw/sd/sdhci: Do not update TRNMOD when Command Inhibit (DAT) is set (bsc#1222845, CVE-2024-3447) * hw/nvme: Use pcie_sriov_num_vfs() (bsc#1220065, CVE-2024-26328) * Update to version 8.2.2 * chardev/char-socket: Fix TLS io channels sending too much data to the backend * tests/unit/test-util-sockets: Remove temporary file after test * hw/usb/bus.c: PCAP adding 0xA in Windows version * hw/intc/Kconfig: Fix GIC settings when using "\--without-default-devices" * gitlab: force allow use of pip in Cirrus jobs * tests/vm: avoid re-building the VM images all the time * tests/vm: update openbsd image to 7.4 * target/i386: leave the A20 bit set in the final NPT walk * target/i386: remove unnecessary/wrong application of the A20 mask * target/i386: Fix physical address truncation * target/i386: check validity of VMCB addresses * target/i386: mask high bits of CR3 in 32-bit mode * pl031: Update last RTCLR value on write in case it's read back * hw/nvme: fix invalid endian conversion * update edk2 binaries to edk2-stable202402 * update edk2 submodule to edk2-stable202402 * target/ppc: Fix crash on machine check caused by ifetch * target/ppc: Fix lxv/stxv MSR facility check * .gitlab-ci.d/windows.yml: Drop msys2-32bit job * system/vl: Update description for input grab key * docs/system: Update description for input grab key * hw/hppa/Kconfig: Fix building with "configure --without-default-devices" * tests/qtest: Depend on dbus_display1_dep * meson: Explicitly specify dbus-display1.h dependency * audio: Depend on dbus_display1_dep * ui/console: Fix console resize with placeholder surface * ui/clipboard: add asserts for update and request * ui/clipboard: mark type as not available when there is no data * ui: reject extended clipboard message if not activated * target/i386: Generate an illegal opcode exception on cmp instructions with lock prefix * i386/cpuid: Move leaf 7 to correct group * i386/cpuid: Decrease cpuid_i when skipping CPUID leaf 1F * i386/cpu: Mask with XCR0/XSS mask for FEAT_XSAVE_XCR0_HI and FEAT_XSAVE_XSS_HI leafs * i386/cpu: Clear FEAT_XSAVE_XSS_LO/HI leafs when CPUID_EXT_XSAVE is not available * .gitlab-ci/windows.yml: Don't install libusb or spice packages on 32-bit * iotests: Make 144 deterministic again * target/arm: Don't get MDCR_EL2 in pmu_counter_enabled() before checking ARM_FEATURE_PMU * target/arm: Fix SVE/SME gross MTE suppression checks * target/arm: Handle mte in do_ldrq, do_ldro * Address bsc#1220310. Backported upstream commits: * ppc/spapr: Initialize max_cpus limit to SPAPR_IRQ_NR_IPIS * ppc/spapr: Introduce SPAPR_IRQ_NR_IPIS to refer IRQ range for CPU IPIs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-10=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-block-rbd-debuginfo-8.2.5-1.1 * qemu-guest-agent-8.2.5-1.1 * qemu-pr-helper-8.2.5-1.1 * qemu-ui-opengl-8.2.5-1.1 * qemu-block-ssh-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.5-1.1 * qemu-block-curl-8.2.5-1.1 * qemu-ksm-8.2.5-1.1 * qemu-block-curl-debuginfo-8.2.5-1.1 * qemu-chardev-spice-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-gpu-8.2.5-1.1 * qemu-pr-helper-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.5-1.1 * qemu-tools-debuginfo-8.2.5-1.1 * qemu-hw-display-qxl-8.2.5-1.1 * qemu-ui-spice-core-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.5-1.1 * qemu-tools-8.2.5-1.1 * qemu-img-debuginfo-8.2.5-1.1 * qemu-debugsource-8.2.5-1.1 * qemu-ui-spice-core-8.2.5-1.1 * qemu-audio-spice-8.2.5-1.1 * qemu-hw-display-virtio-vga-8.2.5-1.1 * qemu-debuginfo-8.2.5-1.1 * qemu-ui-opengl-debuginfo-8.2.5-1.1 * qemu-hw-usb-redirect-8.2.5-1.1 * qemu-lang-8.2.5-1.1 * qemu-block-iscsi-8.2.5-1.1 * qemu-block-ssh-8.2.5-1.1 * qemu-guest-agent-debuginfo-8.2.5-1.1 * qemu-hw-usb-host-8.2.5-1.1 * qemu-img-8.2.5-1.1 * qemu-8.2.5-1.1 * qemu-block-iscsi-debuginfo-8.2.5-1.1 * qemu-hw-display-qxl-debuginfo-8.2.5-1.1 * qemu-audio-spice-debuginfo-8.2.5-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.5-1.1 * qemu-chardev-spice-8.2.5-1.1 * qemu-block-rbd-8.2.5-1.1 * qemu-hw-usb-host-debuginfo-8.2.5-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-x86-debuginfo-8.2.5-1.1 * qemu-accel-tcg-x86-debuginfo-8.2.5-1.1 * qemu-accel-tcg-x86-8.2.5-1.1 * qemu-x86-8.2.5-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-ipxe-8.2.5-1.1 * qemu-vgabios-8.2.51.16.3_3_ga95067eb-1.1 * qemu-seabios-8.2.51.16.3_3_ga95067eb-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-8.2.5-1.1 * qemu-s390x-debuginfo-8.2.5-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-8.2.5-1.1 * qemu-arm-debuginfo-8.2.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26328.html * https://www.suse.com/security/cve/CVE-2024-3446.html * https://www.suse.com/security/cve/CVE-2024-3447.html * https://www.suse.com/security/cve/CVE-2024-3567.html * https://bugzilla.suse.com/show_bug.cgi?id=1084909 * https://bugzilla.suse.com/show_bug.cgi?id=1220065 * https://bugzilla.suse.com/show_bug.cgi?id=1220310 * https://bugzilla.suse.com/show_bug.cgi?id=1222218 * https://bugzilla.suse.com/show_bug.cgi?id=1222841 * https://bugzilla.suse.com/show_bug.cgi?id=1222843 * https://bugzilla.suse.com/show_bug.cgi?id=1222845 * https://bugzilla.suse.com/show_bug.cgi?id=1224179 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:26 -0000 Subject: SUSE-RU-2025:20033-1: critical: Recommended update for suse-build-key Message-ID: <174902798601.655.5215468100930927419@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2025:20033-1 Release Date: 2025-02-03T08:52:22Z Rating: critical References: * bsc#1229339 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for suse-build-key fixes the following issues: Extended 2048 bit SUSE SLE 12, 15 GA-SP5 key until 2028. (bsc#1229339) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-26=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * suse-build-key-12.0-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229339 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:13 -0000 Subject: SUSE-RU-2025:20026-1: moderate: Recommended update for dracut Message-ID: <174902827385.1737.11961375836970350016@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2025:20026-1 Release Date: 2025-02-03T08:50:41Z Rating: moderate References: * bsc#1208690 * bsc#1226412 * bsc#1226529 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for dracut fixes the following issues: * Update to version 059+suse.567.gadd3169d: * feat(crypt): force the inclusion of crypttab entries with x-initrd.attach (bsc#1226529) * fix(mdraid): try to assemble the missing raid device (bsc#1226412) * fix(dracut-install): continue parsing if ldd prints "cannot be preloaded" (bsc#1208690) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-33=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dracut-059+suse.571.g32b61281-1.1 * dracut-fips-059+suse.571.g32b61281-1.1 * dracut-debugsource-059+suse.571.g32b61281-1.1 * dracut-debuginfo-059+suse.571.g32b61281-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1208690 * https://bugzilla.suse.com/show_bug.cgi?id=1226412 * https://bugzilla.suse.com/show_bug.cgi?id=1226529 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:54 -0000 Subject: SUSE-SU-2025:20017-1: important: Security update for gnutls Message-ID: <174902831464.1737.15610410614591783801@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:20017-1 Release Date: 2025-02-03T08:48:39Z Rating: important References: * bsc#1221242 * bsc#1221746 * bsc#1221747 Cross-References: * CVE-2024-28834 * CVE-2024-28835 CVSS scores: * CVE-2024-28834 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28834 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28835 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-28835 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-28835: certtool crash when verifying a certificate chain (bsc#1221747) * CVE-2024-28834: Fixed side-channel in the deterministic ECDSA (bsc#1221746) * jitterentropy: Release the memory of the entropy collector when using jitterentropy with phtreads as there is also a pre-initialization done in the main thread. (bsc#1221242) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-25=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgnutls30-3.8.3-2.1 * gnutls-debugsource-3.8.3-2.1 * gnutls-debuginfo-3.8.3-2.1 * gnutls-3.8.3-2.1 * libgnutls30-debuginfo-3.8.3-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28834.html * https://www.suse.com/security/cve/CVE-2024-28835.html * https://bugzilla.suse.com/show_bug.cgi?id=1221242 * https://bugzilla.suse.com/show_bug.cgi?id=1221746 * https://bugzilla.suse.com/show_bug.cgi?id=1221747 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:06:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:06:18 -0000 Subject: SUSE-SU-2025:20035-1: moderate: Security update for python-Jinja2 Message-ID: <174902797808.655.2449923634404021985@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20035-1 Release Date: 2025-02-03T08:52:50Z Rating: moderate References: * bsc#1218722 * bsc#1223980 Cross-References: * CVE-2024-22195 * CVE-2024-34064 CVSS scores: * CVE-2024-22195 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-22195 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-22195 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-34064 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-34064 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-34064 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2024-34064, CVE-2024-22195: HTML attribute injection when passing user input as keys to xmlattr filter (bsc#1223980, bsc#1218722) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-37=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-Jinja2-3.1.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22195.html * https://www.suse.com/security/cve/CVE-2024-34064.html * https://bugzilla.suse.com/show_bug.cgi?id=1218722 * https://bugzilla.suse.com/show_bug.cgi?id=1223980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:08 -0000 Subject: SUSE-RU-2025:20027-1: important: Recommended update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp Message-ID: <174902826853.1737.5078613013400678411@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp Announcement ID: SUSE-RU-2025:20027-1 Release Date: 2025-02-03T08:51:00Z Rating: important References: * bsc#1007273 * bsc#1175678 * bsc#1218171 * bsc#1219004 * bsc#1221525 * bsc#1221963 * bsc#1222086 * bsc#1222398 * bsc#1223094 * bsc#1223107 * bsc#1223430 * bsc#1223766 * bsc#1224771 * bsc#1225267 * bsc#1226014 * bsc#1226030 * bsc#1226128 * bsc#1226493 * bsc#1227205 * bsc#1227625 * bsc#1227793 * bsc#1228138 * bsc#1228206 * bsc#1228208 * bsc#1228420 * bsc#1228647 * bsc#1228787 * bsc#1229014 * bsc#1230229 * bsc#1230267 * bsc#1230912 * bsc#1231043 * bsc#222971 * jsc#OBS-301 * jsc#PED-7982 * jsc#PED-8014 * jsc#PED-8018 * jsc#PED-8153 Affected Products: * SUSE Linux Micro 6.0 An update that contains five features and has 33 fixes can now be installed. ## Description: This update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp fixes the following issues: libsolv version 0.7.30: * removed dependency on external find program in the repo2solv tool * bindings: fix return value of repodata.add_solv() * new SOLVER_FLAG_FOCUS_NEW flag * add a conflict to older libsolv-tools to libsolv-tools-base * report unsupported compression in solv_xfopen() with errno * fix return value of repodata.add_solv() in the bindings * fix SHA-224 oid in solv_pgpvrfy * improve updating of installed multiversion packages * fix decision introspection going into an endless loop in some cases * added experimental lua bindings * split libsolv-tools into libsolv-tools-base [jsc#PED-8153] * removed dependency on external find program in the repo2solv tool * bindings: fix return value of repodata.add_solv() * new SOLVER_FLAG_FOCUS_NEW flag * add a conflict to older libsolv-tools to libsolv-tools-base * report unsupported compression in solv_xfopen() with errno * fix return value of repodata.add_solv() in the bindings * fix SHA-224 oid in solv_pgpvrfy * improve updating of installed multiversion packages * fix decision introspection going into an endless loop in some cases * added experimental lua bindings * split libsolv-tools into libsolv-tools-base [jsc#PED-8153] libzypp update to 17.35.12: * PluginFrame: Send unescaped colons in header values (bsc#1231043) According to the STOMP protocol it would be correct to escape a colon in a header- value, but it breaks plugin receivers which do not expect this. The first colon separates header-name from header-value, so escaping in the header- value is not needed anyway. Escaping in the header-value affects especially the urlresolver plugins. The input URL is passed in a header, but sent back as raw data in the frames body. If the plugin receiver does not correctly unescape the URL we may get back a "https\c//" which is not usable. * Do not ignore return value of std::remove_if in MediaSyncFacade (fixes #579) * Fix hang in curl code with no network connection (bsc#1230912) * Deprecate librpmDb::db_const_iterator default ctor (bsc#1230267) It's preferred to explicitly tell the root directory of the system whose database you want to query. * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * Conflicts: zypper <= 1.14.76 * single_rpmtrans: fix installation of .src.rpms (bsc#1228647) * Make sure not to statically linked installed tools (bsc#1228787) * MediaPluginType must be resolved to a valid MediaHandler (bsc#1228208) * Export CredentialManager for legacy YAST versions (bsc#1228420) * Export asSolvable for YAST (bsc#1228420) * Fix 4 typos in zypp.conf. * Fix typo in the geoip update pipeline (bsc#1228206) * Export RepoVariablesStringReplacer for yast2 (bsc#1228138) * Translation: updated .pot file. * Conflict with python zypp-plugin < 0.6.4 (bsc#1227793) Older zypp-plugins reject stomp headers including a '-'. Like the 'content-length' header we may send. * Fix int overflow in Provider (fixes #559) This patch fixes an issue in safe_strtonum which caused timestamps to overflow in the Provider message parser. * Fix error reporting on repoindex.xml parse error (bsc#1227625) * Keep UrlResolverPlugin API public (fixes #560) * Blacklist /snap executables for 'zypper ps' (bsc#1226014) * Fix handling of buddies when applying locks (bsc#1225267) Buddy pairs (like -release package and product) internally share the same status object. When applying locks from query results the locked bit must be set if either item is locked. * Install zypp/APIConfig.h legacy include (fixes #557) * Update soname due to RepoManager refactoring and cleanup. * Workaround broken libsolv-tools-base requirements (fixes openSUSE/zypper#551) * Strip ssl_clientkey from repo urls (bsc#1226030) * Remove protobuf build dependency. * Lazily attach medium during refresh workflows (bsc#1223094) * Refactor RepoManager and add Service workflows. * zypp-tui: Make sure translated texts use the correct textdomain (fixes #551) * Skip libproxy1 requires for tumbleweed. * don't require libproxy1 on tumbleweed, it is optional now * Fix versioning scheme * add one more missing export for libyui-qt-pkg * Revert eintrSafeCall behavior to setting errno to 0. * fix up requires_eq usage for libsolv-tools-base * add one more missing export for PackageKit * switch to reduced size libsolv-tools-base (jsc#PED-8153) * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * Add ZYPP_API for exported functions and switch to visibility=hidden (jsc#PED-8153) * Dynamically resolve libproxy (jsc#PED-8153) * Fix download from gpgkey URL (bsc#1223430, fixes openSUSE/zypper#546) * Don't try to refresh volatile media as long as raw metadata are present (bsc#1223094) * Fix creation of sibling cache dirs with too restrictive mode (bsc#1222398) Some install workflows in YAST may lead to too restrictive (0700) raw cache directories in case of newly created repos. Later commands running with user privileges may not be able to access these repos. * Update RepoStatus fromCookieFile according to the files mtime (bsc#1222086) * TmpFile: Don't call chmod if makeSibling failed. * Fixup New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) Fixed the name of the keyword to "support_superseded" as it was agreed on in jsc#OBS-301. * Add resolver option 'removeUnneeded' to file weak remove jobs for unneeded packages (bsc#1175678) * Add resolver option 'removeOrphaned' for distupgrade (bsc#1221525) * New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) * Tests: fix vsftpd.conf where SUSE and Fedora use different defaults (fixes #522) * Add default stripe minimum (#529) * Don't expose std::optional where YAST/PK explicitly use c++11. * Digest: Avoid using the deprecated OPENSSL_config. * ProblemSolution::skipsPatchesOnly overload to handout the patches. * Remove https->http redirection exceptions for download.opensuse.org. suseconnect-ng updated to 1.12: - Set the filesystem root on zypper when given (bsc#1230229,bsc#1229014) - Added uname as collector - Added SAP workload detection - Added detection of container runtimes - Multiple fixes on ARM64 detection - Use `read_values` for the CPU collector on Z - Fixed data collection for ppc64le - Grab the home directory from /etc/passwd if needed (bsc#1226128) - Build zypper-migration and zypper-packages-search as standalone binaries rather then one single binary - Add --gpg-auto-import-keys flag before action in zypper command (bsc#1219004) - Include /etc/products.d in directories whose content are backed up and restored if a zypper-migration rollback happens. (bsc#1219004) - Add the ability to upload the system uptime logs, produced by the suse-uptime-tracker daemon, to SCC/RMT as part of keepalive report. (jsc#PED-7982) (jsc#PED-8018) - Add support for third party packages in SUSEConnect - Refactor existing system information collection implementation - Fix certificate import for Yast when using a registration proxy with self-signed SSL certificate (bsc#1223107) zypp-plugin updated to 0.6.4: * Fix stomp header regex to include '-' (bsc#1227793) zypper updated to 1.14.77: * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * BuildRequires: libzypp-devel >= 17.35.10. * Fix wrong numbers used in CommitSummary skipped/failed messages. * Show rpm install size before installing (bsc#1224771) If filesystem snapshots are taken before the installation (e.g. by snapper) no disk space is freed by removing old packages. In this case the install size of all packages is a hint how much additional disk space is needed by the new packages static content. * Fix readline setup to handle Ctrl-C and Ctrl-D corrrectly (bsc#1227205) * Let_readline_abort_on_Ctrl-C (bsc#1226493) * packages: add '\--system' to show @System packages (bsc#222971) * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * BuildRequires: libzypp-devel >= 17.33.0. * Delay zypp lock until command options are parsed (bsc#1223766) * Unify message format(fixes #485) * switch cmake build type to RelWithDebInfo * modernize spec file (remove Authors section, use proper macros, remove redundant clean section, don't mark man pages as doc) * switch to -O2 -fvisibility=hidden -fpie: * PIC is not needed as no shared lib is built * fstack-protector-strong is default on modern dists and would be downgraded by fstack-protector * default visibility hidden allows better optimisation * O2 is reducing inlining bloat -> 18% reduced binary size * remove procps requires (was only for ZMD which is dropped) (jsc#PED-8153) * Do not try to refresh repo metadata as non-root user (bsc#1222086) Instead show refresh stats and hint how to update them. * man: Explain how to protect orphaned packages by collecting them in a plaindir repo. * packages: Add --autoinstalled and --userinstalled options to list them. * Don't print 'reboot required' message if download-only or dry-run (fixes #529) Instead point out that a reboot would be required if the option was not used. * Resepect zypper.conf option `showAlias` search commands (bsc#1221963) Repository::asUserString (or Repository::label) respects the zypper.conf option, while name/alias return the property. * dup: New option --remove-orphaned to remove all orphaned packages in dup (bsc#1221525) * info,summary: Support VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) * BuildRequires: libzypp-devel >= 17.32.0. API cleanup and changes for VendorSupportSuperseded. * Show active dry-run/download-only at the commit propmpt. * patch: Add --skip-not-applicable-patches option (closes #514) * Fix printing detailed solver problem description. The problem description() is one rule out possibly many in completeProblemInfo() the solver has chosen to represent the problem. So either description or completeProblemInfo should be printed, but not both. * Fix bash-completion to work with right adjusted numbers in the 1st column too (closes #505) * Set libzypp shutdown request signal on Ctrl+C (fixes #522) * lr REPO: In the detailed view show all baseurls not just the first one (bsc#1218171) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-82=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.30-1.1 * libzypp-debugsource-17.35.12-1.1 * libsolv-tools-0.7.30-1.1 * suseconnect-ng-1.12.0-1.1 * zypper-1.14.77-1.1 * libsolv-tools-base-0.7.30-1.1 * libzypp-17.35.12-1.1 * zypper-debuginfo-1.14.77-1.1 * libzypp-debuginfo-17.35.12-1.1 * libsolv-tools-base-debuginfo-0.7.30-1.1 * libsolv-debugsource-0.7.30-1.1 * zypper-debugsource-1.14.77-1.1 * SUSE Linux Micro 6.0 (noarch) * zypper-needs-restarting-1.14.77-1.1 * python311-zypp-plugin-0.6.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1007273 * https://bugzilla.suse.com/show_bug.cgi?id=1175678 * https://bugzilla.suse.com/show_bug.cgi?id=1218171 * https://bugzilla.suse.com/show_bug.cgi?id=1219004 * https://bugzilla.suse.com/show_bug.cgi?id=1221525 * https://bugzilla.suse.com/show_bug.cgi?id=1221963 * https://bugzilla.suse.com/show_bug.cgi?id=1222086 * https://bugzilla.suse.com/show_bug.cgi?id=1222398 * https://bugzilla.suse.com/show_bug.cgi?id=1223094 * https://bugzilla.suse.com/show_bug.cgi?id=1223107 * https://bugzilla.suse.com/show_bug.cgi?id=1223430 * https://bugzilla.suse.com/show_bug.cgi?id=1223766 * https://bugzilla.suse.com/show_bug.cgi?id=1224771 * https://bugzilla.suse.com/show_bug.cgi?id=1225267 * https://bugzilla.suse.com/show_bug.cgi?id=1226014 * https://bugzilla.suse.com/show_bug.cgi?id=1226030 * https://bugzilla.suse.com/show_bug.cgi?id=1226128 * https://bugzilla.suse.com/show_bug.cgi?id=1226493 * https://bugzilla.suse.com/show_bug.cgi?id=1227205 * https://bugzilla.suse.com/show_bug.cgi?id=1227625 * https://bugzilla.suse.com/show_bug.cgi?id=1227793 * https://bugzilla.suse.com/show_bug.cgi?id=1228138 * https://bugzilla.suse.com/show_bug.cgi?id=1228206 * https://bugzilla.suse.com/show_bug.cgi?id=1228208 * https://bugzilla.suse.com/show_bug.cgi?id=1228420 * https://bugzilla.suse.com/show_bug.cgi?id=1228647 * https://bugzilla.suse.com/show_bug.cgi?id=1228787 * https://bugzilla.suse.com/show_bug.cgi?id=1229014 * https://bugzilla.suse.com/show_bug.cgi?id=1230229 * https://bugzilla.suse.com/show_bug.cgi?id=1230267 * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 * https://bugzilla.suse.com/show_bug.cgi?id=222971 * https://jira.suse.com/browse/OBS-301 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8014 * https://jira.suse.com/browse/PED-8018 * https://jira.suse.com/browse/PED-8153 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:35 -0000 Subject: SUSE-SU-2025:20012-1: important: Security update for libvirt Message-ID: <174902835540.1737.6288603370702555929@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2025:20012-1 Release Date: 2025-02-03T08:47:44Z Rating: important References: * bsc#1222584 * bsc#1223849 * bsc#1226492 Cross-References: * CVE-2024-4418 CVSS scores: * CVE-2024-4418 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4418 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for libvirt fixes the following issues: Security issue fixed: * CVE-2024-4418: rpc: ensure temporary GSource is removed from client event loop (bsc#1223849) Non-security issue fixed: * libxl: Fix domxml-to-native conversion (bsc#1222584) * qemu: Fix migration with custom XML (bsc#1226492) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-40=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libvirt-daemon-driver-storage-core-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-qemu-10.0.0-3.1 * libvirt-daemon-10.0.0-3.1 * libvirt-daemon-driver-nwfilter-10.0.0-3.1 * libvirt-daemon-driver-network-10.0.0-3.1 * libvirt-daemon-driver-qemu-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-direct-10.0.0-3.1 * libvirt-daemon-lock-10.0.0-3.1 * libvirt-daemon-driver-storage-logical-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-10.0.0-3.1 * libvirt-daemon-driver-storage-disk-10.0.0-3.1 * libvirt-daemon-driver-storage-disk-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-core-10.0.0-3.1 * libvirt-daemon-driver-storage-scsi-10.0.0-3.1 * libvirt-daemon-driver-nwfilter-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-secret-debuginfo-10.0.0-3.1 * libvirt-daemon-plugin-lockd-debuginfo-10.0.0-3.1 * libvirt-daemon-log-debuginfo-10.0.0-3.1 * libvirt-daemon-proxy-debuginfo-10.0.0-3.1 * libvirt-debugsource-10.0.0-3.1 * libvirt-daemon-log-10.0.0-3.1 * libvirt-libs-10.0.0-3.1 * libvirt-daemon-driver-storage-mpath-debuginfo-10.0.0-3.1 * libvirt-daemon-common-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-nodedev-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-10.0.0-3.1 * libvirt-daemon-hooks-10.0.0-3.1 * libvirt-daemon-driver-storage-scsi-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-mpath-10.0.0-3.1 * libvirt-daemon-proxy-10.0.0-3.1 * libvirt-daemon-driver-nodedev-10.0.0-3.1 * libvirt-nss-debuginfo-10.0.0-3.1 * libvirt-client-qemu-10.0.0-3.1 * libvirt-libs-debuginfo-10.0.0-3.1 * libvirt-client-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-secret-10.0.0-3.1 * libvirt-daemon-plugin-lockd-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-logical-10.0.0-3.1 * libvirt-nss-10.0.0-3.1 * libvirt-daemon-qemu-10.0.0-3.1 * libvirt-daemon-common-10.0.0-3.1 * libvirt-client-10.0.0-3.1 * libvirt-daemon-driver-network-debuginfo-10.0.0-3.1 * libvirt-daemon-lock-debuginfo-10.0.0-3.1 * libvirt-daemon-debuginfo-10.0.0-3.1 * libvirt-daemon-config-network-10.0.0-3.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-10.0.0-3.1 * libvirt-daemon-driver-storage-rbd-debuginfo-10.0.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4418.html * https://bugzilla.suse.com/show_bug.cgi?id=1222584 * https://bugzilla.suse.com/show_bug.cgi?id=1223849 * https://bugzilla.suse.com/show_bug.cgi?id=1226492 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:33 -0000 Subject: SUSE-SU-2025:20022-1: important: Security update for ca-certificates-mozilla Message-ID: <174902829354.1737.17066890202876232647@smelt2.prg2.suse.org> # Security update for ca-certificates-mozilla Announcement ID: SUSE-SU-2025:20022-1 Release Date: 2025-02-03T08:49:50Z Rating: important References: * bsc#1199079 * bsc#1220356 * bsc#1227525 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for ca-certificates-mozilla fixes the following issues: * Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525) * Added: FIRMAPROFESIONAL CA ROOT-A WEB * Distrust: GLOBALTRUST 2020 * Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356) Added: * CommScope Public Trust ECC Root-01 * CommScope Public Trust ECC Root-02 * CommScope Public Trust RSA Root-01 * CommScope Public Trust RSA Root-02 * D-Trust SBR Root CA 1 2022 * D-Trust SBR Root CA 2 2022 * Telekom Security SMIME ECC Root 2021 * Telekom Security SMIME RSA Root 2023 * Telekom Security TLS ECC Root 2020 * Telekom Security TLS RSA Root 2023 * TrustAsia Global Root CA G3 * TrustAsia Global Root CA G4 Removed: * Autoridad de Certificacion Firmaprofesional CIF A62634068 * Chambers of Commerce Root - 2008 * Global Chambersign Root - 2008 * Security Communication Root CA * Symantec Class 1 Public Primary Certification Authority - G6 * Symantec Class 2 Public Primary Certification Authority - G6 * TrustCor ECA-1 * TrustCor RootCert CA-1 * TrustCor RootCert CA-2 * VeriSign Class 1 Public Primary Certification Authority - G3 * VeriSign Class 2 Public Primary Certification Authority - G3 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-24=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * ca-certificates-mozilla-2.68-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199079 * https://bugzilla.suse.com/show_bug.cgi?id=1220356 * https://bugzilla.suse.com/show_bug.cgi?id=1227525 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:53 -0000 Subject: SUSE-SU-2025:20009-1: critical: Security update for openssh Message-ID: <174902837338.1737.4322594262190487842@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20009-1 Release Date: 2025-02-03T08:47:41Z Rating: critical References: * bsc#1217950 * bsc#1218215 * bsc#1226642 * bsc#1227318 Cross-References: * CVE-2023-48795 * CVE-2023-51385 * CVE-2024-39894 * CVE-2024-6387 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-51385 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51385 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-39894 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39894 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6387 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-6387 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-6387 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2024-39894: Fixed timing attacks against echo-off password entry (bsc#1227318) * CVE-2024-6387: Fixed race condition in a signal handler (bsc#1226642). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-8=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssh-clients-9.6p1-2.1 * openssh-server-config-rootlogin-9.6p1-2.1 * openssh-common-debuginfo-9.6p1-2.1 * openssh-clients-debuginfo-9.6p1-2.1 * openssh-fips-9.6p1-2.1 * openssh-debuginfo-9.6p1-2.1 * openssh-9.6p1-2.1 * openssh-debugsource-9.6p1-2.1 * openssh-common-9.6p1-2.1 * openssh-server-9.6p1-2.1 * openssh-server-debuginfo-9.6p1-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://www.suse.com/security/cve/CVE-2023-51385.html * https://www.suse.com/security/cve/CVE-2024-39894.html * https://www.suse.com/security/cve/CVE-2024-6387.html * https://bugzilla.suse.com/show_bug.cgi?id=1217950 * https://bugzilla.suse.com/show_bug.cgi?id=1218215 * https://bugzilla.suse.com/show_bug.cgi?id=1226642 * https://bugzilla.suse.com/show_bug.cgi?id=1227318 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:15:24 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:15:24 -0000 Subject: SUSE-SU-2025:20043-1: moderate: Security update for libxml2 Message-ID: <174902852454.627.2493315214761257033@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20043-1 Release Date: 2025-02-03T08:54:24Z Rating: moderate References: * bsc#1224282 Cross-References: * CVE-2024-34459 CVSS scores: * CVE-2024-34459 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-34459: Fixed buffer over-read in (bsc#1224282) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-45=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libxml2-2-debuginfo-2.11.6-3.1 * libxml2-tools-2.11.6-3.1 * libxml2-2-2.11.6-3.1 * libxml2-tools-debuginfo-2.11.6-3.1 * libxml2-debugsource-2.11.6-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34459.html * https://bugzilla.suse.com/show_bug.cgi?id=1224282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:27 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:27 -0000 Subject: SUSE-SU-2025:20024-1: important: Security update for unbound Message-ID: <174902828791.1737.16612934779851176796@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2025:20024-1 Release Date: 2025-02-03T08:50:21Z Rating: important References: * bsc#1215628 * bsc#1219823 * bsc#1219826 * bsc#1221164 Cross-References: * CVE-2023-50387 * CVE-2023-50868 * CVE-2024-1931 * CVE-2024-33655 CVSS scores: * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-1931 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1931 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1931 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33655 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for unbound fixes the following issues: * Update to 1.20.0: Features: * The config for discard-timeout, wait-limit, wait-limit-cookie, wait-limit- netblock and wait-limit-cookie-netblock was added, for the fix to the DNSBomb issue. * Merge GH#1027: Introduce 'cache-min-negative-ttl' option. * Merge GH#1043 from xiaoxiaoafeifei: Add loongarch support; updates config.guess(2024-01-01) and config.sub(2024-01-01), verified with upstream. * Implement cachedb-check-when-serve-expired: yes option, default is enabled. When serve expired is enabled with cachedb, it first checks cachedb before serving the expired response. * Fix GH#876: [FR] can unbound-checkconf be silenced when configuration is valid? Bug Fixes: * Fix for the DNSBomb vulnerability CVE-2024-33655. Thanks to Xiang Li from the Network and Information Security Lab of Tsinghua University for reporting it. * Update doc/unbound.doxygen with 'doxygen -u'. Fixes option deprecation warnings and updates with newer defaults. * Remove unused portion from iter_dname_ttl unit test. * Fix validator classification of qtype DNAME for positive and redirection answers, and fix validator signature routine for dealing with the synthesized CNAME for a DNAME without previously encountering it and also for when the qtype is DNAME. * Fix qname minimisation for reply with a DNAME for qtype CNAME that answers it. * Fix doc test so it ignores but outputs unsupported doxygen options. * Fix GH#1021 Inconsistent Behavior with Changing rpz-cname-override and doing a unbound-control reload. * Merge GH#1028: Clearer documentation for tcp-idle-timeout and edns-tcp-keepalive-timeout. * Fix GH#1029: rpz trigger clientip and action rpz-passthru not working as expected. * Fix rpz that the rpz override is taken in case of clientip triggers. Fix that the clientip passthru action is logged. Fix that the clientip localdata action is logged. Fix rpz override action cname for the clientip trigger. * Fix to unify codepath for local alias for rpz cname action override. * Fix rpz for cname override action after nsdname and nsip triggers. * Fix that addrinfo is not kept around but copied and freed, so that log-destaddr uses a copy of the information, much like NSD does. * Merge GH#1030: Persist the openssl and expat directories for repeated Windows builds. * Fix that rpz CNAME content is limited to the max number of cnames. * Fix rpz, it follows iterator CNAMEs for nsip and nsdname and sets the reply query_info values, that is better for debug logging. * Fix rpz that copies the cname override completely to the temp region, so there are no references to the rpz region. * Add rpz unit test for nsip action override. * Fix rpz for qtype CNAME after nameserver trigger. * Fix rpz so that rpz CNAME can apply after rpz CNAME. And fix that clientip and nsip can give a CNAME. * Fix localdata and rpz localdata to match CNAME only if no direct type match is available. * Merge GH#831 from Pierre4012: Improve Windows NSIS installer script (setup.nsi). * For GH#831: Format text, use exclamation icon and explicit label names. * Fix name of unit test for subnet cache response. * Fix GH#1032: The size of subnet_msg_cache calculation mistake cause memory usage increased beyond expectations. * Fix for GH#1032, add safeguard to make table space positive. * Fix comment in lruhash space function. * Fix to add unit test for lruhash space that exercises the routines. * Fix that when the server truncates the pidfile, it does not follow symbolic links. * Fix that the server does not chown the pidfile. * Fix GH#1034: DoT forward-zone via unbound-control. * Fix for crypto related failures to have a better error string. * Fix GH#1035: Potential Bug while parsing port from the "stub-host" string; also affected forward-zones and remote-control host directives. * Fix GH#369: dnstap showing extra responses; for client responses right from the cache when replying with expired data or prefetching. * Fix GH#1040: fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c. * For GH#1040: adjust error text and disallow negative ports in other parts of cfg_mark_ports. * Fix comment syntax for view function views_find_view. * Fix GH#595: unbound-anchor cannot deal with full disk; it will now first write out to a temp file before replacing the original one, like Unbound already does for auto-trust-anchor-file. * Fixup compile without cachedb. * Add test for cachedb serve expired. * Extended test for cachedb serve expired. * Fix makefile dependencies for fake_event.c. * Fix cachedb for serve-expired with serve-expired-reply-ttl. * Fix to not reply serve expired unless enabled for cachedb. * Fix cachedb for serve-expired with serve- expired-client-timeout. * Fixup unit test for cachedb server expired client timeout with a check if response if from upstream or from cachedb. * Fixup cachedb to not refetch when serve-expired-client-timeout is used. * Merge GH#1049 from Petr Men??k: Py_NoSiteFlag is not needed since Python 3.8 * Fix GH#1048: Update ax_pkg_swig.m4 and ax_pthread.m4. * Fix configure, autoconf for GH#1048. * Add checklock feature verbose_locking to trace locks and unlocks. * Fix edns subnet to sort rrset references when storing messages in the cache. This fixes a race condition in the rrset locks. * Merge GH#1053: Remove child delegations from cache when grandchild delegations are returned from parent. * Fix ci workflow for macos for moved install locations. * Fix configure flto check error, by finding grep for it. * Merge GH#1041: Stub and Forward unshare. This has one structure for them and fixes GH#1038: fatal error: Could not initialize thread / error: reading root hints. * Fix to disable fragmentation on systems with IP_DONTFRAG, with a nonzero value for the socket option argument. * Fix doc unit test for out of directory build. * Fix cachedb with serve-expired- client-timeout disabled. The edns subnet module deletes global cache and cachedb cache when it stores a result, and serve-expired is enabled, so that the global reply, that is older than the ecs reply, does not return after the ecs reply expires. * Add unit tests for cachedb and subnet cache expired data. * Man page entry for unbound-checkconf -q. * Cleanup unnecessary strdup calls for EDE strings. * Fix doxygen comment for errinf_to_str_bogus. * Update to 1.19.3: * Features: * Merge PR #973: Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672. * Bug Fixes * Fix unit test parse of origin syntax. * Use 127.0.0.1 explicitly in tests to avoid delays and errors on newer systems. * Fix #964: config.h.in~ backup file in release tar balls. * Merge #968: Replace the obsolescent fgrep with grep -F in tests. * Merge #971: fix 'WARNING: Message has 41 extra bytes at end'. * Fix #969: [FR] distinguish Do53, DoT and DoH in the logs. * Fix dnstap that assertion failed on logging other than UDP and TCP traffic. It lists it as TCP traffic. * Fix to sync the tests script file common.sh. * iana portlist update. * Updated IPv4 and IPv6 address for b.root-servers.net in root hints. * Update test script file common.sh. * Fix tests to use new common.sh functions, wait_logfile and kill_from_pidfile. * Fix #974: doc: default number of outgoing ports without libevent. * Merge #975: Fixed some syntax errors in rpl files. * Fix root_zonemd unit test, it checks that the root ZONEMD verifies, now that the root has a valid ZONEMD. * Update example.conf with cookie options. * Merge #980: DoH: reject non-h2 early. To fix #979: Improve errors for non-HTTP/2 DoH clients. * Merge #985: Add DoH and DoT to dnstap message. * Fix #983: Sha1 runtime insecure change was incomplete. * Remove unneeded newlines and improve indentation in remote control code. * Merge #987: skip edns frag retry if advertised udp payload size is not smaller. * Fix unit test for #987 change in udp1xxx retry packet send. * Merge #988: Fix NLnetLabs#981: dump_cache truncates large records. * Fix to link with -lcrypt32 for OpenSSL 3.2.0 on Windows. * Fix to link with libssp for libcrypto and getaddrinfo check for only header. Also update crosscompile to remove ssp for 32bit. * Merge #993: Update b.root-servers.net also in example config file. * Update workflow for ports to use newer openssl on windows compile. * Fix warning for windres on resource files due to redefinition. * Fix for #997: Print details for SSL certificate failure. * Update error printout for duplicate trust anchors to include the trust anchor name (relates to #920). * Update message TTL when using cached RRSETs. It could result in non-expired messages with expired RRSETs (non-usable messages by Unbound). * Merge #999: Search for protobuf-c with pkg-config. * Fix #1006: Can't find protobuf-c package since #999. * Fix documentation for access-control in the unbound.conf man page. * Merge #1010: Mention REFUSED has the TC bit set with unmatched allow_cookie acl in the manpage. It also fixes the code to match the documentation about clients with a valid cookie that bypass the ratelimit regardless of the allow_cookie acl. * Document the suspend argument for process_ds_response(). * Move github workflows to use checkoutv4. * Fix edns subnet replies for scope zero answers to not get stored in the global cache, and in cachedb, when the upstream replies without an EDNS record. * Fix for #1022: Fix ede prohibited in access control refused answers. * Fix unbound-control-setup.cmd to use 3072 bits so that certificates are long enough for newer OpenSSL versions. * Fix TTL of synthesized CNAME when a DNAME is used from cache. * Fix unbound-control-setup.cmd to have CA v3 basicConstraints, like unbound-control-setup.sh has. * Update to 1.19.2: * Bug Fixes: * Fix CVE-2024-1931, Denial of service when trimming EDE text on positive replies. [bsc#1221164] * Update to 1.19.1: * Bug Fixes: [bsc#1219823, CVE-2023-50387][bsc#1219826, CVE-2023-50868] * Fix CVE-2023-50387, DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers. * Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU. * as we use --disable-explicit-port-randomisation, also disable outgoing-port- permit and outgoing-port-avoid in config file to suppress the related unbound-checkconf warnings on every start * Update to 1.19.0: * Features: * Fix #850: [FR] Ability to use specific database in Redis, with new redis-logical-db configuration option. * Merge #944: Disable EDNS DO. Disable the EDNS DO flag in upstream requests. This can be helpful for devices that cannot handle DNSSEC information. But it should not be enabled otherwise, because that would stop DNSSEC validation. The DNSSEC validation would not work for Unbound itself, and also not for downstream users. Default is no. The option is disable-edns-do: no * Expose the script filename in the Python module environment 'mod_env' instead of the config_file structure which includes the linked list of scripts in a multi Python module setup; fixes #79. * Expose the configured listening and outgoing interfaces, if any, as a list of strings in the Python 'config_file' class instead of the current Swig object proxy; fixes #79. * Mailing list patches from Daniel Gr?ber for DNS64 fallback to plain AAAA when no A record exists for synthesis, and minor DNS64 code refactoring for better readability. * Merge #951: Cachedb no store. The cachedb-no-store: yes option is used to stop cachedb from writing messages to the backend storage. It reads messages when data is available from the backend. The default is no. * Bug Fixes: * Fix for version generation race condition that ignored changes. * Fix #942: 1.18.0 libunbound DNS regression when built without OpenSSL. * Fix for WKS call to getservbyname that creates allocation on exit in unit test by testing numbers first and testing from the services list later. * Fix autoconf 2.69 warnings in configure. * Fix #927: unbound 1.18.0 make test error. Fix make test without SHA1. * Merge #931: Prevent warnings from -Wmissing-prototypes. * Fix to scrub resource records of type A and AAAA that have an inappropriate size. They are removed from responses. * Fix to move msgparse_rrset_remove_rr code to util/msgparse.c. * Fix to add EDE text when RRs have been removed due to length. * Fix to set ede match in unit test for rr length removal. * Fix to print EDE text in readable form in output logs. * Fix send of udp retries when ENOBUFS is returned. It stops looping and also waits for the condition to go away. Reported by Florian Obser. * Fix authority zone answers for obscured DNAMEs and delegations. * Merge #936: Check for c99 with autoconf versions prior to 2.70. * Fix to remove two c99 notations. * Fix rpz tcp-only action with rpz triggers nsdname and nsip. * Fix misplaced comment. * Merge #881: Generalise the proxy protocol code. * Fix #946: Forwarder returns servfail on upstream response noerror no data. * Fix edns subnet so that queries with a source prefix of zero cause the recursor send no edns subnet option to the upstream. * Fix that printout of EDNS options shows the EDNS cookie option by name. * Fix infinite loop when reading multiple lines of input on a broken remote control socket. Addesses #947 and #948. * Fix #949: "could not create control compt". * Fix that cachedb does not warn when serve-expired is disabled about use of serve-expired-reply-ttl and serve-expired-client-timeout. * Fix for #949: Fix pythonmod/ubmodule-tst.py for Python 3.x. * Better fix for infinite loop when reading multiple lines of input on a broken remote control socket, by treating a zero byte line the same as transmission end. Addesses #947 and #948. * For multi Python module setups, clean previously parsed module functions in **main** 's dictionary, if any, so that only current module functions are registered. * Fix #954: Inconsistent RPZ handling for A record returned along with CNAME. * Fixes for the DNS64 patches. * Update the dns64_lookup.rpl test for the DNS64 fallback patch. * Merge #955 from buevsan: fix ipset wrong behavior. * Update testdata/ipset.tdir test for ipset fix. * Fix to print detailed errors when an SSL IO routine fails via SSL_get_error. * Clearer configure text for missing protobuf-c development libraries. * autoconf. * Merge #930 from Stuart Henderson: add void to log_ident_revert_to_default declaration. * Fix #941: dnscrypt doesn't work after upgrade to 1.18 with suggestion by dukeartem to also fix the udp_ancil with dnscrypt. * Fix SSL compile failure for definition in log_crypto_err_io_code_arg. * Fix SSL compile failure for other missing definitions in log_crypto_err_io_code_arg. * Fix compilation without openssl, remove unused function warning. * Mention flex and bison in README.md when building from repository source. * Update to 1.18.0: * Features: * ?dd a metric about the maximum number of collisions in lrushah. * Set max-udp-size default to 1232. This is the same default value as the default value for edns-buffer-size. It restricts client edns buffer size choices, and makes unbound behave similar to other DNS resolvers. * Add harden-unknown-additional option. It removes unknown records from the authority section and additional section. * Added new static zone type block_a to suppress all A queries for specific zones. * [FR] Ability to use Redis unix sockets. * [FR] Ability to set the Redis password. * Features/dropqueuedpackets, with sock-queue-timeout option that drops packets that have been in the socket queue for too long. Added statistics num.queries_timed_out and query.queue_time_us.max that track the socket queue timeouts. * 'eqvinox' Lamparter: NAT64 support. * [FR] Use kernel timestamps for dnstap. * Add cachedb hit stat. Introduces 'num.query.cachedb' as a new statistical counter. * Add SVCB dohpath support. * Add validation EDEs to queries where the CD bit is set. * Add prefetch support for subnet cache entries. * Add EDE (RFC8914) caching. * Add support for EDE caching in cachedb and subnetcache. * Downstream DNS Server Cookies a la RFC7873 and RFC9018. Create server cookies for clients that send client cookies. This needs to be explicitly turned on in the config file with: `answer-cookie: yes`. * Bug Fixes * Response change to NODATA for some ANY queries since 1.12. * Fix not following cleared RD flags potentially enables amplification DDoS attacks. * Set default for harden-unknown-additional to no. So that it does not hamper future protocol developments. * Fix to ignore entirely empty responses, and try at another authority. This turns completely empty responses, a type of noerror/nodata into a servfail, but they do not conform to RFC2308, and the retry can fetch improved content. * Allow TTL refresh of expired error responses. * Fix: Unexpected behavior with client-subnet-always-forward and serve-expired * Fix unbound-dnstap-socket test program to reply the finish frame over a TLS connection correctly. * Fix: reserved identifier violation * Fix: Unencrypted query is sent when forward-tls-upstream: yes is used without tls-cert-bundle * Extra consistency check to make sure that when TLS is requested, either we set up a TLS connection or we return an error. * Fix: NXDOMAIN instead of NOERROR rcode when asked for existing CNAME record. * Fix: Bad interaction with 0 TTL records and serve-expired * Fix RPZ IP responses with trigger rpz-drop on cache entries. * Fix RPZ removal of client-ip, nsip, nsdname triggers from IXFR. * Fix dereference of NULL variable warning in mesh_do_callback. * Fix ip_ratelimit test to work with dig that enables DNS cookies. * Fix for iter_dec_attempts that could cause a hang, part of capsforid and qname minimisation, depending on the settings. * Fix uninitialized memory passed in padding bytes of cmsg to sendmsg. * Fix stat_values test to work with dig that enables DNS cookies. * unbound.service: Main process exited, code=killed, status=11/SEGV. Fixes cachedb configuration handling. * Fix: processQueryResponse() THROWAWAY should be mindful of fail_reply. * Update to 1.20.0: Features: * The config for discard-timeout, wait-limit, wait-limit-cookie, wait-limit- netblock and wait-limit-cookie-netblock was added, for the fix to the DNSBomb issue. * Merge GH#1027: Introduce 'cache-min-negative-ttl' option. * Merge GH#1043 from xiaoxiaoafeifei: Add loongarch support; updates config.guess(2024-01-01) and config.sub(2024-01-01), verified with upstream. * Implement cachedb-check-when-serve-expired: yes option, default is enabled. When serve expired is enabled with cachedb, it first checks cachedb before serving the expired response. * Fix GH#876: [FR] can unbound-checkconf be silenced when configuration is valid? Bug Fixes: * Fix for the DNSBomb vulnerability CVE-2024-33655. Thanks to Xiang Li from the Network and Information Security Lab of Tsinghua University for reporting it. * Update doc/unbound.doxygen with 'doxygen -u'. Fixes option deprecation warnings and updates with newer defaults. * Remove unused portion from iter_dname_ttl unit test. * Fix validator classification of qtype DNAME for positive and redirection answers, and fix validator signature routine for dealing with the synthesized CNAME for a DNAME without previously encountering it and also for when the qtype is DNAME. * Fix qname minimisation for reply with a DNAME for qtype CNAME that answers it. * Fix doc test so it ignores but outputs unsupported doxygen options. * Fix GH#1021 Inconsistent Behavior with Changing rpz-cname-override and doing a unbound-control reload. * Merge GH#1028: Clearer documentation for tcp-idle-timeout and edns-tcp-keepalive-timeout. * Fix GH#1029: rpz trigger clientip and action rpz-passthru not working as expected. * Fix rpz that the rpz override is taken in case of clientip triggers. Fix that the clientip passthru action is logged. Fix that the clientip localdata action is logged. Fix rpz override action cname for the clientip trigger. * Fix to unify codepath for local alias for rpz cname action override. * Fix rpz for cname override action after nsdname and nsip triggers. * Fix that addrinfo is not kept around but copied and freed, so that log-destaddr uses a copy of the information, much like NSD does. * Merge GH#1030: Persist the openssl and expat directories for repeated Windows builds. * Fix that rpz CNAME content is limited to the max number of cnames. * Fix rpz, it follows iterator CNAMEs for nsip and nsdname and sets the reply query_info values, that is better for debug logging. * Fix rpz that copies the cname override completely to the temp region, so there are no references to the rpz region. * Add rpz unit test for nsip action override. * Fix rpz for qtype CNAME after nameserver trigger. * Fix rpz so that rpz CNAME can apply after rpz CNAME. And fix that clientip and nsip can give a CNAME. * Fix localdata and rpz localdata to match CNAME only if no direct type match is available. * Merge GH#831 from Pierre4012: Improve Windows NSIS installer script (setup.nsi). * For GH#831: Format text, use exclamation icon and explicit label names. * Fix name of unit test for subnet cache response. * Fix GH#1032: The size of subnet_msg_cache calculation mistake cause memory usage increased beyond expectations. * Fix for GH#1032, add safeguard to make table space positive. * Fix comment in lruhash space function. * Fix to add unit test for lruhash space that exercises the routines. * Fix that when the server truncates the pidfile, it does not follow symbolic links. * Fix that the server does not chown the pidfile. * Fix GH#1034: DoT forward-zone via unbound-control. * Fix for crypto related failures to have a better error string. * Fix GH#1035: Potential Bug while parsing port from the "stub-host" string; also affected forward-zones and remote-control host directives. * Fix GH#369: dnstap showing extra responses; for client responses right from the cache when replying with expired data or prefetching. * Fix GH#1040: fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c. * For GH#1040: adjust error text and disallow negative ports in other parts of cfg_mark_ports. * Fix comment syntax for view function views_find_view. * Fix GH#595: unbound-anchor cannot deal with full disk; it will now first write out to a temp file before replacing the original one, like Unbound already does for auto-trust-anchor-file. * Fixup compile without cachedb. * Add test for cachedb serve expired. * Extended test for cachedb serve expired. * Fix makefile dependencies for fake_event.c. * Fix cachedb for serve-expired with serve-expired-reply-ttl. * Fix to not reply serve expired unless enabled for cachedb. * Fix cachedb for serve-expired with serve- expired-client-timeout. * Fixup unit test for cachedb server expired client timeout with a check if response if from upstream or from cachedb. * Fixup cachedb to not refetch when serve-expired-client-timeout is used. * Merge GH#1049 from Petr Men??k: Py_NoSiteFlag is not needed since Python 3.8 * Fix GH#1048: Update ax_pkg_swig.m4 and ax_pthread.m4. * Fix configure, autoconf for GH#1048. * Add checklock feature verbose_locking to trace locks and unlocks. * Fix edns subnet to sort rrset references when storing messages in the cache. This fixes a race condition in the rrset locks. * Merge GH#1053: Remove child delegations from cache when grandchild delegations are returned from parent. * Fix ci workflow for macos for moved install locations. * Fix configure flto check error, by finding grep for it. * Merge GH#1041: Stub and Forward unshare. This has one structure for them and fixes GH#1038: fatal error: Could not initialize thread / error: reading root hints. * Fix to disable fragmentation on systems with IP_DONTFRAG, with a nonzero value for the socket option argument. * Fix doc unit test for out of directory build. * Fix cachedb with serve-expired- client-timeout disabled. The edns subnet module deletes global cache and cachedb cache when it stores a result, and serve-expired is enabled, so that the global reply, that is older than the ecs reply, does not return after the ecs reply expires. * Add unit tests for cachedb and subnet cache expired data. * Man page entry for unbound-checkconf -q. * Cleanup unnecessary strdup calls for EDE strings. * Fix doxygen comment for errinf_to_str_bogus. * Update to 1.19.3: * Features: * Merge PR #973: Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672. * Bug Fixes * Fix unit test parse of origin syntax. * Use 127.0.0.1 explicitly in tests to avoid delays and errors on newer systems. * Fix #964: config.h.in~ backup file in release tar balls. * Merge #968: Replace the obsolescent fgrep with grep -F in tests. * Merge #971: fix 'WARNING: Message has 41 extra bytes at end'. * Fix #969: [FR] distinguish Do53, DoT and DoH in the logs. * Fix dnstap that assertion failed on logging other than UDP and TCP traffic. It lists it as TCP traffic. * Fix to sync the tests script file common.sh. * iana portlist update. * Updated IPv4 and IPv6 address for b.root-servers.net in root hints. * Update test script file common.sh. * Fix tests to use new common.sh functions, wait_logfile and kill_from_pidfile. * Fix #974: doc: default number of outgoing ports without libevent. * Merge #975: Fixed some syntax errors in rpl files. * Fix root_zonemd unit test, it checks that the root ZONEMD verifies, now that the root has a valid ZONEMD. * Update example.conf with cookie options. * Merge #980: DoH: reject non-h2 early. To fix #979: Improve errors for non-HTTP/2 DoH clients. * Merge #985: Add DoH and DoT to dnstap message. * Fix #983: Sha1 runtime insecure change was incomplete. * Remove unneeded newlines and improve indentation in remote control code. * Merge #987: skip edns frag retry if advertised udp payload size is not smaller. * Fix unit test for #987 change in udp1xxx retry packet send. * Merge #988: Fix NLnetLabs#981: dump_cache truncates large records. * Fix to link with -lcrypt32 for OpenSSL 3.2.0 on Windows. * Fix to link with libssp for libcrypto and getaddrinfo check for only header. Also update crosscompile to remove ssp for 32bit. * Merge #993: Update b.root-servers.net also in example config file. * Update workflow for ports to use newer openssl on windows compile. * Fix warning for windres on resource files due to redefinition. * Fix for #997: Print details for SSL certificate failure. * Update error printout for duplicate trust anchors to include the trust anchor name (relates to #920). * Update message TTL when using cached RRSETs. It could result in non-expired messages with expired RRSETs (non-usable messages by Unbound). * Merge #999: Search for protobuf-c with pkg-config. * Fix #1006: Can't find protobuf-c package since #999. * Fix documentation for access-control in the unbound.conf man page. * Merge #1010: Mention REFUSED has the TC bit set with unmatched allow_cookie acl in the manpage. It also fixes the code to match the documentation about clients with a valid cookie that bypass the ratelimit regardless of the allow_cookie acl. * Document the suspend argument for process_ds_response(). * Move github workflows to use checkoutv4. * Fix edns subnet replies for scope zero answers to not get stored in the global cache, and in cachedb, when the upstream replies without an EDNS record. * Fix for #1022: Fix ede prohibited in access control refused answers. * Fix unbound-control-setup.cmd to use 3072 bits so that certificates are long enough for newer OpenSSL versions. * Fix TTL of synthesized CNAME when a DNAME is used from cache. * Fix unbound-control-setup.cmd to have CA v3 basicConstraints, like unbound-control-setup.sh has. * Update to 1.19.2: * Bug Fixes: * Fix CVE-2024-1931, Denial of service when trimming EDE text on positive replies. [bsc#1221164] * Update to 1.19.1: * Bug Fixes: [bsc#1219823, CVE-2023-50387][bsc#1219826, CVE-2023-50868] * Fix CVE-2023-50387, DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers. * Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU. * as we use --disable-explicit-port-randomisation, also disable outgoing-port- permit and outgoing-port-avoid in config file to suppress the related unbound-checkconf warnings on every start * Use prefixes instead of sudo in unbound.service (bsc#1215628) * Update to 1.19.0: * Features: * Fix #850: [FR] Ability to use specific database in Redis, with new redis-logical-db configuration option. * Merge #944: Disable EDNS DO. Disable the EDNS DO flag in upstream requests. This can be helpful for devices that cannot handle DNSSEC information. But it should not be enabled otherwise, because that would stop DNSSEC validation. The DNSSEC validation would not work for Unbound itself, and also not for downstream users. Default is no. The option is disable-edns-do: no * Expose the script filename in the Python module environment 'mod_env' instead of the config_file structure which includes the linked list of scripts in a multi Python module setup; fixes #79. * Expose the configured listening and outgoing interfaces, if any, as a list of strings in the Python 'config_file' class instead of the current Swig object proxy; fixes #79. * Mailing list patches from Daniel Gr?ber for DNS64 fallback to plain AAAA when no A record exists for synthesis, and minor DNS64 code refactoring for better readability. * Merge #951: Cachedb no store. The cachedb-no-store: yes option is used to stop cachedb from writing messages to the backend storage. It reads messages when data is available from the backend. The default is no. * Bug Fixes: * Fix for version generation race condition that ignored changes. * Fix #942: 1.18.0 libunbound DNS regression when built without OpenSSL. * Fix for WKS call to getservbyname that creates allocation on exit in unit test by testing numbers first and testing from the services list later. * Fix autoconf 2.69 warnings in configure. * Fix #927: unbound 1.18.0 make test error. Fix make test without SHA1. * Merge #931: Prevent warnings from -Wmissing-prototypes. * Fix to scrub resource records of type A and AAAA that have an inappropriate size. They are removed from responses. * Fix to move msgparse_rrset_remove_rr code to util/msgparse.c. * Fix to add EDE text when RRs have been removed due to length. * Fix to set ede match in unit test for rr length removal. * Fix to print EDE text in readable form in output logs. * Fix send of udp retries when ENOBUFS is returned. It stops looping and also waits for the condition to go away. Reported by Florian Obser. * Fix authority zone answers for obscured DNAMEs and delegations. * Merge #936: Check for c99 with autoconf versions prior to 2.70. * Fix to remove two c99 notations. * Fix rpz tcp-only action with rpz triggers nsdname and nsip. * Fix misplaced comment. * Merge #881: Generalise the proxy protocol code. * Fix #946: Forwarder returns servfail on upstream response noerror no data. * Fix edns subnet so that queries with a source prefix of zero cause the recursor send no edns subnet option to the upstream. * Fix that printout of EDNS options shows the EDNS cookie option by name. * Fix infinite loop when reading multiple lines of input on a broken remote control socket. Addesses #947 and #948. * Fix #949: "could not create control compt". * Fix that cachedb does not warn when serve-expired is disabled about use of serve-expired-reply-ttl and serve-expired-client-timeout. * Fix for #949: Fix pythonmod/ubmodule-tst.py for Python 3.x. * Better fix for infinite loop when reading multiple lines of input on a broken remote control socket, by treating a zero byte line the same as transmission end. Addesses #947 and #948. * For multi Python module setups, clean previously parsed module functions in **main** 's dictionary, if any, so that only current module functions are registered. * Fix #954: Inconsistent RPZ handling for A record returned along with CNAME. * Fixes for the DNS64 patches. * Update the dns64_lookup.rpl test for the DNS64 fallback patch. * Merge #955 from buevsan: fix ipset wrong behavior. * Update testdata/ipset.tdir test for ipset fix. * Fix to print detailed errors when an SSL IO routine fails via SSL_get_error. * Clearer configure text for missing protobuf-c development libraries. * autoconf. * Merge #930 from Stuart Henderson: add void to log_ident_revert_to_default declaration. * Fix #941: dnscrypt doesn't work after upgrade to 1.18 with suggestion by dukeartem to also fix the udp_ancil with dnscrypt. * Fix SSL compile failure for definition in log_crypto_err_io_code_arg. * Fix SSL compile failure for other missing definitions in log_crypto_err_io_code_arg. * Fix compilation without openssl, remove unused function warning. * Mention flex and bison in README.md when building from repository source. * Update to 1.18.0: * Features: * ?dd a metric about the maximum number of collisions in lrushah. * Set max-udp-size default to 1232. This is the same default value as the default value for edns-buffer-size. It restricts client edns buffer size choices, and makes unbound behave similar to other DNS resolvers. * Add harden-unknown-additional option. It removes unknown records from the authority section and additional section. * Added new static zone type block_a to suppress all A queries for specific zones. * [FR] Ability to use Redis unix sockets. * [FR] Ability to set the Redis password. * Features/dropqueuedpackets, with sock-queue-timeout option that drops packets that have been in the socket queue for too long. Added statistics num.queries_timed_out and query.queue_time_us.max that track the socket queue timeouts. * 'eqvinox' Lamparter: NAT64 support. * [FR] Use kernel timestamps for dnstap. * Add cachedb hit stat. Introduces 'num.query.cachedb' as a new statistical counter. * Add SVCB dohpath support. * Add validation EDEs to queries where the CD bit is set. * Add prefetch support for subnet cache entries. * Add EDE (RFC8914) caching. * Add support for EDE caching in cachedb and subnetcache. * Downstream DNS Server Cookies a la RFC7873 and RFC9018. Create server cookies for clients that send client cookies. This needs to be explicitly turned on in the config file with: `answer-cookie: yes`. * Bug Fixes * Response change to NODATA for some ANY queries since 1.12. * Fix not following cleared RD flags potentially enables amplification DDoS attacks. * Set default for harden-unknown-additional to no. So that it does not hamper future protocol developments. * Fix to ignore entirely empty responses, and try at another authority. This turns completely empty responses, a type of noerror/nodata into a servfail, but they do not conform to RFC2308, and the retry can fetch improved content. * Allow TTL refresh of expired error responses. * Fix: Unexpected behavior with client-subnet-always-forward and serve-expired * Fix unbound-dnstap-socket test program to reply the finish frame over a TLS connection correctly. * Fix: reserved identifier violation * Fix: Unencrypted query is sent when forward-tls-upstream: yes is used without tls-cert-bundle * Extra consistency check to make sure that when TLS is requested, either we set up a TLS connection or we return an error. * Fix: NXDOMAIN instead of NOERROR rcode when asked for existing CNAME record. * Fix: Bad interaction with 0 TTL records and serve-expired * Fix RPZ IP responses with trigger rpz-drop on cache entries. * Fix RPZ removal of client-ip, nsip, nsdname triggers from IXFR. * Fix dereference of NULL variable warning in mesh_do_callback. * Fix ip_ratelimit test to work with dig that enables DNS cookies. * Fix for iter_dec_attempts that could cause a hang, part of capsforid and qname minimisation, depending on the settings. * Fix uninitialized memory passed in padding bytes of cmsg to sendmsg. * Fix stat_values test to work with dig that enables DNS cookies. * unbound.service: Main process exited, code=killed, status=11/SEGV. Fixes cachedb configuration handling. * Fix: processQueryResponse() THROWAWAY should be mindful of fail_reply. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-31=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libunbound8-debuginfo-1.21.0-1.1 * unbound-anchor-1.21.0-1.1 * unbound-anchor-debuginfo-1.21.0-1.1 * libunbound8-1.21.0-1.1 * unbound-debugsource-1.21.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://www.suse.com/security/cve/CVE-2024-1931.html * https://www.suse.com/security/cve/CVE-2024-33655.html * https://bugzilla.suse.com/show_bug.cgi?id=1215628 * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1221164 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:38 -0000 Subject: SUSE-SU-2025:20020-1: moderate: Security update for ucode-intel Message-ID: <174902829846.1737.4723933354981011499@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20020-1 Release Date: 2025-02-03T08:49:06Z Rating: moderate References: * bsc#1221323 * bsc#1224277 Cross-References: * CVE-2023-22655 * CVE-2023-28746 * CVE-2023-38575 * CVE-2023-39368 * CVE-2023-43490 * CVE-2023-45733 * CVE-2023-45745 * CVE-2023-46103 * CVE-2023-47855 CVSS scores: * CVE-2023-22655 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N * CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-28746 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39368 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-43490 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2023-45733 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2023-45745 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2023-46103 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47855 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves nine vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20240514 release (bsc#1224277) * CVE-2023-45733: Security updates for INTEL-SA-01051 * CVE-2023-46103: Security updates for INTEL-SA-01052 * CVE-2023-45745,CVE-2023-47855: Security updates for INTEL-SA-01036 * Updated to Intel CPU Microcode 20240312 release. (bsc#1221323) * Security updates for INTEL-SA-INTEL-SA-00972 * CVE-2023-39368: Protection mechanism failure of bus lock regulator for some Intel Processors may allow an unauthenticated user to potentially enable denial of service via network access * Security updates for INTEL-SA-INTEL-SA-00982 * CVE-2023-38575: Non-transparent sharing of return predictor targets between contexts in some Intel Processors may allow an authorized user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-INTEL-SA-00898 * CVE-2023-28746: Information exposure through microarchitectural state after transient execution from some register files for some Intel Atom Processors may allow an authenticated user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-INTEL-SA-00960 * CVE-2023-22655 Protection mechanism failure in some 3rd and 4th Generation Intel Xeon Processors when using Intel SGX or Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access. * Security updates for INTEL-SA-INTEL-SA-01045 * CVE-2023-43490: Incorrect calculation in microcode keying mechanism for some Intel Xeon D Processors with Intel SGX may allow a privileged user to potentially enable information disclosure via local access. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-22=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20240813-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-22655.html * https://www.suse.com/security/cve/CVE-2023-28746.html * https://www.suse.com/security/cve/CVE-2023-38575.html * https://www.suse.com/security/cve/CVE-2023-39368.html * https://www.suse.com/security/cve/CVE-2023-43490.html * https://www.suse.com/security/cve/CVE-2023-45733.html * https://www.suse.com/security/cve/CVE-2023-45745.html * https://www.suse.com/security/cve/CVE-2023-46103.html * https://www.suse.com/security/cve/CVE-2023-47855.html * https://bugzilla.suse.com/show_bug.cgi?id=1221323 * https://bugzilla.suse.com/show_bug.cgi?id=1224277 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:15:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:15:20 -0000 Subject: SUSE-SU-2025:20044-1: important: Security update for the Linux Kernel Message-ID: <174902852008.627.14623952673044927995@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20044-1 Release Date: 2025-02-03T08:54:38Z Rating: important References: * bsc#1012628 * bsc#1193454 * bsc#1194869 * bsc#1205462 * bsc#1208783 * bsc#1213123 * bsc#1214285 * bsc#1215199 * bsc#1220066 * bsc#1220252 * bsc#1220877 * bsc#1221326 * bsc#1221630 * bsc#1221645 * bsc#1221652 * bsc#1221857 * bsc#1222254 * bsc#1222335 * bsc#1222350 * bsc#1222364 * bsc#1222372 * bsc#1222387 * bsc#1222433 * bsc#1222434 * bsc#1222625 * bsc#1222633 * bsc#1222634 * bsc#1222808 * bsc#1222967 * bsc#1222973 * bsc#1223053 * bsc#1223074 * bsc#1223191 * bsc#1223395 * bsc#1223635 * bsc#1223720 * bsc#1223731 * bsc#1223742 * bsc#1223763 * bsc#1223767 * bsc#1223777 * bsc#1223803 * bsc#1224105 * bsc#1224415 * bsc#1224485 * bsc#1224496 * bsc#1224510 * bsc#1224535 * bsc#1224631 * bsc#1224636 * bsc#1224690 * bsc#1224694 * bsc#1224700 * bsc#1224711 * bsc#1225475 * bsc#1225582 * bsc#1225607 * bsc#1225718 * bsc#1225751 * bsc#1225814 * bsc#1225832 * bsc#1225838 * bsc#1225903 * bsc#1226031 * bsc#1226127 * bsc#1226502 * bsc#1226530 * bsc#1226588 * bsc#1226604 * bsc#1226743 * bsc#1226751 * bsc#1226765 * bsc#1226798 * bsc#1226801 * bsc#1226834 * bsc#1226874 * bsc#1226885 * bsc#1226920 * bsc#1227149 * bsc#1227182 * bsc#1227383 * bsc#1227437 * bsc#1227492 * bsc#1227493 * bsc#1227494 * bsc#1227618 * bsc#1227620 * bsc#1227623 * bsc#1227627 * bsc#1227634 * bsc#1227706 * bsc#1227722 * bsc#1227724 * bsc#1227725 * bsc#1227728 * bsc#1227729 * bsc#1227732 * bsc#1227733 * bsc#1227734 * bsc#1227747 * bsc#1227750 * bsc#1227754 * bsc#1227758 * bsc#1227760 * bsc#1227761 * bsc#1227764 * bsc#1227766 * bsc#1227770 * bsc#1227771 * bsc#1227772 * bsc#1227774 * bsc#1227781 * bsc#1227784 * bsc#1227785 * bsc#1227787 * bsc#1227790 * bsc#1227791 * bsc#1227792 * bsc#1227796 * bsc#1227798 * bsc#1227799 * bsc#1227802 * bsc#1227808 * bsc#1227810 * bsc#1227811 * bsc#1227812 * bsc#1227815 * bsc#1227816 * bsc#1227818 * bsc#1227820 * bsc#1227823 * bsc#1227824 * bsc#1227826 * bsc#1227828 * bsc#1227829 * bsc#1227830 * bsc#1227832 * bsc#1227833 * bsc#1227834 * bsc#1227839 * bsc#1227840 * bsc#1227846 * bsc#1227849 * bsc#1227851 * bsc#1227853 * bsc#1227863 * bsc#1227864 * bsc#1227865 * bsc#1227867 * bsc#1227869 * bsc#1227870 * bsc#1227883 * bsc#1227884 * bsc#1227891 * bsc#1227893 * bsc#1227929 * bsc#1227950 * bsc#1227957 * bsc#1227981 * bsc#1228020 * bsc#1228021 * bsc#1228192 * bsc#1228235 * bsc#1228236 * bsc#1228247 * bsc#1228321 * bsc#1228409 * bsc#1228410 * bsc#1228426 * bsc#1228427 * bsc#1228429 * bsc#1228446 * bsc#1228447 * bsc#1228449 * bsc#1228450 * bsc#1228452 * bsc#1228456 * bsc#1228457 * bsc#1228458 * bsc#1228459 * bsc#1228460 * bsc#1228462 * bsc#1228463 * bsc#1228466 * bsc#1228467 * bsc#1228468 * bsc#1228469 * bsc#1228470 * bsc#1228472 * bsc#1228479 * bsc#1228480 * bsc#1228481 * bsc#1228482 * bsc#1228483 * bsc#1228484 * bsc#1228485 * bsc#1228486 * bsc#1228487 * bsc#1228489 * bsc#1228491 * bsc#1228492 * bsc#1228493 * bsc#1228494 * bsc#1228495 * bsc#1228496 * bsc#1228499 * bsc#1228500 * bsc#1228501 * bsc#1228502 * bsc#1228503 * bsc#1228505 * bsc#1228508 * bsc#1228509 * bsc#1228510 * bsc#1228511 * bsc#1228513 * bsc#1228515 * bsc#1228516 * bsc#1228518 * bsc#1228520 * bsc#1228525 * bsc#1228527 * bsc#1228530 * bsc#1228531 * bsc#1228539 * bsc#1228561 * bsc#1228563 * bsc#1228564 * bsc#1228565 * bsc#1228567 * bsc#1228568 * bsc#1228572 * bsc#1228576 * bsc#1228579 * bsc#1228580 * bsc#1228581 * bsc#1228582 * bsc#1228584 * bsc#1228586 * bsc#1228588 * bsc#1228590 * bsc#1228591 * bsc#1228599 * bsc#1228615 * bsc#1228616 * bsc#1228617 * bsc#1228625 * bsc#1228626 * bsc#1228633 * bsc#1228635 * bsc#1228636 * bsc#1228640 * bsc#1228643 * bsc#1228644 * bsc#1228646 * bsc#1228649 * bsc#1228650 * bsc#1228654 * bsc#1228655 * bsc#1228656 * bsc#1228658 * bsc#1228660 * bsc#1228662 * bsc#1228665 * bsc#1228666 * bsc#1228667 * bsc#1228672 * bsc#1228673 * bsc#1228674 * bsc#1228677 * bsc#1228680 * bsc#1228687 * bsc#1228705 * bsc#1228706 * bsc#1228707 * bsc#1228708 * bsc#1228709 * bsc#1228710 * bsc#1228718 * bsc#1228720 * bsc#1228721 * bsc#1228722 * bsc#1228723 * bsc#1228724 * bsc#1228726 * bsc#1228727 * bsc#1228733 * bsc#1228737 * bsc#1228743 * bsc#1228748 * bsc#1228754 * bsc#1228756 * bsc#1228757 * bsc#1228758 * bsc#1228764 * bsc#1228766 * bsc#1228779 * bsc#1228801 * bsc#1228849 * bsc#1228850 * bsc#1228857 * bsc#1228959 * bsc#1228964 * bsc#1228966 * bsc#1228967 * bsc#1228971 * bsc#1228973 * bsc#1228977 * bsc#1228978 * bsc#1228979 * bsc#1228986 * bsc#1228988 * bsc#1228989 * bsc#1228991 * bsc#1228992 * bsc#1229005 * bsc#1229024 * bsc#1229042 * bsc#1229045 * bsc#1229046 * bsc#1229054 * bsc#1229056 * bsc#1229086 * bsc#1229134 * bsc#1229136 * bsc#1229154 * bsc#1229156 * bsc#1229160 * bsc#1229167 * bsc#1229168 * bsc#1229169 * bsc#1229170 * bsc#1229171 * bsc#1229172 * bsc#1229173 * bsc#1229174 * bsc#1229239 * bsc#1229240 * bsc#1229241 * bsc#1229243 * bsc#1229244 * bsc#1229245 * bsc#1229246 * bsc#1229247 * bsc#1229248 * bsc#1229249 * bsc#1229250 * bsc#1229251 * bsc#1229252 * bsc#1229253 * bsc#1229254 * bsc#1229255 * bsc#1229256 * bsc#1229287 * bsc#1229290 * bsc#1229291 * bsc#1229292 * bsc#1229294 * bsc#1229296 * bsc#1229297 * bsc#1229298 * bsc#1229299 * bsc#1229301 * bsc#1229303 * bsc#1229304 * bsc#1229305 * bsc#1229307 * bsc#1229309 * bsc#1229312 * bsc#1229313 * bsc#1229314 * bsc#1229315 * bsc#1229316 * bsc#1229317 * bsc#1229318 * bsc#1229319 * bsc#1229320 * bsc#1229327 * bsc#1229341 * bsc#1229342 * bsc#1229344 * bsc#1229345 * bsc#1229346 * bsc#1229347 * bsc#1229349 * bsc#1229350 * bsc#1229351 * bsc#1229353 * bsc#1229354 * bsc#1229355 * bsc#1229356 * bsc#1229357 * bsc#1229358 * bsc#1229359 * bsc#1229360 * bsc#1229365 * bsc#1229366 * bsc#1229369 * bsc#1229370 * bsc#1229373 * bsc#1229374 * bsc#1229379 * bsc#1229381 * bsc#1229382 * bsc#1229383 * bsc#1229386 * bsc#1229388 * bsc#1229390 * bsc#1229391 * bsc#1229392 * bsc#1229395 * bsc#1229398 * bsc#1229399 * bsc#1229400 * bsc#1229402 * bsc#1229403 * bsc#1229404 * bsc#1229407 * bsc#1229409 * bsc#1229410 * bsc#1229411 * bsc#1229413 * bsc#1229414 * bsc#1229417 * bsc#1229444 * bsc#1229451 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229480 * bsc#1229481 * bsc#1229482 * bsc#1229484 * bsc#1229485 * bsc#1229486 * bsc#1229487 * bsc#1229488 * bsc#1229489 * bsc#1229490 * bsc#1229493 * bsc#1229495 * bsc#1229496 * bsc#1229497 * bsc#1229500 * bsc#1229503 * bsc#1229707 * bsc#1229739 * bsc#1229743 * bsc#1229746 * bsc#1229747 * bsc#1229752 * bsc#1229754 * bsc#1229755 * bsc#1229756 * bsc#1229759 * bsc#1229761 * bsc#1229767 * bsc#1229781 * bsc#1229784 * bsc#1229785 * bsc#1229787 * bsc#1229788 * bsc#1229789 * bsc#1229792 * bsc#1229820 * bsc#1229827 * bsc#1229830 * bsc#1229837 * bsc#1229940 * bsc#1230056 * jsc#PED-10029 * jsc#PED-10045 * jsc#PED-10055 * jsc#PED-10105 * jsc#PED-10108 * jsc#PED-8491 * jsc#PED-8779 * jsc#PED-8954 Cross-References: * CVE-2023-52489 * CVE-2023-52581 * CVE-2023-52668 * CVE-2023-52688 * CVE-2023-52859 * CVE-2023-52885 * CVE-2023-52886 * CVE-2023-52887 * CVE-2023-52889 * CVE-2024-26590 * CVE-2024-26631 * CVE-2024-26637 * CVE-2024-26668 * CVE-2024-26669 * CVE-2024-26677 * CVE-2024-26682 * CVE-2024-26683 * CVE-2024-26735 * CVE-2024-26808 * CVE-2024-26809 * CVE-2024-26812 * CVE-2024-26835 * CVE-2024-26837 * CVE-2024-26849 * CVE-2024-26851 * CVE-2024-26976 * CVE-2024-27010 * CVE-2024-27011 * CVE-2024-27024 * CVE-2024-27049 * CVE-2024-27050 * CVE-2024-27079 * CVE-2024-27403 * CVE-2024-27433 * CVE-2024-27437 * CVE-2024-31076 * CVE-2024-35855 * CVE-2024-35897 * CVE-2024-35902 * CVE-2024-35913 * CVE-2024-35939 * CVE-2024-35949 * CVE-2024-36270 * CVE-2024-36286 * CVE-2024-36288 * CVE-2024-36489 * CVE-2024-36881 * CVE-2024-36907 * CVE-2024-36929 * CVE-2024-36933 * CVE-2024-36939 * CVE-2024-36970 * CVE-2024-36979 * CVE-2024-38563 * CVE-2024-38609 * CVE-2024-38662 * CVE-2024-39476 * CVE-2024-39483 * CVE-2024-39484 * CVE-2024-39486 * CVE-2024-39488 * CVE-2024-39489 * CVE-2024-39491 * CVE-2024-39493 * CVE-2024-39497 * CVE-2024-39499 * CVE-2024-39500 * CVE-2024-39501 * CVE-2024-39505 * CVE-2024-39506 * CVE-2024-39508 * CVE-2024-39509 * CVE-2024-39510 * CVE-2024-40899 * CVE-2024-40900 * CVE-2024-40902 * CVE-2024-40903 * CVE-2024-40904 * CVE-2024-40905 * CVE-2024-40909 * CVE-2024-40910 * CVE-2024-40911 * CVE-2024-40912 * CVE-2024-40913 * CVE-2024-40916 * CVE-2024-40920 * CVE-2024-40921 * CVE-2024-40922 * CVE-2024-40924 * CVE-2024-40926 * CVE-2024-40927 * CVE-2024-40929 * CVE-2024-40930 * CVE-2024-40932 * CVE-2024-40934 * CVE-2024-40936 * CVE-2024-40938 * CVE-2024-40939 * CVE-2024-40941 * CVE-2024-40942 * CVE-2024-40943 * CVE-2024-40944 * CVE-2024-40945 * CVE-2024-40954 * CVE-2024-40956 * CVE-2024-40957 * CVE-2024-40958 * CVE-2024-40959 * CVE-2024-40962 * CVE-2024-40964 * CVE-2024-40967 * CVE-2024-40976 * CVE-2024-40977 * CVE-2024-40978 * CVE-2024-40981 * CVE-2024-40982 * CVE-2024-40984 * CVE-2024-40987 * CVE-2024-40988 * CVE-2024-40989 * CVE-2024-40990 * CVE-2024-40992 * CVE-2024-40994 * CVE-2024-40995 * CVE-2024-40997 * CVE-2024-41000 * CVE-2024-41001 * CVE-2024-41002 * CVE-2024-41004 * CVE-2024-41007 * CVE-2024-41009 * CVE-2024-41010 * CVE-2024-41012 * CVE-2024-41015 * CVE-2024-41016 * CVE-2024-41020 * CVE-2024-41022 * CVE-2024-41024 * CVE-2024-41025 * CVE-2024-41028 * CVE-2024-41032 * CVE-2024-41035 * CVE-2024-41036 * CVE-2024-41037 * CVE-2024-41038 * CVE-2024-41039 * CVE-2024-41040 * CVE-2024-41041 * CVE-2024-41044 * CVE-2024-41045 * CVE-2024-41048 * CVE-2024-41049 * CVE-2024-41050 * CVE-2024-41051 * CVE-2024-41056 * CVE-2024-41057 * CVE-2024-41058 * CVE-2024-41059 * CVE-2024-41060 * CVE-2024-41061 * CVE-2024-41062 * CVE-2024-41063 * CVE-2024-41064 * CVE-2024-41065 * CVE-2024-41066 * CVE-2024-41068 * CVE-2024-41069 * CVE-2024-41070 * CVE-2024-41071 * CVE-2024-41072 * CVE-2024-41073 * CVE-2024-41074 * CVE-2024-41075 * CVE-2024-41076 * CVE-2024-41078 * CVE-2024-41079 * CVE-2024-41080 * CVE-2024-41081 * CVE-2024-41084 * CVE-2024-41087 * CVE-2024-41088 * CVE-2024-41089 * CVE-2024-41092 * CVE-2024-41093 * CVE-2024-41094 * CVE-2024-41095 * CVE-2024-41096 * CVE-2024-41097 * CVE-2024-41098 * CVE-2024-42064 * CVE-2024-42069 * CVE-2024-42070 * CVE-2024-42073 * CVE-2024-42074 * CVE-2024-42076 * CVE-2024-42077 * CVE-2024-42079 * CVE-2024-42080 * CVE-2024-42082 * CVE-2024-42085 * CVE-2024-42086 * CVE-2024-42087 * CVE-2024-42089 * CVE-2024-42090 * CVE-2024-42092 * CVE-2024-42093 * CVE-2024-42095 * CVE-2024-42096 * CVE-2024-42097 * CVE-2024-42098 * CVE-2024-42101 * CVE-2024-42104 * CVE-2024-42105 * CVE-2024-42106 * CVE-2024-42107 * CVE-2024-42109 * CVE-2024-42110 * CVE-2024-42113 * CVE-2024-42114 * CVE-2024-42115 * CVE-2024-42117 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42121 * CVE-2024-42122 * CVE-2024-42124 * CVE-2024-42125 * CVE-2024-42126 * CVE-2024-42127 * CVE-2024-42130 * CVE-2024-42131 * CVE-2024-42132 * CVE-2024-42133 * CVE-2024-42136 * CVE-2024-42137 * CVE-2024-42138 * CVE-2024-42139 * CVE-2024-42141 * CVE-2024-42142 * CVE-2024-42143 * CVE-2024-42144 * CVE-2024-42145 * CVE-2024-42147 * CVE-2024-42148 * CVE-2024-42152 * CVE-2024-42153 * CVE-2024-42155 * CVE-2024-42156 * CVE-2024-42157 * CVE-2024-42158 * CVE-2024-42159 * CVE-2024-42161 * CVE-2024-42162 * CVE-2024-42223 * CVE-2024-42224 * CVE-2024-42225 * CVE-2024-42226 * CVE-2024-42227 * CVE-2024-42228 * CVE-2024-42229 * CVE-2024-42230 * CVE-2024-42232 * CVE-2024-42236 * CVE-2024-42237 * CVE-2024-42238 * CVE-2024-42239 * CVE-2024-42240 * CVE-2024-42241 * CVE-2024-42244 * CVE-2024-42245 * CVE-2024-42246 * CVE-2024-42247 * CVE-2024-42250 * CVE-2024-42253 * CVE-2024-42259 * CVE-2024-42268 * CVE-2024-42269 * CVE-2024-42270 * CVE-2024-42271 * CVE-2024-42274 * CVE-2024-42276 * CVE-2024-42277 * CVE-2024-42278 * CVE-2024-42279 * CVE-2024-42280 * CVE-2024-42281 * CVE-2024-42283 * CVE-2024-42284 * CVE-2024-42285 * CVE-2024-42286 * CVE-2024-42287 * CVE-2024-42288 * CVE-2024-42289 * CVE-2024-42290 * CVE-2024-42291 * CVE-2024-42292 * CVE-2024-42295 * CVE-2024-42298 * CVE-2024-42301 * CVE-2024-42302 * CVE-2024-42303 * CVE-2024-42308 * CVE-2024-42309 * CVE-2024-42310 * CVE-2024-42311 * CVE-2024-42312 * CVE-2024-42313 * CVE-2024-42314 * CVE-2024-42315 * CVE-2024-42316 * CVE-2024-42318 * CVE-2024-42319 * CVE-2024-42320 * CVE-2024-42322 * CVE-2024-43816 * CVE-2024-43817 * CVE-2024-43818 * CVE-2024-43819 * CVE-2024-43821 * CVE-2024-43823 * CVE-2024-43824 * CVE-2024-43825 * CVE-2024-43826 * CVE-2024-43829 * CVE-2024-43830 * CVE-2024-43831 * CVE-2024-43833 * CVE-2024-43834 * CVE-2024-43837 * CVE-2024-43839 * CVE-2024-43840 * CVE-2024-43841 * CVE-2024-43842 * CVE-2024-43846 * CVE-2024-43847 * CVE-2024-43849 * CVE-2024-43850 * CVE-2024-43851 * CVE-2024-43853 * CVE-2024-43854 * CVE-2024-43855 * CVE-2024-43856 * CVE-2024-43858 * CVE-2024-43860 * CVE-2024-43861 * CVE-2024-43863 * CVE-2024-43864 * CVE-2024-43866 * CVE-2024-43867 * CVE-2024-43871 * CVE-2024-43872 * CVE-2024-43873 * CVE-2024-43874 * CVE-2024-43875 * CVE-2024-43876 * CVE-2024-43877 * CVE-2024-43879 * CVE-2024-43880 * CVE-2024-43881 * CVE-2024-43882 * CVE-2024-43883 * CVE-2024-43884 * CVE-2024-43885 * CVE-2024-43889 * CVE-2024-43892 * CVE-2024-43893 * CVE-2024-43894 * CVE-2024-43895 * CVE-2024-43897 * CVE-2024-43899 * CVE-2024-43900 * CVE-2024-43902 * CVE-2024-43903 * CVE-2024-43905 * CVE-2024-43906 * CVE-2024-43907 * CVE-2024-43908 * CVE-2024-43909 * CVE-2024-43911 * CVE-2024-43912 * CVE-2024-44931 * CVE-2024-44938 * CVE-2024-44939 CVSS scores: * CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52489 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52887 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-26837 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26976 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27024 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35913 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41020 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41022 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41024 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41028 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41057 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41057 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41058 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41063 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41065 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42086 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42093 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42097 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42105 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42133 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42136 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42143 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-42144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42155 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42236 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42253 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42271 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42274 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43881 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43883 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43885 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44938 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 383 vulnerabilities, contains eight features and has 87 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 kernel was updated to receive various security bugfixes. This release includes the first live patch. The following security bugs were fixed: * CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326). * CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287,). * CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252). * CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350). * CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ("rxrpc: Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633). * CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808). * CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26837: net: bridge: switchdev: Skip MDB replays of deferred events on offload (bsc#1222973). * CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742). * CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711). * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-36881: mm/userfaultfd: reset ptes when close() for wr-protected ones (bsc#1225718). * CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-36979: net: bridge: mst: fix vlan use-after-free syzbot reported a suspicious rcu usage[1] in bridge's mst code. (bsc#1226604). * CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798). * CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781). * CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784). * CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840). * CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810). * CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811). * CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812). * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823). * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021). * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460). * CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496). * CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518). * CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499). * CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468). * CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462). * CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459). * CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643). * CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646). * CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457). * CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672). * CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42109: netfilter: nf_tables: unconditionall (bsc#1228505). * CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568). * CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500). * CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503). * CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157 git-fixes). * CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-42159: scsi: mpi3mr: sanitise num_phys (bsc#1228754). * CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756). * CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986). * CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one movable task" (bsc#1228978). * CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init(). (bsc#1229402). * CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init(). (bsc#1229404). * CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379). * CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42308: Update DRM patch reference (bsc#1229411) * CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353). * CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316). * CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342). * CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496). * CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827). Additional CVEs were previously fixed and are only mentioned in the metadata. The following non-security bugs were fixed: * ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes). * ACPI: battery: create alarm sysfs attribute atomically (stable-fixes). * ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git- fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes). * ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes). * ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable- fixes). * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes). * ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes). * ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable- fixes). * ALSA: hda/tas2781: Use correct endian conversion (git-fixes). * ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes). * ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git- fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Skip event type filtering for UMP events (git-fixes). * ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes). * ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes). * ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes). * ALSA: timer: Relax start tick time check for slave timer elements (git- fixes). * ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable- fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable- fixes). * ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes). * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes). * ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: amd: Fix for acp init sequence (git-fixes). * ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes). * ASoC: SOF: mediatek: Add missing board compatible (stable-fixes). * ASoC: allow module autoloading for table board_ids (stable-fixes). * ASoC: allow module autoloading for table db1200_pids (stable-fixes). * ASoC: amd: acp: fix module autoloading (git-fixes). * ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable- fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes). * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Add error handling to pair_device() (git-fixes). * Bluetooth: SMP: Fix assumption of Central always being Initiator (git- fixes). * Bluetooth: bnep: Fix out-of-bound access (stable-fixes). * Bluetooth: btintel: Fail setup on error (git-fixes). * Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable- fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable- fixes). * Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes). * Bluetooth: hci_core: Fix LE quote calculation (git-fixes). * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes). * Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes). * Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes). * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git- fixes). * Drop libata patch that caused a regression (bsc#1229054) * HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * Input: MT - limit max slots (stable-fixes). * Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056). * Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes). * Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes). * KVM: Always flush async #PF workqueue when vCPU is being destroyed (git- fixes). * KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git- fixes). * KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869). * KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199). * KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes). * KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes). * KVM: Stop processing _all_ memslots when "null" mmu_notifier handler is found (git-fixes). * KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes). * KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes). * KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git- fixes). * KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git- fixes). * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes). * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git- fixes). * KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes). * KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes). * KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes) * KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes). * KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes). * KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes). * KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes). * KVM: arm64: vgic-v4: Restore pending state on host userspace write (git- fixes). * KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes). * KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes). * KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes). * KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes). * KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes). * KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes). * KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes). * KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * KVM: s390: fix validity interception issue when gisa is switched off (git- fixes bsc#1229167). * KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes). * KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes). * Move upstreamed powerpc patches into sorted section * Move upstreamed sound patches into sorted section * Moved upstreamed ASoC patch into sorted section * NFSD: Support write delegations in LAYOUTGET (git-fixes). * NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes). * PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes). * RDMA/cache: Release GID table even if leak is detected (git-fixes) * RDMA/device: Return error earlier if port in not valid (git-fixes) * RDMA/hns: Check atomic wr length (git-fixes) * RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes) * RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes) * RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes) * RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes) * RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes) * RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes) * RDMA/hns: Fix unmatch exception handling when init eq table fails (git- fixes) * RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes) * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes). * RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes) * RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes) * RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes) * RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes) * RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes) * Revert "ALSA: firewire-lib: obsolete workqueue for period update" (bsc#1208783). * Revert "ALSA: firewire-lib: operate for period elapse event in process context" (bsc#1208783). * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes). * Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git- fixes). * Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes). * Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD" (git-fixes). * Revert "usb: gadget: uvc: cleanup request when not in correct state" (stable-fixes). * Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes). * SUNRPC: Fix a race to wake a sync task (git-fixes). * SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * Squashfs: fix variable overflow triggered by sysbot (git-fixes). * USB: serial: debug: do not echo input by default (stable-fixes). * Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834) * Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920) * Update patch references for ASoC regression fixes (bsc#1229045 bsc#1229046) * afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes). * apparmor: unpack transition table if dfa is not present (bsc#1226031). * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: barrier: Restore spec_bar() macro (git-fixes) * arm64: cputype: Add Cortex-A720 definitions (git-fixes) * arm64: cputype: Add Cortex-A725 definitions (git-fixes) * arm64: cputype: Add Cortex-X1C definitions (git-fixes) * arm64: cputype: Add Cortex-X3 definitions (git-fixes) * arm64: cputype: Add Cortex-X4 definitions (git-fixes) * arm64: cputype: Add Cortex-X925 definitions (git-fixes) * arm64: cputype: Add Neoverse-V3 definitions (git-fixes) * arm64: dts: imx8mp: Add NPU Node (git-fixes) * arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes) * arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes) * arm64: dts: imx8mp: add HDMI power-domains (git-fixes) * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes) * arm64: errata: Expand speculative SSBS workaround (git-fixes) * arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files. * arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git- fixes) * ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable- fixes). * ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable- fixes). * blacklist.conf: Add libata upstream revert entry (bsc#1229054) * bnxt_re: Fix imm_data endianness (git-fixes) * bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes) * bpf, lpm: Fix check prefixlen before walking trie (git-fixes). * bpf/tests: Remove duplicate JSGT tests (git-fixes). * bpf: Add crosstask check to __bpf_get_stack (git-fixes). * bpf: Detect IP == ksym.end as part of BPF program (git-fixes). * bpf: Ensure proper register state printing for cond jumps (git-fixes). * bpf: Fix a few selftest failures due to llvm18 change (git-fixes). * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903). * bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes). * bpf: Fix kfunc callback register type handling (git-fixes). * bpf: Fix prog_array_map_poke_run map poke update (git-fixes). * bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes). * bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git- fixes). * bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes). * bpf: Set uattr->batch.count as zero before batched update or deletion (git- fixes). * bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git- fixes). * bpf: enforce precision of R0 on callback return (git-fixes). * bpf: extract bpf_ctx_convert_map logic and make it more reusable (git- fixes). * bpf: fix control-flow graph checking in privileged mode (git-fixes). * bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes). * bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes). * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes). * bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git- fixes). * bpftool: Align output skeleton ELF code (git-fixes). * bpftool: Fix -Wcast-qual warning (git-fixes). * bpftool: Silence build warning about calloc() (git-fixes). * bpftool: mark orphaned programs during prog show (git-fixes). * btrfs: add a btrfs_finish_ordered_extent helper (git-fixes). * btrfs: add a is_data_bbio helper (git-fixes). * btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes). * btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321). * btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes). * btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes). * btrfs: factor out a can_finish_ordered_extent helper (git-fixes). * btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes). * btrfs: fix double inode unlock for direct IO sync writes (git-fixes). * btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes). * btrfs: fix leak of qgroup extent records after transaction abort (git- fixes). * btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git- fixes). * btrfs: limit write bios to a single ordered extent (git-fixes). * btrfs: make btrfs_finish_ordered_extent() return void (git-fixes). * btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes). * btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes). * btrfs: open code end_extent_writepage in end_bio_extent_writepage (git- fixes). * btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes). * btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes). * btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes). * btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes). * btrfs: remove btrfs_add_ordered_extent (git-fixes). * btrfs: rename err to ret in btrfs_direct_write() (git-fixes). * btrfs: uninline some static inline helpers from tree-log.h (git-fixes). * btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git- fixes). * btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes). * btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes). * btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete direct writes (git- fixes). * btrfs: use irq safe locking when running and adding delayed iputs (git- fixes). * cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand- mode (bsc#1229245). * cachefiles: add missing lock protection when polling (bsc#1229256). * cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244). * cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249). * cachefiles: cancel all requests for the object that is being dropped (bsc#1229255). * cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251). * cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246). * cachefiles: introduce object ondemand state (bsc#1229239). * cachefiles: make on-demand read killable (bsc#1229252). * cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243). * cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250). * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253). * cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248). * cachefiles: resend an open request if the read request's object is closed (bsc#1229241). * cachefiles: stop sending new request when dropping object (bsc#1229254). * can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes). * can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * ceph: periodically flush the cap releases (bsc#1230056). * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801). * cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254). * cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254). * cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254). * cgroup: Remove unnecessary list_empty() (bsc#1222254). * cgroup: preserve KABI of cgroup_root (bsc#1222254). * char: xillybus: Check USB endpoints when probing device (git-fixes). * char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes). * char: xillybus: Refine workqueue handling (git-fixes). * clk: en7523: fix rate divider for slic and spi clocks (git-fixes). * clk: qcom: Park shared RCGs upon registration (git-fixes). * clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git- fixes). * clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git- fixes). * clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git- fixes). * clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes). * clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes). * clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes). * clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes). * clocksource/drivers/sh_cmt: Address race condition for clock events (stable- fixes). * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * cxl/region: Move cxl_dpa_to_region() work to the region driver (bsc#1228472) * dev/parport: fix the array out-of-bounds risk (stable-fixes). * device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes). * dmaengine: dw: Add memory bus width verification (git-fixes). * dmaengine: dw: Add peripheral bus width verification (git-fixes). * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes). * driver core: Fix uevent_show() vs driver detach race (git-fixes). * drm/admgpu: fix dereferencing null pointer context (stable-fixes). * drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes). * drm/amd/display: Add null checker before passing variables (stable-fixes). * drm/amd/display: Adjust cursor position (git-fixes). * drm/amd/display: Check for NULL pointer (stable-fixes). * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable- fixes). * drm/amd/display: avoid using null object of framebuffer (git-fixes). * drm/amd/display: fix cursor offset on rotation 180 (git-fixes). * drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes). * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable- fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes). * drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable- fixes). * drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes). * drm/amdgpu: Actually check flags for all context ops (stable-fixes). * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes). * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes). * drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes). * drm/amdgpu: Validate TA binary size (stable-fixes). * drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * drm/amdgpu: fix potential resource leak warning (stable-fixes). * drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable- fixes). * drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes). * drm/client: fix null pointer dereference in drm_client_modeset_probe (git- fixes). * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes). * drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes). * drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes). * drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes). * drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes). * drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes). * drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git- fixes). * drm/lima: set gp bus_stop bit before hard reset (stable-fixes). * drm/mediatek/dp: Fix spurious kfree() (git-fixes). * drm/msm/dp: fix the max supported bpp logic (git-fixes). * drm/msm/dp: reset the link phy params before link training (git-fixes). * drm/msm/dpu: capture snapshot on the first commit_done timeout (stable- fixes). * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes). * drm/msm/dpu: do not play tricks with debug macros (git-fixes). * drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes). * drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes). * drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable- fixes). * drm/msm/dpu: take plane rotation into account for wide planes (git-fixes). * drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes). * drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable- fixes). * drm/msm/mdss: Rename path references to mdp_path (stable-fixes). * drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes). * drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes). * drm/nouveau: prime: fix refcount underflow (git-fixes). * drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes). * drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024). * drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes). * drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes). * drm/virtio: Fix type of dma-fence context variable (git-fixes). * drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes). * drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes). * drm/vmwgfx: Fix prime with external buffers (git-fixes). * efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes). * evm: do not copy up 'security.evm' xattr (git-fixes). * firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes). * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455). * fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456). * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git- fixes). * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git- fixes). * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git- fixes). * gfs2: setattr_chown: Add missing initialization (git-fixes). * gpio: mlxbf3: Support shutdown() function (git-fixes). * gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable- fixes). * gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes). * hwmon: (ltc2992) Avoid division by zero (stable-fixes). * hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes). * hwmon: (pc87360) Bounds check data->innr usage (stable-fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: riic: avoid potential division by zero (stable-fixes). * i2c: smbus: Improve handling of stuck alerts (git-fixes). * i2c: smbus: Send alert notifications to all devices if source not found (git-fixes). * i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes). * i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable- fixes). * i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable- fixes). * i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes). * ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737). * io_uring/advise: support 64-bit lengths (git-fixes). * io_uring: Drop per-ctx dummy_ubuf (git-fixes). * io_uring: Fix probe of disabled operations (git-fixes). * io_uring: fix io_match_task must_hold (git-fixes). * io_uring: tighten task exit cancellations (git-fixes). * iommu/amd: Convert comma to semicolon (git-fixes). * iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes). * iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git- fixes). * ip6_tunnel: Fix broken GRO (bsc#1229444). * ipv6: sr: fix incorrect unregister order (git-fixes). * irqdomain: Fixed unbalanced fwnode get and put (git-fixes). * jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes). * jfs: define xtree root and page independently (git-fixes). * jfs: fix null ptr deref in dtInsertEntry (git-fixes). * jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git- fixes). * jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes). * jump_label: Fix the fix, brown paper bags galore (git-fixes). * jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git- fixes). * kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes). * kABI workaround for sound core UMP conversion (stable-fixes). * kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783) * kcov: properly check for softirq context (git-fixes). * kernel-binary: generate and install compile_commands.json (bsc#1228971) * kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134). * kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git- fixes). * kprobes: Fix to check symbol prefixes correctly (git-fixes). * kprobes: Prohibit probing on CFI preamble symbol (git-fixes). * kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168). * libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes). * libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git- fixes). * libbpf: Fix faccessat() usage on Android (git-fixes). * libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395). * md/md-bitmap: fix writing non bitmap pages (git-fixes). * md/raid1: set max_sectors during early return from choose_slow_rdev() (git- fixes). * md/raid1: support read error check (git-fixes). * md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes). * md/raid5: fix spares errors about rcu usage (git-fixes). * md/raid5: recheck if reshape has finished with device_lock held (git-fixes). * md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git- fixes). * md: add a mddev_add_trace_msg helper (git-fixes). * md: add check for sleepers in md_wakeup_thread() (git-fixes). * md: change the return value type of md_write_start to void (git-fixes). * md: do not account sync_io if iostats of the disk is disabled (git-fixes). * md: do not delete safemode_timer in mddev_suspend (git-fixes). * md: factor out a helper exceed_read_errors() to check read_errors (git- fixes). * md: fix a suspicious RCU usage warning (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: amphion: Remove lock in s_ctrl callback (stable-fixes). * media: drivers/media/dvb-core: copy user arrays safely (stable-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes). * media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes). * media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes). * media: uvcvideo: Ignore empty TS packets (stable-fixes). * media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes). * media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes). * memcg: protect concurrent access to mem_cgroup_idr (git-fixes). * memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes). * memory: tegra: Skip SID programming if SID registers are not set (stable- fixes). * minmax: add a few more MIN_T/MAX_T users (bsc#1229024). * minmax: avoid overly complicated constant expressions in VM code (bsc#1229024). * minmax: do not use max() in situations that want a C constant expression (bsc#1229024). * minmax: fix up min3() and max3() too (bsc#1229024). * minmax: improve macro expansion and type checking (bsc#1229024). * minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024). * minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024). * minmax: simplify min()/max()/clamp() implementation (bsc#1229024). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes). * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes). * mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes). * net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451). * net/iucv: fix use after free in iucv_sock_close() (bsc#1228973). * net/rds: fix possible cp null dereference (git-fixes). * net/sched: initialize noop_qdisc owner (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes). * net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757). * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: missing check virtio (git-fixes). * net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes). * net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes). * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462). * nfc: pn533: Add poll mod list filling check (git-fixes). * nfs: do not invalidate dentries on transient errors (git-fixes). * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * nfs: make the rpc_stat per net namespace (git-fixes). * nfs: pass explicit offset/count to trace events (git-fixes). * nfs: propagate readlink errors in nfs_symlink_filler (git-fixes). * nouveau/firmware: use dma non-coherent allocator (git-fixes). * nvme-multipath: find NUMA path only for online numa-node (git-fixes). * nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706). * nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706). * nvme-pci: Fix the instructions for disabling power management (git-fixes). * nvme-pci: add missing condition check for existence of mapped data (git- fixes). * nvme-pci: do not directly handle subsys reset fallout (bsc#1220066). * nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857). * nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857). * nvme-tcp: check for invalidated or revoked key (bsc#1221857). * nvme-tcp: sanitize TLS key handling (bsc#1221857). * nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857). * nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes). * nvme: avoid double free special payload (git-fixes). * nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git- fixes). * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * nvme: split off TLS sysfs attributes into a separate group (bsc#1221857). * nvme: tcp: remove unnecessary goto statement (bsc#1221857). * nvme_core: scan namespaces asynchronously (bsc#1224105). * nvmet-auth: fix nvmet_auth hash error handling (git-fixes). * nvmet: always initialize cqe.result (git-fixes). * nvmet: do not return 'reserved' for empty TSAS values (git-fixes). * nvmet: fix a possible leak when destroy a ctrl during qp establishment (git- fixes). * nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes). * pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git- fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779). * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779). * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779). * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779). * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779). * platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes). * platform/x86: lg-laptop: fix %s null argument warning (stable-fixes). * power: supply: axp288_charger: Fix constant_charge_voltage writes (git- fixes). * power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes). * power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869). * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869). * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869). * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869). * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869). * printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607). * reiserfs: fix uninit-value in comp_keys (git-fixes). * rtc: nct3018y: fix possible NULL dereference (stable-fixes). * s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171). * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173). * s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452). * s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174). * s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172). * s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172). * s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720). * s390/pkey: introduce dynamic debugging for pkey (bsc#1228720). * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169). * s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170). * samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes). * samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes). * sbitmap: use READ_ONCE to access map->word (stable-fixes). * scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857). * scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857). * scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857). * scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857). * scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857). * scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857). * scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857). * scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Indent help text (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes). * selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903). * selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes). * selftests/bpf: Add netkit to tc_redirect selftest (git-fixes). * selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes). * selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes). * selftests/bpf: Fix erroneous bitmask operation (git-fixes). * selftests/bpf: Fix issues in setup_classid_environment() (git-fixes). * selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes). * selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes). * selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes). * selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes). * selftests/bpf: Make linked_list failure test more robust (git-fixes). * selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git- fixes). * selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes). * selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes). * selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes). * selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git- fixes). * selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes). * selftests/bpf: satisfy compiler by having explicit return in btf test (git- fixes). * serial: core: check uartclk for zero to avoid divide by zero (stable-fixes). * soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes). * soc: qcom: pmic_glink: Actually communicate when remote goes down (git- fixes). * soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes). * spi: Add empty versions of ACPI functions (stable-fixes). * spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes). * spi: microchip-core: switch to use modern name (stable-fixes). * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes). * spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes). * squashfs: squashfs_read_data need to check if the length is 0 (git-fixes). * ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes). * staging: iio: resolver: ad2s1210: fix use before initialization (stable- fixes). * staging: ks7010: disable bh on tx_dev_lock (stable-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849). * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes). * swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git- fixes). * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes). * thermal/drivers/broadcom: Fix race between removal and clock disable (git- fixes). * thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix timing issue with parallel threads in perf bench wake-up- parallel (bsc#1227747). * tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes). * tools/resolve_btfids: Fix cross-compilation to non-host endianness (git- fixes). * tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git- fixes). * tools/resolve_btfids: fix build with musl libc (git-fixes). * trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes). * tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * tty: atmel_serial: use the correct RTS flag (git-fixes). * tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git- fixes). * usb: cdnsp: fix for Link TRB with TC (git-fixes). * usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes). * usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usb: gadget: core: Check for unset descriptor (git-fixes). * usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes). * usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes). * usb: gadget: u_serial: Set start_delayed during suspend (git-fixes). * usb: gadget: uvc: cleanup request when not in correct state (stable-fixes). * usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes). * usb: typec: fsa4480: Check if the chip is really there (git-fixes). * usb: typec: fsa4480: Relax CHIP_ID check (git-fixes). * usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes). * usb: typec: fsa4480: rework mux & switch setup to handle more states (git- fixes). * usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes). * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes). * vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * vhost/vsock: always initialize seqpacket_allow (git-fixes). * vhost: Release worker mutex during flushes (git-fixes). * vhost: Use virtqueue mutex for swapping worker (git-fixes). * virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes). * virtio-crypto: handle config changed by work queue (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtiofs: forbid newlines in tags (bsc#1229940). * wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable- fixes). * wifi: ath12k: fix soft lockup on suspend (git-fixes). * wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes). * wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes). * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes). * wifi: mac80211: use monitor sdata with driver only if desired (git-fixes). * wifi: mwifiex: duplicate static structs used in driver instances (git- fixes). * wifi: nl80211: disallow setting special AP channel widths (stable-fixes). * wifi: nl80211: do not give key data to userspace (stable-fixes). * wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes). * wifi: wfx: repair open network AP mode (git-fixes). * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454). * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454). * x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git- fixes). * x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes). * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes). * x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes). * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes). * x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git- fixes). * x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes). * x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes). * x86/numa: Introduce numa_fill_memblks() (git-fixes). * x86/pci: Skip early E820 check for ECAM region (git-fixes). * x86/xen: Convert comma to semicolon (git-fixes). * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes). * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * xfs: allow cross-linking special files without project quota (git-fixes). * xfs: allow symlinks with short remote targets (bsc#1229160). * xfs: allow unlinked symlinks and dirs with zero size (git-fixes). * xfs: attr forks require attr, not attr2 (git-fixes). * xfs: convert comma to semicolon (git-fixes). * xfs: do not use current->journal_info (git-fixes). * xfs: fix unlink vs cluster buffer instantiation race (git-fixes). * xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes). * xfs: journal geometry is not properly bounds checked (git-fixes). * xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes). * xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes). * xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git- fixes). * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes). * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes). * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-61=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-61=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-6.4.0-19.1 * kernel-macros-6.4.0-19.1 * kernel-devel-6.4.0-19.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-19.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-19.1 * kernel-default-debuginfo-6.4.0-19.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_2-debugsource-1-1.1 * kernel-livepatch-6_4_0-19-default-1-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-1-1.1 * kernel-default-livepatch-6.4.0-19.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-19.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-19.1 * kernel-kvmsmall-debugsource-6.4.0-19.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-17.1.1.51 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-19.1 * kernel-default-6.4.0-19.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-19.1 * kernel-64kb-devel-6.4.0-19.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-obs-build-debugsource-6.4.0-19.1 * kernel-syms-6.4.0-19.1 * kernel-default-devel-6.4.0-19.1 * kernel-default-debugsource-6.4.0-19.1 * kernel-obs-build-6.4.0-19.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-19.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52489.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52668.html * https://www.suse.com/security/cve/CVE-2023-52688.html * https://www.suse.com/security/cve/CVE-2023-52859.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2023-52886.html * https://www.suse.com/security/cve/CVE-2023-52887.html * https://www.suse.com/security/cve/CVE-2023-52889.html * https://www.suse.com/security/cve/CVE-2024-26590.html * https://www.suse.com/security/cve/CVE-2024-26631.html * https://www.suse.com/security/cve/CVE-2024-26637.html * https://www.suse.com/security/cve/CVE-2024-26668.html * https://www.suse.com/security/cve/CVE-2024-26669.html * https://www.suse.com/security/cve/CVE-2024-26677.html * https://www.suse.com/security/cve/CVE-2024-26682.html * https://www.suse.com/security/cve/CVE-2024-26683.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26809.html * https://www.suse.com/security/cve/CVE-2024-26812.html * https://www.suse.com/security/cve/CVE-2024-26835.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-26849.html * https://www.suse.com/security/cve/CVE-2024-26851.html * https://www.suse.com/security/cve/CVE-2024-26976.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-27011.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-27049.html * https://www.suse.com/security/cve/CVE-2024-27050.html * https://www.suse.com/security/cve/CVE-2024-27079.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-27433.html * https://www.suse.com/security/cve/CVE-2024-27437.html * https://www.suse.com/security/cve/CVE-2024-31076.html * https://www.suse.com/security/cve/CVE-2024-35855.html * https://www.suse.com/security/cve/CVE-2024-35897.html * https://www.suse.com/security/cve/CVE-2024-35902.html * https://www.suse.com/security/cve/CVE-2024-35913.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36270.html * https://www.suse.com/security/cve/CVE-2024-36286.html * https://www.suse.com/security/cve/CVE-2024-36288.html * https://www.suse.com/security/cve/CVE-2024-36489.html * https://www.suse.com/security/cve/CVE-2024-36881.html * https://www.suse.com/security/cve/CVE-2024-36907.html * https://www.suse.com/security/cve/CVE-2024-36929.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-36939.html * https://www.suse.com/security/cve/CVE-2024-36970.html * https://www.suse.com/security/cve/CVE-2024-36979.html * https://www.suse.com/security/cve/CVE-2024-38563.html * https://www.suse.com/security/cve/CVE-2024-38609.html * https://www.suse.com/security/cve/CVE-2024-38662.html * https://www.suse.com/security/cve/CVE-2024-39476.html * https://www.suse.com/security/cve/CVE-2024-39483.html * https://www.suse.com/security/cve/CVE-2024-39484.html * https://www.suse.com/security/cve/CVE-2024-39486.html * https://www.suse.com/security/cve/CVE-2024-39488.html * https://www.suse.com/security/cve/CVE-2024-39489.html * https://www.suse.com/security/cve/CVE-2024-39491.html * https://www.suse.com/security/cve/CVE-2024-39493.html * https://www.suse.com/security/cve/CVE-2024-39497.html * https://www.suse.com/security/cve/CVE-2024-39499.html * https://www.suse.com/security/cve/CVE-2024-39500.html * https://www.suse.com/security/cve/CVE-2024-39501.html * https://www.suse.com/security/cve/CVE-2024-39505.html * https://www.suse.com/security/cve/CVE-2024-39506.html * https://www.suse.com/security/cve/CVE-2024-39508.html * https://www.suse.com/security/cve/CVE-2024-39509.html * https://www.suse.com/security/cve/CVE-2024-39510.html * https://www.suse.com/security/cve/CVE-2024-40899.html * https://www.suse.com/security/cve/CVE-2024-40900.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-40903.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40905.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40911.html * https://www.suse.com/security/cve/CVE-2024-40912.html * https://www.suse.com/security/cve/CVE-2024-40913.html * https://www.suse.com/security/cve/CVE-2024-40916.html * https://www.suse.com/security/cve/CVE-2024-40920.html * https://www.suse.com/security/cve/CVE-2024-40921.html * https://www.suse.com/security/cve/CVE-2024-40922.html * https://www.suse.com/security/cve/CVE-2024-40924.html * https://www.suse.com/security/cve/CVE-2024-40926.html * https://www.suse.com/security/cve/CVE-2024-40927.html * https://www.suse.com/security/cve/CVE-2024-40929.html * https://www.suse.com/security/cve/CVE-2024-40930.html * https://www.suse.com/security/cve/CVE-2024-40932.html * https://www.suse.com/security/cve/CVE-2024-40934.html * https://www.suse.com/security/cve/CVE-2024-40936.html * https://www.suse.com/security/cve/CVE-2024-40938.html * https://www.suse.com/security/cve/CVE-2024-40939.html * https://www.suse.com/security/cve/CVE-2024-40941.html * https://www.suse.com/security/cve/CVE-2024-40942.html * https://www.suse.com/security/cve/CVE-2024-40943.html * https://www.suse.com/security/cve/CVE-2024-40944.html * https://www.suse.com/security/cve/CVE-2024-40945.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-40956.html * https://www.suse.com/security/cve/CVE-2024-40957.html * https://www.suse.com/security/cve/CVE-2024-40958.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-40962.html * https://www.suse.com/security/cve/CVE-2024-40964.html * https://www.suse.com/security/cve/CVE-2024-40967.html * https://www.suse.com/security/cve/CVE-2024-40976.html * https://www.suse.com/security/cve/CVE-2024-40977.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40981.html * https://www.suse.com/security/cve/CVE-2024-40982.html * https://www.suse.com/security/cve/CVE-2024-40984.html * https://www.suse.com/security/cve/CVE-2024-40987.html * https://www.suse.com/security/cve/CVE-2024-40988.html * https://www.suse.com/security/cve/CVE-2024-40989.html * https://www.suse.com/security/cve/CVE-2024-40990.html * https://www.suse.com/security/cve/CVE-2024-40992.html * https://www.suse.com/security/cve/CVE-2024-40994.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41001.html * https://www.suse.com/security/cve/CVE-2024-41002.html * https://www.suse.com/security/cve/CVE-2024-41004.html * https://www.suse.com/security/cve/CVE-2024-41007.html * https://www.suse.com/security/cve/CVE-2024-41009.html * https://www.suse.com/security/cve/CVE-2024-41010.html * https://www.suse.com/security/cve/CVE-2024-41012.html * https://www.suse.com/security/cve/CVE-2024-41015.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41020.html * https://www.suse.com/security/cve/CVE-2024-41022.html * https://www.suse.com/security/cve/CVE-2024-41024.html * https://www.suse.com/security/cve/CVE-2024-41025.html * https://www.suse.com/security/cve/CVE-2024-41028.html * https://www.suse.com/security/cve/CVE-2024-41032.html * https://www.suse.com/security/cve/CVE-2024-41035.html * https://www.suse.com/security/cve/CVE-2024-41036.html * https://www.suse.com/security/cve/CVE-2024-41037.html * https://www.suse.com/security/cve/CVE-2024-41038.html * https://www.suse.com/security/cve/CVE-2024-41039.html * https://www.suse.com/security/cve/CVE-2024-41040.html * https://www.suse.com/security/cve/CVE-2024-41041.html * https://www.suse.com/security/cve/CVE-2024-41044.html * https://www.suse.com/security/cve/CVE-2024-41045.html * https://www.suse.com/security/cve/CVE-2024-41048.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-41050.html * https://www.suse.com/security/cve/CVE-2024-41051.html * https://www.suse.com/security/cve/CVE-2024-41056.html * https://www.suse.com/security/cve/CVE-2024-41057.html * https://www.suse.com/security/cve/CVE-2024-41058.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41061.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41063.html * https://www.suse.com/security/cve/CVE-2024-41064.html * https://www.suse.com/security/cve/CVE-2024-41065.html * https://www.suse.com/security/cve/CVE-2024-41066.html * https://www.suse.com/security/cve/CVE-2024-41068.html * https://www.suse.com/security/cve/CVE-2024-41069.html * https://www.suse.com/security/cve/CVE-2024-41070.html * https://www.suse.com/security/cve/CVE-2024-41071.html * https://www.suse.com/security/cve/CVE-2024-41072.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41074.html * https://www.suse.com/security/cve/CVE-2024-41075.html * https://www.suse.com/security/cve/CVE-2024-41076.html * https://www.suse.com/security/cve/CVE-2024-41078.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41080.html * https://www.suse.com/security/cve/CVE-2024-41081.html * https://www.suse.com/security/cve/CVE-2024-41084.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-41088.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-41093.html * https://www.suse.com/security/cve/CVE-2024-41094.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-41096.html * https://www.suse.com/security/cve/CVE-2024-41097.html * https://www.suse.com/security/cve/CVE-2024-41098.html * https://www.suse.com/security/cve/CVE-2024-42064.html * https://www.suse.com/security/cve/CVE-2024-42069.html * https://www.suse.com/security/cve/CVE-2024-42070.html * https://www.suse.com/security/cve/CVE-2024-42073.html * https://www.suse.com/security/cve/CVE-2024-42074.html * https://www.suse.com/security/cve/CVE-2024-42076.html * https://www.suse.com/security/cve/CVE-2024-42077.html * https://www.suse.com/security/cve/CVE-2024-42079.html * https://www.suse.com/security/cve/CVE-2024-42080.html * https://www.suse.com/security/cve/CVE-2024-42082.html * https://www.suse.com/security/cve/CVE-2024-42085.html * https://www.suse.com/security/cve/CVE-2024-42086.html * https://www.suse.com/security/cve/CVE-2024-42087.html * https://www.suse.com/security/cve/CVE-2024-42089.html * https://www.suse.com/security/cve/CVE-2024-42090.html * https://www.suse.com/security/cve/CVE-2024-42092.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42095.html * https://www.suse.com/security/cve/CVE-2024-42096.html * https://www.suse.com/security/cve/CVE-2024-42097.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42101.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42105.html * https://www.suse.com/security/cve/CVE-2024-42106.html * https://www.suse.com/security/cve/CVE-2024-42107.html * https://www.suse.com/security/cve/CVE-2024-42109.html * https://www.suse.com/security/cve/CVE-2024-42110.html * https://www.suse.com/security/cve/CVE-2024-42113.html * https://www.suse.com/security/cve/CVE-2024-42114.html * https://www.suse.com/security/cve/CVE-2024-42115.html * https://www.suse.com/security/cve/CVE-2024-42117.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42121.html * https://www.suse.com/security/cve/CVE-2024-42122.html * https://www.suse.com/security/cve/CVE-2024-42124.html * https://www.suse.com/security/cve/CVE-2024-42125.html * https://www.suse.com/security/cve/CVE-2024-42126.html * https://www.suse.com/security/cve/CVE-2024-42127.html * https://www.suse.com/security/cve/CVE-2024-42130.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42132.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-42136.html * https://www.suse.com/security/cve/CVE-2024-42137.html * https://www.suse.com/security/cve/CVE-2024-42138.html * https://www.suse.com/security/cve/CVE-2024-42139.html * https://www.suse.com/security/cve/CVE-2024-42141.html * https://www.suse.com/security/cve/CVE-2024-42142.html * https://www.suse.com/security/cve/CVE-2024-42143.html * https://www.suse.com/security/cve/CVE-2024-42144.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42147.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-42152.html * https://www.suse.com/security/cve/CVE-2024-42153.html * https://www.suse.com/security/cve/CVE-2024-42155.html * https://www.suse.com/security/cve/CVE-2024-42156.html * https://www.suse.com/security/cve/CVE-2024-42157.html * https://www.suse.com/security/cve/CVE-2024-42158.html * https://www.suse.com/security/cve/CVE-2024-42159.html * https://www.suse.com/security/cve/CVE-2024-42161.html * https://www.suse.com/security/cve/CVE-2024-42162.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42224.html * https://www.suse.com/security/cve/CVE-2024-42225.html * https://www.suse.com/security/cve/CVE-2024-42226.html * https://www.suse.com/security/cve/CVE-2024-42227.html * https://www.suse.com/security/cve/CVE-2024-42228.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-42236.html * https://www.suse.com/security/cve/CVE-2024-42237.html * https://www.suse.com/security/cve/CVE-2024-42238.html * https://www.suse.com/security/cve/CVE-2024-42239.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-42241.html * https://www.suse.com/security/cve/CVE-2024-42244.html * https://www.suse.com/security/cve/CVE-2024-42245.html * https://www.suse.com/security/cve/CVE-2024-42246.html * https://www.suse.com/security/cve/CVE-2024-42247.html * https://www.suse.com/security/cve/CVE-2024-42250.html * https://www.suse.com/security/cve/CVE-2024-42253.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42268.html * https://www.suse.com/security/cve/CVE-2024-42269.html * https://www.suse.com/security/cve/CVE-2024-42270.html * https://www.suse.com/security/cve/CVE-2024-42271.html * https://www.suse.com/security/cve/CVE-2024-42274.html * https://www.suse.com/security/cve/CVE-2024-42276.html * https://www.suse.com/security/cve/CVE-2024-42277.html * https://www.suse.com/security/cve/CVE-2024-42278.html * https://www.suse.com/security/cve/CVE-2024-42279.html * https://www.suse.com/security/cve/CVE-2024-42280.html * https://www.suse.com/security/cve/CVE-2024-42281.html * https://www.suse.com/security/cve/CVE-2024-42283.html * https://www.suse.com/security/cve/CVE-2024-42284.html * https://www.suse.com/security/cve/CVE-2024-42285.html * https://www.suse.com/security/cve/CVE-2024-42286.html * https://www.suse.com/security/cve/CVE-2024-42287.html * https://www.suse.com/security/cve/CVE-2024-42288.html * https://www.suse.com/security/cve/CVE-2024-42289.html * https://www.suse.com/security/cve/CVE-2024-42290.html * https://www.suse.com/security/cve/CVE-2024-42291.html * https://www.suse.com/security/cve/CVE-2024-42292.html * https://www.suse.com/security/cve/CVE-2024-42295.html * https://www.suse.com/security/cve/CVE-2024-42298.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-42302.html * https://www.suse.com/security/cve/CVE-2024-42303.html * https://www.suse.com/security/cve/CVE-2024-42308.html * https://www.suse.com/security/cve/CVE-2024-42309.html * https://www.suse.com/security/cve/CVE-2024-42310.html * https://www.suse.com/security/cve/CVE-2024-42311.html * https://www.suse.com/security/cve/CVE-2024-42312.html * https://www.suse.com/security/cve/CVE-2024-42313.html * https://www.suse.com/security/cve/CVE-2024-42314.html * https://www.suse.com/security/cve/CVE-2024-42315.html * https://www.suse.com/security/cve/CVE-2024-42316.html * https://www.suse.com/security/cve/CVE-2024-42318.html * https://www.suse.com/security/cve/CVE-2024-42319.html * https://www.suse.com/security/cve/CVE-2024-42320.html * https://www.suse.com/security/cve/CVE-2024-42322.html * https://www.suse.com/security/cve/CVE-2024-43816.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43818.html * https://www.suse.com/security/cve/CVE-2024-43819.html * https://www.suse.com/security/cve/CVE-2024-43821.html * https://www.suse.com/security/cve/CVE-2024-43823.html * https://www.suse.com/security/cve/CVE-2024-43824.html * https://www.suse.com/security/cve/CVE-2024-43825.html * https://www.suse.com/security/cve/CVE-2024-43826.html * https://www.suse.com/security/cve/CVE-2024-43829.html * https://www.suse.com/security/cve/CVE-2024-43830.html * https://www.suse.com/security/cve/CVE-2024-43831.html * https://www.suse.com/security/cve/CVE-2024-43833.html * https://www.suse.com/security/cve/CVE-2024-43834.html * https://www.suse.com/security/cve/CVE-2024-43837.html * https://www.suse.com/security/cve/CVE-2024-43839.html * https://www.suse.com/security/cve/CVE-2024-43840.html * https://www.suse.com/security/cve/CVE-2024-43841.html * https://www.suse.com/security/cve/CVE-2024-43842.html * https://www.suse.com/security/cve/CVE-2024-43846.html * https://www.suse.com/security/cve/CVE-2024-43847.html * https://www.suse.com/security/cve/CVE-2024-43849.html * https://www.suse.com/security/cve/CVE-2024-43850.html * https://www.suse.com/security/cve/CVE-2024-43851.html * https://www.suse.com/security/cve/CVE-2024-43853.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-43855.html * https://www.suse.com/security/cve/CVE-2024-43856.html * https://www.suse.com/security/cve/CVE-2024-43858.html * https://www.suse.com/security/cve/CVE-2024-43860.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://www.suse.com/security/cve/CVE-2024-43863.html * https://www.suse.com/security/cve/CVE-2024-43864.html * https://www.suse.com/security/cve/CVE-2024-43866.html * https://www.suse.com/security/cve/CVE-2024-43867.html * https://www.suse.com/security/cve/CVE-2024-43871.html * https://www.suse.com/security/cve/CVE-2024-43872.html * https://www.suse.com/security/cve/CVE-2024-43873.html * https://www.suse.com/security/cve/CVE-2024-43874.html * https://www.suse.com/security/cve/CVE-2024-43875.html * https://www.suse.com/security/cve/CVE-2024-43876.html * https://www.suse.com/security/cve/CVE-2024-43877.html * https://www.suse.com/security/cve/CVE-2024-43879.html * https://www.suse.com/security/cve/CVE-2024-43880.html * https://www.suse.com/security/cve/CVE-2024-43881.html * https://www.suse.com/security/cve/CVE-2024-43882.html * https://www.suse.com/security/cve/CVE-2024-43883.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43885.html * https://www.suse.com/security/cve/CVE-2024-43889.html * https://www.suse.com/security/cve/CVE-2024-43892.html * https://www.suse.com/security/cve/CVE-2024-43893.html * https://www.suse.com/security/cve/CVE-2024-43894.html * https://www.suse.com/security/cve/CVE-2024-43895.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-43899.html * https://www.suse.com/security/cve/CVE-2024-43900.html * https://www.suse.com/security/cve/CVE-2024-43902.html * https://www.suse.com/security/cve/CVE-2024-43903.html * https://www.suse.com/security/cve/CVE-2024-43905.html * https://www.suse.com/security/cve/CVE-2024-43906.html * https://www.suse.com/security/cve/CVE-2024-43907.html * https://www.suse.com/security/cve/CVE-2024-43908.html * https://www.suse.com/security/cve/CVE-2024-43909.html * https://www.suse.com/security/cve/CVE-2024-43911.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-44931.html * https://www.suse.com/security/cve/CVE-2024-44938.html * https://www.suse.com/security/cve/CVE-2024-44939.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1193454 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1208783 * https://bugzilla.suse.com/show_bug.cgi?id=1213123 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220066 * https://bugzilla.suse.com/show_bug.cgi?id=1220252 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1221326 * https://bugzilla.suse.com/show_bug.cgi?id=1221630 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221652 * https://bugzilla.suse.com/show_bug.cgi?id=1221857 * https://bugzilla.suse.com/show_bug.cgi?id=1222254 * https://bugzilla.suse.com/show_bug.cgi?id=1222335 * https://bugzilla.suse.com/show_bug.cgi?id=1222350 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222387 * https://bugzilla.suse.com/show_bug.cgi?id=1222433 * https://bugzilla.suse.com/show_bug.cgi?id=1222434 * https://bugzilla.suse.com/show_bug.cgi?id=1222625 * https://bugzilla.suse.com/show_bug.cgi?id=1222633 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1222808 * https://bugzilla.suse.com/show_bug.cgi?id=1222967 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223053 * https://bugzilla.suse.com/show_bug.cgi?id=1223074 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223395 * https://bugzilla.suse.com/show_bug.cgi?id=1223635 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223742 * https://bugzilla.suse.com/show_bug.cgi?id=1223763 * https://bugzilla.suse.com/show_bug.cgi?id=1223767 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1223803 * https://bugzilla.suse.com/show_bug.cgi?id=1224105 * https://bugzilla.suse.com/show_bug.cgi?id=1224415 * https://bugzilla.suse.com/show_bug.cgi?id=1224485 * https://bugzilla.suse.com/show_bug.cgi?id=1224496 * https://bugzilla.suse.com/show_bug.cgi?id=1224510 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224631 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224690 * https://bugzilla.suse.com/show_bug.cgi?id=1224694 * https://bugzilla.suse.com/show_bug.cgi?id=1224700 * https://bugzilla.suse.com/show_bug.cgi?id=1224711 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225582 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225718 * https://bugzilla.suse.com/show_bug.cgi?id=1225751 * https://bugzilla.suse.com/show_bug.cgi?id=1225814 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1225838 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226031 * https://bugzilla.suse.com/show_bug.cgi?id=1226127 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226530 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226604 * https://bugzilla.suse.com/show_bug.cgi?id=1226743 * https://bugzilla.suse.com/show_bug.cgi?id=1226751 * https://bugzilla.suse.com/show_bug.cgi?id=1226765 * https://bugzilla.suse.com/show_bug.cgi?id=1226798 * https://bugzilla.suse.com/show_bug.cgi?id=1226801 * https://bugzilla.suse.com/show_bug.cgi?id=1226834 * https://bugzilla.suse.com/show_bug.cgi?id=1226874 * https://bugzilla.suse.com/show_bug.cgi?id=1226885 * https://bugzilla.suse.com/show_bug.cgi?id=1226920 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227182 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227437 * https://bugzilla.suse.com/show_bug.cgi?id=1227492 * https://bugzilla.suse.com/show_bug.cgi?id=1227493 * https://bugzilla.suse.com/show_bug.cgi?id=1227494 * https://bugzilla.suse.com/show_bug.cgi?id=1227618 * https://bugzilla.suse.com/show_bug.cgi?id=1227620 * https://bugzilla.suse.com/show_bug.cgi?id=1227623 * https://bugzilla.suse.com/show_bug.cgi?id=1227627 * https://bugzilla.suse.com/show_bug.cgi?id=1227634 * https://bugzilla.suse.com/show_bug.cgi?id=1227706 * https://bugzilla.suse.com/show_bug.cgi?id=1227722 * https://bugzilla.suse.com/show_bug.cgi?id=1227724 * https://bugzilla.suse.com/show_bug.cgi?id=1227725 * https://bugzilla.suse.com/show_bug.cgi?id=1227728 * https://bugzilla.suse.com/show_bug.cgi?id=1227729 * https://bugzilla.suse.com/show_bug.cgi?id=1227732 * https://bugzilla.suse.com/show_bug.cgi?id=1227733 * https://bugzilla.suse.com/show_bug.cgi?id=1227734 * https://bugzilla.suse.com/show_bug.cgi?id=1227747 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227754 * https://bugzilla.suse.com/show_bug.cgi?id=1227758 * https://bugzilla.suse.com/show_bug.cgi?id=1227760 * https://bugzilla.suse.com/show_bug.cgi?id=1227761 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1227766 * https://bugzilla.suse.com/show_bug.cgi?id=1227770 * https://bugzilla.suse.com/show_bug.cgi?id=1227771 * https://bugzilla.suse.com/show_bug.cgi?id=1227772 * https://bugzilla.suse.com/show_bug.cgi?id=1227774 * https://bugzilla.suse.com/show_bug.cgi?id=1227781 * https://bugzilla.suse.com/show_bug.cgi?id=1227784 * https://bugzilla.suse.com/show_bug.cgi?id=1227785 * https://bugzilla.suse.com/show_bug.cgi?id=1227787 * https://bugzilla.suse.com/show_bug.cgi?id=1227790 * https://bugzilla.suse.com/show_bug.cgi?id=1227791 * https://bugzilla.suse.com/show_bug.cgi?id=1227792 * https://bugzilla.suse.com/show_bug.cgi?id=1227796 * https://bugzilla.suse.com/show_bug.cgi?id=1227798 * https://bugzilla.suse.com/show_bug.cgi?id=1227799 * https://bugzilla.suse.com/show_bug.cgi?id=1227802 * https://bugzilla.suse.com/show_bug.cgi?id=1227808 * https://bugzilla.suse.com/show_bug.cgi?id=1227810 * https://bugzilla.suse.com/show_bug.cgi?id=1227811 * https://bugzilla.suse.com/show_bug.cgi?id=1227812 * https://bugzilla.suse.com/show_bug.cgi?id=1227815 * https://bugzilla.suse.com/show_bug.cgi?id=1227816 * https://bugzilla.suse.com/show_bug.cgi?id=1227818 * https://bugzilla.suse.com/show_bug.cgi?id=1227820 * https://bugzilla.suse.com/show_bug.cgi?id=1227823 * https://bugzilla.suse.com/show_bug.cgi?id=1227824 * https://bugzilla.suse.com/show_bug.cgi?id=1227826 * https://bugzilla.suse.com/show_bug.cgi?id=1227828 * https://bugzilla.suse.com/show_bug.cgi?id=1227829 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227833 * https://bugzilla.suse.com/show_bug.cgi?id=1227834 * https://bugzilla.suse.com/show_bug.cgi?id=1227839 * https://bugzilla.suse.com/show_bug.cgi?id=1227840 * https://bugzilla.suse.com/show_bug.cgi?id=1227846 * https://bugzilla.suse.com/show_bug.cgi?id=1227849 * https://bugzilla.suse.com/show_bug.cgi?id=1227851 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1227863 * https://bugzilla.suse.com/show_bug.cgi?id=1227864 * https://bugzilla.suse.com/show_bug.cgi?id=1227865 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227869 * https://bugzilla.suse.com/show_bug.cgi?id=1227870 * https://bugzilla.suse.com/show_bug.cgi?id=1227883 * https://bugzilla.suse.com/show_bug.cgi?id=1227884 * https://bugzilla.suse.com/show_bug.cgi?id=1227891 * https://bugzilla.suse.com/show_bug.cgi?id=1227893 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227950 * https://bugzilla.suse.com/show_bug.cgi?id=1227957 * https://bugzilla.suse.com/show_bug.cgi?id=1227981 * https://bugzilla.suse.com/show_bug.cgi?id=1228020 * https://bugzilla.suse.com/show_bug.cgi?id=1228021 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228235 * https://bugzilla.suse.com/show_bug.cgi?id=1228236 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1228321 * https://bugzilla.suse.com/show_bug.cgi?id=1228409 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228426 * https://bugzilla.suse.com/show_bug.cgi?id=1228427 * https://bugzilla.suse.com/show_bug.cgi?id=1228429 * https://bugzilla.suse.com/show_bug.cgi?id=1228446 * https://bugzilla.suse.com/show_bug.cgi?id=1228447 * https://bugzilla.suse.com/show_bug.cgi?id=1228449 * https://bugzilla.suse.com/show_bug.cgi?id=1228450 * https://bugzilla.suse.com/show_bug.cgi?id=1228452 * https://bugzilla.suse.com/show_bug.cgi?id=1228456 * https://bugzilla.suse.com/show_bug.cgi?id=1228457 * https://bugzilla.suse.com/show_bug.cgi?id=1228458 * https://bugzilla.suse.com/show_bug.cgi?id=1228459 * https://bugzilla.suse.com/show_bug.cgi?id=1228460 * https://bugzilla.suse.com/show_bug.cgi?id=1228462 * https://bugzilla.suse.com/show_bug.cgi?id=1228463 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1228467 * https://bugzilla.suse.com/show_bug.cgi?id=1228468 * https://bugzilla.suse.com/show_bug.cgi?id=1228469 * https://bugzilla.suse.com/show_bug.cgi?id=1228470 * https://bugzilla.suse.com/show_bug.cgi?id=1228472 * https://bugzilla.suse.com/show_bug.cgi?id=1228479 * https://bugzilla.suse.com/show_bug.cgi?id=1228480 * https://bugzilla.suse.com/show_bug.cgi?id=1228481 * https://bugzilla.suse.com/show_bug.cgi?id=1228482 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228484 * https://bugzilla.suse.com/show_bug.cgi?id=1228485 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228489 * https://bugzilla.suse.com/show_bug.cgi?id=1228491 * https://bugzilla.suse.com/show_bug.cgi?id=1228492 * https://bugzilla.suse.com/show_bug.cgi?id=1228493 * https://bugzilla.suse.com/show_bug.cgi?id=1228494 * https://bugzilla.suse.com/show_bug.cgi?id=1228495 * https://bugzilla.suse.com/show_bug.cgi?id=1228496 * https://bugzilla.suse.com/show_bug.cgi?id=1228499 * https://bugzilla.suse.com/show_bug.cgi?id=1228500 * https://bugzilla.suse.com/show_bug.cgi?id=1228501 * https://bugzilla.suse.com/show_bug.cgi?id=1228502 * https://bugzilla.suse.com/show_bug.cgi?id=1228503 * https://bugzilla.suse.com/show_bug.cgi?id=1228505 * https://bugzilla.suse.com/show_bug.cgi?id=1228508 * https://bugzilla.suse.com/show_bug.cgi?id=1228509 * https://bugzilla.suse.com/show_bug.cgi?id=1228510 * https://bugzilla.suse.com/show_bug.cgi?id=1228511 * https://bugzilla.suse.com/show_bug.cgi?id=1228513 * https://bugzilla.suse.com/show_bug.cgi?id=1228515 * https://bugzilla.suse.com/show_bug.cgi?id=1228516 * https://bugzilla.suse.com/show_bug.cgi?id=1228518 * https://bugzilla.suse.com/show_bug.cgi?id=1228520 * https://bugzilla.suse.com/show_bug.cgi?id=1228525 * https://bugzilla.suse.com/show_bug.cgi?id=1228527 * https://bugzilla.suse.com/show_bug.cgi?id=1228530 * https://bugzilla.suse.com/show_bug.cgi?id=1228531 * https://bugzilla.suse.com/show_bug.cgi?id=1228539 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228563 * https://bugzilla.suse.com/show_bug.cgi?id=1228564 * https://bugzilla.suse.com/show_bug.cgi?id=1228565 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228568 * https://bugzilla.suse.com/show_bug.cgi?id=1228572 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228579 * https://bugzilla.suse.com/show_bug.cgi?id=1228580 * https://bugzilla.suse.com/show_bug.cgi?id=1228581 * https://bugzilla.suse.com/show_bug.cgi?id=1228582 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228586 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228590 * https://bugzilla.suse.com/show_bug.cgi?id=1228591 * https://bugzilla.suse.com/show_bug.cgi?id=1228599 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228616 * https://bugzilla.suse.com/show_bug.cgi?id=1228617 * https://bugzilla.suse.com/show_bug.cgi?id=1228625 * https://bugzilla.suse.com/show_bug.cgi?id=1228626 * https://bugzilla.suse.com/show_bug.cgi?id=1228633 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1228636 * https://bugzilla.suse.com/show_bug.cgi?id=1228640 * https://bugzilla.suse.com/show_bug.cgi?id=1228643 * https://bugzilla.suse.com/show_bug.cgi?id=1228644 * https://bugzilla.suse.com/show_bug.cgi?id=1228646 * https://bugzilla.suse.com/show_bug.cgi?id=1228649 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1228655 * https://bugzilla.suse.com/show_bug.cgi?id=1228656 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228660 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228665 * https://bugzilla.suse.com/show_bug.cgi?id=1228666 * https://bugzilla.suse.com/show_bug.cgi?id=1228667 * https://bugzilla.suse.com/show_bug.cgi?id=1228672 * https://bugzilla.suse.com/show_bug.cgi?id=1228673 * https://bugzilla.suse.com/show_bug.cgi?id=1228674 * https://bugzilla.suse.com/show_bug.cgi?id=1228677 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228687 * https://bugzilla.suse.com/show_bug.cgi?id=1228705 * https://bugzilla.suse.com/show_bug.cgi?id=1228706 * https://bugzilla.suse.com/show_bug.cgi?id=1228707 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228709 * https://bugzilla.suse.com/show_bug.cgi?id=1228710 * https://bugzilla.suse.com/show_bug.cgi?id=1228718 * https://bugzilla.suse.com/show_bug.cgi?id=1228720 * https://bugzilla.suse.com/show_bug.cgi?id=1228721 * https://bugzilla.suse.com/show_bug.cgi?id=1228722 * https://bugzilla.suse.com/show_bug.cgi?id=1228723 * https://bugzilla.suse.com/show_bug.cgi?id=1228724 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228727 * https://bugzilla.suse.com/show_bug.cgi?id=1228733 * https://bugzilla.suse.com/show_bug.cgi?id=1228737 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228748 * https://bugzilla.suse.com/show_bug.cgi?id=1228754 * https://bugzilla.suse.com/show_bug.cgi?id=1228756 * https://bugzilla.suse.com/show_bug.cgi?id=1228757 * https://bugzilla.suse.com/show_bug.cgi?id=1228758 * https://bugzilla.suse.com/show_bug.cgi?id=1228764 * https://bugzilla.suse.com/show_bug.cgi?id=1228766 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 * https://bugzilla.suse.com/show_bug.cgi?id=1228849 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1228959 * https://bugzilla.suse.com/show_bug.cgi?id=1228964 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1228967 * https://bugzilla.suse.com/show_bug.cgi?id=1228971 * https://bugzilla.suse.com/show_bug.cgi?id=1228973 * https://bugzilla.suse.com/show_bug.cgi?id=1228977 * https://bugzilla.suse.com/show_bug.cgi?id=1228978 * https://bugzilla.suse.com/show_bug.cgi?id=1228979 * https://bugzilla.suse.com/show_bug.cgi?id=1228986 * https://bugzilla.suse.com/show_bug.cgi?id=1228988 * https://bugzilla.suse.com/show_bug.cgi?id=1228989 * https://bugzilla.suse.com/show_bug.cgi?id=1228991 * https://bugzilla.suse.com/show_bug.cgi?id=1228992 * https://bugzilla.suse.com/show_bug.cgi?id=1229005 * https://bugzilla.suse.com/show_bug.cgi?id=1229024 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229045 * https://bugzilla.suse.com/show_bug.cgi?id=1229046 * https://bugzilla.suse.com/show_bug.cgi?id=1229054 * https://bugzilla.suse.com/show_bug.cgi?id=1229056 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229134 * https://bugzilla.suse.com/show_bug.cgi?id=1229136 * https://bugzilla.suse.com/show_bug.cgi?id=1229154 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229160 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229168 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229170 * https://bugzilla.suse.com/show_bug.cgi?id=1229171 * https://bugzilla.suse.com/show_bug.cgi?id=1229172 * https://bugzilla.suse.com/show_bug.cgi?id=1229173 * https://bugzilla.suse.com/show_bug.cgi?id=1229174 * https://bugzilla.suse.com/show_bug.cgi?id=1229239 * https://bugzilla.suse.com/show_bug.cgi?id=1229240 * https://bugzilla.suse.com/show_bug.cgi?id=1229241 * https://bugzilla.suse.com/show_bug.cgi?id=1229243 * https://bugzilla.suse.com/show_bug.cgi?id=1229244 * https://bugzilla.suse.com/show_bug.cgi?id=1229245 * https://bugzilla.suse.com/show_bug.cgi?id=1229246 * https://bugzilla.suse.com/show_bug.cgi?id=1229247 * https://bugzilla.suse.com/show_bug.cgi?id=1229248 * https://bugzilla.suse.com/show_bug.cgi?id=1229249 * https://bugzilla.suse.com/show_bug.cgi?id=1229250 * https://bugzilla.suse.com/show_bug.cgi?id=1229251 * https://bugzilla.suse.com/show_bug.cgi?id=1229252 * https://bugzilla.suse.com/show_bug.cgi?id=1229253 * https://bugzilla.suse.com/show_bug.cgi?id=1229254 * https://bugzilla.suse.com/show_bug.cgi?id=1229255 * https://bugzilla.suse.com/show_bug.cgi?id=1229256 * https://bugzilla.suse.com/show_bug.cgi?id=1229287 * https://bugzilla.suse.com/show_bug.cgi?id=1229290 * https://bugzilla.suse.com/show_bug.cgi?id=1229291 * https://bugzilla.suse.com/show_bug.cgi?id=1229292 * https://bugzilla.suse.com/show_bug.cgi?id=1229294 * https://bugzilla.suse.com/show_bug.cgi?id=1229296 * https://bugzilla.suse.com/show_bug.cgi?id=1229297 * https://bugzilla.suse.com/show_bug.cgi?id=1229298 * https://bugzilla.suse.com/show_bug.cgi?id=1229299 * https://bugzilla.suse.com/show_bug.cgi?id=1229301 * https://bugzilla.suse.com/show_bug.cgi?id=1229303 * https://bugzilla.suse.com/show_bug.cgi?id=1229304 * https://bugzilla.suse.com/show_bug.cgi?id=1229305 * https://bugzilla.suse.com/show_bug.cgi?id=1229307 * https://bugzilla.suse.com/show_bug.cgi?id=1229309 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229313 * https://bugzilla.suse.com/show_bug.cgi?id=1229314 * https://bugzilla.suse.com/show_bug.cgi?id=1229315 * https://bugzilla.suse.com/show_bug.cgi?id=1229316 * https://bugzilla.suse.com/show_bug.cgi?id=1229317 * https://bugzilla.suse.com/show_bug.cgi?id=1229318 * https://bugzilla.suse.com/show_bug.cgi?id=1229319 * https://bugzilla.suse.com/show_bug.cgi?id=1229320 * https://bugzilla.suse.com/show_bug.cgi?id=1229327 * https://bugzilla.suse.com/show_bug.cgi?id=1229341 * https://bugzilla.suse.com/show_bug.cgi?id=1229342 * https://bugzilla.suse.com/show_bug.cgi?id=1229344 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229346 * https://bugzilla.suse.com/show_bug.cgi?id=1229347 * https://bugzilla.suse.com/show_bug.cgi?id=1229349 * https://bugzilla.suse.com/show_bug.cgi?id=1229350 * https://bugzilla.suse.com/show_bug.cgi?id=1229351 * https://bugzilla.suse.com/show_bug.cgi?id=1229353 * https://bugzilla.suse.com/show_bug.cgi?id=1229354 * https://bugzilla.suse.com/show_bug.cgi?id=1229355 * https://bugzilla.suse.com/show_bug.cgi?id=1229356 * https://bugzilla.suse.com/show_bug.cgi?id=1229357 * https://bugzilla.suse.com/show_bug.cgi?id=1229358 * https://bugzilla.suse.com/show_bug.cgi?id=1229359 * https://bugzilla.suse.com/show_bug.cgi?id=1229360 * https://bugzilla.suse.com/show_bug.cgi?id=1229365 * https://bugzilla.suse.com/show_bug.cgi?id=1229366 * https://bugzilla.suse.com/show_bug.cgi?id=1229369 * https://bugzilla.suse.com/show_bug.cgi?id=1229370 * https://bugzilla.suse.com/show_bug.cgi?id=1229373 * https://bugzilla.suse.com/show_bug.cgi?id=1229374 * https://bugzilla.suse.com/show_bug.cgi?id=1229379 * https://bugzilla.suse.com/show_bug.cgi?id=1229381 * https://bugzilla.suse.com/show_bug.cgi?id=1229382 * https://bugzilla.suse.com/show_bug.cgi?id=1229383 * https://bugzilla.suse.com/show_bug.cgi?id=1229386 * https://bugzilla.suse.com/show_bug.cgi?id=1229388 * https://bugzilla.suse.com/show_bug.cgi?id=1229390 * https://bugzilla.suse.com/show_bug.cgi?id=1229391 * https://bugzilla.suse.com/show_bug.cgi?id=1229392 * https://bugzilla.suse.com/show_bug.cgi?id=1229395 * https://bugzilla.suse.com/show_bug.cgi?id=1229398 * https://bugzilla.suse.com/show_bug.cgi?id=1229399 * https://bugzilla.suse.com/show_bug.cgi?id=1229400 * https://bugzilla.suse.com/show_bug.cgi?id=1229402 * https://bugzilla.suse.com/show_bug.cgi?id=1229403 * https://bugzilla.suse.com/show_bug.cgi?id=1229404 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229409 * https://bugzilla.suse.com/show_bug.cgi?id=1229410 * https://bugzilla.suse.com/show_bug.cgi?id=1229411 * https://bugzilla.suse.com/show_bug.cgi?id=1229413 * https://bugzilla.suse.com/show_bug.cgi?id=1229414 * https://bugzilla.suse.com/show_bug.cgi?id=1229417 * https://bugzilla.suse.com/show_bug.cgi?id=1229444 * https://bugzilla.suse.com/show_bug.cgi?id=1229451 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229480 * https://bugzilla.suse.com/show_bug.cgi?id=1229481 * https://bugzilla.suse.com/show_bug.cgi?id=1229482 * https://bugzilla.suse.com/show_bug.cgi?id=1229484 * https://bugzilla.suse.com/show_bug.cgi?id=1229485 * https://bugzilla.suse.com/show_bug.cgi?id=1229486 * https://bugzilla.suse.com/show_bug.cgi?id=1229487 * https://bugzilla.suse.com/show_bug.cgi?id=1229488 * https://bugzilla.suse.com/show_bug.cgi?id=1229489 * https://bugzilla.suse.com/show_bug.cgi?id=1229490 * https://bugzilla.suse.com/show_bug.cgi?id=1229493 * https://bugzilla.suse.com/show_bug.cgi?id=1229495 * https://bugzilla.suse.com/show_bug.cgi?id=1229496 * https://bugzilla.suse.com/show_bug.cgi?id=1229497 * https://bugzilla.suse.com/show_bug.cgi?id=1229500 * https://bugzilla.suse.com/show_bug.cgi?id=1229503 * https://bugzilla.suse.com/show_bug.cgi?id=1229707 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229743 * https://bugzilla.suse.com/show_bug.cgi?id=1229746 * https://bugzilla.suse.com/show_bug.cgi?id=1229747 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229754 * https://bugzilla.suse.com/show_bug.cgi?id=1229755 * https://bugzilla.suse.com/show_bug.cgi?id=1229756 * https://bugzilla.suse.com/show_bug.cgi?id=1229759 * https://bugzilla.suse.com/show_bug.cgi?id=1229761 * https://bugzilla.suse.com/show_bug.cgi?id=1229767 * https://bugzilla.suse.com/show_bug.cgi?id=1229781 * https://bugzilla.suse.com/show_bug.cgi?id=1229784 * https://bugzilla.suse.com/show_bug.cgi?id=1229785 * https://bugzilla.suse.com/show_bug.cgi?id=1229787 * https://bugzilla.suse.com/show_bug.cgi?id=1229788 * https://bugzilla.suse.com/show_bug.cgi?id=1229789 * https://bugzilla.suse.com/show_bug.cgi?id=1229792 * https://bugzilla.suse.com/show_bug.cgi?id=1229820 * https://bugzilla.suse.com/show_bug.cgi?id=1229827 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229837 * https://bugzilla.suse.com/show_bug.cgi?id=1229940 * https://bugzilla.suse.com/show_bug.cgi?id=1230056 * https://jira.suse.com/browse/PED-10029 * https://jira.suse.com/browse/PED-10045 * https://jira.suse.com/browse/PED-10055 * https://jira.suse.com/browse/PED-10105 * https://jira.suse.com/browse/PED-10108 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8779 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:26 -0000 Subject: SUSE-SU-2025:20014-1: important: Security update for openssl-3, libpulp, ulp-macros Message-ID: <174902834695.1737.2115626616612717692@smelt2.prg2.suse.org> # Security update for openssl-3, libpulp, ulp-macros Announcement ID: SUSE-SU-2025:20014-1 Release Date: 2025-02-03T08:48:39Z Rating: important References: * bsc#1220523 * bsc#1220690 * bsc#1220693 * bsc#1220696 * bsc#1221365 * bsc#1221751 * bsc#1221752 * bsc#1221753 * bsc#1221760 * bsc#1221763 * bsc#1221786 * bsc#1221787 * bsc#1221821 * bsc#1221822 * bsc#1221824 * bsc#1221827 * bsc#1222548 * bsc#1222899 * bsc#1223306 * bsc#1223336 * bsc#1223428 * bsc#1224388 * bsc#1225291 * bsc#1225551 * bsc#1226463 * bsc#1227138 * bsc#1229465 Cross-References: * CVE-2024-2511 * CVE-2024-4603 * CVE-2024-4741 * CVE-2024-5535 * CVE-2024-6119 CVSS scores: * CVE-2024-2511 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2511 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4603 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-4603 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-4741 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6119 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6119 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6119 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities and has 22 fixes can now be installed. ## Description: This update for openssl-3, libpulp, ulp-macros fixes the following issues: openssl-3: \- CVE-2024-6119: possible denial of service in X.509 name checks (bsc#1229465) \- CVE-2024-5535: SSL_select_next_proto buffer overread (bsc#1227138) \- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers (bsc#1225551) \- CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388) \- CVE-2024-2511: Fix unconstrained session cache growth in TLSv1.3 (bsc#1222548) \- FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365) \- FIPS: RSA keygen PCT requirements. (bsc#1221760, bsc#1221753) \- FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. (bsc#1220523) \- FIPS: Port openssl to use jitterentropy (bsc#1220523) \- FIPS: Block non-Approved Elliptic Curves (bsc#1221786) \- FIPS: Service Level Indicator (bsc#1221365) \- FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. (bsc#1221751) \- FIPS: Add required selftests (bsc#1221760) \- FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821) \- FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827) \- FIPS: Zeroization is required (bsc#1221752) \- FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696) \- FIPS: NIST SP 800-56Brev2 (bsc#1221824) \- FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787) \- FIPS: Port openssl to use jitterentropy (bsc#1220523) \- FIPS: NIST SP 800-56Arev3 (bsc#1221822) \- FIPS: Error state has to be enforced (bsc#1221753) \- Build with enabled sm2 and sm4 support (bsc#1222899) \- fix non-reproducible build issue \- Fix HDKF key derivation (bsc#1225291) \- Enable livepatching support (bsc#1223428) libpulp: \- Update package with libpulp-0.3.5 * Change .so load policy from lazy to eager. * Fix patch of references when mprotect is enabled. * Fix tramposed calloc arguments. * Fix crash of ulp packer on empty lines. * Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763). * Update package with libpulp-0.3.4: * Add debuginfo into ulp extract. * Disabled ptrace_scope when building the package (bsc#1221763). * Update package with libpulp-0.3.3: * Fixed a race condition when process list is empty. * Removed "Unable to get section data" error message (bsc#1223306). * Bumped asunsafe_conversion attempts from 100 to 2000. * Fixed banner test on clang-18. * Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763). * Update package with libpulp-0.3.1: * Add timestamp information on `ulp patches`. ulp-macros: \- Initial release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-58=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * libpulp-tools-debuginfo-0.3.5-1.1 * libpulp-debugsource-0.3.5-1.1 * libpulp0-debuginfo-0.3.5-1.1 * libpulp-tools-0.3.5-1.1 * libpulp0-0.3.5-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libopenssl-3-devel-3.1.4-6.1 * openssl-3-3.1.4-6.1 * libjitterentropy3-3.4.1-3.1 * openssl-3-debuginfo-3.1.4-6.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-6.1 * jitterentropy-devel-3.4.1-3.1 * libopenssl3-debuginfo-3.1.4-6.1 * libopenssl-3-fips-provider-3.1.4-6.1 * libopenssl3-3.1.4-6.1 * openssl-3-debugsource-3.1.4-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2511.html * https://www.suse.com/security/cve/CVE-2024-4603.html * https://www.suse.com/security/cve/CVE-2024-4741.html * https://www.suse.com/security/cve/CVE-2024-5535.html * https://www.suse.com/security/cve/CVE-2024-6119.html * https://bugzilla.suse.com/show_bug.cgi?id=1220523 * https://bugzilla.suse.com/show_bug.cgi?id=1220690 * https://bugzilla.suse.com/show_bug.cgi?id=1220693 * https://bugzilla.suse.com/show_bug.cgi?id=1220696 * https://bugzilla.suse.com/show_bug.cgi?id=1221365 * https://bugzilla.suse.com/show_bug.cgi?id=1221751 * https://bugzilla.suse.com/show_bug.cgi?id=1221752 * https://bugzilla.suse.com/show_bug.cgi?id=1221753 * https://bugzilla.suse.com/show_bug.cgi?id=1221760 * https://bugzilla.suse.com/show_bug.cgi?id=1221763 * https://bugzilla.suse.com/show_bug.cgi?id=1221786 * https://bugzilla.suse.com/show_bug.cgi?id=1221787 * https://bugzilla.suse.com/show_bug.cgi?id=1221821 * https://bugzilla.suse.com/show_bug.cgi?id=1221822 * https://bugzilla.suse.com/show_bug.cgi?id=1221824 * https://bugzilla.suse.com/show_bug.cgi?id=1221827 * https://bugzilla.suse.com/show_bug.cgi?id=1222548 * https://bugzilla.suse.com/show_bug.cgi?id=1222899 * https://bugzilla.suse.com/show_bug.cgi?id=1223306 * https://bugzilla.suse.com/show_bug.cgi?id=1223336 * https://bugzilla.suse.com/show_bug.cgi?id=1223428 * https://bugzilla.suse.com/show_bug.cgi?id=1224388 * https://bugzilla.suse.com/show_bug.cgi?id=1225291 * https://bugzilla.suse.com/show_bug.cgi?id=1225551 * https://bugzilla.suse.com/show_bug.cgi?id=1226463 * https://bugzilla.suse.com/show_bug.cgi?id=1227138 * https://bugzilla.suse.com/show_bug.cgi?id=1229465 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:11:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:11:34 -0000 Subject: SUSE-RU-2025:20021-1: low: Recommended update for bash, libcap-ng, libselinux, libselinux-bindings, libsemanage, zypper Message-ID: <174902829493.1737.11793409811021561816@smelt2.prg2.suse.org> # Recommended update for bash, libcap-ng, libselinux, libselinux-bindings, libsemanage, zypper Announcement ID: SUSE-RU-2025:20021-1 Release Date: 2025-02-03T08:49:10Z Rating: low References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update fixes the following issues: * No change rebuild due to dependency changes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-9=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsemanage2-3.5-3.1 * python3-selinux-debuginfo-3.5-3.1 * libselinux1-debuginfo-3.5-3.1 * python3-selinux-3.5-3.1 * libcap-ng-debugsource-0.8.3-4.1 * selinux-tools-3.5-3.1 * libselinux-bindings-debugsource-3.5-3.1 * bash-debugsource-5.2.15-3.1 * zypper-1.14.68-2.1 * bash-debuginfo-5.2.15-3.1 * libselinux1-3.5-3.1 * zypper-debugsource-1.14.68-2.1 * libselinux-debugsource-3.5-3.1 * zypper-debuginfo-1.14.68-2.1 * libcap-ng0-debuginfo-0.8.3-4.1 * bash-5.2.15-3.1 * libsemanage-debugsource-3.5-3.1 * selinux-tools-debuginfo-3.5-3.1 * libsemanage2-debuginfo-3.5-3.1 * libsemanage-conf-3.5-3.1 * libcap-ng0-0.8.3-4.1 * SUSE Linux Micro 6.0 (noarch) * zypper-needs-restarting-1.14.68-2.1 * bash-sh-5.2.15-3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:13 -0000 Subject: SUSE-SU-2025:20036-1: important: Security update for qemu Message-ID: <174902857347.627.3245410816688482252@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2025:20036-1 Release Date: 2025-02-03T08:53:01Z Rating: important References: * bsc#1221812 * bsc#1227322 * bsc#1229007 Cross-References: * CVE-2024-4467 * CVE-2024-7409 CVSS scores: * CVE-2024-4467 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-4467 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-7409 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for qemu fixes the following issues: * Fix bsc#1221812: * block: Reschedule query-block during qcow2 invalidation (bsc#1221812) * Fix bsc#1229007, CVE-2024-7409: * nbd/server: CVE-2024-7409: Close stray clients at server-stop (bsc#1229007) * nbd/server: CVE-2024-7409: Drop non-negotiating clients (bsc#1229007) * nbd/server: CVE-2024-7409: Cap default max-connections to 100 (bsc#1229007) * nbd/server: Plumb in new args to nbd_client_add() (bsc#1229007, CVE-2024-7409) * nbd: Minor style and typo fixes (bsc#1229007, CVE-2024-7409) * Update to version 8.2.6: Full backport lists (from the various releases) here: https://lore.kernel.org/qemu- devel/1721203806.547734.831464.nullmailer at tls.msk.ru/ Some of the upstream backports are: hw/nvme: fix number of PIDs for FDP RUH update sphinx/qapidoc: Fix to generate doc for explicit, unboxed arguments char- stdio: Restore blocking mode of stdout on exit virtio: remove virtio_tswap16s() call in vring_packed_event_read() virtio-pci: Fix the failure process in kvm_virtio_pci_vector_use_one() block: Parse filenames only when explicitly requested iotests/270: Don't store data-file with json: prefix in image iotests/244: Don't store data-file with protocol in image qcow2: Don't open data_file with BDRV_O_NO_IO (bsc#1227322, CVE-2024-4467) target/arm: Fix FJCVTZS vs flush-to-zero target/arm: Fix VCMLA Dd, Dn, Dm[idx] i386/cpu: fixup number of addressable IDs for processor cores in the physical package tests: Update our CI to use CentOS Stream 9 instead of 8 migration: Fix file migration with fdset tcg/loongarch64: Fix tcg_out_movi vs some pcrel pointers target/sparc: use signed denominator in sdiv helper linux-user: Make TARGET_NR_setgroups affect only the current thread accel/tcg: Fix typo causing tb->page_addr[1] to not be recorded stdvga: fix screen blanking hw/audio/virtio-snd: Always use little endian audio format ui/gtk: Draw guest frame at refresh cycle virtio-net: drop too short packets early target/i386: fix size of EBP writeback in gen_enter() ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-60=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-ui-opengl-8.2.6-1.1 * qemu-block-iscsi-debuginfo-8.2.6-1.1 * qemu-pr-helper-8.2.6-1.1 * qemu-audio-spice-8.2.6-1.1 * qemu-8.2.6-1.1 * qemu-block-ssh-debuginfo-8.2.6-1.1 * qemu-tools-debuginfo-8.2.6-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.6-1.1 * qemu-ui-opengl-debuginfo-8.2.6-1.1 * qemu-hw-display-virtio-vga-8.2.6-1.1 * qemu-pr-helper-debuginfo-8.2.6-1.1 * qemu-block-curl-debuginfo-8.2.6-1.1 * qemu-block-rbd-8.2.6-1.1 * qemu-block-rbd-debuginfo-8.2.6-1.1 * qemu-img-debuginfo-8.2.6-1.1 * qemu-ksm-8.2.6-1.1 * qemu-ui-spice-core-debuginfo-8.2.6-1.1 * qemu-block-iscsi-8.2.6-1.1 * qemu-tools-8.2.6-1.1 * qemu-img-8.2.6-1.1 * qemu-block-curl-8.2.6-1.1 * qemu-hw-usb-host-debuginfo-8.2.6-1.1 * qemu-hw-display-qxl-debuginfo-8.2.6-1.1 * qemu-lang-8.2.6-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.6-1.1 * qemu-ui-spice-core-8.2.6-1.1 * qemu-block-ssh-8.2.6-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.6-1.1 * qemu-guest-agent-8.2.6-1.1 * qemu-hw-display-qxl-8.2.6-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.6-1.1 * qemu-hw-display-virtio-gpu-8.2.6-1.1 * qemu-debugsource-8.2.6-1.1 * qemu-guest-agent-debuginfo-8.2.6-1.1 * qemu-chardev-spice-8.2.6-1.1 * qemu-hw-usb-host-8.2.6-1.1 * qemu-chardev-spice-debuginfo-8.2.6-1.1 * qemu-audio-spice-debuginfo-8.2.6-1.1 * qemu-hw-usb-redirect-8.2.6-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.6-1.1 * qemu-debuginfo-8.2.6-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-accel-tcg-x86-8.2.6-1.1 * qemu-x86-debuginfo-8.2.6-1.1 * qemu-accel-tcg-x86-debuginfo-8.2.6-1.1 * qemu-x86-8.2.6-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-vgabios-8.2.61.16.3_3_ga95067eb-1.1 * qemu-seabios-8.2.61.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.6-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-8.2.6-1.1 * qemu-s390x-debuginfo-8.2.6-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-debuginfo-8.2.6-1.1 * qemu-arm-8.2.6-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4467.html * https://www.suse.com/security/cve/CVE-2024-7409.html * https://bugzilla.suse.com/show_bug.cgi?id=1221812 * https://bugzilla.suse.com/show_bug.cgi?id=1227322 * https://bugzilla.suse.com/show_bug.cgi?id=1229007 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:15:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:15:34 -0000 Subject: SUSE-SU-2025:20042-1: important: Security update for selinux-policy Message-ID: <174902853411.627.4448938656586536813@smelt2.prg2.suse.org> # Security update for selinux-policy Announcement ID: SUSE-SU-2025:20042-1 Release Date: 2025-02-03T08:54:23Z Rating: important References: * bsc#1210717 * bsc#1215405 * bsc#1225984 * bsc#1227930 * bsc#1228247 * bsc#1229132 Affected Products: * SUSE Linux Micro 6.0 An update that has six fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: Update to version 20230523+git25.ad22dd7f: * Backport wtmpdb label change to have the same wtmpdb label as in SL Micro 6.1 (bsc#1229132) * Add auth_rw_wtmpdb_login_records to domains using auth_manage_login_records * Add auth_rw_wtmpdb_login_records to modules * Allow xdm_t to read-write to wtmpdb (bsc#1225984) * Introduce types for wtmpdb and rw interface * Introduce wtmp_file_type attribute * Revert "Add policy for wtmpdb (bsc#1210717)" Update to version 20230523+git18.f44daf8a: * Provide type for sysstat lock files (bsc#1228247) Update to version 20230523+git16.0849f54c: * allow firewalld access to /dev/random and write HW acceleration logs (bsc#1215405, bsc#1227930) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-43=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * selinux-policy-20230523+git25.ad22dd7f-1.1 * selinux-policy-targeted-20230523+git25.ad22dd7f-1.1 * selinux-policy-devel-20230523+git25.ad22dd7f-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1210717 * https://bugzilla.suse.com/show_bug.cgi?id=1215405 * https://bugzilla.suse.com/show_bug.cgi?id=1225984 * https://bugzilla.suse.com/show_bug.cgi?id=1227930 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1229132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:15:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:15:49 -0000 Subject: SUSE-RU-2025:20040-1: moderate: Recommended update for kernel-livepatch-tools Message-ID: <174902854945.627.5006523341448869231@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-tools Announcement ID: SUSE-RU-2025:20040-1 Release Date: 2025-02-03T08:53:49Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for kernel-livepatch-tools fixes the following issues: kernel-livepatch-tools is released in version 1.4. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-34=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-livepatch-tools-1.4-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:15:47 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:15:47 -0000 Subject: SUSE-SU-2025:20041-1: critical: Security update for systemd Message-ID: <174902854798.627.10020764672982645674@smelt2.prg2.suse.org> # Security update for systemd Announcement ID: SUSE-SU-2025:20041-1 Release Date: 2025-02-03T08:54:03Z Rating: critical References: * bsc#1200723 * bsc#1204968 * bsc#1213873 * bsc#1218110 * bsc#1221906 * bsc#1226414 * bsc#1226415 * bsc#1228091 * bsc#1228223 * bsc#1228809 * bsc#1229518 * jsc#PED-5659 Cross-References: * CVE-2022-3821 CVSS scores: * CVE-2022-3821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability, contains one feature and has 10 fixes can now be installed. ## Description: This update for systemd fixes the following issues: * Import commit 0512d0d1fc0b54a84964281708036a46ab39c153 0512d0d1fc cgroup: Rename effective limits internal table (jsc#PED-5659) 765846b70b cgroup: Restrict effective limits with global resource provision (jsc#PED-5659) e29909088b test: Add effective cgroup limits testing (jsc#PED-5659) beacac6df0 test: Convert rlimit test to subtest of generic limit testing (jsc#PED-5659) e3b789e512 cgroup: Add EffectiveMemoryMax=, EffectiveMemoryHigh= and EffectiveTasksMax= properties (jsc#PED-5659) 5aa063ae16 bus-print-properties: prettify more unset properties a53122c9bd bus-print-properties: ignore CGROUP_LIMIT_MAX for Memory*{Current, Peak} 8418791441 cgroup: rename TasksMax structure to CGroupTasksMax * Don't try to restart the udev socket units anymore (bsc#1228809) There's currently no way to restart a socket activable service and its socket units "atomically" and safely. * Make the 32bit version of libudev.so available again (bsc#1228223) The symlink for building 32bit applications was mistakenly dropped when the content of libudev-devel was merged into systemd-devel. Provide the 32bit flavor of systemd-devel again, which should restore the plug and play support in Wine for 32bit windows applications. * Import commit up to 5aa182660dff86fe9d5cba61b0c6542bb2f2db23 (merge of v254.17) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-73=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-73=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-experimental-254.18-1.1 * systemd-debuginfo-254.18-1.1 * systemd-coredump-254.18-1.1 * libudev1-254.18-1.1 * libudev1-debuginfo-254.18-1.1 * systemd-journal-remote-debuginfo-254.18-1.1 * systemd-coredump-debuginfo-254.18-1.1 * systemd-container-254.18-1.1 * libsystemd0-254.18-1.1 * systemd-journal-remote-254.18-1.1 * udev-254.18-1.1 * udev-debuginfo-254.18-1.1 * systemd-debugsource-254.18-1.1 * systemd-experimental-debuginfo-254.18-1.1 * libsystemd0-debuginfo-254.18-1.1 * systemd-254.18-1.1 * systemd-container-debuginfo-254.18-1.1 * systemd-portable-debuginfo-254.18-1.1 * systemd-portable-254.18-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-devel-254.18-1.1 * systemd-debugsource-254.18-1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3821.html * https://bugzilla.suse.com/show_bug.cgi?id=1200723 * https://bugzilla.suse.com/show_bug.cgi?id=1204968 * https://bugzilla.suse.com/show_bug.cgi?id=1213873 * https://bugzilla.suse.com/show_bug.cgi?id=1218110 * https://bugzilla.suse.com/show_bug.cgi?id=1221906 * https://bugzilla.suse.com/show_bug.cgi?id=1226414 * https://bugzilla.suse.com/show_bug.cgi?id=1226415 * https://bugzilla.suse.com/show_bug.cgi?id=1228091 * https://bugzilla.suse.com/show_bug.cgi?id=1228223 * https://bugzilla.suse.com/show_bug.cgi?id=1228809 * https://bugzilla.suse.com/show_bug.cgi?id=1229518 * https://jira.suse.com/browse/PED-5659 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:03 -0000 Subject: SUSE-SU-2025:20038-1: important: Security update for glibc Message-ID: <174902856327.627.9603388806601295188@smelt2.prg2.suse.org> # Security update for glibc Announcement ID: SUSE-SU-2025:20038-1 Release Date: 2025-02-03T08:53:22Z Rating: important References: * bsc#1221482 * bsc#1221940 * bsc#1222992 * bsc#1223423 * bsc#1223424 * bsc#1223425 * bsc#1228041 Cross-References: * CVE-2024-2961 * CVE-2024-33599 * CVE-2024-33600 * CVE-2024-33601 * CVE-2024-33602 CVSS scores: * CVE-2024-2961 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-2961 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2024-33599 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-33599 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-33600 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33600 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33601 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33601 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-33602 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-33602 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities and has two fixes can now be installed. ## Description: This update for glibc fixes the following issues: Fixed security issues: * CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425) * CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bsc#1223423) * CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response (bsc#1223424) * CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bsc#1223424) * CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (bsc#1223425) * CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992) Fixed non-security issues: * Add workaround for invalid use of libc_nonshared.a with non-SUSE libc (bsc#1221482) * Fix segfault in wcsncmp (bsc#1228041) * Also include stat64 in the 32-bit libc_nonshared.a workaround (bsc#1221482) * Avoid creating ULP prologue for _start routine (bsc#1221940) * Also add libc_nonshared.a workaround to 32-bit x86 compat package (bsc#1221482) * malloc: Use __get_nprocs on arena_get2 * linux: Use rseq area unconditionally in sched_getcpu ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-32=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * glibc-2.38-7.1 * glibc-locale-2.38-7.1 * glibc-locale-base-2.38-7.1 * glibc-devel-debuginfo-2.38-7.1 * glibc-debuginfo-2.38-7.1 * glibc-locale-base-debuginfo-2.38-7.1 * glibc-debugsource-2.38-7.1 * glibc-devel-2.38-7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2961.html * https://www.suse.com/security/cve/CVE-2024-33599.html * https://www.suse.com/security/cve/CVE-2024-33600.html * https://www.suse.com/security/cve/CVE-2024-33601.html * https://www.suse.com/security/cve/CVE-2024-33602.html * https://bugzilla.suse.com/show_bug.cgi?id=1221482 * https://bugzilla.suse.com/show_bug.cgi?id=1221940 * https://bugzilla.suse.com/show_bug.cgi?id=1222992 * https://bugzilla.suse.com/show_bug.cgi?id=1223423 * https://bugzilla.suse.com/show_bug.cgi?id=1223424 * https://bugzilla.suse.com/show_bug.cgi?id=1223425 * https://bugzilla.suse.com/show_bug.cgi?id=1228041 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:12:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:12:03 -0000 Subject: SUSE-RU-2025:20015-1: moderate: Recommended update for transactional-update Message-ID: <174902832331.1737.17041922734429314072@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2025:20015-1 Release Date: 2025-02-03T08:48:39Z Rating: moderate References: * bsc#1223504 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for transactional-update fixes the following issues: * Version 4.6.8 * tukit: Properly handle overlay syncing failures * soft-reboot: Log requested reboot type * soft-reboot: Don't force hard reboot on version change only * Version 4.6.7 * Add support for snapper 0.11.0; also significantly decreases cleanup time (bsc#1223504) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-38=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * dracut-transactional-update-4.8.1-1.1 * transactional-update-zypp-config-4.8.1-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * tukit-4.8.1-1.1 * tukitd-debuginfo-4.8.1-1.1 * transactional-update-4.8.1-1.1 * transactional-update-debuginfo-4.8.1-1.1 * libtukit4-debuginfo-4.8.1-1.1 * tukitd-4.8.1-1.1 * transactional-update-debugsource-4.8.1-1.1 * tukit-debuginfo-4.8.1-1.1 * libtukit4-4.8.1-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223504 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:29 -0000 Subject: SUSE-SU-2025:20035-1: moderate: Security update for python-Jinja2 Message-ID: <174902858925.627.8593652508804837449@smelt2.prg2.suse.org> # Security update for python-Jinja2 Announcement ID: SUSE-SU-2025:20035-1 Release Date: 2025-02-03T08:52:50Z Rating: moderate References: * bsc#1218722 * bsc#1223980 Cross-References: * CVE-2024-22195 * CVE-2024-34064 CVSS scores: * CVE-2024-22195 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-22195 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-22195 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-34064 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-34064 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-34064 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Jinja2 fixes the following issues: * CVE-2024-34064, CVE-2024-22195: HTML attribute injection when passing user input as keys to xmlattr filter (bsc#1223980, bsc#1218722) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-37=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-Jinja2-3.1.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22195.html * https://www.suse.com/security/cve/CVE-2024-34064.html * https://bugzilla.suse.com/show_bug.cgi?id=1218722 * https://bugzilla.suse.com/show_bug.cgi?id=1223980 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:17:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:17:03 -0000 Subject: SUSE-SU-2025:20029-1: moderate: Security update for curl Message-ID: <174902862336.627.17049432199208161143@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20029-1 Release Date: 2025-02-03T08:51:45Z Rating: moderate References: * bsc#1221665 * bsc#1221666 * bsc#1221667 * bsc#1221668 * bsc#1227888 * bsc#1228535 Cross-References: * CVE-2024-2004 * CVE-2024-2379 * CVE-2024-2398 * CVE-2024-2466 * CVE-2024-6197 * CVE-2024-7264 CVSS scores: * CVE-2024-2004 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N * CVE-2024-2004 ( NVD ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N * CVE-2024-2379 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-2379 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-2398 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2466 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-6197 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7264 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-7264 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-7264 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: Security issues fixed: * CVE-2024-7264: ASN.1 date parser overread (bsc#1228535) * CVE-2024-6197: Freeing stack buffer in utf8asn1str (bsc#1227888) * CVE-2024-2379: QUIC certificate check bypass with wolfSSL (bsc#1221666) * CVE-2024-2466: TLS certificate check bypass with mbedTLS (bsc#1221668) * CVE-2024-2004: Usage of disabled protocol (bsc#1221665) * CVE-2024-2398: HTTP/2 push headers memory-leak (bsc#1221667) Non-security issue fixed: * Fixed various TLS related issues including FTP over SSL transmission timeouts. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-30=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * curl-8.6.0-3.1 * curl-debugsource-8.6.0-3.1 * curl-debuginfo-8.6.0-3.1 * libcurl4-debuginfo-8.6.0-3.1 * libcurl4-8.6.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2004.html * https://www.suse.com/security/cve/CVE-2024-2379.html * https://www.suse.com/security/cve/CVE-2024-2398.html * https://www.suse.com/security/cve/CVE-2024-2466.html * https://www.suse.com/security/cve/CVE-2024-6197.html * https://www.suse.com/security/cve/CVE-2024-7264.html * https://bugzilla.suse.com/show_bug.cgi?id=1221665 * https://bugzilla.suse.com/show_bug.cgi?id=1221666 * https://bugzilla.suse.com/show_bug.cgi?id=1221667 * https://bugzilla.suse.com/show_bug.cgi?id=1221668 * https://bugzilla.suse.com/show_bug.cgi?id=1227888 * https://bugzilla.suse.com/show_bug.cgi?id=1228535 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:06 -0000 Subject: SUSE-SU-2025:20037-1: moderate: Security update for python-urllib3 Message-ID: <174902856671.627.8122527898713752839@smelt2.prg2.suse.org> # Security update for python-urllib3 Announcement ID: SUSE-SU-2025:20037-1 Release Date: 2025-02-03T08:53:14Z Rating: moderate References: * bsc#1226469 Cross-References: * CVE-2024-37891 CVSS scores: * CVE-2024-37891 ( SUSE ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-urllib3 fixes the following issues: * CVE-2024-37891: Fixed issue where proxy-authorization request header was not stripped during cross-origin redirects (bsc#1226469) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-36=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-urllib3-2.1.0-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37891.html * https://bugzilla.suse.com/show_bug.cgi?id=1226469 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:39 -0000 Subject: SUSE-SU-2025:20032-1: moderate: Security update for avahi Message-ID: <174902859950.627.9418196246097823447@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2025:20032-1 Release Date: 2025-02-03T08:52:10Z Rating: moderate References: * bsc#1216594 * bsc#1216598 * bsc#1226586 Cross-References: * CVE-2023-38469 * CVE-2023-38471 CVSS scores: * CVE-2023-38469 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38469 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38471 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38471 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for avahi fixes the following issues: Security issues fixed: * CVE-2023-38471: Extract host name using avahi_unescape_label (bsc#1216594). * CVE-2023-38469: Reject overly long TXT resource records (bsc#1216598). Non-security issue fixed: * no longer supply bogus services to callbacks (bsc#1226586). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-35=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * avahi-debuginfo-0.8-5.1 * avahi-debugsource-0.8-5.1 * avahi-0.8-5.1 * libavahi-core7-debuginfo-0.8-5.1 * libavahi-common3-0.8-5.1 * libavahi-core7-0.8-5.1 * libavahi-client3-debuginfo-0.8-5.1 * libavahi-common3-debuginfo-0.8-5.1 * libavahi-client3-0.8-5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38469.html * https://www.suse.com/security/cve/CVE-2023-38471.html * https://bugzilla.suse.com/show_bug.cgi?id=1216594 * https://bugzilla.suse.com/show_bug.cgi?id=1216598 * https://bugzilla.suse.com/show_bug.cgi?id=1226586 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:57 -0000 Subject: SUSE-SU-2025:20030-1: critical: Security update for mozilla-nss Message-ID: <174902861736.627.11666231575915049972@smelt2.prg2.suse.org> # Security update for mozilla-nss Announcement ID: SUSE-SU-2025:20030-1 Release Date: 2025-02-03T08:51:45Z Rating: critical References: * bsc#1214980 * bsc#1216198 * bsc#1222804 * bsc#1222807 * bsc#1222811 * bsc#1222813 * bsc#1222814 * bsc#1222821 * bsc#1222822 * bsc#1222826 * bsc#1222828 * bsc#1222830 * bsc#1222833 * bsc#1222834 * bsc#1223724 * bsc#1224113 * bsc#1224115 * bsc#1224116 * bsc#1224118 * bsc#1227918 * jsc#PED-6358 Cross-References: * CVE-2023-5388 CVSS scores: * CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-5388 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability, contains one feature and has 19 fixes can now be installed. ## Description: This update for mozilla-nss fixes the following issues: * update to NSS 3.101.2 * ChaChaXor to return after the function * update to NSS 3.101.1 * missing sqlite header. * GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME. * update to NSS 3.101 * add diagnostic assertions for SFTKObject refcount. * freeing the slot in DeleteCertAndKey if authentication failed * fix formatting issues. * Add Firmaprofesional CA Root-A Web to NSS. * remove invalid acvp fuzz test vectors. * pad short P-384 and P-521 signatures gtests. * remove unused FreeBL ECC code. * pad short P-384 and P-521 signatures. * be less strict about ECDSA private key length. * Integrate HACL* P-521. * Integrate HACL* P-384. * memory leak in create_objects_from_handles. * ensure all input is consumed in a few places in mozilla::pkix * SMIME/CMS and PKCS #12 do not integrate with modern NSS policy * clean up escape handling * Use lib::pkix as default validator instead of the old-one * Need to add high level support for PQ signing. * Certificate Compression: changing the allocation/freeing of buffer + Improving the documentation * SMIME/CMS and PKCS #12 do not integrate with modern NSS policy * Allow for non-full length ecdsa signature when using softoken * Modification of .taskcluster.yml due to mozlint indent defects * Implement support for PBMAC1 in PKCS#12 * disable VLA warnings for fuzz builds. * remove redundant AllocItem implementation. * add PK11_ReadDistrustAfterAttribute. * Clang-formatting of SEC_GetMgfTypeByOidTag update * Set SEC_ERROR_LIBRARY_FAILURE on self-test failure * sftk_getParameters(): Fix fallback to default variable after error with configfile. * Switch to the mozillareleases/image_builder image * update to NSS 3.100 * merge pk11_kyberSlotList into pk11_ecSlotList for faster Xyber operations. * remove ckcapi. * avoid a potential PK11GenericObject memory leak. * Remove incomplete ESDH code. * Decrypt RSA OAEP encrypted messages. * Fix certutil CRLDP URI code. * Don't set CKA_DERIVE for CKK_EC_EDWARDS private keys. * Add ability to encrypt and decrypt CMS messages using ECDH. * Correct Templates for key agreement in smime/cmsasn.c. * Moving the decodedCert allocation to NSS. * Allow developers to speed up repeated local execution of NSS tests that depend on certificates. * update to NSS 3.99 * Removing check for message len in ed25519 * add ed25519 to SECU_ecName2params. * add EdDSA wycheproof tests. * nss/lib layer code for EDDSA. * Adding EdDSA implementation. * Exporting Certificate Compression types * Updating ACVP docker to rust 1.74 * Updating HACL* to 0f136f28935822579c244f287e1d2a1908a7e552 * Add NSS_CMSRecipient_IsSupported. * update to NSS 3.98 * CVE-2023-5388: Timing attack against RSA decryption in TLS * Certificate Compression: enabling the check that the compression was advertised * Move Windows workers to nss-1/b-win2022-alpha * Remove Email trust bit from OISTE WISeKey Global Root GC CA * Replace `distutils.spawn.find_executable` with `shutil.which` within `mach` in `nss` * Certificate Compression: Updating nss_bogo_shim to support Certificate compression * TLS Certificate Compression (RFC 8879) Implementation * Add valgrind annotations to freebl kyber operations for constant-time execution tests * Set nssckbi version number to 2.66 * Add Telekom Security roots * Add D-Trust 2022 S/MIME roots * Remove expired Security Communication RootCA1 root * move keys to a slot that supports concatenation in PK11_ConcatSymKeys * remove unmaintained tls-interop tests * bogo: add support for the -ipv6 and -shim-id shim flags * bogo: add support for the -curves shim flag and update Kyber expectations * bogo: adjust expectation for a key usage bit test * mozpkix: add option to ignore invalid subject alternative names * Fix selfserv not stripping `publicname:` from -X value * take ownership of ecckilla shims * add valgrind annotations to freebl/ec.c * PR_INADDR_ANY needs PR_htonl before assignment to inet.ip * Update zlib to 1.3.1 * update to NSS 3.97 * make Xyber768d00 opt-in by policy * add libssl support for xyber768d00 * add PK11_ConcatSymKeys * add Kyber and a PKCS#11 KEM interface to softoken * add a FreeBL API for Kyber * part 2: vendor github.com/pq-crystals/kyber/commit/e0d1c6ff * part 1: add a script for vendoring kyber from pq-crystals repo * Removing the calls to RSA Blind from loader.* * fix worker type for level3 mac tasks * RSA Blind implementation * Remove DSA selftests * read KWP testvectors from JSON * Backed out changeset dcb174139e4f * Fix CKM_PBE_SHA1_DES2_EDE_CBC derivation * Wrap CC shell commands in gyp expansions * update to NSS 3.96.1 * Use pypi dependencies for MacOS worker in ./build_gyp.sh * p7sign: add -a hash and -u certusage (also p7verify cleanups) * add a defensive check for large ssl_DefSend return values * Add dependency to the taskcluster script for Darwin * Upgrade version of the MacOS worker for the CI * update to NSS 3.95 * Bump builtins version number. * Remove Email trust bit from Autoridad de Certificacion Firmaprofesional CIF A62634068 root cert. * Remove 4 DigiCert (Symantec/Verisign) Root Certificates * Remove 3 TrustCor Root Certificates from NSS. * Remove Camerfirma root certificates from NSS. * Remove old Autoridad de Certificacion Firmaprofesional Certificate. * Add four Commscope root certificates to NSS. * Add TrustAsia Global Root CA G3 and G4 root certificates. * Include P-384 and P-521 Scalar Validation from HACL* * Include P-256 Scalar Validation from HACL*. * After the HACL 256 ECC patch, NSS incorrectly encodes 256 ECC without DER wrapping at the softoken level * Add means to provide library parameters to C_Initialize * clang format * add OSXSAVE and XCR0 tests to AVX2 detection. * Typo in ssl3_AppendHandshakeNumber * Introducing input check of ssl3_AppendHandshakeNumber * Fix Invalid casts in instance.c * update to NSS 3.94 * Updated code and commit ID for HACL* * update ACVP fuzzed test vector: refuzzed with current NSS * Softoken C_ calls should use system FIPS setting to select NSC_ or FC_ variants * NSS needs a database tool that can dump the low level representation of the database * declare string literals using char in pkixnames_tests.cpp * avoid implicit conversion for ByteString * update rust version for acvp docker * Moving the init function of the mpi_ints before clean-up in ec.c * P-256 ECDH and ECDSA from HACL* * Add ACVP test vectors to the repository * Stop relying on std::basic_string * Transpose the PPC_ABI check from Makefile to gyp * Update to NSS 3.93: * Update zlib in NSS to 1.3. * softoken: iterate hashUpdate calls for long inputs. * regenerate NameConstraints test certificates (bsc#1214980). * update to NSS 3.92 * Set nssckbi version number to 2.62 * Add 4 Atos TrustedRoot Root CA certificates to NSS * Add 4 SSL.com Root CA certificates * Add Sectigo E46 and R46 Root CA certificates * Add LAWtrust Root CA2 (4096) * Remove E-Tugra Certification Authority root * Remove Camerfirma Chambers of Commerce Root. * Remove Hongkong Post Root CA 1 * Remove E-Tugra Global Root CA ECC v3 and RSA v3 * Avoid redefining BYTE_ORDER on hppa Linux * update to NSS 3.91 * Implementation of the HW support check for ADX instruction * Removing the support of Curve25519 * Fix comment about the addition of ticketSupportsEarlyData * Adding args to enable-legacy-db build * dbtests.sh failure in "certutil dump keys with explicit default trust flags" * Initialize flags in slot structures * Improve the length check of RSA input to avoid heap overflow * Followup Fixes * avoid processing unexpected inputs by checking for m_exptmod base sign * add a limit check on order_k to avoid infinite loop * Update HACL* to commit 5f6051d2 * add SHA3 to cryptohi and softoken * HACL SHA3 * Disabling ASM C25519 for A but X86_64 * update to NSS 3.90.3 * GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME. * clean up escape handling. * remove redundant AllocItem implementation. * Disable ASM support for Curve25519. * Disable ASM support for Curve25519 for all but X86_64. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-59=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoftokn3-debuginfo-3.101.2-1.1 * libfreebl3-debuginfo-3.101.2-1.1 * libfreebl3-3.101.2-1.1 * mozilla-nss-debugsource-3.101.2-1.1 * mozilla-nss-tools-debuginfo-3.101.2-1.1 * mozilla-nss-tools-3.101.2-1.1 * mozilla-nss-certs-3.101.2-1.1 * mozilla-nss-3.101.2-1.1 * libsoftokn3-3.101.2-1.1 * mozilla-nss-debuginfo-3.101.2-1.1 * mozilla-nss-certs-debuginfo-3.101.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5388.html * https://bugzilla.suse.com/show_bug.cgi?id=1214980 * https://bugzilla.suse.com/show_bug.cgi?id=1216198 * https://bugzilla.suse.com/show_bug.cgi?id=1222804 * https://bugzilla.suse.com/show_bug.cgi?id=1222807 * https://bugzilla.suse.com/show_bug.cgi?id=1222811 * https://bugzilla.suse.com/show_bug.cgi?id=1222813 * https://bugzilla.suse.com/show_bug.cgi?id=1222814 * https://bugzilla.suse.com/show_bug.cgi?id=1222821 * https://bugzilla.suse.com/show_bug.cgi?id=1222822 * https://bugzilla.suse.com/show_bug.cgi?id=1222826 * https://bugzilla.suse.com/show_bug.cgi?id=1222828 * https://bugzilla.suse.com/show_bug.cgi?id=1222830 * https://bugzilla.suse.com/show_bug.cgi?id=1222833 * https://bugzilla.suse.com/show_bug.cgi?id=1222834 * https://bugzilla.suse.com/show_bug.cgi?id=1223724 * https://bugzilla.suse.com/show_bug.cgi?id=1224113 * https://bugzilla.suse.com/show_bug.cgi?id=1224115 * https://bugzilla.suse.com/show_bug.cgi?id=1224116 * https://bugzilla.suse.com/show_bug.cgi?id=1224118 * https://bugzilla.suse.com/show_bug.cgi?id=1227918 * https://jira.suse.com/browse/PED-6358 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:15:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:15:55 -0000 Subject: SUSE-SU-2025:20039-1: moderate: Security update for keepalived Message-ID: <174902855510.627.17645312749406168525@smelt2.prg2.suse.org> # Security update for keepalived Announcement ID: SUSE-SU-2025:20039-1 Release Date: 2025-02-03T08:53:39Z Rating: moderate References: * bsc#1228123 Cross-References: * CVE-2024-41184 CVSS scores: * CVE-2024-41184 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for keepalived fixes the following issues: * CVE-2024-41184: Fixed integer overflow in vrrp_ipsets_handler (bsc#1228123) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-72=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * keepalived-debugsource-2.2.8-2.1 * keepalived-2.2.8-2.1 * keepalived-debuginfo-2.2.8-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41184.html * https://bugzilla.suse.com/show_bug.cgi?id=1228123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:41 -0000 Subject: SUSE-SU-2025:20031-1: low: Security update for glib2 Message-ID: <174902860191.627.13992601834850683426@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:20031-1 Release Date: 2025-02-03T08:51:58Z Rating: low References: * bsc#1224044 Cross-References: * CVE-2024-34397 CVSS scores: * CVE-2024-34397 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-34397 ( NVD ): 5.2 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * Fixed a possible use after free regression introduced by CVE-2024-34397 patch (bsc#1224044). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-27=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libglib-2_0-0-2.76.2-5.1 * glib2-tools-2.76.2-5.1 * libgio-2_0-0-debuginfo-2.76.2-5.1 * libgobject-2_0-0-debuginfo-2.76.2-5.1 * libgmodule-2_0-0-2.76.2-5.1 * libglib-2_0-0-debuginfo-2.76.2-5.1 * glib2-debugsource-2.76.2-5.1 * libgio-2_0-0-2.76.2-5.1 * libgobject-2_0-0-2.76.2-5.1 * glib2-tools-debuginfo-2.76.2-5.1 * libgmodule-2_0-0-debuginfo-2.76.2-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34397.html * https://bugzilla.suse.com/show_bug.cgi?id=1224044 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:33 -0000 Subject: SUSE-SU-2025:20034-1: moderate: Security update for python-requests Message-ID: <174902859391.627.4020742554968033644@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:20034-1 Release Date: 2025-02-03T08:52:32Z Rating: moderate References: * bsc#1224788 Cross-References: * CVE-2024-35195 CVSS scores: * CVE-2024-35195 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * Update to 2.32.2 * To provide a more stable migration for custom HTTPAdapters impacted by the CVE changes in 2.32.0, we've renamed _get_connection to a new public API, get_connection_with_tls_context. Existing custom HTTPAdapters will need to migrate their code to use this new API. get_connection is considered deprecated in all versions of Requests>=2.32.0. * Update to 2.32.1 * Fixed an issue where setting verify=False on the first request from a Session will cause subsequent requests to the same origin to also ignore cert verification, regardless of the value of verify. (bsc#1224788, CVE-2024-35195) * verify=True now reuses a global SSLContext which should improve request time variance between first and subsequent requests. * Requests now supports optional use of character detection (chardet or charset_normalizer) when repackaged or vendored. This enables pip and other projects to minimize their vendoring surface area. * Requests has officially added support for CPython 3.12 and dropped support for CPython 3.7. * Starting in Requests 2.33.0, Requests will migrate to a PEP 517 build system using hatchling. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-28=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-requests-2.32.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35195.html * https://bugzilla.suse.com/show_bug.cgi?id=1224788 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:16:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:16:36 -0000 Subject: SUSE-RU-2025:20033-1: critical: Recommended update for suse-build-key Message-ID: <174902859608.627.8817219367476266279@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2025:20033-1 Release Date: 2025-02-03T08:52:22Z Rating: critical References: * bsc#1229339 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for suse-build-key fixes the following issues: Extended 2048 bit SUSE SLE 12, 15 GA-SP5 key until 2028. (bsc#1229339) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-26=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * suse-build-key-12.0-4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229339 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:29 -0000 Subject: SUSE-SU-2025:20020-1: moderate: Security update for ucode-intel Message-ID: <174902894929.655.4042382230586340333@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20020-1 Release Date: 2025-02-03T08:49:06Z Rating: moderate References: * bsc#1221323 * bsc#1224277 Cross-References: * CVE-2023-22655 * CVE-2023-28746 * CVE-2023-38575 * CVE-2023-39368 * CVE-2023-43490 * CVE-2023-45733 * CVE-2023-45745 * CVE-2023-46103 * CVE-2023-47855 CVSS scores: * CVE-2023-22655 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N * CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-28746 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39368 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-43490 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2023-45733 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2023-45745 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2023-46103 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47855 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves nine vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: * Intel CPU Microcode was updated to the 20240514 release (bsc#1224277) * CVE-2023-45733: Security updates for INTEL-SA-01051 * CVE-2023-46103: Security updates for INTEL-SA-01052 * CVE-2023-45745,CVE-2023-47855: Security updates for INTEL-SA-01036 * Updated to Intel CPU Microcode 20240312 release. (bsc#1221323) * Security updates for INTEL-SA-INTEL-SA-00972 * CVE-2023-39368: Protection mechanism failure of bus lock regulator for some Intel Processors may allow an unauthenticated user to potentially enable denial of service via network access * Security updates for INTEL-SA-INTEL-SA-00982 * CVE-2023-38575: Non-transparent sharing of return predictor targets between contexts in some Intel Processors may allow an authorized user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-INTEL-SA-00898 * CVE-2023-28746: Information exposure through microarchitectural state after transient execution from some register files for some Intel Atom Processors may allow an authenticated user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-INTEL-SA-00960 * CVE-2023-22655 Protection mechanism failure in some 3rd and 4th Generation Intel Xeon Processors when using Intel SGX or Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access. * Security updates for INTEL-SA-INTEL-SA-01045 * CVE-2023-43490: Incorrect calculation in microcode keying mechanism for some Intel Xeon D Processors with Intel SGX may allow a privileged user to potentially enable information disclosure via local access. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-22=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20240813-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-22655.html * https://www.suse.com/security/cve/CVE-2023-28746.html * https://www.suse.com/security/cve/CVE-2023-38575.html * https://www.suse.com/security/cve/CVE-2023-39368.html * https://www.suse.com/security/cve/CVE-2023-43490.html * https://www.suse.com/security/cve/CVE-2023-45733.html * https://www.suse.com/security/cve/CVE-2023-45745.html * https://www.suse.com/security/cve/CVE-2023-46103.html * https://www.suse.com/security/cve/CVE-2023-47855.html * https://bugzilla.suse.com/show_bug.cgi?id=1221323 * https://bugzilla.suse.com/show_bug.cgi?id=1224277 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:02 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:02 -0000 Subject: SUSE-RU-2025:20026-1: moderate: Recommended update for dracut Message-ID: <174902892286.655.7055144591382083785@smelt2.prg2.suse.org> # Recommended update for dracut Announcement ID: SUSE-RU-2025:20026-1 Release Date: 2025-02-03T08:50:41Z Rating: moderate References: * bsc#1208690 * bsc#1226412 * bsc#1226529 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for dracut fixes the following issues: * Update to version 059+suse.567.gadd3169d: * feat(crypt): force the inclusion of crypttab entries with x-initrd.attach (bsc#1226529) * fix(mdraid): try to assemble the missing raid device (bsc#1226412) * fix(dracut-install): continue parsing if ldd prints "cannot be preloaded" (bsc#1208690) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-33=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * dracut-059+suse.571.g32b61281-1.1 * dracut-fips-059+suse.571.g32b61281-1.1 * dracut-debugsource-059+suse.571.g32b61281-1.1 * dracut-debuginfo-059+suse.571.g32b61281-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1208690 * https://bugzilla.suse.com/show_bug.cgi?id=1226412 * https://bugzilla.suse.com/show_bug.cgi?id=1226529 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:20:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:20:50 -0000 Subject: SUSE-RU-2025:20027-1: important: Recommended update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp Message-ID: <174902885007.651.17329032431293409172@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp Announcement ID: SUSE-RU-2025:20027-1 Release Date: 2025-02-03T08:51:00Z Rating: important References: * bsc#1007273 * bsc#1175678 * bsc#1218171 * bsc#1219004 * bsc#1221525 * bsc#1221963 * bsc#1222086 * bsc#1222398 * bsc#1223094 * bsc#1223107 * bsc#1223430 * bsc#1223766 * bsc#1224771 * bsc#1225267 * bsc#1226014 * bsc#1226030 * bsc#1226128 * bsc#1226493 * bsc#1227205 * bsc#1227625 * bsc#1227793 * bsc#1228138 * bsc#1228206 * bsc#1228208 * bsc#1228420 * bsc#1228647 * bsc#1228787 * bsc#1229014 * bsc#1230229 * bsc#1230267 * bsc#1230912 * bsc#1231043 * bsc#222971 * jsc#OBS-301 * jsc#PED-7982 * jsc#PED-8014 * jsc#PED-8018 * jsc#PED-8153 Affected Products: * SUSE Linux Micro 6.0 An update that contains five features and has 33 fixes can now be installed. ## Description: This update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp fixes the following issues: libsolv version 0.7.30: * removed dependency on external find program in the repo2solv tool * bindings: fix return value of repodata.add_solv() * new SOLVER_FLAG_FOCUS_NEW flag * add a conflict to older libsolv-tools to libsolv-tools-base * report unsupported compression in solv_xfopen() with errno * fix return value of repodata.add_solv() in the bindings * fix SHA-224 oid in solv_pgpvrfy * improve updating of installed multiversion packages * fix decision introspection going into an endless loop in some cases * added experimental lua bindings * split libsolv-tools into libsolv-tools-base [jsc#PED-8153] * removed dependency on external find program in the repo2solv tool * bindings: fix return value of repodata.add_solv() * new SOLVER_FLAG_FOCUS_NEW flag * add a conflict to older libsolv-tools to libsolv-tools-base * report unsupported compression in solv_xfopen() with errno * fix return value of repodata.add_solv() in the bindings * fix SHA-224 oid in solv_pgpvrfy * improve updating of installed multiversion packages * fix decision introspection going into an endless loop in some cases * added experimental lua bindings * split libsolv-tools into libsolv-tools-base [jsc#PED-8153] libzypp update to 17.35.12: * PluginFrame: Send unescaped colons in header values (bsc#1231043) According to the STOMP protocol it would be correct to escape a colon in a header- value, but it breaks plugin receivers which do not expect this. The first colon separates header-name from header-value, so escaping in the header- value is not needed anyway. Escaping in the header-value affects especially the urlresolver plugins. The input URL is passed in a header, but sent back as raw data in the frames body. If the plugin receiver does not correctly unescape the URL we may get back a "https\c//" which is not usable. * Do not ignore return value of std::remove_if in MediaSyncFacade (fixes #579) * Fix hang in curl code with no network connection (bsc#1230912) * Deprecate librpmDb::db_const_iterator default ctor (bsc#1230267) It's preferred to explicitly tell the root directory of the system whose database you want to query. * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * Conflicts: zypper <= 1.14.76 * single_rpmtrans: fix installation of .src.rpms (bsc#1228647) * Make sure not to statically linked installed tools (bsc#1228787) * MediaPluginType must be resolved to a valid MediaHandler (bsc#1228208) * Export CredentialManager for legacy YAST versions (bsc#1228420) * Export asSolvable for YAST (bsc#1228420) * Fix 4 typos in zypp.conf. * Fix typo in the geoip update pipeline (bsc#1228206) * Export RepoVariablesStringReplacer for yast2 (bsc#1228138) * Translation: updated .pot file. * Conflict with python zypp-plugin < 0.6.4 (bsc#1227793) Older zypp-plugins reject stomp headers including a '-'. Like the 'content-length' header we may send. * Fix int overflow in Provider (fixes #559) This patch fixes an issue in safe_strtonum which caused timestamps to overflow in the Provider message parser. * Fix error reporting on repoindex.xml parse error (bsc#1227625) * Keep UrlResolverPlugin API public (fixes #560) * Blacklist /snap executables for 'zypper ps' (bsc#1226014) * Fix handling of buddies when applying locks (bsc#1225267) Buddy pairs (like -release package and product) internally share the same status object. When applying locks from query results the locked bit must be set if either item is locked. * Install zypp/APIConfig.h legacy include (fixes #557) * Update soname due to RepoManager refactoring and cleanup. * Workaround broken libsolv-tools-base requirements (fixes openSUSE/zypper#551) * Strip ssl_clientkey from repo urls (bsc#1226030) * Remove protobuf build dependency. * Lazily attach medium during refresh workflows (bsc#1223094) * Refactor RepoManager and add Service workflows. * zypp-tui: Make sure translated texts use the correct textdomain (fixes #551) * Skip libproxy1 requires for tumbleweed. * don't require libproxy1 on tumbleweed, it is optional now * Fix versioning scheme * add one more missing export for libyui-qt-pkg * Revert eintrSafeCall behavior to setting errno to 0. * fix up requires_eq usage for libsolv-tools-base * add one more missing export for PackageKit * switch to reduced size libsolv-tools-base (jsc#PED-8153) * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * Add ZYPP_API for exported functions and switch to visibility=hidden (jsc#PED-8153) * Dynamically resolve libproxy (jsc#PED-8153) * Fix download from gpgkey URL (bsc#1223430, fixes openSUSE/zypper#546) * Don't try to refresh volatile media as long as raw metadata are present (bsc#1223094) * Fix creation of sibling cache dirs with too restrictive mode (bsc#1222398) Some install workflows in YAST may lead to too restrictive (0700) raw cache directories in case of newly created repos. Later commands running with user privileges may not be able to access these repos. * Update RepoStatus fromCookieFile according to the files mtime (bsc#1222086) * TmpFile: Don't call chmod if makeSibling failed. * Fixup New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) Fixed the name of the keyword to "support_superseded" as it was agreed on in jsc#OBS-301. * Add resolver option 'removeUnneeded' to file weak remove jobs for unneeded packages (bsc#1175678) * Add resolver option 'removeOrphaned' for distupgrade (bsc#1221525) * New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) * Tests: fix vsftpd.conf where SUSE and Fedora use different defaults (fixes #522) * Add default stripe minimum (#529) * Don't expose std::optional where YAST/PK explicitly use c++11. * Digest: Avoid using the deprecated OPENSSL_config. * ProblemSolution::skipsPatchesOnly overload to handout the patches. * Remove https->http redirection exceptions for download.opensuse.org. suseconnect-ng updated to 1.12: - Set the filesystem root on zypper when given (bsc#1230229,bsc#1229014) - Added uname as collector - Added SAP workload detection - Added detection of container runtimes - Multiple fixes on ARM64 detection - Use `read_values` for the CPU collector on Z - Fixed data collection for ppc64le - Grab the home directory from /etc/passwd if needed (bsc#1226128) - Build zypper-migration and zypper-packages-search as standalone binaries rather then one single binary - Add --gpg-auto-import-keys flag before action in zypper command (bsc#1219004) - Include /etc/products.d in directories whose content are backed up and restored if a zypper-migration rollback happens. (bsc#1219004) - Add the ability to upload the system uptime logs, produced by the suse-uptime-tracker daemon, to SCC/RMT as part of keepalive report. (jsc#PED-7982) (jsc#PED-8018) - Add support for third party packages in SUSEConnect - Refactor existing system information collection implementation - Fix certificate import for Yast when using a registration proxy with self-signed SSL certificate (bsc#1223107) zypp-plugin updated to 0.6.4: * Fix stomp header regex to include '-' (bsc#1227793) zypper updated to 1.14.77: * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * BuildRequires: libzypp-devel >= 17.35.10. * Fix wrong numbers used in CommitSummary skipped/failed messages. * Show rpm install size before installing (bsc#1224771) If filesystem snapshots are taken before the installation (e.g. by snapper) no disk space is freed by removing old packages. In this case the install size of all packages is a hint how much additional disk space is needed by the new packages static content. * Fix readline setup to handle Ctrl-C and Ctrl-D corrrectly (bsc#1227205) * Let_readline_abort_on_Ctrl-C (bsc#1226493) * packages: add '\--system' to show @System packages (bsc#222971) * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * BuildRequires: libzypp-devel >= 17.33.0. * Delay zypp lock until command options are parsed (bsc#1223766) * Unify message format(fixes #485) * switch cmake build type to RelWithDebInfo * modernize spec file (remove Authors section, use proper macros, remove redundant clean section, don't mark man pages as doc) * switch to -O2 -fvisibility=hidden -fpie: * PIC is not needed as no shared lib is built * fstack-protector-strong is default on modern dists and would be downgraded by fstack-protector * default visibility hidden allows better optimisation * O2 is reducing inlining bloat -> 18% reduced binary size * remove procps requires (was only for ZMD which is dropped) (jsc#PED-8153) * Do not try to refresh repo metadata as non-root user (bsc#1222086) Instead show refresh stats and hint how to update them. * man: Explain how to protect orphaned packages by collecting them in a plaindir repo. * packages: Add --autoinstalled and --userinstalled options to list them. * Don't print 'reboot required' message if download-only or dry-run (fixes #529) Instead point out that a reboot would be required if the option was not used. * Resepect zypper.conf option `showAlias` search commands (bsc#1221963) Repository::asUserString (or Repository::label) respects the zypper.conf option, while name/alias return the property. * dup: New option --remove-orphaned to remove all orphaned packages in dup (bsc#1221525) * info,summary: Support VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) * BuildRequires: libzypp-devel >= 17.32.0. API cleanup and changes for VendorSupportSuperseded. * Show active dry-run/download-only at the commit propmpt. * patch: Add --skip-not-applicable-patches option (closes #514) * Fix printing detailed solver problem description. The problem description() is one rule out possibly many in completeProblemInfo() the solver has chosen to represent the problem. So either description or completeProblemInfo should be printed, but not both. * Fix bash-completion to work with right adjusted numbers in the 1st column too (closes #505) * Set libzypp shutdown request signal on Ctrl+C (fixes #522) * lr REPO: In the detailed view show all baseurls not just the first one (bsc#1218171) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-82=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsolv-tools-base-0.7.30-1.1 * libzypp-debuginfo-17.35.12-1.1 * libsolv-tools-debuginfo-0.7.30-1.1 * zypper-1.14.77-1.1 * libsolv-tools-base-debuginfo-0.7.30-1.1 * libzypp-17.35.12-1.1 * zypper-debuginfo-1.14.77-1.1 * libsolv-debugsource-0.7.30-1.1 * zypper-debugsource-1.14.77-1.1 * suseconnect-ng-1.12.0-1.1 * libsolv-tools-0.7.30-1.1 * libzypp-debugsource-17.35.12-1.1 * SUSE Linux Micro 6.0 (noarch) * zypper-needs-restarting-1.14.77-1.1 * python311-zypp-plugin-0.6.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1007273 * https://bugzilla.suse.com/show_bug.cgi?id=1175678 * https://bugzilla.suse.com/show_bug.cgi?id=1218171 * https://bugzilla.suse.com/show_bug.cgi?id=1219004 * https://bugzilla.suse.com/show_bug.cgi?id=1221525 * https://bugzilla.suse.com/show_bug.cgi?id=1221963 * https://bugzilla.suse.com/show_bug.cgi?id=1222086 * https://bugzilla.suse.com/show_bug.cgi?id=1222398 * https://bugzilla.suse.com/show_bug.cgi?id=1223094 * https://bugzilla.suse.com/show_bug.cgi?id=1223107 * https://bugzilla.suse.com/show_bug.cgi?id=1223430 * https://bugzilla.suse.com/show_bug.cgi?id=1223766 * https://bugzilla.suse.com/show_bug.cgi?id=1224771 * https://bugzilla.suse.com/show_bug.cgi?id=1225267 * https://bugzilla.suse.com/show_bug.cgi?id=1226014 * https://bugzilla.suse.com/show_bug.cgi?id=1226030 * https://bugzilla.suse.com/show_bug.cgi?id=1226128 * https://bugzilla.suse.com/show_bug.cgi?id=1226493 * https://bugzilla.suse.com/show_bug.cgi?id=1227205 * https://bugzilla.suse.com/show_bug.cgi?id=1227625 * https://bugzilla.suse.com/show_bug.cgi?id=1227793 * https://bugzilla.suse.com/show_bug.cgi?id=1228138 * https://bugzilla.suse.com/show_bug.cgi?id=1228206 * https://bugzilla.suse.com/show_bug.cgi?id=1228208 * https://bugzilla.suse.com/show_bug.cgi?id=1228420 * https://bugzilla.suse.com/show_bug.cgi?id=1228647 * https://bugzilla.suse.com/show_bug.cgi?id=1228787 * https://bugzilla.suse.com/show_bug.cgi?id=1229014 * https://bugzilla.suse.com/show_bug.cgi?id=1230229 * https://bugzilla.suse.com/show_bug.cgi?id=1230267 * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 * https://bugzilla.suse.com/show_bug.cgi?id=222971 * https://jira.suse.com/browse/OBS-301 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8014 * https://jira.suse.com/browse/PED-8018 * https://jira.suse.com/browse/PED-8153 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:20 -0000 Subject: SUSE-RU-2025:20023-1: moderate: Recommended update for elemental-system-agent, elemental, systemd-presets-branding-Elemental, elemental-toolkit, elemental-agent, elemental-operator Message-ID: <174902894002.655.11810143572917268633@smelt2.prg2.suse.org> # Recommended update for elemental-system-agent, elemental, systemd-presets- branding-Elemental, elemental-toolkit, elemental-agent, elemental-operator Announcement ID: SUSE-RU-2025:20023-1 Release Date: 2025-02-03T08:50:21Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for elemental-system-agent, elemental, systemd-presets-branding- Elemental, elemental-toolkit, elemental-agent, elemental-operator fixes the following issues: elemental: \- Update to version v2.1.2 * Fix grub2-x86_64-efi installation * Removing syslinux from base image * Workaround to remove any pre-existing Elemental initrd elemental-agent: \- Update to version 0.5.0+git20240729.4482c01: * Fix rke2 cluster class (#80) * Fix rootfs layout (#76) * Exclude cloud-config-defaults feature (#75) * Use toolkit nightly builds (#74) * Align images to Elemental dev (#73) * Only use essential elemental services (#71) * Actualyze elemental init arguments and improve iso build setup (#70) * Fix missing mtools dependency (#68) * Unify root password * Prevent associating multiple ElementalHosts (#65) * Remove CodeQL github action workaround (#66) * upgrade elemental-toolkit to 2.1.0 version (#61) * tests: align Ginkgo version in the Makefile (#63) * Dockerfiles: ensure /usr/libexec is present on the image FS (#64) * minor/setup_kind_cluster.sh: print the command to write the my-config.yaml (#62) * Fix RKE2 ClusterClass and RKE2 default registration method (#60) * Remove unused Codecov config (#59) * Actualize RKE2 templates (#58) * Remove CodeCov action (#57) * Update codeql action (#56) * Display host phases (#51) * Bump CAPI version (#54) * Print test agent config by default (#55) * Deprecate release-action (#53) * Display association status (#49) * Add registration ready condition (#50) * Prevent kubelet and containerd from running in Recovery (#43) * Mitigate time sync issues on JWT validation (#41) * Improve kubeadm image (#39) \- Update to version 0.5.0+git20240319.13ad570: * Update dependencies and fix CodeQL failure (#36) * Update to go 1.22 (#32) * Update k3s provider urls (#34) * Remove tumbleweed dracut patches (#33) * Refer to CONTROL_PLANE_ENDPOINT_HOST * Update metadata.yaml * Update quickstart (#30) * Remove uninitialized taint from nodes (#29) * Set providerid on nodes (#22) * Bump yip to v1.4.10 \- Initial version 0.5.0 elemental-operator: \- Update to version 1.6.4: * register: always register when called (#816) * Update to version 1.6.3: * Backport to v1.6.x (#796) * Enable PR workflow for v1.6 maintenance branch * Add toggle to automatically delete no longer in sync versions (#780) (#783) * [v1.6.x] Add managedosversion finalizer (#775 & #784) (#782) * Ensure re-sync is triggered * [v1.6.x][BACKPORT] operator: fix ManagedOSVersionChannel sync (#771) * Use YAML content for Elemental Agent config (#765) (#770) * Allow yip configs (#751) (#762) * Update deployment.yaml (#757) (#761) * Flag no longer in sync ManagedOSVersions (#750) (#752) * Let elemental-register digest system hardware data (#748) (#749) * register: don't send new Disks and Controllers data (#741) * Added the ability to create a node reset marker for unmanaged hosts (#731) (#737) * Update to version 1.6.2: * chart: add chart name and version to the operator deployment (#694) * Add Metadata CRD (#717) elemental-system-agent: \- Update to version 0.3.7: * Add support for CATTLE_AGENT_VAR_DIR in suc plan * add the step for creating GH release, and fix typo in filename * Migrate from Drone to GitHub Action * Version bump for Alpine and Kubectl * Add support for CATTLE_AGENT_STRICT_VERIFY|STRICT_VERIFY environment variables to ensure kubeconfig CA data is valid (#171) elemental-toolkit: \- Update to version 2.1.1: * [backport] Disable boot entry if efivars is read-only (#2059) (#2145) * [backport] CI refactor to v2.1.x branch (#2146) * Remove pre-existing Elemental initrds systemd-presets-branding-Elemental: \- Include elemental-register.timer as service enabled by default ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-16=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * elemental-updater-2.1.1-1.1 * elemental-2.1.1-1.1 * systemd-presets-branding-Elemental-20240807-1.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * elemental-system-agent-0.3.7-1.1 * elemental-support-1.6.4-1.1 * elemental-toolkit-2.1.1-1.1 * elemental-register-1.6.4-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:46 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:46 -0000 Subject: SUSE-SU-2025:20017-1: important: Security update for gnutls Message-ID: <174902896613.655.10232575008887401182@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:20017-1 Release Date: 2025-02-03T08:48:39Z Rating: important References: * bsc#1221242 * bsc#1221746 * bsc#1221747 Cross-References: * CVE-2024-28834 * CVE-2024-28835 CVSS scores: * CVE-2024-28834 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28834 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28835 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-28835 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-28835: certtool crash when verifying a certificate chain (bsc#1221747) * CVE-2024-28834: Fixed side-channel in the deterministic ECDSA (bsc#1221746) * jitterentropy: Release the memory of the entropy collector when using jitterentropy with phtreads as there is also a pre-initialization done in the main thread. (bsc#1221242) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-25=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * gnutls-debugsource-3.8.3-2.1 * libgnutls30-debuginfo-3.8.3-2.1 * gnutls-debuginfo-3.8.3-2.1 * libgnutls30-3.8.3-2.1 * gnutls-3.8.3-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28834.html * https://www.suse.com/security/cve/CVE-2024-28835.html * https://bugzilla.suse.com/show_bug.cgi?id=1221242 * https://bugzilla.suse.com/show_bug.cgi?id=1221746 * https://bugzilla.suse.com/show_bug.cgi?id=1221747 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:21:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:21:12 -0000 Subject: SUSE-SU-2025:20028-1: important: Security update for the Linux Kernel Message-ID: <174902887256.655.5814522107450678217@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20028-1 Release Date: 2025-02-03T08:51:43Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1141539 * bsc#1181674 * bsc#1186716 * bsc#1187716 * bsc#1193599 * bsc#1194869 * bsc#1195775 * bsc#1204562 * bsc#1207948 * bsc#1208593 * bsc#1209657 * bsc#1209834 * bsc#1213573 * bsc#1214683 * bsc#1214852 * bsc#1215199 * bsc#1215587 * bsc#1216196 * bsc#1216358 * bsc#1216436 * bsc#1216702 * bsc#1217169 * bsc#1217384 * bsc#1217408 * bsc#1217481 * bsc#1217750 * bsc#1217912 * bsc#1218442 * bsc#1218447 * bsc#1218562 * bsc#1218730 * bsc#1218820 * bsc#1218917 * bsc#1219104 * bsc#1219170 * bsc#1219216 * bsc#1219224 * bsc#1219451 * bsc#1219478 * bsc#1219485 * bsc#1219596 * bsc#1219633 * bsc#1219832 * bsc#1219847 * bsc#1219953 * bsc#1220021 * bsc#1220120 * bsc#1220138 * bsc#1220148 * bsc#1220214 * bsc#1220328 * bsc#1220427 * bsc#1220430 * bsc#1220569 * bsc#1220738 * bsc#1220783 * bsc#1220942 * bsc#1221044 * bsc#1221057 * bsc#1221086 * bsc#1221097 * bsc#1221303 * bsc#1221612 * bsc#1221615 * bsc#1221635 * bsc#1221645 * bsc#1221647 * bsc#1221649 * bsc#1221654 * bsc#1221656 * bsc#1221659 * bsc#1221765 * bsc#1221777 * bsc#1221816 * bsc#1221829 * bsc#1221858 * bsc#1221958 * bsc#1222011 * bsc#1222015 * bsc#1222080 * bsc#1222241 * bsc#1222294 * bsc#1222303 * bsc#1222326 * bsc#1222328 * bsc#1222357 * bsc#1222368 * bsc#1222378 * bsc#1222380 * bsc#1222385 * bsc#1222426 * bsc#1222438 * bsc#1222459 * bsc#1222463 * bsc#1222464 * bsc#1222532 * bsc#1222559 * bsc#1222588 * bsc#1222596 * bsc#1222608 * bsc#1222613 * bsc#1222615 * bsc#1222617 * bsc#1222619 * bsc#1222624 * bsc#1222627 * bsc#1222654 * bsc#1222721 * bsc#1222768 * bsc#1222769 * bsc#1222771 * bsc#1222775 * bsc#1222777 * bsc#1222779 * bsc#1222780 * bsc#1222782 * bsc#1222793 * bsc#1222809 * bsc#1222810 * bsc#1222893 * bsc#1223007 * bsc#1223010 * bsc#1223011 * bsc#1223016 * bsc#1223018 * bsc#1223020 * bsc#1223021 * bsc#1223023 * bsc#1223024 * bsc#1223035 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223045 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223057 * bsc#1223058 * bsc#1223060 * bsc#1223061 * bsc#1223062 * bsc#1223076 * bsc#1223077 * bsc#1223084 * bsc#1223111 * bsc#1223113 * bsc#1223137 * bsc#1223138 * bsc#1223140 * bsc#1223143 * bsc#1223187 * bsc#1223188 * bsc#1223189 * bsc#1223190 * bsc#1223191 * bsc#1223192 * bsc#1223195 * bsc#1223196 * bsc#1223197 * bsc#1223198 * bsc#1223202 * bsc#1223203 * bsc#1223204 * bsc#1223205 * bsc#1223207 * bsc#1223265 * bsc#1223285 * bsc#1223315 * bsc#1223323 * bsc#1223338 * bsc#1223357 * bsc#1223369 * bsc#1223380 * bsc#1223384 * bsc#1223390 * bsc#1223415 * bsc#1223439 * bsc#1223462 * bsc#1223525 * bsc#1223532 * bsc#1223539 * bsc#1223570 * bsc#1223575 * bsc#1223590 * bsc#1223591 * bsc#1223592 * bsc#1223593 * bsc#1223625 * bsc#1223626 * bsc#1223627 * bsc#1223629 * bsc#1223631 * bsc#1223632 * bsc#1223633 * bsc#1223634 * bsc#1223637 * bsc#1223638 * bsc#1223641 * bsc#1223642 * bsc#1223643 * bsc#1223644 * bsc#1223645 * bsc#1223646 * bsc#1223648 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223653 * bsc#1223654 * bsc#1223655 * bsc#1223657 * bsc#1223660 * bsc#1223661 * bsc#1223663 * bsc#1223664 * bsc#1223665 * bsc#1223666 * bsc#1223667 * bsc#1223668 * bsc#1223669 * bsc#1223670 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223679 * bsc#1223686 * bsc#1223692 * bsc#1223693 * bsc#1223695 * bsc#1223696 * bsc#1223698 * bsc#1223699 * bsc#1223705 * bsc#1223709 * bsc#1223711 * bsc#1223712 * bsc#1223714 * bsc#1223715 * bsc#1223717 * bsc#1223718 * bsc#1223723 * bsc#1223725 * bsc#1223728 * bsc#1223731 * bsc#1223732 * bsc#1223734 * bsc#1223735 * bsc#1223737 * bsc#1223738 * bsc#1223739 * bsc#1223740 * bsc#1223741 * bsc#1223744 * bsc#1223745 * bsc#1223747 * bsc#1223748 * bsc#1223749 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223756 * bsc#1223757 * bsc#1223759 * bsc#1223760 * bsc#1223761 * bsc#1223762 * bsc#1223764 * bsc#1223765 * bsc#1223768 * bsc#1223769 * bsc#1223770 * bsc#1223774 * bsc#1223776 * bsc#1223778 * bsc#1223779 * bsc#1223780 * bsc#1223781 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223804 * bsc#1223805 * bsc#1223806 * bsc#1223807 * bsc#1223808 * bsc#1223810 * bsc#1223813 * bsc#1223815 * bsc#1223816 * bsc#1223819 * bsc#1223821 * bsc#1223822 * bsc#1223823 * bsc#1223824 * bsc#1223826 * bsc#1223827 * bsc#1223828 * bsc#1223829 * bsc#1223831 * bsc#1223834 * bsc#1223836 * bsc#1223837 * bsc#1223838 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223847 * bsc#1223863 * bsc#1223869 * bsc#1223870 * bsc#1223871 * bsc#1223872 * bsc#1223874 * bsc#1223944 * bsc#1223945 * bsc#1223946 * bsc#1223991 * bsc#1224049 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224187 * bsc#1224331 * bsc#1224348 * bsc#1224414 * bsc#1224422 * bsc#1224423 * bsc#1224429 * bsc#1224430 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224439 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224477 * bsc#1224479 * bsc#1224480 * bsc#1224481 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224488 * bsc#1224490 * bsc#1224491 * bsc#1224492 * bsc#1224493 * bsc#1224494 * bsc#1224495 * bsc#1224497 * bsc#1224498 * bsc#1224499 * bsc#1224500 * bsc#1224501 * bsc#1224502 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224512 * bsc#1224513 * bsc#1224515 * bsc#1224516 * bsc#1224517 * bsc#1224519 * bsc#1224520 * bsc#1224521 * bsc#1224523 * bsc#1224524 * bsc#1224525 * bsc#1224526 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224537 * bsc#1224539 * bsc#1224540 * bsc#1224541 * bsc#1224542 * bsc#1224543 * bsc#1224544 * bsc#1224545 * bsc#1224546 * bsc#1224549 * bsc#1224550 * bsc#1224552 * bsc#1224553 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224565 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224572 * bsc#1224573 * bsc#1224575 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224583 * bsc#1224584 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224589 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224602 * bsc#1224603 * bsc#1224604 * bsc#1224605 * bsc#1224606 * bsc#1224607 * bsc#1224608 * bsc#1224609 * bsc#1224611 * bsc#1224612 * bsc#1224613 * bsc#1224614 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224619 * bsc#1224620 * bsc#1224621 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224639 * bsc#1224640 * bsc#1224641 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224646 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224652 * bsc#1224653 * bsc#1224654 * bsc#1224655 * bsc#1224657 * bsc#1224659 * bsc#1224660 * bsc#1224661 * bsc#1224662 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224670 * bsc#1224671 * bsc#1224672 * bsc#1224673 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224698 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224718 * bsc#1224719 * bsc#1224720 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224728 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224735 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224742 * bsc#1224743 * bsc#1224747 * bsc#1224749 * bsc#1224751 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224767 * bsc#1224790 * bsc#1224792 * bsc#1224793 * bsc#1224803 * bsc#1224804 * bsc#1224866 * bsc#1224928 * bsc#1224930 * bsc#1224932 * bsc#1224933 * bsc#1224935 * bsc#1224936 * bsc#1224937 * bsc#1224939 * bsc#1224941 * bsc#1224944 * bsc#1224946 * bsc#1224947 * bsc#1224949 * bsc#1224951 * bsc#1224988 * bsc#1224989 * bsc#1224992 * bsc#1224998 * bsc#1225000 * bsc#1225001 * bsc#1225004 * bsc#1225006 * bsc#1225007 * bsc#1225008 * bsc#1225009 * bsc#1225014 * bsc#1225015 * bsc#1225022 * bsc#1225025 * bsc#1225028 * bsc#1225029 * bsc#1225031 * bsc#1225036 * bsc#1225041 * bsc#1225044 * bsc#1225049 * bsc#1225050 * bsc#1225053 * bsc#1225076 * bsc#1225077 * bsc#1225078 * bsc#1225081 * bsc#1225085 * bsc#1225086 * bsc#1225088 * bsc#1225090 * bsc#1225092 * bsc#1225096 * bsc#1225097 * bsc#1225098 * bsc#1225101 * bsc#1225103 * bsc#1225104 * bsc#1225105 * bsc#1225106 * bsc#1225108 * bsc#1225120 * bsc#1225132 * bsc#1225133 * bsc#1225134 * bsc#1225136 * bsc#1225172 * bsc#1225180 * bsc#1225272 * bsc#1225300 * bsc#1225391 * bsc#1225472 * bsc#1225475 * bsc#1225476 * bsc#1225477 * bsc#1225478 * bsc#1225485 * bsc#1225489 * bsc#1225490 * bsc#1225502 * bsc#1225527 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225548 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225555 * bsc#1225556 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225564 * bsc#1225565 * bsc#1225566 * bsc#1225568 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225573 * bsc#1225577 * bsc#1225578 * bsc#1225579 * bsc#1225580 * bsc#1225581 * bsc#1225583 * bsc#1225584 * bsc#1225585 * bsc#1225586 * bsc#1225587 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225593 * bsc#1225594 * bsc#1225595 * bsc#1225599 * bsc#1225600 * bsc#1225601 * bsc#1225602 * bsc#1225605 * bsc#1225607 * bsc#1225609 * bsc#1225610 * bsc#1225611 * bsc#1225616 * bsc#1225618 * bsc#1225640 * bsc#1225642 * bsc#1225681 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225696 * bsc#1225698 * bsc#1225699 * bsc#1225702 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225711 * bsc#1225712 * bsc#1225714 * bsc#1225715 * bsc#1225717 * bsc#1225719 * bsc#1225720 * bsc#1225722 * bsc#1225723 * bsc#1225726 * bsc#1225728 * bsc#1225731 * bsc#1225732 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225737 * bsc#1225741 * bsc#1225744 * bsc#1225745 * bsc#1225746 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225752 * bsc#1225753 * bsc#1225756 * bsc#1225757 * bsc#1225758 * bsc#1225759 * bsc#1225760 * bsc#1225761 * bsc#1225762 * bsc#1225763 * bsc#1225765 * bsc#1225766 * bsc#1225767 * bsc#1225769 * bsc#1225770 * bsc#1225773 * bsc#1225775 * bsc#1225805 * bsc#1225810 * bsc#1225815 * bsc#1225820 * bsc#1225823 * bsc#1225827 * bsc#1225829 * bsc#1225830 * bsc#1225834 * bsc#1225835 * bsc#1225839 * bsc#1225840 * bsc#1225842 * bsc#1225843 * bsc#1225847 * bsc#1225851 * bsc#1225856 * bsc#1225866 * bsc#1225872 * bsc#1225894 * bsc#1225895 * bsc#1225896 * bsc#1225898 * bsc#1225903 * bsc#1225945 * bsc#1226022 * bsc#1226131 * bsc#1226145 * bsc#1226149 * bsc#1226155 * bsc#1226158 * bsc#1226163 * bsc#1226202 * bsc#1226211 * bsc#1226212 * bsc#1226213 * bsc#1226226 * bsc#1226457 * bsc#1226502 * bsc#1226503 * bsc#1226513 * bsc#1226514 * bsc#1226519 * bsc#1226520 * bsc#1226582 * bsc#1226587 * bsc#1226588 * bsc#1226592 * bsc#1226593 * bsc#1226594 * bsc#1226595 * bsc#1226597 * bsc#1226607 * bsc#1226608 * bsc#1226610 * bsc#1226612 * bsc#1226613 * bsc#1226630 * bsc#1226632 * bsc#1226633 * bsc#1226634 * bsc#1226637 * bsc#1226657 * bsc#1226658 * bsc#1226734 * bsc#1226735 * bsc#1226737 * bsc#1226738 * bsc#1226739 * bsc#1226740 * bsc#1226741 * bsc#1226742 * bsc#1226744 * bsc#1226746 * bsc#1226747 * bsc#1226749 * bsc#1226750 * bsc#1226754 * bsc#1226757 * bsc#1226758 * bsc#1226760 * bsc#1226761 * bsc#1226764 * bsc#1226767 * bsc#1226768 * bsc#1226769 * bsc#1226771 * bsc#1226772 * bsc#1226774 * bsc#1226775 * bsc#1226776 * bsc#1226777 * bsc#1226780 * bsc#1226781 * bsc#1226783 * bsc#1226785 * bsc#1226786 * bsc#1226788 * bsc#1226789 * bsc#1226790 * bsc#1226791 * bsc#1226796 * bsc#1226799 * bsc#1226837 * bsc#1226839 * bsc#1226840 * bsc#1226841 * bsc#1226842 * bsc#1226844 * bsc#1226848 * bsc#1226852 * bsc#1226856 * bsc#1226857 * bsc#1226859 * bsc#1226861 * bsc#1226863 * bsc#1226864 * bsc#1226866 * bsc#1226867 * bsc#1226868 * bsc#1226875 * bsc#1226876 * bsc#1226878 * bsc#1226879 * bsc#1226883 * bsc#1226886 * bsc#1226890 * bsc#1226891 * bsc#1226894 * bsc#1226895 * bsc#1226905 * bsc#1226908 * bsc#1226909 * bsc#1226911 * bsc#1226915 * bsc#1226928 * bsc#1226934 * bsc#1226938 * bsc#1226939 * bsc#1226941 * bsc#1226948 * bsc#1226949 * bsc#1226950 * bsc#1226962 * bsc#1226976 * bsc#1226989 * bsc#1226990 * bsc#1226992 * bsc#1226993 * bsc#1226994 * bsc#1226995 * bsc#1226996 * bsc#1227066 * bsc#1227072 * bsc#1227085 * bsc#1227089 * bsc#1227090 * bsc#1227096 * bsc#1227101 * bsc#1227103 * bsc#1227149 * bsc#1227190 * bsc#1227282 * bsc#1227362 * bsc#1227363 * bsc#1227383 * bsc#1227432 * bsc#1227433 * bsc#1227434 * bsc#1227435 * bsc#1227443 * bsc#1227446 * bsc#1227447 * bsc#1227487 * bsc#1227573 * bsc#1227626 * bsc#1227716 * bsc#1227719 * bsc#1227723 * bsc#1227730 * bsc#1227736 * bsc#1227755 * bsc#1227757 * bsc#1227762 * bsc#1227763 * bsc#1227779 * bsc#1227780 * bsc#1227783 * bsc#1227786 * bsc#1227788 * bsc#1227789 * bsc#1227797 * bsc#1227800 * bsc#1227801 * bsc#1227803 * bsc#1227806 * bsc#1227813 * bsc#1227814 * bsc#1227836 * bsc#1227855 * bsc#1227862 * bsc#1227866 * bsc#1227886 * bsc#1227899 * bsc#1227910 * bsc#1227913 * bsc#1227926 * bsc#1228090 * bsc#1228114 * bsc#1228192 * bsc#1228193 * bsc#1228211 * bsc#1228269 * bsc#1228289 * bsc#1228327 * bsc#1228328 * bsc#1228403 * bsc#1228405 * bsc#1228408 * bsc#1228417 * bsc#1229025 * jsc#PED-542 * jsc#PED-8111 * jsc#PED-8240 * jsc#PED-8491 * jsc#PED-8570 * jsc#PED-8644 * jsc#PED-8645 * jsc#PED-8649 * jsc#PED-8688 * jsc#PED-8701 * jsc#PED-8954 Cross-References: * CVE-2021-47432 * CVE-2022-48669 * CVE-2022-48772 * CVE-2023-0160 * CVE-2023-38417 * CVE-2023-47210 * CVE-2023-51780 * CVE-2023-52434 * CVE-2023-52435 * CVE-2023-52472 * CVE-2023-52483 * CVE-2023-52616 * CVE-2023-52618 * CVE-2023-52622 * CVE-2023-52635 * CVE-2023-52641 * CVE-2023-52647 * CVE-2023-52648 * CVE-2023-52649 * CVE-2023-52650 * CVE-2023-52652 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52656 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52672 * CVE-2023-52673 * CVE-2023-52674 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52685 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52698 * CVE-2023-52699 * CVE-2023-52735 * CVE-2023-52749 * CVE-2023-52750 * CVE-2023-52751 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52757 * CVE-2023-52759 * CVE-2023-52762 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52765 * CVE-2023-52766 * CVE-2023-52767 * CVE-2023-52768 * CVE-2023-52769 * CVE-2023-52771 * CVE-2023-52772 * CVE-2023-52773 * CVE-2023-52774 * CVE-2023-52775 * CVE-2023-52776 * CVE-2023-52777 * CVE-2023-52780 * CVE-2023-52781 * CVE-2023-52782 * CVE-2023-52783 * CVE-2023-52784 * CVE-2023-52786 * CVE-2023-52787 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52792 * CVE-2023-52794 * CVE-2023-52795 * CVE-2023-52796 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52801 * CVE-2023-52803 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52807 * CVE-2023-52808 * CVE-2023-52809 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52812 * CVE-2023-52813 * CVE-2023-52814 * CVE-2023-52815 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52827 * CVE-2023-52829 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52835 * CVE-2023-52836 * CVE-2023-52837 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52842 * CVE-2023-52843 * CVE-2023-52844 * CVE-2023-52845 * CVE-2023-52846 * CVE-2023-52847 * CVE-2023-52849 * CVE-2023-52850 * CVE-2023-52851 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52857 * CVE-2023-52858 * CVE-2023-52860 * CVE-2023-52861 * CVE-2023-52862 * CVE-2023-52863 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52866 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52869 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52874 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52879 * CVE-2023-52880 * CVE-2023-52881 * CVE-2023-52882 * CVE-2023-52883 * CVE-2023-52884 * CVE-2023-6238 * CVE-2024-0639 * CVE-2024-21823 * CVE-2024-23848 * CVE-2024-25741 * CVE-2024-26582 * CVE-2024-26611 * CVE-2024-26615 * CVE-2024-26623 * CVE-2024-26625 * CVE-2024-26632 * CVE-2024-26633 * CVE-2024-26635 * CVE-2024-26636 * CVE-2024-26638 * CVE-2024-26641 * CVE-2024-26643 * CVE-2024-26663 * CVE-2024-26665 * CVE-2024-26671 * CVE-2024-26673 * CVE-2024-26674 * CVE-2024-26676 * CVE-2024-26679 * CVE-2024-26691 * CVE-2024-26692 * CVE-2024-26726 * CVE-2024-26734 * CVE-2024-26739 * CVE-2024-26742 * CVE-2024-26750 * CVE-2024-26758 * CVE-2024-26760 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26772 * CVE-2024-26775 * CVE-2024-26780 * CVE-2024-26783 * CVE-2024-26785 * CVE-2024-26786 * CVE-2024-26791 * CVE-2024-26794 * CVE-2024-26813 * CVE-2024-26814 * CVE-2024-26816 * CVE-2024-26822 * CVE-2024-26826 * CVE-2024-26828 * CVE-2024-26832 * CVE-2024-26845 * CVE-2024-26846 * CVE-2024-26852 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26860 * CVE-2024-26861 * CVE-2024-26862 * CVE-2024-26863 * CVE-2024-26865 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26877 * CVE-2024-26878 * CVE-2024-26880 * CVE-2024-26881 * CVE-2024-26883 * CVE-2024-26884 * CVE-2024-26885 * CVE-2024-26889 * CVE-2024-26890 * CVE-2024-26892 * CVE-2024-26893 * CVE-2024-26895 * CVE-2024-26897 * CVE-2024-26898 * CVE-2024-26899 * CVE-2024-26900 * CVE-2024-26901 * CVE-2024-26903 * CVE-2024-26906 * CVE-2024-26907 * CVE-2024-26909 * CVE-2024-26913 * CVE-2024-26914 * CVE-2024-26915 * CVE-2024-26916 * CVE-2024-26919 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26923 * CVE-2024-26925 * CVE-2024-26927 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26932 * CVE-2024-26933 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26939 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26944 * CVE-2024-26945 * CVE-2024-26946 * CVE-2024-26948 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26955 * CVE-2024-26956 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26959 * CVE-2024-26960 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26965 * CVE-2024-26966 * CVE-2024-26968 * CVE-2024-26969 * CVE-2024-26970 * CVE-2024-26972 * CVE-2024-26973 * CVE-2024-26974 * CVE-2024-26975 * CVE-2024-26977 * CVE-2024-26978 * CVE-2024-26981 * CVE-2024-26982 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26990 * CVE-2024-26991 * CVE-2024-26992 * CVE-2024-26993 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27009 * CVE-2024-27012 * CVE-2024-27013 * CVE-2024-27014 * CVE-2024-27015 * CVE-2024-27016 * CVE-2024-27019 * CVE-2024-27020 * CVE-2024-27022 * CVE-2024-27023 * CVE-2024-27025 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27036 * CVE-2024-27037 * CVE-2024-27038 * CVE-2024-27039 * CVE-2024-27040 * CVE-2024-27041 * CVE-2024-27042 * CVE-2024-27043 * CVE-2024-27044 * CVE-2024-27045 * CVE-2024-27046 * CVE-2024-27047 * CVE-2024-27048 * CVE-2024-27051 * CVE-2024-27052 * CVE-2024-27053 * CVE-2024-27054 * CVE-2024-27056 * CVE-2024-27057 * CVE-2024-27059 * CVE-2024-27060 * CVE-2024-27062 * CVE-2024-27064 * CVE-2024-27065 * CVE-2024-27067 * CVE-2024-27068 * CVE-2024-27071 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27076 * CVE-2024-27077 * CVE-2024-27078 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27391 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27402 * CVE-2024-27404 * CVE-2024-27405 * CVE-2024-27408 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27414 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27418 * CVE-2024-27431 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-33619 * CVE-2024-34777 * CVE-2024-35247 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35791 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35803 * CVE-2024-35804 * CVE-2024-35805 * CVE-2024-35806 * CVE-2024-35807 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35814 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35827 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35831 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35843 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35848 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35853 * CVE-2024-35854 * CVE-2024-35857 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35880 * CVE-2024-35883 * CVE-2024-35884 * CVE-2024-35885 * CVE-2024-35886 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35890 * CVE-2024-35891 * CVE-2024-35892 * CVE-2024-35893 * CVE-2024-35895 * CVE-2024-35896 * CVE-2024-35898 * CVE-2024-35899 * CVE-2024-35900 * CVE-2024-35901 * CVE-2024-35903 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35908 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35917 * CVE-2024-35921 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35925 * CVE-2024-35926 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35931 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35934 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35942 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35957 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35962 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35970 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35976 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35979 * CVE-2024-35981 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35991 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-35998 * CVE-2024-35999 * CVE-2024-36002 * CVE-2024-36003 * CVE-2024-36004 * CVE-2024-36005 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36008 * CVE-2024-36009 * CVE-2024-36010 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36013 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36017 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36024 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36030 * CVE-2024-36032 * CVE-2024-36281 * CVE-2024-36477 * CVE-2024-36478 * CVE-2024-36479 * CVE-2024-36880 * CVE-2024-36882 * CVE-2024-36885 * CVE-2024-36887 * CVE-2024-36889 * CVE-2024-36890 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36899 * CVE-2024-36900 * CVE-2024-36901 * CVE-2024-36902 * CVE-2024-36903 * CVE-2024-36904 * CVE-2024-36906 * CVE-2024-36909 * CVE-2024-36910 * CVE-2024-36911 * CVE-2024-36912 * CVE-2024-36913 * CVE-2024-36914 * CVE-2024-36915 * CVE-2024-36916 * CVE-2024-36917 * CVE-2024-36918 * CVE-2024-36919 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36923 * CVE-2024-36924 * CVE-2024-36926 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36934 * CVE-2024-36935 * CVE-2024-36936 * CVE-2024-36937 * CVE-2024-36938 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36945 * CVE-2024-36946 * CVE-2024-36947 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36952 * CVE-2024-36955 * CVE-2024-36957 * CVE-2024-36959 * CVE-2024-36960 * CVE-2024-36962 * CVE-2024-36964 * CVE-2024-36965 * CVE-2024-36967 * CVE-2024-36969 * CVE-2024-36971 * CVE-2024-36972 * CVE-2024-36973 * CVE-2024-36974 * CVE-2024-36975 * CVE-2024-36977 * CVE-2024-36978 * CVE-2024-37021 * CVE-2024-37078 * CVE-2024-37353 * CVE-2024-37354 * CVE-2024-38381 * CVE-2024-38384 * CVE-2024-38385 * CVE-2024-38388 * CVE-2024-38390 * CVE-2024-38391 * CVE-2024-38539 * CVE-2024-38540 * CVE-2024-38541 * CVE-2024-38543 * CVE-2024-38544 * CVE-2024-38545 * CVE-2024-38546 * CVE-2024-38547 * CVE-2024-38548 * CVE-2024-38549 * CVE-2024-38550 * CVE-2024-38551 * CVE-2024-38552 * CVE-2024-38553 * CVE-2024-38554 * CVE-2024-38555 * CVE-2024-38556 * CVE-2024-38557 * CVE-2024-38558 * CVE-2024-38559 * CVE-2024-38560 * CVE-2024-38562 * CVE-2024-38564 * CVE-2024-38565 * CVE-2024-38566 * CVE-2024-38567 * CVE-2024-38568 * CVE-2024-38569 * CVE-2024-38570 * CVE-2024-38571 * CVE-2024-38572 * CVE-2024-38573 * CVE-2024-38575 * CVE-2024-38578 * CVE-2024-38579 * CVE-2024-38580 * CVE-2024-38581 * CVE-2024-38582 * CVE-2024-38583 * CVE-2024-38586 * CVE-2024-38587 * CVE-2024-38588 * CVE-2024-38590 * CVE-2024-38591 * CVE-2024-38592 * CVE-2024-38594 * CVE-2024-38595 * CVE-2024-38597 * CVE-2024-38598 * CVE-2024-38599 * CVE-2024-38600 * CVE-2024-38601 * CVE-2024-38602 * CVE-2024-38603 * CVE-2024-38604 * CVE-2024-38605 * CVE-2024-38608 * CVE-2024-38610 * CVE-2024-38611 * CVE-2024-38615 * CVE-2024-38616 * CVE-2024-38617 * CVE-2024-38618 * CVE-2024-38619 * CVE-2024-38621 * CVE-2024-38622 * CVE-2024-38627 * CVE-2024-38628 * CVE-2024-38629 * CVE-2024-38630 * CVE-2024-38633 * CVE-2024-38634 * CVE-2024-38635 * CVE-2024-38636 * CVE-2024-38659 * CVE-2024-38661 * CVE-2024-38663 * CVE-2024-38664 * CVE-2024-38780 * CVE-2024-39276 * CVE-2024-39277 * CVE-2024-39291 * CVE-2024-39296 * CVE-2024-39301 * CVE-2024-39362 * CVE-2024-39371 * CVE-2024-39463 * CVE-2024-39466 * CVE-2024-39468 * CVE-2024-39469 * CVE-2024-39471 * CVE-2024-39472 * CVE-2024-39473 * CVE-2024-39474 * CVE-2024-39475 * CVE-2024-39479 * CVE-2024-39481 * CVE-2024-39482 * CVE-2024-39487 * CVE-2024-39490 * CVE-2024-39494 * CVE-2024-39496 * CVE-2024-39498 * CVE-2024-39502 * CVE-2024-39504 * CVE-2024-39507 * CVE-2024-40901 * CVE-2024-40906 * CVE-2024-40908 * CVE-2024-40919 * CVE-2024-40923 * CVE-2024-40925 * CVE-2024-40928 * CVE-2024-40931 * CVE-2024-40935 * CVE-2024-40937 * CVE-2024-40940 * CVE-2024-40947 * CVE-2024-40948 * CVE-2024-40953 * CVE-2024-40960 * CVE-2024-40961 * CVE-2024-40966 * CVE-2024-40970 * CVE-2024-40972 * CVE-2024-40975 * CVE-2024-40979 * CVE-2024-40998 * CVE-2024-40999 * CVE-2024-41006 * CVE-2024-41011 * CVE-2024-41013 * CVE-2024-41014 * CVE-2024-41017 * CVE-2024-41090 * CVE-2024-41091 CVSS scores: * CVE-2021-47432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47432 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38417 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47210 ( SUSE ): 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52483 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52616 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52622 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52649 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52655 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52735 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52749 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52765 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52765 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52768 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52768 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52769 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52769 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52771 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52771 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52772 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52772 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52775 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52776 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52777 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52780 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52782 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52783 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52786 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52798 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52799 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52801 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52801 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52807 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52811 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52827 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52827 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52829 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52829 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52836 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52837 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52838 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52840 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52842 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52862 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52862 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52866 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52879 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52883 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52883 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52884 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52884 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6238 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6238 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21823 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25741 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-25741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26582 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26623 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26632 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26635 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26638 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26638 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26641 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26665 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26734 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26785 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26865 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26865 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26880 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26880 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26890 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-26892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26901 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26907 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26907 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26927 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26939 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26945 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26966 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26982 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26992 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-26993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27009 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27022 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27040 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27044 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27045 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27047 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27052 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27053 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27054 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27402 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27402 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27404 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27408 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27414 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27431 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-33619 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34777 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35803 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35843 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35843 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35853 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35857 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35868 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35884 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35896 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35899 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35942 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35957 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35970 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36013 ( NVD ): 6.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36016 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36017 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36030 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36030 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36281 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36477 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36478 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36478 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36479 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36889 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-36890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36900 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36903 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-36910 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36912 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36913 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36916 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36916 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-36917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36934 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36935 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36935 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36937 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36947 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36960 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36960 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36962 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36965 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36972 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36973 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36977 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-37021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-37354 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38384 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38385 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38388 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38388 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38390 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38391 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38539 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38540 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38541 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38543 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-38545 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38548 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38550 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38550 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38552 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-38552 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38553 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38553 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38555 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38556 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38557 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38559 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38560 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38562 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38562 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38564 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38565 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-38565 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-38566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38568 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38569 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38569 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38571 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38571 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38572 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38573 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38578 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38579 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-38580 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38582 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38583 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38587 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38587 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38588 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38588 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38591 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38594 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38595 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38597 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-38600 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38601 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38603 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38605 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38608 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38611 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38616 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38618 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38627 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38628 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38630 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38636 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38659 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H * CVE-2024-38661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39276 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39291 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39362 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39371 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39466 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39466 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39468 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39468 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39469 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39471 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39472 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-39472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39473 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39474 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39481 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39482 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39482 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39487 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39490 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39496 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39496 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39498 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39502 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39504 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39504 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-40906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40906 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40928 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40931 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-40931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40947 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40975 ( SUSE ): 2.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-41006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 826 vulnerabilities, contains 11 features and has 148 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408). * CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405). * CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403). * CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910). * CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993). * CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789). * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866). * CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114). * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716). * CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719). * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328). * CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913). * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886). * CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926). * CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899). * CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803). * CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783). * CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813). * CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797). * CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814). * CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757). * CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836). * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730). * CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800). * CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788). * CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731). * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786). * CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780). * CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779). * CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573) * CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490) * CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499) * CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641) * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512) * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non- allocated memory (bsc#1227762). * CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432). * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806). * CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422) * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815) * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813) * CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801). * CVE-2024-35890: gro: fix ownership transfer (bsc#1224516). * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719). * CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851). * CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750). * CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103). * CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763). * CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804). * CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723) * CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755). * CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807). * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711) * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545) * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778) * CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604). * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). * CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414). * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). * CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836). * CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806). * CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740). * CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326). * CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600). * CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088). * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783). * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626). * CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010). * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). * CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589). * CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463). * CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744). * CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717). * CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745). * CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752). * CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753). * CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328). * CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883). * CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489). * CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447). * CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434). * CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659). * CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656). * CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757). * CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544). * CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866). * CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654). * CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021). * CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647). * CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057). * CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779). * CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438). * CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743). * CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098). * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758). * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101). * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767). * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732). * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994). * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751). * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066). * CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948). * CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949). * CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950). * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799). * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610). * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841). * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879). * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996). * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789). * CVE-2024-38566: bpf: Fix verifier assumptions about socket->sk (bsc#1226790). * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514). * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770). * CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519). * CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857). * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842). * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744). * CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607). * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774). * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781). * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746). * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749). * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734). * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772). * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771). * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810). * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809). * CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823). * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815). * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145). * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439). * CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497). * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670). * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702). * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741). * CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737). * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735). * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080). * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951). * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498). * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). * CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681). * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723). * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759). * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726). * CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105). * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661). * CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939). * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760). * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763). * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834). * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614). * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585). * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539). * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018). * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515). * CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612). * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520). * CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619). * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2024-36030: Fixed the double free in rvu_npc_freemem() (bsc#1225712) * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621) * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148). * CVE-2024-26860: Fixed a memory leak when rechecking the data (bsc#1223077). * CVE-2023-52772: Fixed use-after-free in unix_stream_read_actor() (bsc#1224989). * CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2024-35895: Fixed lock inversion deadlock in map delete elem (bsc#1224511). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-27036: Fixed writeback data corruption (bsc#1223810). * CVE-2024-35903: Fixed IP after emitting call depth accounting (bsc#1224493). * CVE-2024-35931: Fixed PCI error slot reset during RAS recovery (bsc#1224652). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523). * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502). * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fixed warning during rehash (bsc#1224543). * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2023-52771: Fixed delete_endpoint() vs parent unregistration race (bsc#1225007). * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606). * CVE-2024-27408: Fixed race condition in dmaengine w-edma/eDMA (bsc#1224430). * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649). * CVE-2024-35921: Fixed oops when HEVC init fails (bsc#1224477). * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936). * CVE-2024-35991: Fixed kABI workaround for struct idxd_evl (bsc#1224553). * CVE-2024-27418: Fixed memory leak in mctp_local_output (bsc#1224720) * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721) * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2024-35917: Fixed Fix bpf_plt pointer arithmetic (bsc#1224481). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727). * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608). * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2023-52659: Fixed to pfn_to_kaddr() not treated as a 64-bit type (bsc#1224442). * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659). * CVE-2024-21823: Fixed safety flag to struct ends (bsc#1223625). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098). * CVE-2023-52483: mctp: perform route lookups under a RCU read-side lock (bsc#1220738). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-26632: Fixed iterating over an empty bio with bio_for_each_folio_all (bsc#1221635). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829). * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615). * CVE-2023-6238: Fixed kcalloc() arguments order (bsc#1217384). * CVE-2024-26946: Fixed copy_from_kernel_nofault() to read from unsafe address (bsc#1223669). * CVE-2024-26945: Fixed nr_cpus < nr_iaa case (bsc#1223732). * CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2023-52641: Fixed NULL ptr dereference checking at the end of attr_allocate_frame() (bsc#1222303) * CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679). * CVE-2024-26865: rds: tcp: Fix use-after-free of net in reqsk_timer_handler() (bsc#1223062). * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). * CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368). * CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693). * CVE-2024-26726: Fixed invalid drop extent_map for free space inode on write error (bsc#1222532) * CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745). * CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735). * CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664). * CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822). * CVE-2024-26991: Fixed overflow lpage_info when checking attributes (bsc#1223695). * CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655). * CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686). * CVE-2024-27022: Fixed linking file vma until vma is fully initialized (bsc#1223774). * CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104). * CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634). * CVE-2024-26899: Fixed deadlock between bd_link_disk_holder and partition scan (bsc#1223045). * CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060). * CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198). * CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357). * CVE-2024-26638: Fixed uninitialize struct msghdr completely (bsc#1221649). * CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057). * CVE-2024-26909: Fixed drm bridge use-after-free (bsc#1223143). * CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (bsc#1222378). * CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624). * CVE-2024-26832: Fixed missing folio cleanup in writeback race path (bsc#1223007). * CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615). * CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294). * CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035). * CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189). * CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190). The following non-security bugs were fixed: * 9p: add missing locking around taking dentry fid list (git-fixes) * ACPI: CPPC: Fix access width used for PCC registers (git-fixes). * ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes). * ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes). * ACPI: EC: Abort address space access upon error (stable-fixes). * ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable- fixes). * ACPI: EC: Evaluate orphan _REG under EC device (git-fixes). * ACPI: EC: Install address space handler at the namespace root (stable- fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git- fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes). * ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable- fixes). * ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750). * ACPI: x86: Add PNP_UART1_SKIP quirk for Lenovo Blade2 tablets (stable- fixes). * ACPI: x86: Force StorageD3Enable on more products (stable-fixes). * ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (git-fixes). * ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes). * ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes). * ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes). * ALSA: PCM: Allow resume only for suspended streams (stable-fixes). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: core: Remove debugfs at disconnection (git-fixes). * ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes). * ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes). * ALSA: emux: improve patch ioctl data validation (stable-fixes). * ALSA: hda/conexant: Mute speakers at suspend / shutdown (bsc#1228269). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (bsc#1228269). * ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes). * ALSA: hda/realtek - fixed headset Mic not show (stable-fixes). * ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14AHP9 (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ARP8 (stable-fixes). * ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable- fixes). * ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes). * ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes). * ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes). * ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes). * ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes). * ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes). * ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes). * ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462). * ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes). * ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes). * ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes). * ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes). * ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes). * ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes). * ALSA: hda/realtek: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes). * ALSA: hda/realtek: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes). * ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes). * ALSA: hda/realtek: cs35l41: Fixup remaining asus strix models (git-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes). * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Hera2 Laptop (stable-fixes). * ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes). * ALSA: hda: clarify Copyright information (stable-fixes). * ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes). * ALSA: hda: cs35l41: Component should be unbound before deconstruction (git- fixes). * ALSA: hda: cs35l41: Fix swapped l/r audio channels for Lenovo ThinBook 13x Gen4 (git-fixes). * ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes). * ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind() (git-fixes). * ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git- fixes). * ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes). * ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable- fixes). * ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes). * ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes). * ALSA: hda: cs35l56: Component should be unbound before deconstruction (git- fixes). * ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes). * ALSA: hda: cs35l56: Fix lifecycle of codec pointer (stable-fixes). * ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes). * ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable- fixes). * ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes). * ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git- fixes). * ALSA: hda: tas2781: Component should be unbound before deconstruction (git- fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git- fixes). * ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable- fixes). * ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable- fixes). * ALSA: scarlett2: Add correct product series name to messages (stable-fixes). * ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git- fixes). * ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes). * ALSA: scarlett2: Default mixer driver to enabled (stable-fixes). * ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes). * ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes). * ALSA: seq: Fix incorrect UMP type for system messages (git-fixes). * ALSA: seq: Fix missing MSB in MIDI2 SPP conversion (git-fixes). * ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git- fixes). * ALSA: seq: Fix missing channel at encoding RPN/NRPN MIDI2 messages (git- fixes). * ALSA: seq: Fix yet another spot for system message conversion (git-fixes). * ALSA: seq: ump: Fix missing System Reset message handling (git-fixes). * ALSA: seq: ump: Fix swapped song position pointer data (git-fixes). * ALSA: seq: ump: Skip useless ports for static blocks (git-fixes). * ALSA: timer: Set lower bound of start tick time (stable-fixes). * ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes). * ALSA: ump: Do not clear bank selection after sending a program change (git- fixes). * ALSA: ump: Do not update FB name for static blocks (git-fixes). * ALSA: ump: Force 1 Group for MIDI1 FBs (git-fixes). * ALSA: ump: Set default protocol when not given explicitly (git-fixes). * ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes). * ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes). * ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes). * ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes). * ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git- fixes). * ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes). * ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes). * ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: Set name of control as in topology (git-fixes). * ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git- fixes). * ASoC: Intel: common: add ACPI matching tables for Arrow Lake (stable-fixes). * ASoC: Intel: sof-sdw: really remove FOUR_SPEAKER quirk (git-fixes). * ASoC: Intel: sof_sdw: add JD2 quirk for HP Omen 14 (stable-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0C0F (stable-fixes). * ASoC: Intel: use soc_intel_is_byt_cr() only when IOSF_MBI is reachable (git- fixes). * ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes). * ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes). * ASoC: SOF: Intel: hda-pcm: Limit the maximum number of periods by MAX_BDL_ENTRIES (stable-fixes). * ASoC: SOF: Intel: hda: fix null deref on system suspend entry (git-fixes). * ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git- fixes). * ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes). * ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes). * ASoC: SOF: imx8m: Fix DSP control regmap retrieval (git-fixes). * ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes). * ASoC: SOF: ipc4-topology: Preserve the DMA Link ID for ChainDMA on unprepare (git-fixes). * ASoC: SOF: ipc4-topology: Use correct queue_id for requesting input pin format (stable-fixes). * ASoC: SOF: pcm: Restrict DSP D0i3 during S0ix to IPC3 (stable-fixes). * ASoC: SOF: sof-audio: Skip unprepare for in-use widgets on error rollback (stable-fixes). * ASoC: TAS2781: Fix tasdev_load_calibrated_data() (git-fixes). * ASoC: acp: Support microphone from device Acer 315-24p (git-fixes). * ASoC: amd: Adjust error handling in case of absent codec device (git-fixes). * ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes). * ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git- fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M5602RA (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E16 Gen 2 (bsc#1228269). * ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes). * ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes). * ASoC: cs35l56: Accept values greater than 0 as IRQ numbers (git-fixes). * ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes). * ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes). * ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes). * ASoC: fsl-asoc-card: set priv->pdev before using it (git-fixes). * ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: max98088: Check for clk_prepare_enable() error (git-fixes). * ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git- fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-card: make links nonatomic (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes). * ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes). * ASoC: q6apm-lpass-dai: close graph on prepare errors (git-fixes). * ASoC: qcom: Adjust issues in case of DT error in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: rockchip: i2s-tdm: Fix trcm mode by setting clock on right mclk (git- fixes). * ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git- fixes). * ASoC: rt711-sdw: add missing readable registers (stable-fixes). * ASoC: rt715-sdca: volume step modification (git-fixes). * ASoC: rt715: add vendor clear control register (git-fixes). * ASoC: rt722-sdca-sdw: add debounce time for type detection (stable-fixes). * ASoC: rt722-sdca-sdw: add silence detection register as volatile (stable- fixes). * ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes). * ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes). * ASoC: sof: amd: fix for firmware reload failure in Vangogh platform (git- fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes). * ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes). * ASoC: tegra: Fix DSPK 16-bit playback (git-fixes). * ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes). * ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes). * ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable- fixes). * ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes). * ASoC: topology: Do not assign fields that are already set (stable-fixes). * ASoC: topology: Fix references to freed memory (stable-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes). * ASoc: tas2781: Enable RCA-based playback without DSP firmware download (git- fixes). * Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable- fixes). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes). * Bluetooth: ISO: Check socket flag instead of hcon (git-fixes). * Bluetooth: ISO: Fix BIS cleanup (stable-fixes). * Bluetooth: Ignore too large handle values in BIG (git-fixes). * Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes). * Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes). * Bluetooth: Remove usage of the deprecated ida_simple_xx() API (stable- fixes). * Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable- fixes). * Bluetooth: btintel: Refactor btintel_set_ppag() (git-fixes). * Bluetooth: btnxpuart: Add handling for boot-signature timeout errors (git- fixes). * Bluetooth: btnxpuart: Enable Power Save feature on startup (stable-fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable- fixes). * Bluetooth: btusb: Fix triggering coredump implementation for QCA (git- fixes). * Bluetooth: hci_bcm4377: Fix msgid release (git-fixes). * Bluetooth: hci_bcm4377: Use correct unit for timeouts (git-fixes). * Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable- fixes). * Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes). * Bluetooth: hci_event: Fix setting of unicast qos interval (git-fixes). * Bluetooth: hci_event: Remove code to removed CONFIG_BT_HS (stable-fixes). * Bluetooth: hci_event: Set QoS encryption from BIGInfo report (git-fixes). * Bluetooth: hci_sync: Using hci_cmd_sync_submit when removing Adv Monitor (bsc#1219216). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: set power_ctrl_enabled on NULL returned by gpiod_get_optional() (git-fixes). * EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes). * Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771) * Enable CONFIG_SCHED_CLUSTER=y on arm64 (jsc#PED-8701). * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA. * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA. * Fix a potential infinite loop in extract_user_to_sg() (git-fixes). * Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes). * Fix missing CONFIG_SUSE_SUPPORTED for arm64/64kb flavor (bsc#1223357) * HID: Add quirk for Logitech Casa touchpad (stable-fixes). * HID: Ignore battery for ELAN touchscreens 2F2C and 4116 (stable-fixes). * HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes). * HID: core: remove unnecessary WARN_ON() in implement() (git-fixes). * HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git- fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes). * HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git- fixes). * HID: logitech-dj: allow mice to use all types of reports (git-fixes). * HID: mcp-2221: cancel delayed_work only when CONFIG_IIO is enabled (stable- fixes). * HID: wacom: Modify pen IDs (git-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * Input: ads7846 - use spi_device_id table (stable-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: elan_i2c - do not leave interrupt disabled on suspend failure (git- fixes). * Input: elantech - fix touchpad state on resume for Lenovo N24 (stable- fixes). * Input: ff-core - prefer struct_size over open coded arithmetic (stable- fixes). * Input: i8042 - add Ayaneo Kun to i8042 quirk table (stable-fixes). * Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * Input: qt1050 - handle CHIP_ID reading error (git-fixes). * Input: silead - Always support 10 fingers (stable-fixes). * Input: xpad - add support for ASUS ROG RAIKIRI (git-fixes). * Input: xpad - add support for ASUS ROG RAIKIRI PRO (stable-fixes). * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: SEV-ES: Delegate LBR virtualization to the processor (git-fixes). * KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (git- fixes). * KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes). * KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes). * KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes). * KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (git- fixes). * KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes). * KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes). * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478). * KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790). * KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes). * KVM: x86/mmu: Move private vs. shared check above slot validity checks (git- fixes). * KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes). * KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes). * KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes). * KVM: x86/pmu: Always treat Fixed counters as available when supported (git- fixes). * KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes). * KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes). * KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git- fixes). * KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes). * KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git- fixes). * KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes). * KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes). * KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes). * KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes). * KVM: x86/xen: improve accuracy of Xen timers (git-fixes). * KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git- fixes). * KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes). * KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git- fixes). * KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git- fixes). * KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes). * KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes). * KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git- fixes). * KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes). * KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git- fixes). * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git- fixes). * KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP (git-fixes). * KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git- fixes). * NFC: trf7970a: disable all regulators on removal (git-fixes). * NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes). * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847). * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847). * NFS: add barriers when testing for NFS_FSDATA_BLOCKED (git-fixes). * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226). * NFSD: Fix checksum mismatches in the duplicate reply cache (git-fixes). * NFSv4.1 enforce rootpath check in fs_location query (git-fixes). * NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362). * NFSv4: Fixup smatch warning for ambiguous return (git-fixes). * Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes). * PCI/ASPM: Update save_state when configuration changes (bsc#1226915) * PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes). * PCI/DPC: Use FIELD_GET() (stable-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/MSI: Fix UAF in msi_capability_init (git-fixes). * PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes). * PCI: Clear Secondary Status errors after enumeration (bsc#1226928) * PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes). * PCI: Do not wait for disconnected devices when resuming (git-fixes). * PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes). * PCI: Extend ACS configurability (bsc#1228090). * PCI: Fix resource double counting on remove & rescan (git-fixes). * PCI: Fix typos in docs and comments (stable-fixes). * PCI: Introduce cleanup helpers for device reference counts and locks (stable-fixes). * PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes). * PCI: dw-rockchip: Fix initial PERST# GPIO value (git-fixes). * PCI: dwc: Fix index 0 incorrectly being interpreted as a free ATU slot (git- fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: endpoint: Clean up error handling in vpci_scan_bus() (git-fixes). * PCI: endpoint: Fix error handling in epf_ntb_epc_cleanup() (git-fixes). * PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init() (git-fixes). * PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes). * PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes). * PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes). * PCI: qcom-ep: Disable resources unconditionally during PERST# assert (git- fixes). * PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup() (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes). * PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888). * PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes). * PCI: switchtec: Use normal comment style (stable-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes). * PCI: vmd: Create domain symlink before pci_bus_add_devices() (bsc#1227363). * PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes). * Port "certs: Add ECDSA signature verification self-test". * Port "certs: Move RSA self-test data to separate file". * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300). * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300). * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/bnxt_re: Fix the max msix vectors macro (git-fixes) * RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes) * RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes). * RDMA/mlx5: Add check for srq max_sge attribute (git-fixes) * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Change check for cacheable mkeys (git-fixes) * RDMA/mlx5: Ensure created mkeys always have a populated rb_key (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/mlx5: Fix unwind flow as part of mlx5_ib_stage_init_init (git-fixes) * RDMA/mlx5: Follow rb_key.ats when creating new mkeys (git-fixes) * RDMA/mlx5: Remove extra unlock on error path (git-fixes) * RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes) * RDMA/restrack: Fix potential invalid address access (git-fixes) * RDMA/rxe: Allow good work requests to be executed (git-fixes) * RDMA/rxe: Fix data copy for IB_SEND_INLINE (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix responder length checking for UD request packets (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * SEV: disable SEV-ES DebugSwap by default (git-fixes). * SUNRPC: Fix gss_free_in_token_pages() (git-fixes). * SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git- fixes). * SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272). * SUNRPC: return proper error from gss_wrap_req_priv (git-fixes). * USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes). * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git- fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes). * USB: serial: mos7840: fix crash on resume (git-fixes). * USB: serial: option: add Fibocom FM135-GL variants (stable-fixes). * USB: serial: option: add Fibocom FM350-GL (stable-fixes). * USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes). * USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes). * USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable- fixes). * USB: serial: option: add Rolling RW350-GL variants (stable-fixes). * USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes). * USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes). * USB: serial: option: add Telit generic core-dump composition (stable-fixes). * USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes). * USB: serial: option: add support for Foxconn T99W651 (stable-fixes). * USB: serial: option: support Quectel EM060K sub-models (stable-fixes). * USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git- fixes). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * X.509: Fix the parser of extended key usage for length (bsc#1218820). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * amd/amdkfd: sync all devices to wait all processes being evicted (stable- fixes). * aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts * arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes). * arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502) * arm64/io: add constant-argument check (bsc#1226502 git-fixes) * arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). * arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes). * arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes) * arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes) * arm64: dts: freescale: imx8mm-verdin: enable hysteresis on slow input (git- fixes) * arm64: dts: hi3798cv200: fix the size of GICR (git-fixes) * arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes) * arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes) * arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes) * arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes) * arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes) * arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx93-11x11-evk: Remove the 'no-sdio' property (git-fixes) * arm64: dts: microchip: sparx5: fix mdio reg (git-fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add mdio and ethernet-phy nodes to (git-fixes) * arm64: dts: rockchip: Add missing power-domains for rk356x vop_mmu (git- fixes) * arm64: dts: rockchip: Add pinctrl for UART0 to rk3308-rock-pi-s (git-fixes) * arm64: dts: rockchip: Add sdmmc related properties on (git-fixes) * arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes) * arm64: dts: rockchip: Drop invalid mic-in-differential on (git-fixes) * arm64: dts: rockchip: Fix SD NAND and eMMC init on rk3308-rock-pi-s (git- fixes) * arm64: dts: rockchip: Fix mic-in-differential usage on (git-fixes) * arm64: dts: rockchip: Fix mic-in-differential usage on rk3566-roc-pc (git- fixes) * arm64: dts: rockchip: Fix the DCDC_REG2 minimum voltage on Quartz64 (git- fixes) * arm64: dts: rockchip: Fix the value of `dlg,jack-det-rate` mismatch (git- fixes) * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes) * arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git- fixes) * arm64: dts: rockchip: Rename LED related pinctrl nodes on (git-fixes) * arm64: dts: rockchip: Update WIFi/BT related nodes on (git-fixes) * arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git- fixes) * arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes) * arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git- fixes) * arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes) * arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes) * arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes) * arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes) * arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes) * arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes). * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688). * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688). * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688). * arm64: tegra: Correct Tegra132 I2C alias (git-fixes) * asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable- fixes). * ata,scsi: libata-core: Do not leak memory for ata_port struct members (git- fixes). * ata: ahci: Clean up sysfs file on error (git-fixes). * ata: libata-core: Fix double free on error (git-fixes). * ata: libata-core: Fix null pointer dereference on error (git-fixes). * ata: libata-scsi: Fix offsets for the fixed format sense data (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * auxdisplay: ht16k33: Drop reference after LED registration (git-fixes). * ax25: Fix netdev refcount issue (git-fixes). * ax25: Fix refcount imbalance on inbound connections (git-fixes). * ax25: Fix reference count leak issue of net_device (git-fixes). * ax25: Fix reference count leak issues of ax25_dev (git-fixes). * batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes). * batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes). * bitops: add missing prototype check (git-fixes). * blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605). * blk-cgroup: fix list corruption from resetting io stat (bsc#1225605). * block: Move checking GENHD_FL_NO_PART to bdev_add_partition() (bsc#1226213). * block: fix q->blkg_list corruption during disk rebind (bsc#1223591). * bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (git- fixes). * bnxt_en: Fix error recovery for RoCE ulp client (git-fixes). * bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git- fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes). * bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes). * bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes). * bpf, arm64: Fix incorrect runtime stats (git-fixes) * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: Remove xdp_do_flush_map() (bsc#1214683 (PREEMPT_RT prerequisite backports)). * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903). * bpf: correct loop detection for iterators convergence (bsc#1225903). * bpf: exact states comparison for iterator convergence checks (bsc#1225903). * bpf: extract __check_reg_arg() utility function (bsc#1225903). * bpf: extract same_callsites() as utility function (bsc#1225903). * bpf: extract setup_func_entry() utility function (bsc#1225903). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903). * bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903). * bpf: print full verifier states on infinite loop detection (bsc#1225903). * bpf: verify callbacks as if they are called unknown number of times (bsc#1225903). * bpf: widening for callback iterators (bsc#1225903). * btrfs: add a helper to read the superblock metadata_uuid (git-fixes) * btrfs: add and use helper to check if block group is used (bsc#1220120). * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: add new unused block groups to the list of unused block groups (bsc#1220120). * btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120). * btrfs: always clear PERTRANS metadata during commit (git-fixes) * btrfs: always print transaction aborted messages with an error level (git- fixes) * btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120). * btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120). * btrfs: assert delayed node locked when removing delayed item (git-fixes) * btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120). * btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120). * btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120). * btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120). * btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes) * btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git- fixes) * btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes) * btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git- fixes) * btrfs: do not allow non subvolume root targets for snapshot (git-fixes) * btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes) * btrfs: do not delete unused block group if it may be used soon (bsc#1220120). * btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120). * btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git- fixes) * btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120). * btrfs: do not warn if discard range is not aligned to sector (git-fixes) * btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285). * btrfs: error out when COWing block using a stale transaction (git-fixes) * btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes) * btrfs: error when COWing block from a root that is being deleted (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: fail priority metadata ticket with real fs error (bsc#1220120). * btrfs: file_remove_privs needs an exclusive lock in direct io write (git- fixes) * btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes) * btrfs: fix deadlock with fiemap and extent locking (bsc#1223285). * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix off-by-one when checking chunk map includes logical address (git- fixes) * btrfs: fix race between ordered extent completion and fiemap (bsc#1223285). * btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285). * btrfs: fix race when refilling delayed refs block reserve (git-fixes) * btrfs: fix start transaction qgroup rsv double free (git-fixes) * btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) * btrfs: free qgroup rsv on io failure (git-fixes) * btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git- fixes) * btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120). * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: handle errors properly in update_inline_extent_backref() (git-fixes) * btrfs: initialize key where it's used when running delayed data ref (bsc#1220120). * btrfs: log message if extent item not found when running delayed extent op (bsc#1220120). * btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120). * btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120). * btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120). * btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120). * btrfs: make error messages more clear when getting a chunk map (git-fixes) * btrfs: make find_first_extent_bit() return a boolean (bsc#1220120). * btrfs: make find_free_dev_extent() static (bsc#1220120). * btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120). * btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120). * btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120). * btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120). * btrfs: output extra debug info if we failed to find an inline backref (git- fixes) * btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120). * btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes) * btrfs: print available space across all block groups when dumping space info (bsc#1220120). * btrfs: print available space for a block group when dumping a space info (bsc#1220120). * btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120). * btrfs: print target number of bytes when dumping free space (bsc#1220120). * btrfs: qgroup: always free reserved space for extent records (bsc#1216196). * btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git- fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: reject encoded write if inode has nodatasum flag set (git-fixes) * btrfs: release path before inode lookup during the ino lookup ioctl (git- fixes) * btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref() (bsc#1220120). * btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120). * btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120). * btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120). * btrfs: remove unnecessary logic when running new delayed references (bsc#1220120). * btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120). * btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120). * btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120). * btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120). * btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes) * btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes) * btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120). * btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120). * btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459). * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: set page extent mapped after read_folio in relocate_one_page (git- fixes) * btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120). * btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120). * btrfs: store the error that turned the fs into error state (bsc#1220120). * btrfs: sysfs: validate scrub_speed_max value (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120). * btrfs: update documentation for add_new_free_space() (bsc#1220120). * btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120). * btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120). * btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120). * btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120). * btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120). * btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes) * btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes) * btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120). * bus: mhi: host: allow MHI client drivers to provide the firmware via a pointer (bsc#1227149). * bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes). * cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git- fixes). * cachefiles: remove requests from xarray during flushing requests (bsc#1226588). * can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes). * can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes). * can: mcp251xfd: fix infinite loop when xmit fails (git-fixes). * cdrom: rearrange last_media_change check to avoid unintentional overflow (stable-fixes). * ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022). * ceph: always check dir caps asynchronously (bsc#1226022). * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022). * ceph: break the check delayed cap loop every 5s (bsc#1226022). * ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228417). * ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866). * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022). * certs: Add ECDSA signature verification self-test (bsc#1222777). * certs: Move RSA self-test data to separate file (bsc#1222777). * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git- fixes). * checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes). * cifs: Add a laundromat thread for cached directories (git-fixes, bsc#1225172). * cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172). * cifs: account for primary channel in the interface list (bsc#1225172). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1225172). * cifs: distribute channels across interfaces based on speed (bsc#1225172). * cifs: do not pass cifs_sb when trying to add channels (bsc#1225172). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1225172). * cifs: fix charset issue in reconnection (bsc#1225172). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172). * cifs: handle cases where a channel is closed (bsc#1225172). * cifs: handle cases where multiple sessions share connection (bsc#1225172). * cifs: reconnect work should have reference on server struct (bsc#1225172). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: Get runtime PM before walking tree during disable_unused (git-fixes). * clk: Get runtime PM before walking tree for clk_summary (git-fixes). * clk: Initialize struct clk_core kref earlier (stable-fixes). * clk: Show active consumers of clocks in debugfs (stable-fixes). * clk: davinci: da8xx-cfgchip: Initialize clk_init_data before use (git- fixes). * clk: mediatek: mt8183: Only enable runtime PM on mt8183-mfgcfg (git-fixes). * clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes). * clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes). * clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes). * clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git- fixes). * clk: qcom: clk-alpha-pll: set ALPHA_EN bit for Stromer Plus PLLs (git- fixes). * clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes). * clk: qcom: gcc-sm6350: Fix gpll6* & gpll7 parents (git-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes). * clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes). * clk: rs9: fix wrong default value for clock amplitude (git-fixes). * clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes). * clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes). * clkdev: Update clkdev id usage to allow for longer names (stable-fixes). * config/arm64: Enable CoreSight PMU drivers (bsc#1228289 jsc#PED-7859) * counter: linux/counter.h: fix Excess kernel-doc description warning (git- fixes). * counter: ti-eqep: enable clock at probe (git-fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpufreq/amd-pstate: Fix the scaling_max_freq setting on shared memory CPPC systems (git-fixes). * cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git- fixes). * cpufreq: amd-pstate: fix memory leak on CPU EPP exit (stable-fixes). * cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git- fixes). * cpufreq: exit() callback is optional (git-fixes). * cpufreq: ti-cpufreq: Handle deferred probe with dev_err_probe() (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto/ecdh: make ecdh_compute_value() to zeroize the public key (bsc#1222768). * crypto/ecdsa: make ecdsa_ecc_ctx_deinit() to zeroize the public key (bsc#1222768). * crypto: aead,cipher - zeroize key buffer after use (stable-fixes). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - Add support for PCI device 0x156E (bsc#1223338). * crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338). * crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked (git-fixes). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: deflate - Add aliases to deflate (bsc#1227190). * crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782). * crypto: ecdh - explicitly zeroize private_key (stable-fixes). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: ecdsa - Fix the public key format description (git-fixes). * crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes). * crypto: hisilicon/debugfs - Fix debugfs uninit process issue (stable-fixes). * crypto: hisilicon/qm - Add the err memory release process to qm uninit (stable-fixes). * crypto: hisilicon/sec - Fix memory leak for sec resource release (stable- fixes). * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190). * crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes). * crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes). * crypto: qat - extend scope of lock in adf_cfg_add_key_value_param() (git- fixes). * crypto: qat - improve error logging to be consistent across features (git- fixes). * crypto: qat - specify firmware files for 402xx (git-fixes). * crypto: rsa - add a check for allocation failure (bsc#1222775). * crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775). * crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * cxgb4: Properly lock TX queue for the selftest (bsc#1214683 (PREEMPT_RT prerequisite backports)). * cxl/region: Fix cxlr_pmem leaks (git-fixes). * cxl/region: Fix memregion leaks in devm_cxl_add_region() (git-fixes). * cxl/test: Add missing vmalloc.h for tools/testing/cxl/test/mem.c (git- fixes). * cxl/trace: Correct DPA field masks for general_media & dram events (git- fixes). * decompress_bunzip2: fix rare decompression failure (git-fixes). * devres: Fix devm_krealloc() wasting memory (git-fixes). * devres: Fix memory leakage caused by driver API devm_free_percpu() (git- fixes). * dlm: fix user space lock decision to copy lvb (git-fixes). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes). * dma-mapping: benchmark: fix node id validation (git-fixes). * dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes). * dma: fix call order in dmam_free_coherent (git-fixes). * dma: xilinx_dpdma: Fix locking (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes). * dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes). * dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git- fixes). * dmaengine: ioatdma: Fix error path in ioat3_dma_probe() (git-fixes). * dmaengine: ioatdma: Fix kmemleak in ioat_pci_probe() (git-fixes). * dmaengine: ioatdma: Fix leaking on version mismatch (git-fixes). * dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes). * dmaengine: owl: fix register access functions (git-fixes). * dmaengine: tegra186: Fix residual calculation (git-fixes). * dmaengine: ti: k3-udma: Fix BCHAN count with UHC and HC channels (git- fixes). * docs: crypto: async-tx-api: fix broken code example (git-fixes). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * docs: netdev: Fix typo in Signed-off-by tag (git-fixes). * dpll: spec: use proper enum for pin capabilities attribute (git-fixes). * driver core: Introduce device_link_wait_removal() (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drivers/xen: Improve the late XenStore init protocol (git-fixes). * drivers: core: synchronize really_probe() and dev_uevent() (git-fixes). * drivers: soc: xilinx: check return status of get_api_version() (git-fixes). * drm/amd/amdgpu: Fix uninitialized variable warnings (git-fixes). * drm/amd/display: ASSERT when failing to find index by plane/stream id (stable-fixes). * drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes). * drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes). * drm/amd/display: Add dtbclk access to dcn315 (stable-fixes). * drm/amd/display: Add refresh rate range check (stable-fixes). * drm/amd/display: Allocate zero bw after bw alloc enable (stable-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Check index msg_id before read or write (stable-fixes). * drm/amd/display: Check pipe offset before setting vblank (stable-fixes). * drm/amd/display: Disable seamless boot on 128b/132b encoding (stable-fixes). * drm/amd/display: Do not recursively call manual trigger programming (stable- fixes). * drm/amd/display: Enable colorspace property for MST connectors (git-fixes). * drm/amd/display: Exit idle optimizations before HDCP execution (stable- fixes). * drm/amd/display: Fix DC mode screen flickering on DCN321 (stable-fixes). * drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport (stable-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes). * drm/amd/display: Fix overlapping copy within dml_core_mode_programming (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Fix refresh rate range for some panel (stable-fixes). * drm/amd/display: Fix uninitialized variables in DM (stable-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd/display: Move 'struct scaler_data' off stack (git-fixes). * drm/amd/display: Remove pixle rate limit for subvp (stable-fixes). * drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes). * drm/amd/display: Revert Remove pixle rate limit for subvp (stable-fixes). * drm/amd/display: Send DP_TOTAL_LTTPR_CNT during detection if LTTPR is present (stable-fixes). * drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes). * drm/amd/display: Skip finding free audio for unknown engine_id (stable- fixes). * drm/amd/display: Skip pipe if the pipe idx not set properly (stable-fixes). * drm/amd/display: Update efficiency bandwidth for dcn351 (stable-fixes). * drm/amd/display: Workaround register access in idle race with cursor (stable-fixes). * drm/amd/display: change dram_clock_latency to 34us for dcn35 (stable-fixes). * drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes). * drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes). * drm/amd/pm: Restore config space after reset (stable-fixes). * drm/amd/pm: remove logically dead code for renoir (git-fixes). * drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes). * drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes). * drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes). * drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes). * drm/amdgpu/mes: fix use-after-free issue (stable-fixes). * drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes). * drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes). * drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git- fixes). * drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes). * drm/amdgpu: Fix VRAM memory accounting (stable-fixes). * drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (git-fixes). * drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes). * drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes). * drm/amdgpu: Fix memory range calculation (git-fixes). * drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes). * drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes). * drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes). * drm/amdgpu: Fix uninitialized variable warnings (stable-fixes). * drm/amdgpu: Indicate CU havest info to CP (stable-fixes). * drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes). * drm/amdgpu: Update BO eviction priorities (stable-fixes). * drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (stable-fixes). * drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes). * drm/amdgpu: avoid using null object of framebuffer (stable-fixes). * drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes). * drm/amdgpu: fix doorbell regression (git-fixes). * drm/amdgpu: fix locking scope when flushing tlb (stable-fixes). * drm/amdgpu: fix the warning about the expression (int)size - len (stable- fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes). * drm/amdgpu: init microcode chip name from ip versions (stable-fixes). * drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes). * drm/amdgpu: silence UBSAN warning (stable-fixes). * drm/amdkfd: Add VRAM accounting for SVM migration (stable-fixes). * drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes). * drm/amdkfd: Fix CU Masking for GFX 9.4.3 (git-fixes). * drm/amdkfd: Flush the process wq before creating a kfd_process (stable- fixes). * drm/amdkfd: Let VRAM allocations go to GTT domain on small APUs (stable- fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/amdkfd: range check cp bad op exception interrupts (stable-fixes). * drm/arm/komeda: Fix komeda probe failing if there are no links in the secondary pipeline (git-fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes). * drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git- fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: anx7625: Update audio status while detecting (git-fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: it6505: fix hibernate to resume no display issue (git-fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found (git-fixes). * drm/bridge: samsung-dsim: Set P divider based on min/max of fin pll (git- fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/ci: update device type for volteer devices (git-fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git- fixes). * drm/drm_file: Fix pid refcounting race (git-fixes). * drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes). * drm/etnaviv: fix tx clock gating on some GC7000 variants (stable-fixes). * drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes). * drm/exynos: dp: drop driver owner initialization (stable-fixes). * drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes). * drm/fbdev-dma: Fix framebuffer mode for big endian devices (git-fixes). * drm/fbdev-dma: Only set smem_start is enable per module option (git-fixes). * drm/fbdev-generic: Do not set physical framebuffer address (git-fixes). * drm/fbdev-generic: Fix framebuffer on big endian devices (git-fixes). * drm/gma500: Remove lid code (git-fixes). * drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git- fixes). * drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git- fixes). * drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/i915/dp: Do not switch the LTTPR mode on an active link (git-fixes). * drm/i915/dpt: Make DPT object unshrinkable (git-fixes). * drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes). * drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes). * drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes). * drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes). * drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes). * drm/i915/guc: avoid FIELD_PREP warning (git-fixes). * drm/i915/hwmon: Get rid of devm (stable-fixes). * drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599). * drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes). * drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes). * drm/i915: Fix audio component initialization (git-fixes). * drm/komeda: check for error-valued pointer (git-fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/lima: Mark simple_ondemand governor as softdep (git-fixes). * drm/lima: add mask irq callback to gp and pp (stable-fixes). * drm/lima: fix shared irq handling on driver remove (stable-fixes). * drm/lima: mask irqs in timeout path before hard reset (stable-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/mediatek: Add DRM_MODE_ROTATE_0 to rotation property (git-fixes). * drm/mediatek: Add OVL compatible name for MT8195 (git-fixes). * drm/mediatek: Add missing plane settings when async update (git-fixes). * drm/mediatek: Call drm_atomic_helper_shutdown() at shutdown time (stable- fixes). * drm/mediatek: Fix XRGB setting error in Mixer (git-fixes). * drm/mediatek: Fix XRGB setting error in OVL (git-fixes). * drm/mediatek: Fix bit depth overwritten for mtk_ovl_set bit_depth() (git- fixes). * drm/mediatek: Fix destination alpha error in OVL (git-fixes). * drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes). * drm/mediatek: Remove less-than-zero comparison of an unsigned value (git- fixes). * drm/mediatek: Set DRM mode configs accordingly (git-fixes). * drm/mediatek: Support DRM plane alpha in Mixer (git-fixes). * drm/mediatek: Support DRM plane alpha in OVL (git-fixes). * drm/mediatek: Support RGBA8888 and RGBX8888 in OVL on MT8195 (git-fixes). * drm/mediatek: Turn off the layers with zero width or height (git-fixes). * drm/mediatek: Use 8-bit alpha in ETHDR (git-fixes). * drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: fix canvas release in bind function (git-fixes). * drm/meson: gate px_clk when setting rate (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/mgag200: Bind I2C lifetime to DRM device (git-fixes). * drm/mgag200: Set DDC timeout in milliseconds (git-fixes). * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git- fixes). * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_generic_write_seq() (git-fixes). * drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git- fixes). * drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes). * drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git- fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dpu: Add callback function pointer check before its call (git- fixes). * drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git- fixes). * drm/msm/dpu: fix encoder irq wait skip (git-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/msm/dsi: set VIDEO_COMPRESSION_MODE_CTRL_WC (git-fixes). * drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes). * drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838). * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes). * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes). * drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable- fixes). * drm/nouveau: do not attempt to schedule hpd_work on headless cards (git- fixes). * drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes). * drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git- fixes). * drm/omapdrm: Fix console by implementing fb_dirty (git-fixes). * drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git- fixes). * drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes). * drm/panel: himax-hx8394: Handle errors from mipi_dsi_dcs_set_display_on() better (git-fixes). * drm/panel: ili9341: Respect deferred probe (git-fixes). * drm/panel: ili9341: Use predefined error codes (git-fixes). * drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes). * drm/panel: ilitek-ili9882t: Check for errors on the NOP in prepare() (git- fixes). * drm/panel: ilitek-ili9882t: If prepare fails, disable GPIO before regulators (git-fixes). * drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git- fixes). * drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes). * drm/panel: sitronix-st7789v: Add check for of_drm_get_panel_orientation (git-fixes). * drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git- fixes). * drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes). * drm/qxl: Add check for drm_cvt_mode (git-fixes). * drm/radeon/radeon_display: Decrease the size of allocated memory (stable- fixes). * drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes). * drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes). * drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes). * drm/radeon: silence UBSAN warning (v3) (stable-fixes). * drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes). * drm/rockchip: vop2: Fix the port mux of VP2 (git-fixes). * drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes). * drm/sun4i: hdmi: Convert encoder to atomic (stable-fixes). * drm/sun4i: hdmi: Move mode_set into enable (stable-fixes). * drm/ttm: Always take the bo delayed cleanup path for imported bos (git- fixes). * drm/udl: Remove DRM_CONNECTOR_POLL_HPD (git-fixes). * drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes). * drm/vmwgfx: Do not memcmp equivalent pointers (git-fixes). * drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes). * drm/vmwgfx: Fix Legacy Display Unit (git-fixes). * drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes). * drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes). * drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * drm: zynqmp_dpsub: Always register bridge (git-fixes). * drm: zynqmp_dpsub: Fix an error handling path in zynqmp_dpsub_probe() (git- fixes). * drm: zynqmp_kms: Fix AUX bus not getting unregistered (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607). * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git- fixes). * e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes). * ecryptfs: Fix buffer size for tag 66 packet (git-fixes) * ecryptfs: Reject casefold directory inodes (git-fixes) * eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (stable-fixes). * eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes). * efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes). * efi/unaccepted: touch soft lockup during memory accept (git-fixes). * efi/x86: Free EFI memory map only when installing a new one (git-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * erofs: ensure m_llen is reset to 0 if metadata is invalid (git-fixes). * exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * f2fs: fix error path of __f2fs_build_free_nids (git-fixes). * fast_dput(): handle underflows gracefully (git-fixes) * fat: fix uninitialized field in nostale filehandles (git-fixes) * fbdev: fix incorrect address computation in deferred IO (git-fixes). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: sh7760fb: allow modular build (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * filelock: fix potential use-after-free in posix_lock_inode (git-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes). * firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes). * firmware: cs_dsp: Return error if block header overflows file (git-fixes). * firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes). * firmware: cs_dsp: Validate payload length before processing block (git- fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: dmi: Stop decoding on broken entry (stable-fixes). * firmware: psci: Fix return value from psci_system_suspend() (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * firmware: turris-mox-rwtm: Do not complete if there are no waiters (git- fixes). * firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes). * firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes). * fpga: dfl-pci: add PCI subdevice ID for Intel D5005 card (stable-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes) * fs/9p: translate O_TRUNC into OTRUNC (git-fixes) * fs/file: fix the check in find_next_fd() (git-fixes). * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes) * fs: indicate request originates from old mount API (git-fixes) * fs: relax mount_setattr() permission checks (git-fixes) * fsverity: skip PKCS#7 parser when keyring is empty (git-fixes) * ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes). * fuse: do not unhash root (bsc#1223946). * fuse: fix root lookup with nonzero generation (bsc#1223945). * fuse: verify {g,u}id mount options correctly (bsc#1228193). * geneve: fix header validation in geneve[6]_xmit_skb (git-fixes). * genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after() (git- fixes). * gfs2: Do not forget to complete delayed withdraw (git-fixes). * gfs2: Fix "ignore unlock failures after withdraw" (git-fixes). * gfs2: Fix invalid metadata access in punch_hole (git-fixes). * gfs2: Get rid of gfs2_alloc_blocks generation parameter (git-fixes). * gfs2: Rename gfs2_lookup_{ simple => meta } (git-fixes). * gfs2: Use mapping->gfp_mask for metadata inodes (git-fixes). * gfs2: convert to ctime accessor functions (git-fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: davinci: Validate the obtained number of IRQs (git-fixes). * gpio: lpc32xx: fix module autoloading (stable-fixes). * gpio: mc33880: Convert comma to semicolon (git-fixes). * gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (stable-fixes). * gpio: tangier: Use correct type for the IRQ chip data (git-fixes). * gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes). * gpio: tqmx86: fix broken IRQ_TYPE_EDGE_BOTH interrupt type (git-fixes). * gpio: tqmx86: fix typo in Kconfig label (git-fixes). * gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes). * gpio: tqmx86: store IRQ trigger type and unmask status separately (git- fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git- fixes). * gpiolib: cdev: fix uninitialised kfifo (git-fixes). * gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable- fixes). * gpiolib: swnode: Remove wrong header inclusion (git-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * hfsplus: fix to avoid false alarm of circular locking (git-fixes). * hfsplus: fix uninit-value in copy_name (git-fixes). * hpet: Support 32-bit userspace (git-fixes). * hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes). * hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * hwmon: (shtc1) Fix property misspelling (git-fixes). * hwrng: amd - Convert PCIBIOS_* return codes to errnos (git-fixes). * hwrng: core - Fix wrong quality calculation at hw rng registration (git- fixes). * i2c: acpi: Unbind mux adapters before delete (git-fixes). * i2c: at91: Fix the functionality flags of the slave-only interface (git- fixes). * i2c: cadence: Avoid fifo clear after start (git-fixes). * i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes). * i2c: i801: Annotate apanel_addr as __ro_after_init (stable-fixes). * i2c: mark HostNotify target address as used (git-fixes). * i2c: ocores: set IACK bit after core is enabled (git-fixes). * i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr (git-fixes). * i2c: pxa: hide unused icr_bits[] variable (git-fixes). * i2c: rcar: bring hardware to known state when probing (git-fixes). * i2c: smbus: fix NULL function pointer dereference (git-fixes). * i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git- fixes). * i2c: testunit: avoid re-issued work after read message (git-fixes). * i2c: testunit: correct Kconfig description (git-fixes). * i2c: testunit: discard write requests while old command is running (git- fixes). * i2c: testunit: do not erase registers after STOP (git-fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * i40e: Enforce software interrupt during busy-poll exit (git-fixes). * i40e: Fix VF MAC filter removal (git-fixes). * i40e: fix i40e_count_filters() to count only active/new filters (git-fixes). * i40e: fix vf may be used uninitialized in this function warning (git-fixes). * i40e: fix: remove needless retries of NVM update (bsc#1227736). * ice: fix enabling RX VLAN filtering (git-fixes). * ida: make 'ida_dump' static (git-fixes). * idma64: Do not try to serve interrupts when device is powered off (git- fixes). * idpf: extend tx watchdog timeout (bsc#1224137). * idpf: fix kernel panic on unknown packet types (git-fixes). * iio: Fix the sorting functionality in iio_gts_build_avail_time_table (git- fixes). * iio: accel: fxls8962af: select IIO_BUFFER & IIO_KFIFO_BUF (git-fixes). * iio: accel: mxc4005: Interrupt handling fixes (git-fixes). * iio: accel: mxc4005: Reset chip on probe() and resume() (stable-fixes). * iio: accel: mxc4005: allow module autoloading via OF compatible (stable- fixes). * iio: adc: ad7266: Fix variable checking bug (git-fixes). * iio: adc: ad9467: fix scan type sign (git-fixes). * iio: adc: ad9467: use chip_info variables instead of array (stable-fixes). * iio: adc: ad9467: use spi_get_device_match_data() (stable-fixes). * iio: adc: stm32: Fixing err code to not indicate success (git-fixes). * iio: chemical: bme680: Fix calibration data variable (git-fixes). * iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes). * iio: chemical: bme680: Fix pressure value output (git-fixes). * iio: chemical: bme680: Fix sensor data read operation (git-fixes). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: dac: ad5592r: fix temperature channel scaling value (git-fixes). * iio: frequency: adrf6780: rm clk provider include (git-fixes). * iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes). * iio: pressure: Fixes BME280 SPI driver data (git-fixes). * iio: pressure: bmp280: Fix BMP580 temperature reading (stable-fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * iio: pressure: fix some word spelling errors (stable-fixes). * iio: xilinx-ams: Do not include ams_ctrl_channels in scan_mask (git-fixes). * iio:imu: adis16475: Fix sync mode setting (git-fixes). * init/main.c: Fix potential static_command_line memory overflow (git-fixes). * init: open /initrd.image with O_LARGEFILE (stable-fixes). * input: Add event code for accessibility key (stable-fixes). * input: Add support for "Do Not Disturb" (stable-fixes). * intel_th: pci: Add Granite Rapids SOC support (stable-fixes). * intel_th: pci: Add Granite Rapids support (stable-fixes). * intel_th: pci: Add Lunar Lake support (stable-fixes). * intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes). * intel_th: pci: Add Meteor Lake-S support (stable-fixes). * intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git- fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc RPM master ID (git-fixes). * io-wq: write next_work before dropping acct_lock (git-fixes). * io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (git-fixes). * io_uring/io-wq: avoid garbage value of 'match' in io_wq_enqueue() (git- fixes). * io_uring/kbuf: get rid of bl->is_ready (git-fixes). * io_uring/kbuf: get rid of lower BGID lists (git-fixes). Including kabi preservation patch. * io_uring/kbuf: protect io_buffer_list teardown with a reference (git-fixes). * io_uring/kbuf: rename is_mapped (git-fixes). * io_uring/net: correct the type of variable (git-fixes). * io_uring/net: correctly handle multishot recvmsg retry setup (git-fixes). * io_uring/net: fix sendzc lazy wake polling (git-fixes). * io_uring/net: move receive multishot out of the generic msghdr path (git- fixes). * io_uring/net: restore msg_control on sendzc retry (git-fixes). * io_uring/net: unify how recvmsg and sendmsg copy in the msghdr (git-fixes). * io_uring/rsrc: do not lock while !TASK_RUNNING (git-fixes). * io_uring/rsrc: fix incorrect assignment of iter->nr_segs in io_import_fixed (git-fixes). * io_uring/rw: do not allow multishot reads without NOWAIT support (git- fixes). * io_uring/rw: return IOU_ISSUE_SKIP_COMPLETE for multishot retry (git-fixes). * io_uring/sqpoll: work around a potential audit memory leak (git-fixes). * io_uring/unix: drop usage of io_uring socket (git-fixes). * io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64() failure (git-fixes). * io_uring: clean rings on NO_MMAP alloc fail (git-fixes). * io_uring: clear opcode specific data for an early failure (git-fixes). * io_uring: do not save/restore iowait state (git-fixes). * io_uring: fail NOP if non-zero op flags is passed in (git-fixes). * io_uring: fix io_queue_proc modifying req->flags (git-fixes). * io_uring: fix mshot io-wq checks (git-fixes). * io_uring: fix mshot read defer taskrun cqe posting (git-fixes). * io_uring: fix poll_remove stalled req completion (git-fixes). * io_uring: kabi cookie remove (bsc#1217384). * io_uring: remove looping around handling traditional task_work (git-fixes). * io_uring: remove unconditional looping in local task_work handling (git- fixes). * io_uring: use private workqueue for exit work (git-fixes). * io_uring: use the right type for work_llist empty check (git-fixes). * iomap: clear the per-folio dirty bits on all writeback failures (git-fixes) * iommu/amd: Enhance def_domain_type to handle untrusted device (git-fixes). * iommu/amd: Fix panic accessing amd_iommu_enable_faulting (bsc#1224767). * iommu/amd: Fix sysfs leak in iommu init (git-fixes). * iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes). * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * iommu/vt-d: Allocate DMAR fault interrupts locally (bsc#1224767). * iommu/vt-d: Fix WARN_ON in iommu probe path (git-fixes). * iommu/vt-d: Improve ITE fault handling if target device isn't present (git- fixes). * iommu/vt-d: Use rbtree to track iommu probed devices (git-fixes). * iommu: Fix compilation without CONFIG_IOMMU_INTEL (git-fixes). * iommu: Return right value in iommu_sva_bind_device() (git-fixes). * iommu: Undo pasid attachment only for the devices that have succeeded (git- fixes). * iommu: mtk: fix module autoloading (git-fixes). * iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes). * ipmi: ssif_bmc: prevent integer overflow on 32bit systems (git-fixes). * ipv4: annotate data-races around fi->fib_dead (git-fixes). * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) * irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes). * irqchip/armada-370-xp: Suppress unused-function warning (git-fixes). * irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git- fixes). * irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git- fixes). * irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index (stable-fixes). * irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes). * irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes). * irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes). * iwlwifi: fw: fix more kernel-doc warnings (bsc#1227149). * iwlwifi: mvm: Drop unused fw_trips_index[] from iwl_mvm_thermal_device (bsc#1227149). * iwlwifi: mvm: Populate trip table before registering thermal zone (bsc#1227149). * iwlwifi: mvm: Use for_each_thermal_trip() for walking trip points (bsc#1227149). * jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * jfs: Fix array-index-out-of-bounds in diFree (git-fixes). * jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383). * kABI fix of KVM: x86/pmu: Allow programming events that match unsupported arch events (bsc#1225696). * kABI fix of KVM: x86/pmu: Prioritize VMX interception over * kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * kABI workaround for cs35l56 (git-fixes). * kABI workaround for of driver changes (git-fixes). * kABI workaround for sof_ipc_pcm_ops (git-fixes). * kABI workaround for wireless updates (bsc#1227149). * kABI: bpf: verifier kABI workaround (bsc#1225903). * kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git fixes). * kabi/severities: Ignore io_uring internal symbols * kabi/severities: Remove mitigation-related symbols Those are used by the core kernel to implement CPU vulnerabilities mitigation and are not expected to be consumed by 3rd party users. * kabi/severities: cleanup and update for WiFi driver entries (bsc#1227149) * kabi/severities: cover all ath/ _drivers (bsc#1227149) All symbols in ath/_ network drivers are local and can be ignored * kabi/severities: cover all mt76 modules (bsc#1227149) * kabi/severities: ignore IMS functions They were dropped in previous patches. Noone is supposed to use them. * kabi/severities: ignore TAS2781 symbol drop, it's only locally used * kabi/severities: ignore amd pds internal symbols * kabi/severities: ignore kABI changes Realtek WiFi drivers (bsc#1227149) All those symbols are local and used for its own helpers * kabi/severities: ignore xfrm_bpf_md_dst that depends on CONFIG_DEBUG_* (bsc#1223415) * kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502) * kasan, fortify: properly rename memintrinsics (git-fixes). * kbuild: Fix build target deb-pkg: ln: failed to create hard link (git- fixes). * kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes). * kbuild: avoid build error when single DTB is turned into composite DTB (git- fixes). * kbuild: doc: Update default INSTALL_MOD_DIR from extra to updates (git- fixes). * kconfig: doc: fix a typo in the note about 'imply' (git-fixes). * kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes). * kconfig: gconf: give a proper initial state to the Save button (stable- fixes). * kconfig: remove wrong expr_trans_bool() (stable-fixes). * kcov: do not lose track of remote references during softirqs (git-fixes). * kernel-binary: vdso: Own module_dir * kernel-doc: fix struct_group_tagged() parsing (git-fixes). * kexec: do syscore_shutdown() in kernel_kexec (git-fixes). * kheaders: explicitly define file modes for archived headers (stable-fixes). * knfsd: LOOKUP can return an illegal error value (git-fixes). * kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes). * kprobe/ftrace: bail out if ftrace was killed (git-fixes). * kprobe/ftrace: fix build error due to bad function definition (git-fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * kselftest: Add a ksft_perror() helper (stable-fixes). * kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes). * kunit: Fix checksum tests on big endian CPUs (git-fixed). * leds: flash: leds-qcom-flash: Test the correct variable in init (git-fixes). * leds: mt6360: Fix memory leak in mt6360_init_isnk_properties() (git-fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes). * leds: trigger: Unregister sysfs attributes before calling deactivate() (git- fixes). * leds: triggers: Flush pending brightness before activating trigger (git- fixes). * lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes). * lib: objagg: Fix general protection fault (git-fixes). * lib: objagg: Fix spelling (git-fixes). * lib: test_objagg: Fix spelling (git-fixes). * libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228192). * libperf evlist: Avoid out-of-bounds access (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes) * lsm: fix the logic in security_inode_getsecctx() (git-fixes). * mISDN: Fix a use after free in hfcmulti_tx() (git-fixes). * mISDN: fix MISDN_TIME_STAMP handling (git-fixes). * mac802154: fix time calculation in ieee802154_configure_durations() (git- fixes). * mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (git-fixes). * maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes). * media: dvb-frontends: tda18271c2dd: Remove casting during div (stable- fixes). * media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes). * media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable- fixes). * media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes). * media: dvbdev: Initialize sbuf (stable-fixes). * media: dw2102: Do not translate i2c read into write (stable-fixes). * media: dw2102: fix a potential buffer overflow (git-fixes). * media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes). * media: i2c: Fix imx412 exposure control (git-fixes). * media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes). * media: imon: Fix race getting ictx->lock (git-fixes). * media: imx-jpeg: Drop initial source change event if capture has been setup (git-fixes). * media: imx-jpeg: Remove some redundant error logs (git-fixes). * media: imx-pxp: Fix ERR_PTR dereference in pxp_probe() (git-fixes). * media: ipu3-cio2: Request IRQ earlier (git-fixes). * media: lgdt3306a: Add a check against null-pointer-def (stable-fixes). * media: mc: Fix graph walk in media_pipeline_start (git-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: mxl5xx: Move xpt structures off stack (stable-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: pci: ivtv: Add check for DMA map result (git-fixes). * media: radio-shark2: Avoid led_names truncations (git-fixes). * media: rcar-vin: Fix YUYV8_1X16 handling for CSI-2 (git-fixes). * media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes). * media: renesas: vsp1: Fix _irqsave and _irq mix (git-fixes). * media: renesas: vsp1: Store RPF partition configuration per RPF instance (git-fixes). * media: s2255: Use refcount_t instead of atomic_t for num_channels (stable- fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes). * media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes). * media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes). * media: uvcvideo: Override default flags (git-fixes). * media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes). * media: v4l2-subdev: Fix stream handling for crop API (git-fixes). * media: v4l: Do not turn on privacy LED if streamon fails (git-fixes). * media: v4l: async: Fix NULL pointer dereference in adding ancillary links (git-fixes). * media: v4l: subdev: Fix typo in documentation (git-fixes). * media: venus: fix use after free in vdec_close (git-fixes). * media: venus: flush all buffers in output plane streamoff (git-fixes). * mei: demote client disconnect warning on suspend to debug (stable-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mei: me: release irq in mei_me_pci_resume error path (git-fixes). * mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes). * mfd: pm8008: Fix regmap irq chip initialisation (git-fixes). * misc: fastrpc: Avoid updating PD type for capability request (git-fixes). * misc: fastrpc: Copy the complete capability structure to user (git-fixes). * misc: fastrpc: Fix DSP capabilities request (git-fixes). * misc: fastrpc: Fix memory leak in audio daemon attach operation (git-fixes). * misc: fastrpc: Fix ownership reassignment of remote heap (git-fixes). * misc: fastrpc: Restrict untrusted app to attach to privileged PD (git- fixes). * misc: microchip: pci1xxxx: Fix a memory leak in the error handling of gp_aux_bus_probe() (git-fixes). * misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe() (git-fixes). * mlxbf_gige: stop interface during shutdown (git-fixes). * mlxsw: Use refcount_t for reference counting (git-fixes). * mm/slab: make __free(kfree) accept error pointers (git-fixes). * mm: page_owner: fix wrong information in dump_page_owner (git-fixes). * mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes). * mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes). * mmc: core: Do not force a retune before RPMB switch (stable-fixes). * mmc: davinci: Do not strip remove function when driver is builtin (git- fixes). * mmc: sdhci-acpi: Add quirk to enable pull-up on the card-detect GPIO on Asus T100TA (git-fixes). * mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable- fixes). * mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes). * mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes). * mmc: sdhci-brcmstb: check R1_STATUS for erase/trim/discard (git-fixes). * mmc: sdhci-msm: pervent access to suspended controller (git-fixes). * mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes). * mmc: sdhci: Add support for "Tuning Error" interrupts (stable-fixes). * mmc: sdhci: Do not invert write-protect twice (git-fixes). * mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes). * mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes). * mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * module: do not ignore sysfs_create_link() failures (git-fixes). * mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes). * mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes). * mptcp: fix bogus receive window shrinkage with multiple subflows (git- fixes). * mptcp: move __mptcp_error_report in protocol.c (git-fixes). * mptcp: process pending subflow error on close (git-fixes). * mt76: connac: move more mt7921/mt7915 mac shared code in connac lib (bsc#1227149). * mt76: mt7996: rely on mt76_sta_stats in mt76_wcid (bsc#1227149). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: diskonchip: work around ubsan link failure (stable-fixes). * mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes). * mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes). * mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git- fixes). * mtd: rawnand: Fix the nand_read_data_op() early check (git-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes). * net/dcb: check for detached device before executing callbacks (bsc#1215587). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes). * net/mlx5: Fix MTMP register capability offset in MCAM register (git-fixes). * net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Properly link new fs rules into the tree (git-fixes). * net/mlx5: Register devlink first under devlink lock (git-fixes). * net/mlx5: Restore mistakenly dropped parts in register devlink flow (git- fixes). * net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes). * net/mlx5: offset comp irq index in name by one (git-fixes). * net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes). * net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes). * net/mlx5e: RSS, Block changing channels number when RXFH is configured (git- fixes). * net/smc: bugfix for smcr v2 server connect success statistic (git-fixes). * net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes). * net: Remove conditional threaded-NAPI wakeup based on task state (bsc#1214683 (PREEMPT_RT prerequisite backports)). * net: annotate data-races around sk->sk_bind_phc (git-fixes). * net: annotate data-races around sk->sk_forward_alloc (git-fixes). * net: annotate data-races around sk->sk_lingertime (git-fixes). * net: annotate data-races around sk->sk_tsflags (git-fixes). * net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes). * net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes). * net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes). * net: dsa: mt7530: trap link-local frames regardless of ST Port State (git- fixes). * net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes). * net: ena: Fix incorrect descriptor free behavior (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Fix redundant device NUMA node override (jsc#PED-8688). * net: ena: Move XDP code to its new files (git-fixes). * net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git- fixes). * net: ena: Set tx_info->xdpf value to NULL (git-fixes). * net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: ethernet: mtk_wed: introduce mtk_wed_buf structure (bsc#1227149). * net: ethernet: mtk_wed: rename mtk_rxbm_desc in mtk_wed_bm_desc (bsc#1227149). * net: fec: Set mac_managed_pm during probe (git-fixes). * net: fill in MODULE_DESCRIPTION()s in kuba@'s modules (bsc#1227149). * net: hns3: Remove io_stop_wc() calls after __iowrite64_copy() (bsc#1226502) * net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git- fixes). * net: ks8851: Inline ks8851_rx_skb() (git-fixes). * net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git- fixes). * net: lan743x: Support WOL at both the PHY and MAC appropriately (git-fixes). * net: lan743x: disable WOL upon resume to restore full data path operation (git-fixes). * net: mac802154: Fix racy device stats updates by DEV_STATS_INC() and DEV_STATS_ADD() (stable-fixes). * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491). * net: mana: Fix possible double free in error handling path (git-fixes). * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes). * net: nfc: remove inappropriate attrs check (stable-fixes). * net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes). * net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes). * net: phy: micrel: fix KSZ9477 PHY issues after suspend/resume (git-fixes). * net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes). * net: phy: microchip: lan87xx: reinit PHY after cable test (git-fixes). * net: phy: mxl-gpy: Remove interrupt mask clearing from config_init (git- fixes). * net: phy: phy_device: Fix PHY LED blinking code comment (git-fixes). * net: ravb: Always process TX descriptor ring (git-fixes). * net: ravb: Always update error counters (git-fixes). * net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes). * net: sparx5: flower: fix fragment flags handling (git-fixes). * net: stmmac: fix rx queue priority assignment (git-fixes). * net: tls, fix WARNIING in __sk_msg_free (bsc#1221858). * net: tls: fix returned read length with async decrypt (bsc#1221858). * net: tls: fix use-after-free with partial reads and async (bsc#1221858). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net: usb: ax88179_178a: improve link status logs (git-fixes). * net: usb: ax88179_178a: improve reset check (git-fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: qmi_wwan: add Telit FN912 compositions (stable-fixes). * net: usb: qmi_wwan: add Telit FN920C04 compositions (git-fixes). * net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes). * net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git- fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes). * netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes). * netfilter: nft_ct: fix l3num expectations with inet pseudo family (git- fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix kcov check in nci_rx_work() (git-fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442). * nfs: Block on write congestion (bsc#1218442). * nfs: Bump default write congestion size (bsc#1218442). * nfs: Drop pointless check from nfs_commit_release_pages() (bsc#1218442). * nfs: Fix up kabi after adding write_congestion_wait (bsc#1218442). * nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes). * nfs: Properly initialize server->writeback (bsc#1218442). * nfs: drop the incorrect assertion in nfs_swap_rw() (git-fixes). * nfs: fix undefined behavior in nfs_block_bits() (git-fixes). * nfs: keep server info for remounts (git-fixes). * nfsd: hold a lighter-weight client reference over CB_RECALL_ANY (git-fixes). * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912). * nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408). * nilfs2: add missing check for inode numbers on directory entries (stable- fixes). * nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes). * nilfs2: convert persistent object allocator to use kmap_local (git-fixes). * nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes). * nilfs2: fix inode number range checks (stable-fixes). * nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (git- fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix potential hang in nilfs_detach_log_writer() (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nilfs2: return the mapped address from nilfs_get_page() (stable-fixes). * nouveau: add an ioctl to report vram usage (stable-fixes). * nouveau: add an ioctl to return vram bar size (stable-fixes). * nouveau: report byte usage in VRAM usage (git-fixes). * nvme-fabrics: short-circuit reconnect retries (bsc#1186716). * nvme-multipath: fix io accounting on failover (git-fixes). * nvme-pci: Add quirk for broken MSIs (git-fixes). * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049). * nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858). * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049). * nvme: cancel pending I/O if nvme controller is in terminal state (bsc#1226503). * nvme: do not retry authentication failures (bsc#1186716). * nvme: find numa distance only if controller has valid numa id (git-fixes). * nvme: fix multipath batched completion accounting (git-fixes). * nvme: fix nvme_pr_* status code parsing (git-fixes). * nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes). * nvme: return kernel error codes for admin queue connect (bsc#1186716). * nvmet-auth: replace pr_debug() with pr_err() to report an error (git-fixes). * nvmet-auth: return the error code to the nvmet_auth_host_hash() callers (git-fixes). * nvmet-passthru: propagate status from id override functions (git-fixes). * nvmet-tcp: fix possible memory leak when tearing down a controller (git- fixes). * nvmet: fix ns enable/disable possible hang (git-fixes). * nvmet: fix nvme status code when namespace is disabled (git-fixes). * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716). * nvmet: prevent sprintf() overflow in nvmet_subsys_nsid_exists() (git-fixes). * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716). * ocfs2: adjust enabling place for la window (bsc#1219224). * ocfs2: fix DIO failure due to insufficient transaction credits (git-fixes). * ocfs2: fix races between hole punching and AIO+DIO (git-fixes). * ocfs2: fix sparse warnings (bsc#1219224). * ocfs2: improve write IO performance when fragmentation is high (bsc#1219224). * ocfs2: speed up chain-list searching (bsc#1219224). * ocfs2: use coarse time for new created files (git-fixes). * octeontx2-af: Add array index check (git-fixes). * octeontx2-af: Fix NIX SQ mode and BP config (git-fixes). * octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes). * octeontx2-pf: Fix transmit scheduler resource leak (git-fixes). * octeontx2-pf: check negative error code in otx2_open() (git-fixes). * octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes). * of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes). * of: module: add buffer overflow check in of_modalias() (git-fixes). * of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes). * of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes). * of: property: Improve finding the consumer of a remote-endpoint property (git-fixes). * of: property: Improve finding the supplier of a remote-endpoint property (git-fixes). * of: property: fix typo in io-channels (git-fixes). * of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git- fixes). * of: unittest: Fix compile in the non-dynamic case (git-fixes). * orangefs: fix out-of-bounds fsid access (git-fixes). * pNFS/filelayout: fixup pNfs allocation modes (git-fixes). * perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes). * perf annotate: Get rid of duplicate --group option item (git-fixes). * perf auxtrace: Fix multiple use of --itrace option (git-fixes). * perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes). * perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes). * perf bpf: Clean up the generated/copied vmlinux.h (git-fixes). * perf daemon: Fix file leak in daemon_session__control (git-fixes). * perf docs: Document bpf event modifier (git-fixes). * perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes). * perf expr: Fix "has_event" function for metric style events (git-fixes). * perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes). * perf jevents: Drop or simplify small integer values (git-fixes). * perf list: fix short description for some cache events (git-fixes). * perf lock contention: Add a missing NULL check (git-fixes). * perf metric: Do not remove scale from counts (git-fixes). * perf pmu: Count sys and cpuid JSON events separately (git fixes). * perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes). * perf pmu: Treat the msr pmu as software (git-fixes). * perf print-events: make is_event_supported() more robust (git-fixes). * perf probe: Add missing libgen.h header needed for using basename() (git- fixes). * perf record: Check conflict between '\--timestamp-filename' option and pipe mode before recording (git-fixes). * perf record: Delete session after stopping sideband thread (git-fixes). * perf record: Fix debug message placement for test consumption (git-fixes). * perf record: Fix possible incorrect free in record__switch_output() (git- fixes). * perf report: Avoid SEGV in report__setup_sample_type() (git-fixes). * perf sched timehist: Fix -g/--call-graph option failure (git-fixes). * perf script: Show also errors for --insn-trace option (git-fixes). * perf srcline: Add missed addr2line closes (git-fixes). * perf stat: Avoid metric-only segv (git-fixes). * perf stat: Do not display metric header for non-leader uncore events (git- fixes). * perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes). * perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes). * perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes). * perf tests: Apply attributes to all events in object code reading test (git- fixes). * perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes). * perf thread: Fixes to thread__new() related to initializing comm (git- fixes). * perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes). * perf top: Uniform the event name for the hybrid machine (git-fixes). * perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes). * perf ui browser: Avoid SEGV on title (git fixes). * perf ui browser: Do not save pointer to stack memory (git-fixes). * perf vendor events amd: Add Zen 4 memory controller events (git-fixes). * perf vendor events amd: Fix Zen 4 cache latency events (git-fixes). * perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes). * perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event (git-fixes). * perf/x86/intel: Expose existence of callback support to KVM (git-fixes). * perf/x86: Fix out of range data (git-fixes). * perf: Enqueue SIGTRAP always via task_work (bsc#1214683 (PREEMPT_RT prerequisite backports)). * perf: Move irq_work_queue() where the event is prepared (bsc#1214683 (PREEMPT_RT prerequisite backports)). * perf: Remove perf_swevent_get_recursion_context() from perf_pending_task() (bsc#1214683 (PREEMPT_RT prerequisite backports)). * perf: Split __perf_pending_irq() out of perf_pending_irq() (bsc#1214683 (PREEMPT_RT prerequisite backports)). * phy: cadence-torrent: Check return value on register read (git-fixes). * phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes). * phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes). * phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes). * phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes). * phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes). * phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes). * phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git- fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git- fixes). * pinctrl: freescale: mxs: Fix refcount of child (git-fixes). * pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git- fixes). * pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git- fixes). * pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes). * pinctrl: renesas: r8a779g0: FIX PWM suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix (H)SCIF1 suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix (H)SCIF3 suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix CANFD5 suffix (git-fixes). * pinctrl: renesas: r8a779g0: Fix FXR_TXEN[AB] suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix IRQ suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix TCLK suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix TPU suffixes (git-fixes). * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes). * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes). * pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes). * pinctrl: rockchip: update rk3308 iomux routes (git-fixes). * pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes). * pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git- fixes). * pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes). * platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes). * platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * platform/x86/intel/tpmi: Handle error from tpmi_process_info() (stable- fixes). * platform/x86: ISST: Add Grand Ridge to HPM CPU list (stable-fixes). * platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes). * platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes). * platform/x86: lg-laptop: Change ACPI device id (stable-fixes). * platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes). * platform/x86: lg-laptop: Use ACPI device handle when evaluating WMAB/WMBB (stable-fixes). * platform/x86: thinkpad_acpi: Take hotkey_mutex during hotkey_exit() (git- fixes). * platform/x86: toshiba_acpi: Add quirk for buttons on Z830 (stable-fixes). * platform/x86: toshiba_acpi: Fix array out-of-bounds access (git-fixes). * platform/x86: toshiba_acpi: Fix quickstart quirk handling (git-fixes). * platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6" tablet (stable-fixes). * platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes). * platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable- fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * power: supply: ab8500: Fix error handling when calling iio_read_channel_processed() (git-fixes). * power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes). * power: supply: ingenic: Fix some error handling paths in ingenic_battery_get_property() (git-fixes). * power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git- fixes). * powerpc/64s/radix/kfence: map __kfence_pool at page granularity (bsc#1223570 ltc#205770). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/prom: Add CPU info to hardware description string later (bsc#1215199). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869). * powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199). * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * ppdev: Add an error check in register_device (git-fixes). * prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610). * printk: Add this_cpu_in_panic() (bsc#1225607). * printk: Adjust mapping for 32bit seq macros (bsc#1225607). * printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607). * printk: Consolidate console deferred printing (bsc#1225607). * printk: Disable passing console lock owner completely during panic() (bsc#1225607). * printk: Do not take console lock for console_flush_on_panic() (bsc#1225607). * printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607). * printk: Keep non-panic-CPUs out of console lock (bsc#1225607). * printk: Let no_printk() use _printk() (bsc#1225618). * printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607). * printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607). * printk: Wait for all reserved records with pr_flush() (bsc#1225607). * printk: nbcon: Relocate 32bit seq macros (bsc#1225607). * printk: ringbuffer: Clarify special lpos values (bsc#1225607). * printk: ringbuffer: Cleanup reader terminology (bsc#1225607). * printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607). * printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607). * proc/kcore: do not try to access unaccepted memory (git-fixes). * pwm: sti: Prepare removing pwm_chip from driver data (stable-fixes). * pwm: sti: Simplify probe function using devm functions (git-fixes). * pwm: stm32: Always do lazy disabling (git-fixes). * qibfs: fix dentry leak (git-fixes) * regmap-i2c: Subtract reg size from max_write (stable-fixes). * regmap: Add regmap_read_bypassed() (git-fixes). * regulator: bd71815: fix ramp values (git-fixes). * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes). * regulator: change stubbed devm_regulator_get_enable to return Ok (git- fixes). * regulator: core: Fix modpost error "regulator_get_regmap" undefined (git- fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: irq_helpers: duplicate IRQ name (stable-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * regulator: tps65132: Add of_match table (stable-fixes). * regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes). * remoteproc: imx_rproc: Fix refcount mistake in imx_rproc_addr_init (git- fixes). * remoteproc: imx_rproc: Skip over memory region when node value is NULL (git- fixes). * remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes). * remoteproc: k3-r5: Fix IPC-only mode detection (git-fixes). * remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git- fixes). * remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git- fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * remoteproc: stm32_rproc: Fix mailbox interrupts queuing (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * ring-buffer: Only update pages_touched when a new page is touched (git- fixes). * ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes). * rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes). * rtc: abx80x: Fix return value of nvmem callback on read (git-fixes). * rtc: cmos: Fix return value of nvmem callbacks (git-fixes). * rtc: interface: Add RTC offset to alarm after fix-up (git-fixes). * rtc: isl1208: Fix return value of nvmem callbacks (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792). * s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793). * s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227072). * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134). * s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590). * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871). * s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872). * s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874). * s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870). * s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593). * s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592). * s390: Implement __iowrite32_copy() (bsc#1226502) * s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502) * saa7134: Unchecked i2c_transfer function result fixed (git-fixes). * sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791). * sched/debug: Update stale reference to sched_debug.c (bsc#1214683 (PREEMPT_RT prerequisite backports)). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * sctp: annotate data-races around sk->sk_wmem_queued (git-fixes). * selftests/binderfs: use the Makefile's rules, not Make's implicit rules (git-fixes). * selftests/bpf: add edge case backtracking logic test (bsc#1225756). * selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756). * selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903). * selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903). * selftests/bpf: test widening for iterating callbacks (bsc#1225903). * selftests/bpf: tests for iterating callbacks (bsc#1225903). * selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903). * selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903). * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903). * selftests/ftrace: Fix event filter target_func selection (stable-fixes). * selftests/ftrace: Limit length in subsystem-enable tests (git-fixes). * selftests/kcmp: remove unused open mode (git-fixes). * selftests/mm: compaction_test: fix incorrect write of zero to nr_hugepages (git-fixes). * selftests/mm: fix build warnings on ppc64 (stable-fixes). * selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes). * selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes). * selftests/sigaltstack: Fix ppc64 GCC build (git-fixes). * selftests/timers/posix_timers: Reimplement check_timer_distribution() (git- fixes). * selftests: default to host arch for LLVM builds (git-fixes). * selftests: fix OOM in msg_zerocopy selftest (git-fixes). * selftests: hsr: Extend the testsuite to also cover HSRv1 (bsc#1214683 (PREEMPT_RT prerequisite backports)). * selftests: hsr: Reorder the testsuite (bsc#1214683 (PREEMPT_RT prerequisite backports)). * selftests: hsr: Use `let' properly (bsc#1214683 (PREEMPT_RT prerequisite backports)). * selftests: kselftest: Fix build failure with NOLIBC (git-fixes). * selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes). * selftests: make order checking verbose in msg_zerocopy selftest (git-fixes). * selftests: mptcp: add ms units for tc-netem delay (stable-fixes). * selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes). * selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes). * selftests: net: move amt to socat for better compatibility (git-fixes). * selftests: sud_test: return correct emulated syscall value on RISC-V (stable-fixes). * selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes). * selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes). * selftests: timers: Fix abs() warning in posix_timers test (git-fixes). * selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes). * selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes). * selinux: introduce an initial SID for early boot processes (bsc#1208593). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes). * serial: bcm63xx-uart: fix tx after conversion to uart_port_tx_limited() (git-fixes). * serial: core: introduce uart_port_tx_limited_flags() (git-fixes). * serial: exar: adding missing CTI and Exar PCI ids (stable-fixes). * serial: imx: Introduce timeout when waiting on transmitter empty (stable- fixes). * serial: imx: Raise TX trigger level to 8 (stable-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max3100: Update uart_driver_registered on driver removal (git- fixes). * serial: pch: Do not disable interrupts while acquiring lock in ISR (bsc#1214683 (PREEMPT_RT prerequisite backports)). * serial: pch: Do not initialize uart_port's spin_lock (bsc#1214683 (PREEMPT_RT prerequisite backports)). * serial: pch: Invoke handle_rx_to() directly (bsc#1214683 (PREEMPT_RT prerequisite backports)). * serial: pch: Make push_rx() return void (bsc#1214683 (PREEMPT_RT prerequisite backports)). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes). * smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes, bsc#1225172). * smb3: allow controlling maximum number of cached directories (git-fixes, bsc#1225172). * smb3: do not start laundromat thread when dir leases disabled (git-fixes, bsc#1225172). * smb3: show beginning time for per share stats (bsc#1225172). * smb: client: do not start laundromat thread on nohandlecache (git-fixes, bsc#1225172). * smb: client: ensure to try all targets when finding nested links (bsc#1225172). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1225172). * smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes, bsc#1225172). * smb: client: get rid of dfs code dep in namespace.c (bsc#1225172). * smb: client: get rid of dfs naming in automount code (bsc#1225172). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172). * smb: client: make laundromat a delayed worker (git-fixes, bsc#1225172). * smb: client: prevent new fids from being removed by laundromat (git-fixes, bsc#1225172). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1225172). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: qcom: pdr: fix parsing of domains lists (git-fixes). * soc: qcom: pdr: protect locator_addr with the main mutex (git-fixes). * soc: qcom: pmic_glink: Handle the return value of pmic_glink_init (git- fixes). * soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes). * soc: qcom: pmic_glink: do not traverse clients list without a lock (git- fixes). * soc: qcom: pmic_glink: notify clients about the current state (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * soc: qcom: rpmh-rsc: Ensure irqs are not disabled by rpmh_rsc_send_data() callers (git-fixes). * soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes). * soc: xilinx: rename cpu_number1 to dummy_cpu_number (git-fixes). * soundwire: amd: fix for wake interrupt handling for clockstop mode (git- fixes). * soundwire: cadence: fix invalid PDI offset (stable-fixes). * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spi: Do not mark message DMA mapped when no transfer in it is (git-fixes). * spi: atmel-quadspi: Add missing check for clk_prepare (git-fixes). * spi: cadence: Ensure data lines set to low during dummy-cycle period (stable-fixes). * spi: fix null pointer dereference within spi_sync (git-fixes). * spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes). * spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable- fixes). * spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes). * spi: microchip-core: defer asserting chip select until just before write to TX FIFO (git-fixes). * spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer (git-fixes). * spi: microchip-core: fix the issues in the isr (git-fixes). * spi: microchip-core: only disable SPI controller when register value change requires it (git-fixes). * spi: mux: set ctlr->bits_per_word_mask (stable-fixes). * spi: spi-microchip-core: Fix the number of chip selects supported (git- fixes). * spi: spidev: add correct compatible for Rohm BH2228FV (git-fixes). * spi: stm32: Do not warn about spurious interrupts (git-fixes). * spi: stm32: qspi: Clamp stm32_qspi_get_mode() output to CCR_BUSWIDTH_4 (git- fixes). * spi: stm32: qspi: Fix dual flash mode sanity test in stm32_qspi_setup() (git-fixes). * spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (stable- fixes). * staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes). * struct acpi_ec kABI workaround (git-fixes). * sunrpc: fix NFSACL RPC retry on soft mount (git-fixes). * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331) * tcp: Dump bound-only sockets in inet_diag (bsc#1204562). * thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Return error in case of invalid efuse data (git-fixes). * thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes). * thunderbolt: Fix wake configurations after device unplug (stable-fixes). * thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes). * thunderbolt: Introduce tb_port_reset() (stable-fixes). * thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes). * thunderbolt: Reset only non-USB4 host routers in resume (git-fixes). * thunderbolt: debugfs: Fix margin debugfs node creation condition (git- fixes). * tls: break out of main loop when PEEK gets a non-data record (bsc#1221858). * tls: do not skip over different type records from the rx_list (bsc#1221858). * tls: fix peeking with sync+async decryption (bsc#1221858). * tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858). * tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tools/memory-model: Fix bug in lock.cat (git-fixes). * tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765). * tools/power turbostat: Remember global max_die_id (stable-fixes). * tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah CPUs (stable-fixes). * tools: ynl: do not leak mcast_groups on init error (git-fixes). * tools: ynl: fix handling of multiple mcast groups (git-fixes). * tools: ynl: make sure we always pass yarg to mnl_cb_run (git-fixes). * tpm_tis: Do _not_ flush uninitialized work (git-fixes). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes). * tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: Build event generation tests only as modules (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: mcf: MCF54418 has 10 UARTS (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * tty: n_tty: Fix buffer offsets when lookahead is used (git-fixes). * usb-storage: alauda: Check whether the media is initialized (git-fixes). * usb: Disable USB3 LPM at shutdown (stable-fixes). * usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569). * usb: aqc111: stop lying about skb->truesize (git-fixes). * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes). * usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes). * usb: dwc3: core: Add DWC31 version 2.00a controller (stable-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: dwc3: core: Workaround for CSR read timeout (stable-fixes). * usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes). * usb: dwc3: pci: Do not set "linux,phy_charger_detect" property on Lenovo Yoga Tab2 1380 (stable-fixes). * usb: dwc3: pci: add support for the Intel Panther Lake (stable-fixes). * usb: fotg210: Add missing kernel doc description (git-fixes). * usb: gadget: aspeed_udc: fix device address configuration (git-fixes). * usb: gadget: composite: fix OS descriptors w_value logic (git-fixes). * usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable- fixes). * usb: gadget: f_fs: Fix a race condition when processing setup packets (git- fixes). * usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes). * usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes). * usb: gadget: function: Remove usage of the deprecated ida_simple_xx() API (stable-fixes). * usb: gadget: printer: SS+ support (stable-fixes). * usb: gadget: printer: fix races against disable (git-fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes). * usb: gadget: uvc: configfs: ensure guid to be valid before set (stable- fixes). * usb: gadget: uvc: use correct buffer size when parsing configfs lists (git- fixes). * usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes). * usb: musb: da8xx: fix a resource leak in probe() (git-fixes). * usb: ohci: Prevent missed ohci interrupts (git-fixes). * usb: typec: tcpm: Check for port partner validity before consuming it (git- fixes). * usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes). * usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes). * usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git- fixes). * usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: Ack also failed Get Error commands (git-fixes). * usb: typec: ucsi: Never send a lone connector change ack (stable-fixes). * usb: typec: ucsi: always register a link to USB PD device (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * usb: typec: ucsi: glink: fix child node release in probe function (git- fixes). * usb: typec: ucsi: simplify partner's PD caps registration (git-fixes). * usb: typec: ucsi_glink: drop special handling for CCI_BUSY (stable-fixes). * usb: ucsi: stm32: fix command completion handling (git-fixes). * usb: xhci-plat: Do not include xhci.h (stable-fixes). * usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (stable-fixes). * vboxsf: explicitly deny setlease attempts (stable-fixes). * vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944). * virtio_net: Do not send RSS key if it is not supported (git-fixes). * virtio_net: avoid data-races on dev->stats fields (git-fixes). * virtio_net: checksum offloading handling fix (git-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * vmlinux.lds.h: catch .bss..L* sections into BSS") (git-fixes). * vsock/virtio: fix packet delivery to tap device (git-fixes). * watchdog: bd9576: Drop "always-running" property (git-fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * watchdog: rzg2l_wdt: Check return status of pm_runtime_put() (git-fixes). * watchdog: rzg2l_wdt: Use pm_runtime_resume_and_get() (git-fixes). * watchdog: rzn1: Convert comma to semicolon (git-fixes). * watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes). * wifi: add HAS_IOPORT dependencies (bsc#1227149). * wifi: ar5523: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10/11/12k: Use alloc_ordered_workqueue() to create ordered workqueues (bsc#1227149). * wifi: ath10k: Annotate struct ath10k_ce_ring with __counted_by (bsc#1227149). * wifi: ath10k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath10k: Drop checks that are always false (bsc#1227149). * wifi: ath10k: Drop cleaning of driver data from probe error path and remove (bsc#1227149). * wifi: ath10k: Fix a few spelling errors (bsc#1227149). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: Fix enum ath10k_fw_crash_dump_type kernel-doc (bsc#1227149). * wifi: ath10k: Fix htt_data_tx_completion kernel-doc warning (bsc#1227149). * wifi: ath10k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath10k: Remove unused struct ath10k_htc_frame (bsc#1227149). * wifi: ath10k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149). * wifi: ath10k: Use DECLARE_FLEX_ARRAY() for ath10k_htc_record (bsc#1227149). * wifi: ath10k: Use list_count_nodes() (bsc#1227149). * wifi: ath10k: add missing wmi_10_4_feature_mask documentation (bsc#1227149). * wifi: ath10k: add support to allow broadcast action frame RX (bsc#1227149). * wifi: ath10k: consistently use kstrtoX_from_user() functions (bsc#1227149). * wifi: ath10k: correctly document enum wmi_tlv_tx_pause_id (bsc#1227149). * wifi: ath10k: drop HTT_DATA_TX_STATUS_DOWNLOAD_FAIL (bsc#1227149). * wifi: ath10k: fix QCOM_RPROC_COMMON dependency (git-fixes). * wifi: ath10k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149). * wifi: ath10k: fix htt_q_state_conf & htt_q_state kernel-doc (bsc#1227149). * wifi: ath10k: improve structure padding (bsc#1227149). * wifi: ath10k: indicate to mac80211 scan complete with aborted flag for ATH10K_SCAN_STARTING state (bsc#1227149). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath10k: remove ath10k_htc_record::pauload[] (bsc#1227149). * wifi: ath10k: remove duplicate memset() in 10.4 TDLS peer update (bsc#1227149). * wifi: ath10k: remove struct wmi_pdev_chanlist_update_event (bsc#1227149). * wifi: ath10k: remove unused template structs (bsc#1227149). * wifi: ath10k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath10k: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: ath10k: simplify __ath10k_htt_tx_txq_recalc() (bsc#1227149). * wifi: ath10k: simplify ath10k_peer_create() (bsc#1227149). * wifi: ath10k: use flexible array in struct wmi_tdls_peer_capabilities (bsc#1227149). * wifi: ath10k: use flexible array in struct wmi_host_mem_chunks (bsc#1227149). * wifi: ath10k: use flexible arrays for WMI start scan TLVs (bsc#1227149). * wifi: ath11k: Add HTT stats for PHY reset case (bsc#1227149). * wifi: ath11k: Add coldboot calibration support for QCN9074 (bsc#1227149). * wifi: ath11k: Allow ath11k to boot without caldata in ftm mode (bsc#1227149). * wifi: ath11k: Consistently use ath11k_vif_to_arvif() (bsc#1227149). * wifi: ath11k: Consolidate WMI peer flags (bsc#1227149). * wifi: ath11k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath11k: Do not directly use scan_flags in struct scan_req_params (bsc#1227149). * wifi: ath11k: EMA beacon support (bsc#1227149). * wifi: ath11k: Fix a few spelling errors (bsc#1227149). * wifi: ath11k: Fix ath11k_htc_record flexible record (bsc#1227149). * wifi: ath11k: Introduce and use ath11k_sta_to_arsta() (bsc#1227149). * wifi: ath11k: MBSSID beacon support (bsc#1227149). * wifi: ath11k: MBSSID configuration during vdev create/start (bsc#1227149). * wifi: ath11k: MBSSID parameter configuration in AP mode (bsc#1227149). * wifi: ath11k: Really consistently use ath11k_vif_to_arvif() (bsc#1227149). * wifi: ath11k: Relocate the func ath11k_mac_bitrate_mask_num_ht_rates() and change hweight16 to hweight8 (bsc#1227149). * wifi: ath11k: Remove ath11k_base::bd_api (bsc#1227149). * wifi: ath11k: Remove cal_done check during probe (bsc#1227149). * wifi: ath11k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149). * wifi: ath11k: Remove scan_flags union from struct scan_req_params (bsc#1227149). * wifi: ath11k: Remove struct ath11k::ops (bsc#1227149). * wifi: ath11k: Remove unneeded semicolon (bsc#1227149). * wifi: ath11k: Remove unused declarations (bsc#1227149). * wifi: ath11k: Remove unused struct ath11k_htc_frame (bsc#1227149). * wifi: ath11k: Send HT fixed rate in WMI peer fixed param (bsc#1227149). * wifi: ath11k: Split coldboot calibration hw_param (bsc#1227149). * wifi: ath11k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149). * wifi: ath11k: Use device_get_match_data() (bsc#1227149). * wifi: ath11k: Use list_count_nodes() (bsc#1227149). * wifi: ath11k: add WMI event debug messages (bsc#1227149). * wifi: ath11k: add WMI_TLV_SERVICE_EXT_TPC_REG_SUPPORT service bit (bsc#1227149). * wifi: ath11k: add chip id board name while searching board-2.bin for WCN6855 (bsc#1227149). * wifi: ath11k: add firmware-2.bin support (bsc#1227149). * wifi: ath11k: add handler for WMI_VDEV_SET_TPC_POWER_CMDID (bsc#1227149). * wifi: ath11k: add parse of transmit power envelope element (bsc#1227149). * wifi: ath11k: add parsing of phy bitmap for reg rules (bsc#1227149). * wifi: ath11k: add support for QCA2066 (bsc#1227149). * wifi: ath11k: add support to select 6 GHz regulatory type (bsc#1227149). * wifi: ath11k: ath11k_debugfs_register(): fix format-truncation warning (bsc#1227149). * wifi: ath11k: avoid forward declaration of ath11k_mac_start_vdev_delay() (bsc#1227149). * wifi: ath11k: call ath11k_mac_fils_discovery() without condition (bsc#1227149). * wifi: ath11k: constify MHI channel and controller configs (bsc#1227149). * wifi: ath11k: debug: add ATH11K_DBG_CE (bsc#1227149). * wifi: ath11k: debug: remove unused ATH11K_DBG_ANY (bsc#1227149). * wifi: ath11k: debug: use all upper case in ATH11k_DBG_HAL (bsc#1227149). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: ath11k: do not use %pK (bsc#1227149). * wifi: ath11k: document HAL_RX_BUF_RBM_SW4_BM (bsc#1227149). * wifi: ath11k: dp: cleanup debug message (bsc#1227149). * wifi: ath11k: driver settings for MBSSID and EMA (bsc#1227149). * wifi: ath11k: drop NULL pointer check in ath11k_update_per_peer_tx_stats() (bsc#1227149). * wifi: ath11k: drop redundant check in ath11k_dp_rx_mon_dest_process() (bsc#1227149). * wifi: ath11k: enable 36 bit mask for stream DMA (bsc#1227149). * wifi: ath11k: factory test mode support (bsc#1227149). * wifi: ath11k: fill parameters for vdev set tpc power WMI command (bsc#1227149). * wifi: ath11k: fix CAC running state during virtual interface start (bsc#1227149). * wifi: ath11k: fix IOMMU errors on buffer rings (bsc#1227149). * wifi: ath11k: fix RCU documentation in ath11k_mac_op_ipv6_changed() (git- fixes). * wifi: ath11k: fix WCN6750 firmware crash caused by 17 num_vdevs (bsc#1227149). * wifi: ath11k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149). * wifi: ath11k: fix a possible dead lock caused by ab->base_lock (bsc#1227149). * wifi: ath11k: fix ath11k_mac_op_remain_on_channel() stack usage (bsc#1227149). * wifi: ath11k: fix connection failure due to unexpected peer delete (bsc#1227149). * wifi: ath11k: fix tid bitmap is 0 in peer rx mu stats (bsc#1227149). * wifi: ath11k: fix wrong definition of CE ring's base address (git-fixes). * wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath11k: hal: cleanup debug message (bsc#1227149). * wifi: ath11k: htc: cleanup debug messages (bsc#1227149). * wifi: ath11k: initialize eirp_power before use (bsc#1227149). * wifi: ath11k: mac: fix struct ieee80211_sband_iftype_data handling (bsc#1227149). * wifi: ath11k: mhi: add a warning message for MHI_CB_EE_RDDM crash (bsc#1227149). * wifi: ath11k: move pci.ops registration ahead (bsc#1227149). * wifi: ath11k: move power type check to ASSOC stage when connecting to 6 GHz AP (bsc#1227149). * wifi: ath11k: move references from rsvd2 to info fields (bsc#1227149). * wifi: ath11k: pci: cleanup debug logging (bsc#1227149). * wifi: ath11k: print debug level in debug messages (bsc#1227149). * wifi: ath11k: provide address list if chip supports 2 stations (bsc#1227149). * wifi: ath11k: qmi: refactor ath11k_qmi_m3_load() (bsc#1227149). * wifi: ath11k: refactor ath11k_wmi_tlv_parse_alloc() (bsc#1227149). * wifi: ath11k: refactor setting country code logic (stable-fixes). * wifi: ath11k: refactor vif parameter configurations (bsc#1227149). * wifi: ath11k: rely on mac80211 debugfs handling for vif (bsc#1227149). * wifi: ath11k: remove ath11k_htc_record::pauload[] (bsc#1227149). * wifi: ath11k: remove invalid peer create logic (bsc#1227149). * wifi: ath11k: remove manual mask names from debug messages (bsc#1227149). * wifi: ath11k: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath11k: remove unsupported event handlers (bsc#1227149). * wifi: ath11k: remove unused function ath11k_tm_event_wmi() (bsc#1227149). * wifi: ath11k: remove unused members of 'struct ath11k_base' (bsc#1227149). * wifi: ath11k: remove unused scan_events from struct scan_req_params (bsc#1227149). * wifi: ath11k: rename MBSSID fields in wmi_vdev_up_cmd (bsc#1227149). * wifi: ath11k: rename ath11k_start_vdev_delay() (bsc#1227149). * wifi: ath11k: rename the sc naming convention to ab (bsc#1227149). * wifi: ath11k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149). * wifi: ath11k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath11k: restore country code during resume (git-fixes). * wifi: ath11k: save max transmit power in vdev start response event from firmware (bsc#1227149). * wifi: ath11k: save power spectral density(PSD) of regulatory rule (bsc#1227149). * wifi: ath11k: simplify ath11k_mac_validate_vht_he_fixed_rate_settings() (bsc#1227149). * wifi: ath11k: simplify the code with module_platform_driver (bsc#1227149). * wifi: ath11k: store cur_regulatory_info for each radio (bsc#1227149). * wifi: ath11k: support 2 station interfaces (bsc#1227149). * wifi: ath11k: update proper pdev/vdev id for testmode command (bsc#1227149). * wifi: ath11k: update regulatory rules when connect to AP on 6 GHz band for station (bsc#1227149). * wifi: ath11k: update regulatory rules when interface added (bsc#1227149). * wifi: ath11k: use RCU when accessing struct inet6_dev::ac_list (bsc#1227149). * wifi: ath11k: use WMI_VDEV_SET_TPC_POWER_CMDID when EXT_TPC_REG_SUPPORT for 6 GHz (bsc#1227149). * wifi: ath11k: use kstrtoul_from_user() where appropriate (bsc#1227149). * wifi: ath11k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149). * wifi: ath11k: wmi: add unified command debug messages (bsc#1227149). * wifi: ath11k: wmi: cleanup error handling in ath11k_wmi_send_init_country_cmd() (bsc#1227149). * wifi: ath11k: wmi: use common error handling style (bsc#1227149). * wifi: ath11k: workaround too long expansion sparse warnings (bsc#1227149). * wifi: ath12k: Add logic to write QRTR node id to scratch (bsc#1227149). * wifi: ath12k: Add missing qmi_txn_cancel() calls (bsc#1227149). * wifi: ath12k: Add support to parse new WMI event for 6 GHz regulatory (bsc#1227149). * wifi: ath12k: Consistently use ath12k_vif_to_arvif() (bsc#1227149). * wifi: ath12k: Consolidate WMI peer flags (bsc#1227149). * wifi: ath12k: Correct 6 GHz frequency value in rx status (git-fixes). * wifi: ath12k: Do not drop tx_status in failure case (git-fixes). * wifi: ath12k: Do not use scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: Enable Mesh support for QCN9274 (bsc#1227149). * wifi: ath12k: Fix a few spelling errors (bsc#1227149). * wifi: ath12k: Fix tx completion ring (WBM2SW) setup failure (git-fixes). * wifi: ath12k: Fix uninitialized use of ret in ath12k_mac_allocate() (bsc#1227149). * wifi: ath12k: Introduce and use ath12k_sta_to_arsta() (bsc#1227149). * wifi: ath12k: Introduce the container for mac80211 hw (bsc#1227149). * wifi: ath12k: Make QMI message rules const (bsc#1227149). * wifi: ath12k: Optimize the mac80211 hw data access (bsc#1227149). * wifi: ath12k: Read board id to support split-PHY QCN9274 (bsc#1227149). * wifi: ath12k: Refactor the mac80211 hw access from link/radio (bsc#1227149). * wifi: ath12k: Remove ath12k_base::bd_api (bsc#1227149). * wifi: ath12k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149). * wifi: ath12k: Remove some dead code (bsc#1227149). * wifi: ath12k: Remove struct ath12k::ops (bsc#1227149). * wifi: ath12k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath12k: Remove unnecessary struct qmi_txn initializers (bsc#1227149). * wifi: ath12k: Remove unused declarations (bsc#1227149). * wifi: ath12k: Remove unused scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: Set default beacon mode to burst mode (bsc#1227149). * wifi: ath12k: Use initializers for QMI message buffers (bsc#1227149). * wifi: ath12k: Use msdu_end to check MCBC (bsc#1227149). * wifi: ath12k: Use pdev_id rather than mac_id to get pdev (bsc#1227149). * wifi: ath12k: WMI support to process EHT capabilities (bsc#1227149). * wifi: ath12k: add 320 MHz bandwidth enums (bsc#1227149). * wifi: ath12k: add CE and ext IRQ flag to indicate irq_handler (bsc#1227149). * wifi: ath12k: add EHT PHY modes (bsc#1227149). * wifi: ath12k: add MAC id support in WBM error path (bsc#1227149). * wifi: ath12k: add MLO header in peer association (bsc#1227149). * wifi: ath12k: add P2P IE in beacon template (bsc#1227149). * wifi: ath12k: add QMI PHY capability learn support (bsc#1227149). * wifi: ath12k: add WMI support for EHT peer (bsc#1227149). * wifi: ath12k: add ath12k_qmi_free_resource() for recovery (bsc#1227149). * wifi: ath12k: add fallback board name without variant while searching board-2.bin (bsc#1227149). * wifi: ath12k: add firmware-2.bin support (bsc#1227149). * wifi: ath12k: add handler for scan event WMI_SCAN_EVENT_DEQUEUED (bsc#1227149). * wifi: ath12k: add keep backward compatibility of PHY mode to avoid firmware crash (bsc#1227149). * wifi: ath12k: add msdu_end structure for WCN7850 (bsc#1227149). * wifi: ath12k: add parsing of phy bitmap for reg rules (bsc#1227149). * wifi: ath12k: add processing for TWT disable event (bsc#1227149). * wifi: ath12k: add processing for TWT enable event (bsc#1227149). * wifi: ath12k: add qmi_cnss_feature_bitmap field to hardware parameters (bsc#1227149). * wifi: ath12k: add rcu lock for ath12k_wmi_p2p_noa_event() (bsc#1227149). * wifi: ath12k: add read variant from SMBIOS for download board data (bsc#1227149). * wifi: ath12k: add string type to search board data in board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: add support for BA1024 (bsc#1227149). * wifi: ath12k: add support for collecting firmware log (bsc#1227149). * wifi: ath12k: add support for hardware rfkill for WCN7850 (bsc#1227149). * wifi: ath12k: add support for peer meta data version (bsc#1227149). * wifi: ath12k: add support one MSI vector (bsc#1227149). * wifi: ath12k: add support to search regdb data in board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: add wait operation for tx management packets for flush from mac80211 (bsc#1227149). * wifi: ath12k: advertise P2P dev support for WCN7850 (bsc#1227149). * wifi: ath12k: allow specific mgmt frame tx while vdev is not up (bsc#1227149). * wifi: ath12k: ath12k_start_vdev_delay(): convert to use ar (bsc#1227149). * wifi: ath12k: avoid deadlock by change ieee80211_queue_work for regd_update_work (bsc#1227149). * wifi: ath12k: avoid duplicated vdev stop (git-fixes). * wifi: ath12k: avoid explicit HW conversion argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid explicit RBM id argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid explicit mac id argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid repeated hw access from ar (bsc#1227149). * wifi: ath12k: avoid repeated wiphy access from hw (bsc#1227149). * wifi: ath12k: call ath12k_mac_fils_discovery() without condition (bsc#1227149). * wifi: ath12k: change DMA direction while mapping reinjected packets (git- fixes). * wifi: ath12k: change MAC buffer ring size to 2048 (bsc#1227149). * wifi: ath12k: change WLAN_SCAN_PARAMS_MAX_IE_LEN from 256 to 512 (bsc#1227149). * wifi: ath12k: change interface combination for P2P mode (bsc#1227149). * wifi: ath12k: change to initialize recovery variables earlier in ath12k_core_reset() (bsc#1227149). * wifi: ath12k: change to treat alpha code na as world wide regdomain (bsc#1227149). * wifi: ath12k: change to use dynamic memory for channel list of scan (bsc#1227149). * wifi: ath12k: check M3 buffer size as well whey trying to reuse it (bsc#1227149). * wifi: ath12k: check hardware major version for WCN7850 (bsc#1227149). * wifi: ath12k: configure RDDM size to MHI for device recovery (bsc#1227149). * wifi: ath12k: configure puncturing bitmap (bsc#1227149). * wifi: ath12k: correct the data_type from QMI_OPT_FLAG to QMI_UNSIGNED_1_BYTE for mlo_capable (bsc#1227149). * wifi: ath12k: delete the timer rx_replenish_retry during rmmod (bsc#1227149). * wifi: ath12k: designating channel frequency for ROC scan (bsc#1227149). * wifi: ath12k: disable QMI PHY capability learn in split-phy QCN9274 (bsc#1227149). * wifi: ath12k: do not drop data frames from unassociated stations (bsc#1227149). * wifi: ath12k: do not restore ASPM in case of single MSI vector (bsc#1227149). * wifi: ath12k: drop NULL pointer check in ath12k_update_per_peer_tx_stats() (bsc#1227149). * wifi: ath12k: drop failed transmitted frames from metric calculation (git- fixes). * wifi: ath12k: enable 320 MHz bandwidth for 6 GHz band in EHT PHY capability for WCN7850 (bsc#1227149). * wifi: ath12k: enable 802.11 power save mode in station mode (bsc#1227149). * wifi: ath12k: enable IEEE80211_HW_SINGLE_SCAN_ON_ALL_BANDS for WCN7850 (bsc#1227149). * wifi: ath12k: fetch correct pdev id from WMI_SERVICE_READY_EXT_EVENTID (bsc#1227149). * wifi: ath12k: fix PCI read and write (bsc#1227149). * wifi: ath12k: fix WARN_ON during ath12k_mac_update_vif_chan (bsc#1227149). * wifi: ath12k: fix broken structure wmi_vdev_create_cmd (bsc#1227149). * wifi: ath12k: fix conf_mutex in ath12k_mac_op_unassign_vif_chanctx() (bsc#1227149). * wifi: ath12k: fix debug messages (bsc#1227149). * wifi: ath12k: fix fetching MCBC flag for QCN9274 (bsc#1227149). * wifi: ath12k: fix firmware assert during insmod in memory segment mode (bsc#1227149). * wifi: ath12k: fix firmware crash during reo reinject (git-fixes). * wifi: ath12k: fix invalid m3 buffer address (bsc#1227149). * wifi: ath12k: fix invalid memory access while processing fragmented packets (git-fixes). * wifi: ath12k: fix kernel crash during resume (bsc#1227149). * wifi: ath12k: fix license in p2p.c and p2p.h (bsc#1227149). * wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes). * wifi: ath12k: fix peer metadata parsing (git-fixes). * wifi: ath12k: fix potential wmi_mgmt_tx_queue race condition (bsc#1227149). * wifi: ath12k: fix radar detection in 160 MHz (bsc#1227149). * wifi: ath12k: fix recovery fail while firmware crash when doing channel switch (bsc#1227149). * wifi: ath12k: fix the error handler of rfkill config (bsc#1227149). * wifi: ath12k: fix the issue that the multicast/broadcast indicator is not read correctly for WCN7850 (bsc#1227149). * wifi: ath12k: fix the problem that down grade phy mode operation (bsc#1227149). * wifi: ath12k: fix wrong definition of CE ring's base address (git-fixes). * wifi: ath12k: fix wrong definitions of hal_reo_update_rx_queue (bsc#1227149). * wifi: ath12k: get msi_data again after request_irq is called (bsc#1227149). * wifi: ath12k: implement handling of P2P NoA event (bsc#1227149). * wifi: ath12k: implement remain on channel for P2P mode (bsc#1227149). * wifi: ath12k: increase vdev setup timeout (bsc#1227149). * wifi: ath12k: indicate NON MBSSID vdev by default during vdev start (bsc#1227149). * wifi: ath12k: indicate scan complete for scan canceled when scan running (bsc#1227149). * wifi: ath12k: indicate to mac80211 scan complete with aborted flag for ATH12K_SCAN_STARTING state (bsc#1227149). * wifi: ath12k: move HE capabilities processing to a new function (bsc#1227149). * wifi: ath12k: move peer delete after vdev stop of station for WCN7850 (bsc#1227149). * wifi: ath12k: parse WMI service ready ext2 event (bsc#1227149). * wifi: ath12k: peer assoc for 320 MHz (bsc#1227149). * wifi: ath12k: prepare EHT peer assoc parameters (bsc#1227149). * wifi: ath12k: propagate EHT capabilities to userspace (bsc#1227149). * wifi: ath12k: refactor DP Rxdma ring structure (bsc#1227149). * wifi: ath12k: refactor QMI MLO host capability helper function (bsc#1227149). * wifi: ath12k: refactor ath12k_bss_assoc() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_allocate() and ath12k_mac_destroy() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_ampdu_action() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_conf_tx() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_config() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_configure_filter() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_flush() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_start() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_stop() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_update_vif_offload() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_register() and ath12k_mac_unregister() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_setup_channels_rates() (bsc#1227149). * wifi: ath12k: refactor ath12k_wmi_tlv_parse_alloc() (bsc#1227149). * wifi: ath12k: refactor multiple MSI vector implementation (bsc#1227149). * wifi: ath12k: refactor the rfkill worker (bsc#1227149). * wifi: ath12k: register EHT mesh capabilities (bsc#1227149). * wifi: ath12k: relax list iteration in ath12k_mac_vif_unref() (bsc#1227149). * wifi: ath12k: relocate ath12k_dp_pdev_pre_alloc() call (bsc#1227149). * wifi: ath12k: remove hal_desc_sz from hw params (bsc#1227149). * wifi: ath12k: remove redundant memset() in ath12k_hal_reo_qdesc_setup() (bsc#1227149). * wifi: ath12k: remove the unused scan_events from ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: remove unused ATH12K_BD_IE_BOARD_EXT (bsc#1227149). * wifi: ath12k: rename HE capabilities setup/copy functions (bsc#1227149). * wifi: ath12k: rename the sc naming convention to ab (bsc#1227149). * wifi: ath12k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149). * wifi: ath12k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath12k: send WMI_PEER_REORDER_QUEUE_SETUP_CMDID when ADDBA session starts (bsc#1227149). * wifi: ath12k: set IRQ affinity to CPU0 in case of one MSI vector (bsc#1227149). * wifi: ath12k: set PERST pin no pull request for WCN7850 (bsc#1227149). * wifi: ath12k: split hal_ops to support RX TLVs word mask compaction (bsc#1227149). * wifi: ath12k: subscribe required word mask from rx tlv (bsc#1227149). * wifi: ath12k: support default regdb while searching board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: trigger station disconnect on hardware restart (bsc#1227149). * wifi: ath12k: use ATH12K_PCI_IRQ_DP_OFFSET for DP IRQ (bsc#1227149). * wifi: ath12k: use correct flag field for 320 MHz channels (bsc#1227149). * wifi: ath12k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149). * wifi: ath5k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath5k: Remove redundant dev_err() (bsc#1227149). * wifi: ath5k: ath5k_hw_get_median_noise_floor(): use swap() (bsc#1227149). * wifi: ath5k: remove phydir check from ath5k_debug_init_device() (bsc#1227149). * wifi: ath5k: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath5k: remove unused ath5k_eeprom_info::ee_antenna (bsc#1227149). * wifi: ath5k: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: ath6kl: Remove error checking for debugfs_create_dir() (bsc#1227149). * wifi: ath6kl: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath6kl: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: ath9k: remove redundant assignment to variable ret (bsc#1227149). * wifi: ath9k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath9k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath9k: Remove unnecessary ternary operators (bsc#1227149). * wifi: ath9k: Remove unused declarations (bsc#1227149). * wifi: ath9k: avoid using uninitialized array (bsc#1227149). * wifi: ath9k: clean up function ath9k_hif_usb_resume (bsc#1227149). * wifi: ath9k: consistently use kstrtoX_from_user() functions (bsc#1227149). * wifi: ath9k: delete some unused/duplicate macros (bsc#1227149). * wifi: ath9k: fix parameter check in ath9k_init_debug() (bsc#1227149). * wifi: ath9k: reset survey of current channel after a scan started (bsc#1227149). * wifi: ath9k: simplify ar9003_hw_process_ini() (bsc#1227149). * wifi: ath9k: use u32 for txgain indexes (bsc#1227149). * wifi: ath9k: work around memset overflow warning (bsc#1227149). * wifi: ath9k_htc: fix format-truncation warning (bsc#1227149). * wifi: ath: Use is_multicast_ether_addr() to check multicast Ether address (bsc#1227149). * wifi: ath: dfs_pattern_detector: Use flex array to simplify code (bsc#1227149). * wifi: ath: remove unused-but-set parameter (bsc#1227149). * wifi: ath: work around false-positive stringop-overread warning (bsc#1227149). * wifi: atk10k: Do not opencode ath10k_pci_priv() in ath10k_ahb_priv() (bsc#1227149). * wifi: atmel: remove unused ioctl function (bsc#1227149). * wifi: b43: silence sparse warnings (bsc#1227149). * wifi: brcm80211: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: brcmfmac: Annotate struct brcmf_gscan_config with __counted_by (bsc#1227149). * wifi: brcmfmac: Detect corner error case earlier with log (bsc#1227149). * wifi: brcmfmac: add linefeed at end of file (bsc#1227149). * wifi: brcmfmac: allow per-vendor event handling (bsc#1227149). * wifi: brcmfmac: do not cast hidden SSID attribute value to boolean (bsc#1227149). * wifi: brcmfmac: do not pass hidden SSID attribute as value directly (bsc#1227149). * wifi: brcmfmac: export firmware interface functions (bsc#1227149). * wifi: brcmfmac: firmware: Annotate struct brcmf_fw_request with __counted_by (bsc#1227149). * wifi: brcmfmac: fix format-truncation warnings (bsc#1227149). * wifi: brcmfmac: fix gnu_printf warnings (bsc#1227149). * wifi: brcmfmac: fweh: Add __counted_by for struct brcmf_fweh_queue_item and use struct_size() (bsc#1227149). * wifi: brcmfmac: fweh: Fix boot crash on Raspberry Pi 4 (bsc#1227149). * wifi: brcmfmac: move feature overrides before feature_disable (bsc#1227149). * wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes). * wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes). * wifi: brcmsmac: cleanup SCB-related data types (bsc#1227149). * wifi: brcmsmac: fix gnu_printf warnings (bsc#1227149). * wifi: brcmsmac: phy: Remove unreachable code (bsc#1227149). * wifi: brcmsmac: remove more unused data types (bsc#1227149). * wifi: brcmsmac: remove unused data type (bsc#1227149). * wifi: brcmsmac: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: brcmsmac: silence sparse warnings (bsc#1227149). * wifi: brcmutil: use helper function pktq_empty() instead of open code (bsc#1227149). * wifi: carl9170: Remove redundant assignment to pointer super (bsc#1227149). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: carl9170: remove unnecessary (void*) conversions (bsc#1227149). * wifi: cfg80211: Add support for setting TID to link mapping (bsc#1227149). * wifi: cfg80211: Allow AP/P2PGO to indicate port authorization to peer STA/P2PClient (bsc#1227149). * wifi: cfg80211: Extend support for scanning while MLO connected (bsc#1227149). * wifi: cfg80211: Fix typo in documentation (bsc#1227149). * wifi: cfg80211: Handle specific BSSID in 6GHz scanning (bsc#1227149). * wifi: cfg80211: Include operating class 137 in 6GHz band (bsc#1227149). * wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes). * wifi: cfg80211: OWE DH IE handling offload (bsc#1227149). * wifi: cfg80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: cfg80211: Schedule regulatory check on BSS STA channel change (bsc#1227149). * wifi: cfg80211: Update the default DSCP-to-UP mapping (bsc#1227149). * wifi: cfg80211: add BSS usage reporting (bsc#1227149). * wifi: cfg80211: add RNR with reporting AP information (bsc#1227149). * wifi: cfg80211: add a flag to disable wireless extensions (bsc#1227149). * wifi: cfg80211: add local_state_change to deauth trace (bsc#1227149). * wifi: cfg80211: add locked debugfs wrappers (bsc#1227149). * wifi: cfg80211: add support for SPP A-MSDUs (bsc#1227149). * wifi: cfg80211: address several kerneldoc warnings (bsc#1227149). * wifi: cfg80211: allow reg update by driver even if wiphy->regd is set (bsc#1227149). * wifi: cfg80211: annotate iftype_data pointer with sparse (bsc#1227149). * wifi: cfg80211: avoid double free if updating BSS fails (bsc#1227149). * wifi: cfg80211: call reg_call_notifier on beacon hints (bsc#1227149). * wifi: cfg80211: check RTNL when iterating devices (bsc#1227149). * wifi: cfg80211: check wiphy mutex is held for wdev mutex (bsc#1227149). * wifi: cfg80211: consume both probe response and beacon IEs (bsc#1227149). * wifi: cfg80211: detect stuck ECSA element in probe resp (bsc#1227149). * wifi: cfg80211: ensure cfg80211_bss_update frees IEs on error (bsc#1227149). * wifi: cfg80211: export DFS CAC time and usable state helper functions (bsc#1227149). * wifi: cfg80211: expose nl80211_chan_width_to_mhz for wide sharing (bsc#1227149). * wifi: cfg80211: fix 6 GHz scan request building (stable-fixes). * wifi: cfg80211: fix CQM for non-range use (bsc#1227149). * wifi: cfg80211: fix header kernel-doc typos (bsc#1227149). * wifi: cfg80211: fix kernel-doc for wiphy_delayed_work_flush() (bsc#1227149). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: cfg80211: fix spelling & punctutation (bsc#1227149). * wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes). * wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes). * wifi: cfg80211: fully move wiphy work to unbound workqueue (git-fixes). * wifi: cfg80211: generate an ML element for per-STA profiles (bsc#1227149). * wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes). * wifi: cfg80211: handle UHB AP and STA power type (bsc#1227149). * wifi: cfg80211: hold wiphy lock in cfg80211_any_wiphy_oper_chan() (bsc#1227149). * wifi: cfg80211: hold wiphy mutex for send_interface (bsc#1227149). * wifi: cfg80211: improve documentation for flag fields (bsc#1227149). * wifi: cfg80211: introduce cfg80211_ssid_eq() (bsc#1227149). * wifi: cfg80211: make RX assoc data const (bsc#1227149). * wifi: cfg80211: make read-only array centers_80mhz static const (bsc#1227149). * wifi: cfg80211: modify prototype for change_beacon (bsc#1227149). * wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes). * wifi: cfg80211: reg: Support P2P operation on DFS channels (bsc#1227149). * wifi: cfg80211: reg: describe return values in kernel-doc (bsc#1227149). * wifi: cfg80211: reg: fix various kernel-doc issues (bsc#1227149). * wifi: cfg80211: reg: hold wiphy mutex for wdev iteration (bsc#1227149). * wifi: cfg80211: remove scan_width support (bsc#1227149). * wifi: cfg80211: remove wdev mutex (bsc#1227149). * wifi: cfg80211: rename UHB to 6 GHz (bsc#1227149). * wifi: cfg80211: report per-link errors during association (bsc#1227149). * wifi: cfg80211: report unprotected deauth/disassoc in wowlan (bsc#1227149). * wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes). * wifi: cfg80211: save power spectral density(psd) of regulatory rule (bsc#1227149). * wifi: cfg80211: set correct param change count in ML element (bsc#1227149). * wifi: cfg80211: sme: hold wiphy lock for wdev iteration (bsc#1227149). * wifi: cfg80211: sort certificates in build (bsc#1227149). * wifi: cfg80211: split struct cfg80211_ap_settings (bsc#1227149). * wifi: cfg80211: validate HE operation element parsing (bsc#1227149). * wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes). * wifi: cfg80211: wext: convert return value to kernel-doc (bsc#1227149). * wifi: cfg80211: wext: set ssids=NULL for passive scans (git-fixes). * wifi: cw1200: Avoid processing an invalid TIM IE (bsc#1227149). * wifi: cw1200: Convert to GPIO descriptors (bsc#1227149). * wifi: cw1200: fix __le16 sparse warnings (bsc#1227149). * wifi: cw1200: restore endian swapping (bsc#1227149). * wifi: drivers: Explicitly include correct DT includes (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for Broadcom WLAN (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for ar5523 (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for mt76 drivers (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for p54spi (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wcn36xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wilc1000 (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wl1251 and wl12xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wl18xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wlcore (bsc#1227149). * wifi: hostap: Add __counted_by for struct prism2_download_data and use struct_size() (bsc#1227149). * wifi: hostap: fix stringop-truncations GCC warning (bsc#1227149). * wifi: hostap: remove unused ioctl function (bsc#1227149). * wifi: ieee80211: add UL-bandwidth definition of trigger frame (bsc#1227149). * wifi: ieee80211: add definitions for negotiated TID to Link map (bsc#1227149). * wifi: ieee80211: check for NULL in ieee80211_mle_size_ok() (stable-fixes). * wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes). * wifi: iwlmei: do not send SAP messages if AMT is disabled (bsc#1227149). * wifi: iwlmei: do not send nic info with invalid mac address (bsc#1227149). * wifi: iwlmei: send HOST_GOES_DOWN message even if wiamt is disabled (bsc#1227149). * wifi: iwlmei: send driver down SAP message only if wiamt is enabled (bsc#1227149). * wifi: iwlmvm: fw: Add new OEM vendor to tas approved list (bsc#1227149). * wifi: iwlwifi: Add rf_mapping of new wifi7 devices (bsc#1227149). * wifi: iwlwifi: Add support for PPAG cmd v5 and PPAG revision 3 (bsc#1227149). * wifi: iwlwifi: Add support for new 802.11be device (bsc#1227149). * wifi: iwlwifi: Do not mark DFS channels as NO-IR (bsc#1227149). * wifi: iwlwifi: Extract common prph mac/phy regions data dump logic (bsc#1227149). * wifi: iwlwifi: Fix spelling mistake "SESION" -> "SESSION" (bsc#1227149). * wifi: iwlwifi: Use request_module_nowait (bsc#1227149). * wifi: iwlwifi: abort scan when rfkill on but device enabled (bsc#1227149). * wifi: iwlwifi: add HONOR to PPAG approved list (bsc#1227149). * wifi: iwlwifi: add Razer to ppag approved list (bsc#1227149). * wifi: iwlwifi: add mapping of a periphery register crf for WH RF (bsc#1227149). * wifi: iwlwifi: add new RF support for wifi7 (bsc#1227149). * wifi: iwlwifi: add support for SNPS DPHYIP region type (bsc#1227149). * wifi: iwlwifi: add support for a wiphy_work rx handler (bsc#1227149). * wifi: iwlwifi: add support for activating UNII-1 in WW via BIOS (bsc#1227149). * wifi: iwlwifi: add support for new ini region types (bsc#1227149). * wifi: iwlwifi: adjust rx_phyinfo debugfs to MLO (bsc#1227149). * wifi: iwlwifi: always have 'uats_enabled' (bsc#1227149). * wifi: iwlwifi: api: clean up some kernel-doc/typos (bsc#1227149). * wifi: iwlwifi: api: dbg-tlv: fix up kernel-doc (bsc#1227149). * wifi: iwlwifi: api: fix a small upper/lower-case typo (bsc#1227149). * wifi: iwlwifi: api: fix center_freq label in PHY diagram (bsc#1227149). * wifi: iwlwifi: api: fix constant version to match FW (bsc#1227149). * wifi: iwlwifi: api: fix kernel-doc reference (bsc#1227149). * wifi: iwlwifi: bump FW API to 84 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 86 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 87 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 88 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: cancel session protection only if there is one (bsc#1227149). * wifi: iwlwifi: change link id in time event to s8 (bsc#1227149). * wifi: iwlwifi: check for kmemdup() return value in iwl_parse_tlv_firmware() (bsc#1227149). * wifi: iwlwifi: cleanup BT Shared Single Antenna code (bsc#1227149). * wifi: iwlwifi: cleanup sending PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1227149). * wifi: iwlwifi: cleanup uefi variables loading (bsc#1227149). * wifi: iwlwifi: clear link_id in time_event (bsc#1227149). * wifi: iwlwifi: dbg-tlv: avoid extra allocation/copy (bsc#1227149). * wifi: iwlwifi: dbg-tlv: use struct_size() for allocation (bsc#1227149). * wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git- fixes). * wifi: iwlwifi: disable 160 MHz based on subsystem device ID (bsc#1227149). * wifi: iwlwifi: disable eSR when BT is active (bsc#1227149). * wifi: iwlwifi: disable multi rx queue for 9000 (bsc#1227149). * wifi: iwlwifi: do not check TAS block list size twice (bsc#1227149). * wifi: iwlwifi: do not use TRUE/FALSE with bool (bsc#1227149). * wifi: iwlwifi: drop NULL pointer check in iwl_mvm_tzone_set_trip_temp() (bsc#1227149). * wifi: iwlwifi: dvm: remove kernel-doc warnings (bsc#1227149). * wifi: iwlwifi: error-dump: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fail NIC access fast on dead NIC (bsc#1227149). * wifi: iwlwifi: fix #ifdef CONFIG_ACPI check (bsc#1227149). * wifi: iwlwifi: fix iwl_mvm_get_valid_rx_ant() (git-fixes). * wifi: iwlwifi: fix opmode start/stop race (bsc#1227149). * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fix system commands group ordering (bsc#1227149). * wifi: iwlwifi: fix the rf step and flavor bits range (bsc#1227149). * wifi: iwlwifi: fw: Add support for UATS table in UHB (bsc#1227149). * wifi: iwlwifi: fw: Fix debugfs command sending (bsc#1227149). * wifi: iwlwifi: fw: allow vmalloc for PNVM image (bsc#1227149). * wifi: iwlwifi: fw: dbg: ensure correct config name sizes (bsc#1227149). * wifi: iwlwifi: fw: disable firmware debug asserts (bsc#1227149). * wifi: iwlwifi: fw: file: clean up kernel-doc (bsc#1227149). * wifi: iwlwifi: fw: file: do not use [0] for variable arrays (bsc#1227149). * wifi: iwlwifi: fw: fix compiler warning for NULL string print (bsc#1227149). * wifi: iwlwifi: fw: increase fw_version string size (bsc#1227149). * wifi: iwlwifi: fw: reconstruct the API/CAPA enum number (bsc#1227149). * wifi: iwlwifi: fw: replace deprecated strncpy with strscpy_pad (bsc#1227149). * wifi: iwlwifi: handle per-phy statistics from fw (bsc#1227149). * wifi: iwlwifi: implement GLAI ACPI table loading (bsc#1227149). * wifi: iwlwifi: implement can_activate_links callback (bsc#1227149). * wifi: iwlwifi: implement enable/disable for China 2022 regulatory (bsc#1227149). * wifi: iwlwifi: iwl-fh.h: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: iwl-trans.h: clean up kernel-doc (bsc#1227149). * wifi: iwlwifi: iwlmvm: handle unprotected deauth/disassoc in d3 (bsc#1227149). * wifi: iwlwifi: load b0 version of ucode for HR1/HR2 (bsc#1227149). * wifi: iwlwifi: make TB reallocation a debug message (bsc#1227149). * wifi: iwlwifi: make time_events MLO aware (bsc#1227149). * wifi: iwlwifi: mei: return error from register when not built (bsc#1227149). * wifi: iwlwifi: mvm: Add basic link selection logic (bsc#1227149). * wifi: iwlwifi: mvm: Add support for removing responder TKs (bsc#1227149). * wifi: iwlwifi: mvm: Allow DFS concurrent operation (bsc#1227149). * wifi: iwlwifi: mvm: Configure the link mapping for non-MLD FW (bsc#1227149). * wifi: iwlwifi: mvm: Correctly report TSF data in scan complete (bsc#1227149). * wifi: iwlwifi: mvm: Declare support for secure LTF measurement (bsc#1227149). * wifi: iwlwifi: mvm: Do not warn if valid link pair was not found (bsc#1227149). * wifi: iwlwifi: mvm: Do not warn on invalid link on scan complete (bsc#1227149). * wifi: iwlwifi: mvm: Extend support for P2P service discovery (bsc#1227149). * wifi: iwlwifi: mvm: Fix FTM initiator flags (bsc#1227149). * wifi: iwlwifi: mvm: Fix scan abort handling with HW rfkill (stable-fixes). * wifi: iwlwifi: mvm: Fix unreachable code path (bsc#1227149). * wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes). * wifi: iwlwifi: mvm: Keep connection in case of missed beacons during RX (bsc#1227149). * wifi: iwlwifi: mvm: Return success if link could not be removed (bsc#1227149). * wifi: iwlwifi: mvm: Use the link ID provided in scan request (bsc#1227149). * wifi: iwlwifi: mvm: add US/Canada MCC to API (bsc#1227149). * wifi: iwlwifi: mvm: add a debug print when we get a BAR (bsc#1227149). * wifi: iwlwifi: mvm: add a debugfs hook to clear the monitor data (bsc#1227149). * wifi: iwlwifi: mvm: add a per-link debugfs (bsc#1227149). * wifi: iwlwifi: mvm: add a print when sending RLC command (bsc#1227149). * wifi: iwlwifi: mvm: add start mac ctdp sum calculation debugfs handler (bsc#1227149). * wifi: iwlwifi: mvm: add support for TID to link mapping neg request (bsc#1227149). * wifi: iwlwifi: mvm: add support for new wowlan_info_notif (bsc#1227149). * wifi: iwlwifi: mvm: advertise MLO only if EHT is enabled (bsc#1227149). * wifi: iwlwifi: mvm: advertise support for SCS traffic description (bsc#1227149). * wifi: iwlwifi: mvm: advertise support for protected ranging negotiation (bsc#1227149). * wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes). * wifi: iwlwifi: mvm: always update keys in D3 exit (bsc#1227149). * wifi: iwlwifi: mvm: avoid garbage iPN (bsc#1227149). * wifi: iwlwifi: mvm: calculate EMLSR mode after connection (bsc#1227149). * wifi: iwlwifi: mvm: check AP supports EMLSR (bsc#1227149). * wifi: iwlwifi: mvm: check for iwl_mvm_mld_update_sta() errors (bsc#1227149). * wifi: iwlwifi: mvm: check link more carefully (bsc#1227149). * wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes). * wifi: iwlwifi: mvm: check own capabilities for EMLSR (bsc#1227149). * wifi: iwlwifi: mvm: cleanup MLO and non-MLO unification code (bsc#1227149). * wifi: iwlwifi: mvm: combine condition/warning (bsc#1227149). * wifi: iwlwifi: mvm: consider having one active link (bsc#1227149). * wifi: iwlwifi: mvm: const-ify chandef pointers (bsc#1227149). * wifi: iwlwifi: mvm: cycle FW link on chanctx removal (bsc#1227149). * wifi: iwlwifi: mvm: d3: avoid intermediate/early mutex unlock (bsc#1227149). * wifi: iwlwifi: mvm: d3: disconnect on GTK rekey failure (bsc#1227149). * wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes). * wifi: iwlwifi: mvm: d3: implement suspend with MLO (bsc#1227149). * wifi: iwlwifi: mvm: debugfs for fw system stats (bsc#1227149). * wifi: iwlwifi: mvm: define RX queue sync timeout as a macro (bsc#1227149). * wifi: iwlwifi: mvm: disable MLO for the time being (bsc#1227149). * wifi: iwlwifi: mvm: disallow puncturing in US/Canada (bsc#1227149). * wifi: iwlwifi: mvm: disconnect long CSA only w/o alternative (bsc#1227149). * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (bsc#1227149). * wifi: iwlwifi: mvm: do not abort queue sync in CT-kill (bsc#1227149). * wifi: iwlwifi: mvm: do not add dummy phy context (bsc#1227149). * wifi: iwlwifi: mvm: do not always disable EMLSR due to BT coex (bsc#1227149). * wifi: iwlwifi: mvm: do not do duplicate detection for nullfunc packets (bsc#1227149). * wifi: iwlwifi: mvm: do not initialize csa_work twice (git-fixes). * wifi: iwlwifi: mvm: do not limit VLP/AFC to UATS-enabled (git-fixes). * wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes). * wifi: iwlwifi: mvm: do not send BT_COEX_CI command on new devices (bsc#1227149). * wifi: iwlwifi: mvm: do not send NDPs for new tx devices (bsc#1227149). * wifi: iwlwifi: mvm: do not send STA_DISABLE_TX_CMD for newer firmware (bsc#1227149). * wifi: iwlwifi: mvm: do not send the smart fifo command if not needed (bsc#1227149). * wifi: iwlwifi: mvm: do not set trigger frame padding in AP mode (bsc#1227149). * wifi: iwlwifi: mvm: do not support reduced tx power on ack for new devices (bsc#1227149). * wifi: iwlwifi: mvm: do not wake up rx_sync_waitq upon RFKILL (git-fixes). * wifi: iwlwifi: mvm: enable FILS DF Tx on non-PSC channel (bsc#1227149). * wifi: iwlwifi: mvm: enable HE TX/RX <242 tone RU on new RFs (bsc#1227149). * wifi: iwlwifi: mvm: expand queue sync warning messages (bsc#1227149). * wifi: iwlwifi: mvm: extend alive timeout to 2 seconds (bsc#1227149). * wifi: iwlwifi: mvm: fix ROC version check (bsc#1227149). * wifi: iwlwifi: mvm: fix SB CFG check (bsc#1227149). * wifi: iwlwifi: mvm: fix a battery life regression (bsc#1227149). * wifi: iwlwifi: mvm: fix a crash on 7265 (bsc#1227149). * wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes). * wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes). * wifi: iwlwifi: mvm: fix kernel-doc (bsc#1227149). * wifi: iwlwifi: mvm: fix link ID management (bsc#1227149). * wifi: iwlwifi: mvm: fix recovery flow in CSA (bsc#1227149). * wifi: iwlwifi: mvm: fix regdb initialization (bsc#1227149). * wifi: iwlwifi: mvm: fix the PHY context resolution for p2p device (bsc#1227149). * wifi: iwlwifi: mvm: fix the TXF mapping for BZ devices (bsc#1227149). * wifi: iwlwifi: mvm: fix the key PN index (bsc#1227149). * wifi: iwlwifi: mvm: fix thermal kernel-doc (bsc#1227149). * wifi: iwlwifi: mvm: fold the ref++ into iwl_mvm_phy_ctxt_add (bsc#1227149). * wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes). * wifi: iwlwifi: mvm: handle BA session teardown in RF-kill (stable-fixes). * wifi: iwlwifi: mvm: handle debugfs names more carefully (bsc#1227149). * wifi: iwlwifi: mvm: handle link-STA allocation in restart (bsc#1227149). * wifi: iwlwifi: mvm: implement ROC version 3 (bsc#1227149). * wifi: iwlwifi: mvm: implement new firmware API for statistics (bsc#1227149). * wifi: iwlwifi: mvm: increase session protection after CSA (bsc#1227149). * wifi: iwlwifi: mvm: init vif works only once (git-fixes). * wifi: iwlwifi: mvm: introduce PHY_CONTEXT_CMD_API_VER_5 (bsc#1227149). * wifi: iwlwifi: mvm: introduce esr_disable_reason (bsc#1227149). * wifi: iwlwifi: mvm: iterate active links for STA queues (bsc#1227149). * wifi: iwlwifi: mvm: limit EHT 320 MHz MCS for STEP URM (bsc#1227149). * wifi: iwlwifi: mvm: limit pseudo-D3 to 60 seconds (bsc#1227149). * wifi: iwlwifi: mvm: log dropped frames (bsc#1227149). * wifi: iwlwifi: mvm: log dropped packets due to MIC error (bsc#1227149). * wifi: iwlwifi: mvm: make "pldr_sync" mode effective (bsc#1227149). * wifi: iwlwifi: mvm: make functions public (bsc#1227149). * wifi: iwlwifi: mvm: make pldr_sync AX210 specific (bsc#1227149). * wifi: iwlwifi: mvm: move BA notif messages before action (bsc#1227149). * wifi: iwlwifi: mvm: move RU alloc B2 placement (bsc#1227149). * wifi: iwlwifi: mvm: move listen interval to constants (bsc#1227149). * wifi: iwlwifi: mvm: offload IGTK in AP if BIGTK is supported (bsc#1227149). * wifi: iwlwifi: mvm: partially support PHY context version 6 (bsc#1227149). * wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (bsc#1227149). * wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable- fixes). * wifi: iwlwifi: mvm: reduce maximum RX A-MPDU size (bsc#1227149). * wifi: iwlwifi: mvm: refactor TX rate handling (bsc#1227149). * wifi: iwlwifi: mvm: refactor duplicate chanctx condition (bsc#1227149). * wifi: iwlwifi: mvm: remove EHT code from mac80211.c (bsc#1227149). * wifi: iwlwifi: mvm: remove IWL_MVM_STATUS_NEED_FLUSH_P2P (bsc#1227149). * wifi: iwlwifi: mvm: remove flags for enable/disable beacon filter (bsc#1227149). * wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git- fixes). * wifi: iwlwifi: mvm: remove one queue sync on BA session stop (bsc#1227149). * wifi: iwlwifi: mvm: remove set_tim callback for MLD ops (bsc#1227149). * wifi: iwlwifi: mvm: remove stale STA link data during restart (stable- fixes). * wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes). * wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes). * wifi: iwlwifi: mvm: rework debugfs handling (bsc#1227149). * wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes). * wifi: iwlwifi: mvm: set properly mac header (git-fixes). * wifi: iwlwifi: mvm: show dump even for pldr_sync (bsc#1227149). * wifi: iwlwifi: mvm: show skb_mac_gso_segment() failure reason (bsc#1227149). * wifi: iwlwifi: mvm: simplify the reorder buffer (bsc#1227149). * wifi: iwlwifi: mvm: skip adding debugfs symlink for reconfig (bsc#1227149). * wifi: iwlwifi: mvm: support CSA with MLD (bsc#1227149). * wifi: iwlwifi: mvm: support SPP A-MSDUs (bsc#1227149). * wifi: iwlwifi: mvm: support flush on AP interfaces (bsc#1227149). * wifi: iwlwifi: mvm: support injection antenna control (bsc#1227149). * wifi: iwlwifi: mvm: support iwl_dev_tx_power_cmd_v8 (bsc#1227149). * wifi: iwlwifi: mvm: support set_antenna() (bsc#1227149). * wifi: iwlwifi: mvm: unlock mvm if there is no primary link (bsc#1227149). * wifi: iwlwifi: mvm: use fast balance scan in case of an active P2P GO (bsc#1227149). * wifi: iwlwifi: mvm: use the new command to clear the internal buffer (bsc#1227149). * wifi: iwlwifi: mvm: work around A-MSDU size problem (bsc#1227149). * wifi: iwlwifi: no power save during transition to D3 (bsc#1227149). * wifi: iwlwifi: nvm-parse: advertise common packet padding (bsc#1227149). * wifi: iwlwifi: nvm: parse the VLP/AFC bit from regulatory (bsc#1227149). * wifi: iwlwifi: pcie: (re-)assign BAR0 on driver bind (bsc#1227149). * wifi: iwlwifi: pcie: Add new PCI device id and CNVI (bsc#1227149). * wifi: iwlwifi: pcie: clean up WFPM control bits (bsc#1227149). * wifi: iwlwifi: pcie: clean up device removal work (bsc#1227149). * wifi: iwlwifi: pcie: clean up gen1/gen2 TFD unmap (bsc#1227149). * wifi: iwlwifi: pcie: do not allow hw-rfkill to stop device on gen2 (bsc#1227149). * wifi: iwlwifi: pcie: dump CSRs before removal (bsc#1227149). * wifi: iwlwifi: pcie: enable TOP fatal error interrupt (bsc#1227149). * wifi: iwlwifi: pcie: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: pcie: get_crf_id() can be void (bsc#1227149). * wifi: iwlwifi: pcie: give up mem read if HW is dead (bsc#1227149). * wifi: iwlwifi: pcie: move gen1 TB handling to header (bsc#1227149). * wifi: iwlwifi: pcie: point invalid TFDs to invalid data (bsc#1227149). * wifi: iwlwifi: pcie: propagate iwl_pcie_gen2_apm_init() error (bsc#1227149). * wifi: iwlwifi: pcie: rescan bus if no parent (bsc#1227149). * wifi: iwlwifi: prepare for reading DSM from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading PPAG table from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading SAR tables from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading SPLC from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading TAS table from UEFI (bsc#1227149). * wifi: iwlwifi: properly check if link is active (bsc#1227149). * wifi: iwlwifi: properly set WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK (stable-fixes). * wifi: iwlwifi: queue: fix kernel-doc (bsc#1227149). * wifi: iwlwifi: queue: improve warning for no skb in reclaim (bsc#1227149). * wifi: iwlwifi: queue: move iwl_txq_gen2_set_tb() up (bsc#1227149). * wifi: iwlwifi: read DSM func 2 for specific RF types (bsc#1227149). * wifi: iwlwifi: read DSM functions from UEFI (bsc#1227149). * wifi: iwlwifi: read ECKV table from UEFI (bsc#1227149). * wifi: iwlwifi: read PPAG table from UEFI (bsc#1227149). * wifi: iwlwifi: read SAR tables from UEFI (bsc#1227149). * wifi: iwlwifi: read SPLC from UEFI (bsc#1227149). * wifi: iwlwifi: read WRDD table from UEFI (bsc#1227149). * wifi: iwlwifi: read WTAS table from UEFI (bsc#1227149). * wifi: iwlwifi: read mac step from aux register (bsc#1227149). * wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes). * wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes). * wifi: iwlwifi: refactor RX tracing (bsc#1227149). * wifi: iwlwifi: remove 'def_rx_queue' struct member (bsc#1227149). * wifi: iwlwifi: remove Gl A-step remnants (bsc#1227149). * wifi: iwlwifi: remove WARN from read_mem32() (bsc#1227149). * wifi: iwlwifi: remove async command callback (bsc#1227149). * wifi: iwlwifi: remove dead-code (bsc#1227149). * wifi: iwlwifi: remove extra kernel-doc (bsc#1227149). * wifi: iwlwifi: remove memory check for LMAC error address (bsc#1227149). * wifi: iwlwifi: remove retry loops in start (bsc#1227149). * wifi: iwlwifi: remove unused function prototype (bsc#1227149). * wifi: iwlwifi: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: iwlwifi: return negative -EINVAL instead of positive EINVAL (bsc#1227149). * wifi: iwlwifi: rfi: use a single DSM function for all RFI configurations (bsc#1227149). * wifi: iwlwifi: send EDT table to FW (bsc#1227149). * wifi: iwlwifi: separate TAS 'read-from-BIOS' and 'send-to-FW' flows (bsc#1227149). * wifi: iwlwifi: simplify getting DSM from ACPI (bsc#1227149). * wifi: iwlwifi: skip affinity setting on non-SMP (bsc#1227149). * wifi: iwlwifi: skip opmode start retries on dead transport (bsc#1227149). * wifi: iwlwifi: small cleanups in PPAG table flows (bsc#1227149). * wifi: iwlwifi: support link command version 2 (bsc#1227149). * wifi: iwlwifi: support link id in SESSION_PROTECTION_NOTIF (bsc#1227149). * wifi: iwlwifi: support link_id in SESSION_PROTECTION cmd (bsc#1227149). * wifi: iwlwifi: take SGOM and UATS code out of ACPI ifdef (bsc#1227149). * wifi: iwlwifi: take send-DSM-to-FW flows out of ACPI ifdef (bsc#1227149). * wifi: iwlwifi: trace full frames with TX status request (bsc#1227149). * wifi: iwlwifi: update context info structure definitions (bsc#1227149). * wifi: iwlwifi: use system_unbound_wq for debug dump (bsc#1227149). * wifi: iwlwifi: validate PPAG table when sent to FW (bsc#1227149). * wifi: lib80211: remove unused variables iv32 and iv16 (bsc#1227149). * wifi: libertas: Follow renaming of SPI "master" to "controller" (bsc#1227149). * wifi: libertas: add missing calls to cancel_work_sync() (bsc#1227149). * wifi: libertas: cleanup SDIO reset (bsc#1227149). * wifi: libertas: handle possible spu_write_u16() errors (bsc#1227149). * wifi: libertas: prefer kstrtoX() for simple integer conversions (bsc#1227149). * wifi: libertas: simplify list operations in free_if_spi_card() (bsc#1227149). * wifi: libertas: use convenient lists to manage SDIO packets (bsc#1227149). * wifi: mac80211: Add __counted_by for struct ieee802_11_elems and use struct_size() (bsc#1227149). * wifi: mac80211: Avoid address calculations via out of bounds array indexing (stable-fixes). * wifi: mac80211: Check if we had first beacon with relevant links (bsc#1227149). * wifi: mac80211: Do not force off-channel for management Tx with MLO (bsc#1227149). * wifi: mac80211: Do not include crypto/algapi.h (bsc#1227149). * wifi: mac80211: Extend support for scanning while MLO connected (bsc#1227149). * wifi: mac80211: Fix SMPS handling in the context of MLO (bsc#1227149). * wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git- fixes). * wifi: mac80211: Notify the low level driver on change in MLO valid links (bsc#1227149). * wifi: mac80211: Print local link address during authentication (bsc#1227149). * wifi: mac80211: Recalc offload when monitor stop (git-fixes). * wifi: mac80211: Remove unused function declarations (bsc#1227149). * wifi: mac80211: Rename and update IEEE80211_VIF_DISABLE_SMPS_OVERRIDE (bsc#1227149). * wifi: mac80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: mac80211: Sanity check tx bitrate if not provided by driver (bsc#1227149). * wifi: mac80211: Schedule regulatory channels check on bandwith change (bsc#1227149). * wifi: mac80211: Skip association timeout update after comeback rejection (bsc#1227149). * wifi: mac80211: add a driver callback to add vif debugfs (bsc#1227149). * wifi: mac80211: add a driver callback to check active_links (bsc#1227149). * wifi: mac80211: add a flag to disallow puncturing (bsc#1227149). * wifi: mac80211: add back SPDX identifier (bsc#1227149). * wifi: mac80211: add ieee80211_tdls_sta_link_id() (stable-fixes). * wifi: mac80211: add link id to ieee80211_gtk_rekey_add() (bsc#1227149). * wifi: mac80211: add link id to mgd_prepare_tx() (bsc#1227149). * wifi: mac80211: add more ops assertions (bsc#1227149). * wifi: mac80211: add more warnings about inserting sta info (bsc#1227149). * wifi: mac80211: add support for SPP A-MSDUs (bsc#1227149). * wifi: mac80211: add support for mld in ieee80211_chswitch_done (bsc#1227149). * wifi: mac80211: add support for parsing TID to Link mapping element (bsc#1227149). * wifi: mac80211: add/remove driver debugfs entries as appropriate (bsc#1227149). * wifi: mac80211: additions to change_beacon() (bsc#1227149). * wifi: mac80211: address some kerneldoc warnings (bsc#1227149). * wifi: mac80211: allow 64-bit radiotap timestamps (bsc#1227149). * wifi: mac80211: allow for_each_sta_active_link() under RCU (bsc#1227149). * wifi: mac80211: apply mcast rate only if interface is up (stable-fixes). * wifi: mac80211: cancel multi-link reconf work on disconnect (git-fixes). * wifi: mac80211: chanctx emulation set CHANGE_CHANNEL when in_reconfig (git- fixes). * wifi: mac80211: check EHT/TTLM action frame length (bsc#1227149). * wifi: mac80211: check wiphy mutex in ops (bsc#1227149). * wifi: mac80211: clean up assignments to pointer cache (stable-fixes). * wifi: mac80211: cleanup airtime arithmetic with ieee80211_sta_keep_active() (bsc#1227149). * wifi: mac80211: cleanup auth_data only if association continues (bsc#1227149). * wifi: mac80211: convert A-MPDU work to wiphy work (bsc#1227149). * wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git- fixes). * wifi: mac80211: correctly set active links upon TTLM (bsc#1227149). * wifi: mac80211: correcty limit wider BW TDLS STAs (git-fixes). * wifi: mac80211: debugfs: lock wiphy instead of RTNL (bsc#1227149). * wifi: mac80211: describe return values in kernel-doc (bsc#1227149). * wifi: mac80211: disable softirqs for queued frame handling (git-fixes). * wifi: mac80211: do not connect to an AP while it's in a CSA process (bsc#1227149). * wifi: mac80211: do not re-add debugfs entries during resume (bsc#1227149). * wifi: mac80211: do not select link ID if not provided in scan request (bsc#1227149). * wifi: mac80211: do not set ESS capab bit in assoc request (bsc#1227149). * wifi: mac80211: do not use rate mask for scanning (stable-fixes). * wifi: mac80211: drop robust action frames before assoc (bsc#1227149). * wifi: mac80211: drop spurious WARN_ON() in ieee80211_ibss_csa_beacon() (bsc#1227149). * wifi: mac80211: ensure beacon is non-S1G prior to extracting the beacon timestamp field (stable-fixes). * wifi: mac80211: ethtool: always hold wiphy mutex (bsc#1227149). * wifi: mac80211: ethtool: hold wiphy mutex (bsc#1227149). * wifi: mac80211: expand __ieee80211_data_to_8023() status (bsc#1227149). * wifi: mac80211: extend wiphy lock in interface removal (bsc#1227149). * wifi: mac80211: fix BA session teardown race (bsc#1227149). * wifi: mac80211: fix BSS_CHANGED_UNSOL_BCAST_PROBE_RESP (bsc#1227149). * wifi: mac80211: fix SMPS status handling (bsc#1227149). * wifi: mac80211: fix TXQ error path and cleanup (bsc#1227149). * wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes). * wifi: mac80211: fix a expired vs. cancel race in roc (bsc#1227149). * wifi: mac80211: fix advertised TTLM scheduling (bsc#1227149). * wifi: mac80211: fix another key installation error path (bsc#1227149). * wifi: mac80211: fix change_address deadlock during unregister (bsc#1227149). * wifi: mac80211: fix channel switch link data (bsc#1227149). * wifi: mac80211: fix driver debugfs for vif type change (bsc#1227149). * wifi: mac80211: fix error path key leak (bsc#1227149). * wifi: mac80211: fix header kernel-doc typos (bsc#1227149). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mac80211: fix ieee80211_drop_unencrypted_mgmt return type/value (bsc#1227149). * wifi: mac80211: fix monitor channel with chanctx emulation (bsc#1227149). * wifi: mac80211: fix potential key leak (bsc#1227149). * wifi: mac80211: fix prep_connection error path (stable-fixes). * wifi: mac80211: fix spelling typo in comment (bsc#1227149). * wifi: mac80211: fix unaligned le16 access (git-fixes). * wifi: mac80211: fix unsolicited broadcast probe config (bsc#1227149). * wifi: mac80211: fix various kernel-doc issues (bsc#1227149). * wifi: mac80211: fixes in FILS discovery updates (bsc#1227149). * wifi: mac80211: flush STA queues on unauthorization (bsc#1227149). * wifi: mac80211: flush wiphy work where appropriate (bsc#1227149). * wifi: mac80211: handle debugfs when switching to/from MLO (bsc#1227149). * wifi: mac80211: handle tasklet frames before stopping (stable-fixes). * wifi: mac80211: hold wiphy lock in netdev/link debugfs (bsc#1227149). * wifi: mac80211: hold wiphy_lock around concurrency checks (bsc#1227149). * wifi: mac80211: improve CSA/ECSA connection refusal (bsc#1227149). * wifi: mac80211: initialize SMPS mode correctly (bsc#1227149). * wifi: mac80211: lock wiphy for aggregation debugfs (bsc#1227149). * wifi: mac80211: lock wiphy in IP address notifier (bsc#1227149). * wifi: mac80211: make mgd_protect_tdls_discover MLO-aware (bsc#1227149). * wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes). * wifi: mac80211: mesh: Remove unused function declaration mesh_ids_set_default() (bsc#1227149). * wifi: mac80211: mesh: fix some kdoc warnings (bsc#1227149). * wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes). * wifi: mac80211: move CSA finalize to wiphy work (bsc#1227149). * wifi: mac80211: move DFS CAC work to wiphy work (bsc#1227149). * wifi: mac80211: move TDLS work to wiphy work (bsc#1227149). * wifi: mac80211: move color change finalize to wiphy work (bsc#1227149). * wifi: mac80211: move dynamic PS to wiphy work (bsc#1227149). * wifi: mac80211: move filter reconfig to wiphy work (bsc#1227149). * wifi: mac80211: move key tailroom work to wiphy work (bsc#1227149). * wifi: mac80211: move link activation work to wiphy work (bsc#1227149). * wifi: mac80211: move monitor work to wiphy work (bsc#1227149). * wifi: mac80211: move tspec work to wiphy work (bsc#1227149). * wifi: mac80211: process and save negotiated TID to Link mapping request (bsc#1227149). * wifi: mac80211: purge TX queues in flush_queues flow (bsc#1227149). * wifi: mac80211: reduce iflist_mtx (bsc#1227149). * wifi: mac80211: reject MLO channel configuration if not supported (bsc#1227149). * wifi: mac80211: relax RCU check in for_each_vif_active_link() (bsc#1227149). * wifi: mac80211: remove RX_DROP_UNUSABLE (bsc#1227149). * wifi: mac80211: remove ampdu_mlme.mtx (bsc#1227149). * wifi: mac80211: remove chanctx_mtx (bsc#1227149). * wifi: mac80211: remove key_mtx (bsc#1227149). * wifi: mac80211: remove link before AP (git-fixes). * wifi: mac80211: remove local->mtx (bsc#1227149). * wifi: mac80211: remove redundant ML element check (bsc#1227149). * wifi: mac80211: remove shifted rate support (bsc#1227149). * wifi: mac80211: remove sta_mtx (bsc#1227149). * wifi: mac80211: remove unnecessary struct forward declaration (bsc#1227149). * wifi: mac80211: rename ieee80211_tx_status() to ieee80211_tx_status_skb() (bsc#1227149). * wifi: mac80211: rename struct cfg80211_rx_assoc_resp to cfg80211_rx_assoc_resp_data (bsc#1227149). * wifi: mac80211: report per-link error during association (bsc#1227149). * wifi: mac80211: reset negotiated TTLM on disconnect (git-fixes). * wifi: mac80211: rework RX timestamp flags (bsc#1227149). * wifi: mac80211: rework ack_frame_id handling a bit (bsc#1227149). * wifi: mac80211: rx.c: fix sentence grammar (bsc#1227149). * wifi: mac80211: set wiphy for virtual monitors (bsc#1227149). * wifi: mac80211: simplify non-chanctx drivers (bsc#1227149). * wifi: mac80211: split ieee80211_drop_unencrypted_mgmt() return value (bsc#1227149). * wifi: mac80211: sta_info.c: fix sentence grammar (bsc#1227149). * wifi: mac80211: support antenna control in injection (bsc#1227149). * wifi: mac80211: support handling of advertised TID-to-link mapping (bsc#1227149). * wifi: mac80211: take MBSSID/EHT data also from probe resp (bsc#1227149). * wifi: mac80211: take wiphy lock for MAC addr change (bsc#1227149). * wifi: mac80211: tx: clarify conditions in if statement (bsc#1227149). * wifi: mac80211: update beacon counters per link basis (bsc#1227149). * wifi: mac80211: update some locking documentation (bsc#1227149). * wifi: mac80211: update the rx_chains after set_antenna() (bsc#1227149). * wifi: mac80211: use bandwidth indication element for CSA (bsc#1227149). * wifi: mac80211: use deflink and fix typo in link ID check (bsc#1227149). * wifi: mac80211: use wiphy locked debugfs for sdata/link (bsc#1227149). * wifi: mac80211: use wiphy locked debugfs helpers for agg_status (bsc#1227149). * wifi: mac80211_hwsim: init peer measurement result (git-fixes). * wifi: mt7601u: delete dead code checking debugfs returns (bsc#1227149). * wifi: mt7601u: replace strlcpy() with strscpy() (bsc#1227149). * wifi: mt76: Annotate struct mt76_rx_tid with __counted_by (bsc#1227149). * wifi: mt76: Convert to platform remove callback returning void (bsc#1227149). * wifi: mt76: Remove redundant assignment to variable tidno (bsc#1227149). * wifi: mt76: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: mt76: Replace strlcpy() with strscpy() (bsc#1227149). * wifi: mt76: Use PTR_ERR_OR_ZERO() to simplify code (bsc#1227149). * wifi: mt76: add DMA mapping error check in mt76_alloc_txwi() (bsc#1227149). * wifi: mt76: add ability to explicitly forbid LED registration with DT (bsc#1227149). * wifi: mt76: add support for providing eeprom in nvmem cells (bsc#1227149). * wifi: mt76: add tx_nss histogram to ethtool stats (bsc#1227149). * wifi: mt76: change txpower init to per-phy (bsc#1227149). * wifi: mt76: check sta rx control frame to multibss capability (bsc#1227149). * wifi: mt76: check txs format before getting skb by pid (bsc#1227149). * wifi: mt76: check vif type before reporting cca and csa (bsc#1227149). * wifi: mt76: connac: add MBSSID support for mt7996 (bsc#1227149). * wifi: mt76: connac: add beacon duplicate TX mode support for mt7996 (bsc#1227149). * wifi: mt76: connac: add beacon protection support for mt7996 (bsc#1227149). * wifi: mt76: connac: add connac3 mac library (bsc#1227149). * wifi: mt76: connac: add data field in struct tlv (bsc#1227149). * wifi: mt76: connac: add eht support for phy mode config (bsc#1227149). * wifi: mt76: connac: add eht support for tx power (bsc#1227149). * wifi: mt76: connac: add firmware support for mt7992 (bsc#1227149). * wifi: mt76: connac: add more unified command IDs (bsc#1227149). * wifi: mt76: connac: add more unified event IDs (bsc#1227149). * wifi: mt76: connac: add new definition of tx descriptor (bsc#1227149). * wifi: mt76: connac: add support for dsp firmware download (bsc#1227149). * wifi: mt76: connac: add support to set ifs time by mcu command (bsc#1227149). * wifi: mt76: connac: add thermal protection support for mt7996 (bsc#1227149). * wifi: mt76: connac: check for null before dereferencing (bsc#1227149). * wifi: mt76: connac: export functions for mt7925 (bsc#1227149). * wifi: mt76: connac: introduce helper for mt7925 chipset (bsc#1227149). * wifi: mt76: connac: set correct muar_idx for mt799x chipsets (bsc#1227149). * wifi: mt76: connac: set fixed_bw bit in TX descriptor for fixed rate frames (bsc#1227149). * wifi: mt76: connac: use muar idx 0xe for non-mt799x as well (bsc#1227149). * wifi: mt76: disable HW AMSDU when using fixed rate (bsc#1227149). * wifi: mt76: dma: introduce __mt76_dma_queue_reset utility routine (bsc#1227149). * wifi: mt76: enable UNII-4 channel 177 support (bsc#1227149). * wifi: mt76: fix race condition related to checking tx queue fill status (bsc#1227149). * wifi: mt76: fix the issue of missing txpwr settings from ch153 to ch177 (bsc#1227149). * wifi: mt76: fix typo in mt76_get_of_eeprom_from_nvmem function (bsc#1227149). * wifi: mt76: increase MT_QFLAG_WED_TYPE size (bsc#1227149). * wifi: mt76: introduce mt76_queue_is_wed_tx_free utility routine (bsc#1227149). * wifi: mt76: introduce wed pointer in mt76_queue (bsc#1227149). * wifi: mt76: limit support of precal loading for mt7915 to MTD only (bsc#1227149). * wifi: mt76: make mt76_get_of_eeprom static again (bsc#1227149). * wifi: mt76: mmio: move mt76_mmio_wed_{init,release}_rx_buf in common code (bsc#1227149). * wifi: mt76: move ampdu_state in mt76_wcid (bsc#1227149). * wifi: mt76: move mt76_mmio_wed_offload_{enable,disable} in common code (bsc#1227149). * wifi: mt76: move mt76_net_setup_tc in common code (bsc#1227149). * wifi: mt76: move rate info in mt76_vif (bsc#1227149). * wifi: mt76: move wed reset common code in mt76 module (bsc#1227149). * wifi: mt76: mt7603: add missing register initialization for MT7628 (bsc#1227149). * wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes). * wifi: mt76: mt7603: disable A-MSDU tx support on MT7628 (bsc#1227149). * wifi: mt76: mt7603: fix beacon interval after disabling a single vif (bsc#1227149). * wifi: mt76: mt7603: fix tx filter/flush function (bsc#1227149). * wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes). * wifi: mt76: mt7603: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7603: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7615: add missing chanctx ops (bsc#1227149). * wifi: mt76: mt7615: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149). * wifi: mt76: mt7615: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7615: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt76_connac3: move lmac queue enumeration in mt76_connac3_mac.h (bsc#1227149). * wifi: mt76: mt76x02: fix return value check in mt76x02_mac_process_rx (bsc#1227149). * wifi: mt76: mt76x2u: add netgear wdna3100v3 to device table (bsc#1227149). * wifi: mt76: mt7915 add tc offloading support (bsc#1227149). * wifi: mt76: mt7915: accumulate mu-mimo ofdma muru stats (bsc#1227149). * wifi: mt76: mt7915: add locking for accessing mapped registers (bsc#1227149). * wifi: mt76: mt7915: add missing chanctx ops (bsc#1227149). * wifi: mt76: mt7915: add support for MT7981 (bsc#1227149). * wifi: mt76: mt7915: also MT7981 is 3T3R but nss2 on 5 GHz band (bsc#1227149). * wifi: mt76: mt7915: disable WFDMA Tx/Rx during SER recovery (bsc#1227149). * wifi: mt76: mt7915: drop return in mt7915_sta_statistics (bsc#1227149). * wifi: mt76: mt7915: fix EEPROM offset of TSSI flag on MT7981 (bsc#1227149). * wifi: mt76: mt7915: fix error recovery with WED enabled (bsc#1227149). * wifi: mt76: mt7915: fix monitor mode issues (bsc#1227149). * wifi: mt76: mt7915: move mib_stats structure in mt76.h (bsc#1227149). * wifi: mt76: mt7915: move poll_list in mt76_wcid (bsc#1227149). * wifi: mt76: mt7915: move sta_poll_list and sta_poll_lock in mt76_dev (bsc#1227149). * wifi: mt76: mt7915: report tx retries/failed counts for non-WED path (bsc#1227149). * wifi: mt76: mt7915: update mpdu density capability (bsc#1227149). * wifi: mt76: mt7915: update mt798x_wmac_adie_patch_7976 (bsc#1227149). * wifi: mt76: mt7915: workaround too long expansion sparse warnings (git- fixes). * wifi: mt76: mt7921: Support temp sensor (bsc#1227149). * wifi: mt76: mt7921: add 6GHz power type support for clc (bsc#1227149). * wifi: mt76: mt7921: convert acpisar and clc pointers to void (bsc#1227149). * wifi: mt76: mt7921: enable set txpower for UNII-4 (bsc#1227149). * wifi: mt76: mt7921: fix 6GHz disabled by the missing default CLC config (bsc#1227149). * wifi: mt76: mt7921: fix CLC command timeout when suspend/resume (bsc#1227149). * wifi: mt76: mt7921: fix a potential association failure upon resuming (bsc#1227149). * wifi: mt76: mt7921: fix kernel panic by accessing invalid 6GHz channel info (bsc#1227149). * wifi: mt76: mt7921: fix suspend issue on MediaTek COB platform (bsc#1227149). * wifi: mt76: mt7921: fix the unfinished command of regd_notifier before suspend (bsc#1227149). * wifi: mt76: mt7921: fix wrong 6Ghz power type (bsc#1227149). * wifi: mt76: mt7921: get regulatory information from the clc event (bsc#1227149). * wifi: mt76: mt7921: get rid of MT7921_RESET_TIMEOUT marco (bsc#1227149). * wifi: mt76: mt7921: make mt7921_mac_sta_poll static (bsc#1227149). * wifi: mt76: mt7921: move acpi_sar code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move common register definition in mt792x_regs.h (bsc#1227149). * wifi: mt76: mt7921: move connac nic capability handling to mt7921 (bsc#1227149). * wifi: mt76: mt7921: move debugfs shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move dma shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move hif_ops macro in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move init shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move mac shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move mt7921_dma_init in pci.c (bsc#1227149). * wifi: mt76: mt7921: move mt7921u_disconnect mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: move mt792x_hw_dev in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move mt792x_mutex_{acquire/release} in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move runtime-pm pci code in mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: move shared runtime-pm code on mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: reduce the size of MCU firmware download Rx queue (bsc#1227149). * wifi: mt76: mt7921: rely on mib_stats shared definition (bsc#1227149). * wifi: mt76: mt7921: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7921: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7921: remove macro duplication in regs.h (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_dev in mt792x_dev (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_hif_ops in mt792x_hif_ops (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_phy in mt792x_phy (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_sta in mt792x_sta (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_vif in mt792x_vif (bsc#1227149). * wifi: mt76: mt7921: support 5.9/6GHz channel config in acpi (bsc#1227149). * wifi: mt76: mt7921: update the channel usage when the regd domain changed (bsc#1227149). * wifi: mt76: mt7921e: report tx retries/failed counts in tx free event (bsc#1227149). * wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (stable- fixes). * wifi: mt76: mt7925: add Mediatek Wi-Fi7 driver for mt7925 chips (bsc#1227149). * wifi: mt76: mt7925: add flow to avoid chip bt function fail (bsc#1227149). * wifi: mt76: mt7925: add support to set ifs time by mcu command (bsc#1227149). * wifi: mt76: mt7925: ensure 4-byte alignment for suspend & wow command (bsc#1227149). * wifi: mt76: mt7925: fix SAP no beacon issue in 5Ghz and 6Ghz band (bsc#1227149). * wifi: mt76: mt7925: fix WoW failed in encrypted mode (bsc#1227149). * wifi: mt76: mt7925: fix connect to 80211b mode fail in 2Ghz band (bsc#1227149). * wifi: mt76: mt7925: fix fw download fail (bsc#1227149). * wifi: mt76: mt7925: fix mcu query command fail (bsc#1227149). * wifi: mt76: mt7925: fix the wrong data type for scan command (bsc#1227149). * wifi: mt76: mt7925: fix the wrong header translation config (bsc#1227149). * wifi: mt76: mt7925: fix typo in mt7925_init_he_caps (bsc#1227149). * wifi: mt76: mt7925: fix wmm queue mapping (bsc#1227149). * wifi: mt76: mt7925: remove iftype from mt7925_init_eht_caps signature (bsc#1227149). * wifi: mt76: mt7925: support temperature sensor (bsc#1227149). * wifi: mt76: mt7925: update PCIe DMA settings (bsc#1227149). * wifi: mt76: mt7925e: fix use-after-free in free_irq() (bsc#1227149). * wifi: mt76: mt792x: add the illegal value check for mtcl table of acpi (bsc#1227149). * wifi: mt76: mt792x: fix ethtool warning (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x-lib module (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x-usb module (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x_irq_map (bsc#1227149). * wifi: mt76: mt792x: move MT7921_PM_TIMEOUT and MT7921_HW_SCAN_TIMEOUT in common code (bsc#1227149). * wifi: mt76: mt792x: move more dma shared code in mt792x_dma (bsc#1227149). * wifi: mt76: mt792x: move mt7921_load_firmware in mt792x-lib module (bsc#1227149). * wifi: mt76: mt792x: move mt7921_skb_add_usb_sdio_hdr in mt792x module (bsc#1227149). * wifi: mt76: mt792x: move shared structure definition in mt792x.h (bsc#1227149). * wifi: mt76: mt792x: move some common usb code in mt792x module (bsc#1227149). * wifi: mt76: mt792x: support mt7925 chip init (bsc#1227149). * wifi: mt76: mt792x: update the country list of EU for ACPI SAR (bsc#1227149). * wifi: mt76: mt792xu: enable dmashdl support (bsc#1227149). * wifi: mt76: mt7996: Add mcu commands for getting sta tx statistic (bsc#1227149). * wifi: mt76: mt7996: Use DECLARE_FLEX_ARRAY() and fix -Warray-bounds warnings (bsc#1227149). * wifi: mt76: mt7996: add DMA support for mt7992 (bsc#1227149). * wifi: mt76: mt7996: add TX statistics for EHT mode in debugfs (bsc#1227149). * wifi: mt76: mt7996: add muru support (bsc#1227149). * wifi: mt76: mt7996: add sanity checks for background radar trigger (stable- fixes). * wifi: mt76: mt7996: add support for variants with auxiliary RX path (bsc#1227149). * wifi: mt76: mt7996: add thermal sensor device support (bsc#1227149). * wifi: mt76: mt7996: add txpower setting support (bsc#1227149). * wifi: mt76: mt7996: adjust WFDMA settings to improve performance (bsc#1227149). * wifi: mt76: mt7996: adjust interface num and wtbl size for mt7992 (bsc#1227149). * wifi: mt76: mt7996: align the format of fixed rate command (bsc#1227149). * wifi: mt76: mt7996: check txs format before getting skb by pid (bsc#1227149). * wifi: mt76: mt7996: disable WFDMA Tx/Rx during SER recovery (bsc#1227149). * wifi: mt76: mt7996: drop return in mt7996_sta_statistics (bsc#1227149). * wifi: mt76: mt7996: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149). * wifi: mt76: mt7996: enable PPDU-TxS to host (bsc#1227149). * wifi: mt76: mt7996: enable VHT extended NSS BW feature (bsc#1227149). * wifi: mt76: mt7996: ensure 4-byte alignment for beacon commands (bsc#1227149). * wifi: mt76: mt7996: fix alignment of sta info event (bsc#1227149). * wifi: mt76: mt7996: fix fortify warning (bsc#1227149). * wifi: mt76: mt7996: fix fw loading timeout (bsc#1227149). * wifi: mt76: mt7996: fix mt7996_mcu_all_sta_info_event struct packing (bsc#1227149). * wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature (bsc#1227149). * wifi: mt76: mt7996: fix size of txpower MCU command (bsc#1227149). * wifi: mt76: mt7996: fix uninitialized variable in mt7996_irq_tasklet() (bsc#1227149). * wifi: mt76: mt7996: fix uninitialized variable in parsing txfree (bsc#1227149). * wifi: mt76: mt7996: get tx_retries and tx_failed from txfree (bsc#1227149). * wifi: mt76: mt7996: handle IEEE80211_RC_SMPS_CHANGED (bsc#1227149). * wifi: mt76: mt7996: increase tx token size (bsc#1227149). * wifi: mt76: mt7996: introduce mt7996_band_valid() (bsc#1227149). * wifi: mt76: mt7996: mark GCMP IGTK unsupported (bsc#1227149). * wifi: mt76: mt7996: move radio ctrl commands to proper functions (bsc#1227149). * wifi: mt76: mt7996: only set vif teardown cmds at remove interface (bsc#1227149). * wifi: mt76: mt7996: rely on mib_stats shared definition (bsc#1227149). * wifi: mt76: mt7996: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7996: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7996: remove TXS queue setting (bsc#1227149). * wifi: mt76: mt7996: remove periodic MPDU TXS request (bsc#1227149). * wifi: mt76: mt7996: rework ampdu params setting (bsc#1227149). * wifi: mt76: mt7996: rework register offsets for mt7992 (bsc#1227149). * wifi: mt76: mt7996: set DMA mask to 36 bits for boards with more than 4GB of RAM (bsc#1227149). * wifi: mt76: mt7996: support more options for mt7996_set_bitrate_mask() (bsc#1227149). * wifi: mt76: mt7996: support mt7992 eeprom loading (bsc#1227149). * wifi: mt76: mt7996: support per-band LED control (bsc#1227149). * wifi: mt76: mt7996: switch to mcu command for TX GI report (bsc#1227149). * wifi: mt76: mt7996: use u16 for val field in mt7996_mcu_set_rro signature (bsc#1227149). * wifi: mt76: permit to load precal from NVMEM cell for mt7915 (bsc#1227149). * wifi: mt76: permit to use alternative cell name to eeprom NVMEM load (bsc#1227149). * wifi: mt76: reduce spin_lock_bh held up in mt76_dma_rx_cleanup (bsc#1227149). * wifi: mt76: replace skb_put with skb_put_zero (stable-fixes). * wifi: mt76: report non-binding skb tx rate when WED is active (bsc#1227149). * wifi: mt76: set page_pool napi pointer for mmio devices (bsc#1227149). * wifi: mt76: split get_of_eeprom in subfunction (bsc#1227149). * wifi: mt76: usb: create a dedicated queue for psd traffic (bsc#1227149). * wifi: mt76: usb: store usb endpoint in mt76_queue (bsc#1227149). * wifi: mt76: use atomic iface iteration for pre-TBTT work (bsc#1227149). * wifi: mt76: use chainmask for power delta calculation (bsc#1227149). * wifi: mwifiex: Drop unused headers (bsc#1227149). * wifi: mwifiex: Fix interface type change (git-fixes). * wifi: mwifiex: Refactor 1-element array into flexible array in struct mwifiex_ie_types_chan_list_param_set (bsc#1227149). * wifi: mwifiex: Replace one-element array with flexible-array member in struct mwifiex_ie_types_rxba_sync (bsc#1227149). * wifi: mwifiex: Set WIPHY_FLAG_NETNS_OK flag (bsc#1227149). * wifi: mwifiex: Use default @max_active for workqueues (bsc#1227149). * wifi: mwifiex: Use helpers to check multicast addresses (bsc#1227149). * wifi: mwifiex: Use list_count_nodes() (bsc#1227149). * wifi: mwifiex: cleanup adapter data (bsc#1227149). * wifi: mwifiex: cleanup private data structures (bsc#1227149). * wifi: mwifiex: cleanup struct mwifiex_sdio_mpa_rx (bsc#1227149). * wifi: mwifiex: drop BUG_ON from TX paths (bsc#1227149). * wifi: mwifiex: fix comment typos in SDIO module (bsc#1227149). * wifi: mwifiex: followup PCIE and related cleanups (bsc#1227149). * wifi: mwifiex: handle possible mwifiex_write_reg() errors (bsc#1227149). * wifi: mwifiex: handle possible sscanf() errors (bsc#1227149). * wifi: mwifiex: mwifiex_process_sleep_confirm_resp(): remove unused priv variable (bsc#1227149). * wifi: mwifiex: prefer strscpy() over strlcpy() (bsc#1227149). * wifi: mwifiex: simplify PCIE write operations (bsc#1227149). * wifi: mwifiex: use MODULE_FIRMWARE to add firmware files metadata (bsc#1227149). * wifi: mwifiex: use cfg80211_ssid_eq() instead of mwifiex_ssid_cmp() (bsc#1227149). * wifi: mwifiex: use is_zero_ether_addr() instead of ether_addr_equal() (bsc#1227149). * wifi: mwifiex: use kstrtoX_from_user() in debugfs handlers (bsc#1227149). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * wifi: nl80211: Avoid address calculations via out of bounds array indexing (git-fixes). * wifi: nl80211: Extend del pmksa support for SAE and OWE security (bsc#1227149). * wifi: nl80211: Remove unused declaration nl80211_pmsr_dump_results() (bsc#1227149). * wifi: nl80211: additions to NL80211_CMD_SET_BEACON (bsc#1227149). * wifi: nl80211: allow reporting wakeup for unprot deauth/disassoc (bsc#1227149). * wifi: nl80211: do not free NULL coalescing rule (git-fixes). * wifi: nl80211: fixes to FILS discovery updates (bsc#1227149). * wifi: nl80211: refactor nl80211_send_mlme_event() arguments (bsc#1227149). * wifi: p54: Add missing MODULE_FIRMWARE macro (bsc#1227149). * wifi: p54: Annotate struct p54_cal_database with __counted_by (bsc#1227149). * wifi: p54: fix GCC format truncation warning with wiphy->fw_version (bsc#1227149). * wifi: plfxlc: Drop unused include (bsc#1227149). * wifi: radiotap: add bandwidth definition of EHT U-SIG (bsc#1227149). * wifi: remove unused argument of ieee80211_get_tdls_action() (bsc#1227149). * wifi: rsi: fix restricted __le32 degrades to integer sparse warnings (bsc#1227149). * wifi: rsi: rsi_91x_coex: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_debugfs: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_hal: Remove unnecessary conversions (bsc#1227149). * wifi: rsi: rsi_91x_mac80211: Remove unnecessary conversions (bsc#1227149). * wifi: rsi: rsi_91x_main: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_sdio: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_sdio_ops: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_usb: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_usb_ops: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rt2x00: Simplify bool conversion (bsc#1227149). * wifi: rt2x00: correct MAC_SYS_CTRL register RX mask in R-Calibration (bsc#1227149). * wifi: rt2x00: disable RTS threshold for rt2800 by default (bsc#1227149). * wifi: rt2x00: fix MT7620 low RSSI issue (bsc#1227149). * wifi: rt2x00: fix rt2800 watchdog function (bsc#1227149). * wifi: rt2x00: fix the typo in comments (bsc#1227149). * wifi: rt2x00: improve MT7620 register initialization (bsc#1227149). * wifi: rt2x00: introduce DMA busy check watchdog for rt2800 (bsc#1227149). * wifi: rt2x00: limit MT7620 TX power based on eeprom calibration (bsc#1227149). * wifi: rt2x00: make watchdog param per device (bsc#1227149). * wifi: rt2x00: remove redundant check if u8 array element is less than zero (bsc#1227149). * wifi: rt2x00: remove useless code in rt2x00queue_create_tx_descriptor() (bsc#1227149). * wifi: rt2x00: rework MT7620 PA/LNA RF calibration (bsc#1227149). * wifi: rt2x00: rework MT7620 channel config function (bsc#1227149). * wifi: rt2x00: silence sparse warnings (bsc#1227149). * wifi: rt2x00: simplify rt2x00crypto_rx_insert_iv() (bsc#1227149). * wifi: rtl8xxxu: 8188e: convert usage of priv->vif to priv->vifs[0] (bsc#1227149). * wifi: rtl8xxxu: 8188f: Limit TX power index (git-fixes). * wifi: rtl8xxxu: Actually use macid in rtl8xxxu_gen2_report_connect (bsc#1227149). * wifi: rtl8xxxu: Add TP-Link TL-WN823N V2 (bsc#1227149). * wifi: rtl8xxxu: Add a description about the device ID 0x7392:0xb722 (bsc#1227149). * wifi: rtl8xxxu: Add beacon functions (bsc#1227149). * wifi: rtl8xxxu: Add parameter force to rtl8xxxu_refresh_rate_mask (bsc#1227149). * wifi: rtl8xxxu: Add parameter macid to update_rate_mask (bsc#1227149). * wifi: rtl8xxxu: Add parameter role to report_connect (bsc#1227149). * wifi: rtl8xxxu: Add set_tim() callback (bsc#1227149). * wifi: rtl8xxxu: Add sta_add() and sta_remove() callbacks (bsc#1227149). * wifi: rtl8xxxu: Add start_ap() callback (bsc#1227149). * wifi: rtl8xxxu: Allow creating interface in AP mode (bsc#1227149). * wifi: rtl8xxxu: Allow setting rts threshold to -1 (bsc#1227149). * wifi: rtl8xxxu: Clean up filter configuration (bsc#1227149). * wifi: rtl8xxxu: Declare AP mode support for 8188f (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8192EU (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8710BU (RTL8188GU) (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8723BU (bsc#1227149). * wifi: rtl8xxxu: Enable hw seq for mgmt/non-QoS data frames (bsc#1227149). * wifi: rtl8xxxu: Fix LED control code of RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: Fix off by one initial RTS rate (bsc#1227149). * wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes). * wifi: rtl8xxxu: Put the macid in txdesc (bsc#1227149). * wifi: rtl8xxxu: Remove usage of ieee80211_get_tx_rate() (bsc#1227149). * wifi: rtl8xxxu: Remove usage of tx_info->control.rates[0].flags (bsc#1227149). * wifi: rtl8xxxu: Rename some registers (bsc#1227149). * wifi: rtl8xxxu: Select correct queue for beacon frames (bsc#1227149). * wifi: rtl8xxxu: Set maximum number of supported stations (bsc#1227149). * wifi: rtl8xxxu: Support USB RX aggregation for the newer chips (bsc#1227149). * wifi: rtl8xxxu: Support new chip RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: add hw crypto support for AP mode (bsc#1227149). * wifi: rtl8xxxu: add macids for STA mode (bsc#1227149). * wifi: rtl8xxxu: add missing number of sec cam entries for all variants (bsc#1227149). * wifi: rtl8xxxu: check vif before using in rtl8xxxu_tx() (bsc#1227149). * wifi: rtl8xxxu: convert EN_DESC_ID of TX descriptor to le32 type (bsc#1227149). * wifi: rtl8xxxu: declare concurrent mode support for 8188f (bsc#1227149). * wifi: rtl8xxxu: do not parse CFO, if both interfaces are connected in STA mode (bsc#1227149). * wifi: rtl8xxxu: enable MFP support with security flag of RX descriptor (bsc#1227149). * wifi: rtl8xxxu: enable channel switch support (bsc#1227149). * wifi: rtl8xxxu: extend check for matching bssid to both interfaces (bsc#1227149). * wifi: rtl8xxxu: extend wifi connected check to both interfaces (bsc#1227149). * wifi: rtl8xxxu: fix error messages (bsc#1227149). * wifi: rtl8xxxu: fix mixed declarations in rtl8xxxu_set_aifs() (bsc#1227149). * wifi: rtl8xxxu: make instances of iface limit and combination to be static const (bsc#1227149). * wifi: rtl8xxxu: make supporting AP mode only on port 0 transparent (bsc#1227149). * wifi: rtl8xxxu: mark TOTOLINK N150UA V5/N150UA-B as tested (bsc#1227149). * wifi: rtl8xxxu: prepare supporting two virtual interfaces (bsc#1227149). * wifi: rtl8xxxu: remove assignment of priv->vif in rtl8xxxu_bss_info_changed() (bsc#1227149). * wifi: rtl8xxxu: remove obsolete priv->vif (bsc#1227149). * wifi: rtl8xxxu: rtl8xxxu_rx_complete(): remove unnecessary return (bsc#1227149). * wifi: rtl8xxxu: support multiple interface in start_ap() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in bss_info_changed() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in configure_filter() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in update_beacon_work_callback() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in watchdog_callback() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in {add,remove}_interface() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in set_aifs() (bsc#1227149). * wifi: rtl8xxxu: support setting bssid register for multiple interfaces (bsc#1227149). * wifi: rtl8xxxu: support setting linktype for both interfaces (bsc#1227149). * wifi: rtl8xxxu: support setting mac address register for both interfaces (bsc#1227149). * wifi: rtl8xxxu: update rate mask per sta (bsc#1227149). * wifi: rtlwifi: Convert to use PCIe capability accessors (bsc#1227149). * wifi: rtlwifi: Ignore IEEE80211_CONF_CHANGE_RETRY_LIMITS (bsc#1227149). * wifi: rtlwifi: Remove bridge vendor/device ids (bsc#1227149). * wifi: rtlwifi: Remove rtl_intf_ops.read_efuse_byte (bsc#1227149). * wifi: rtlwifi: Remove unused PCI related defines and struct (bsc#1227149). * wifi: rtlwifi: Speed up firmware loading for USB (bsc#1227149). * wifi: rtlwifi: cleanup USB interface (bsc#1227149). * wifi: rtlwifi: cleanup few rtlxxx_tx_fill_desc() routines (bsc#1227149). * wifi: rtlwifi: cleanup few rtlxxxx_set_hw_reg() routines (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_hal (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_phy (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_ps_ctl (bsc#1227149). * wifi: rtlwifi: drop chk_switch_dmdp() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop fill_fake_txdesc() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop pre_fill_tx_bd_desc() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop unused const_amdpci_aspm (bsc#1227149). * wifi: rtlwifi: remove misused flag from HAL data (bsc#1227149). * wifi: rtlwifi: remove unreachable code in rtl92d_dm_check_edca_turbo() (bsc#1227149). * wifi: rtlwifi: remove unused dualmac control leftovers (bsc#1227149). * wifi: rtlwifi: remove unused timer and related code (bsc#1227149). * wifi: rtlwifi: rtl8192cu: Fix 2T2R chip type detection (bsc#1227149). * wifi: rtlwifi: rtl8192cu: Fix TX aggregation (bsc#1227149). * wifi: rtlwifi: rtl8192de: Do not read register in _rtl92de_query_rxphystatus (bsc#1227149). * wifi: rtlwifi: rtl8192de: Fix 5 GHz TX power (stable-fixes). * wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes). * wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes). * wifi: rtlwifi: rtl8723: Remove unused function rtl8723_cmd_send_packet() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Access full PMCS reg and use pci_regs.h (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Add pdev into _rtl8821ae_clear_pci_pme_status() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Remove unnecessary PME_Status bit set (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Reverse PM Capability exists check (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Use pci_find_capability() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: phy: remove some useless code (bsc#1227149). * wifi: rtlwifi: rtl8821ae: phy: using calculate_bit_shift() (bsc#1227149). * wifi: rtlwifi: rtl92ee_dm_dynamic_primary_cca_check(): fix typo in function name (bsc#1227149). * wifi: rtlwifi: rtl_usb: Store the endpoint addresses (bsc#1227149). * wifi: rtlwifi: rtl_usb: Use sync register writes (bsc#1227149). * wifi: rtlwifi: set initial values for unexpected cases of USB endpoint priority (bsc#1227149). * wifi: rtlwifi: simplify LED management (bsc#1227149). * wifi: rtlwifi: simplify TX command fill callbacks (bsc#1227149). * wifi: rtlwifi: simplify rtl_action_proc() and rtl_tx_agg_start() (bsc#1227149). * wifi: rtlwifi: use convenient list_count_nodes() (bsc#1227149). * wifi: rtlwifi: use eth_broadcast_addr() to assign broadcast address (bsc#1227149). * wifi: rtlwifi: use helper function rtl_get_hdr() (bsc#1227149). * wifi: rtlwifi: use unsigned long for bt_coexist_8723 timestamp (bsc#1227149). * wifi: rtlwifi: use unsigned long for rtl_bssid_entry timestamp (bsc#1227149). * wifi: rtw88: 8821c: tweak CCK TX filter setting for SRRC regulation (bsc#1227149). * wifi: rtw88: 8821c: update TX power limit to V67 (bsc#1227149). * wifi: rtw88: 8822c: update TX power limit to V70 (bsc#1227149). * wifi: rtw88: 8822ce: refine power parameters for RFE type 5 (bsc#1227149). * wifi: rtw88: Add support for the SDIO based RTL8723DS chipset (bsc#1227149). * wifi: rtw88: Fix AP mode incorrect DTIM behavior (bsc#1227149). * wifi: rtw88: Fix action frame transmission fail before association (bsc#1227149). * wifi: rtw88: Skip high queue in hci_flush (bsc#1227149). * wifi: rtw88: Stop high queue during scan (bsc#1227149). * wifi: rtw88: Use random MAC when efuse MAC invalid (bsc#1227149). * wifi: rtw88: add missing unwind goto for __rtw_download_firmware() (bsc#1227149). * wifi: rtw88: debug: add to check if debug mask is enabled (bsc#1227149). * wifi: rtw88: debug: remove wrapper of rtw_dbg() (bsc#1227149). * wifi: rtw88: dump firmware debug information in abnormal state (bsc#1227149). * wifi: rtw88: fix incorrect error codes in rtw_debugfs_copy_from_user (bsc#1227149). * wifi: rtw88: fix incorrect error codes in rtw_debugfs_set_* (bsc#1227149). * wifi: rtw88: fix not entering PS mode after AP stops (bsc#1227149). * wifi: rtw88: fix typo rtw8822cu_probe (bsc#1227149). * wifi: rtw88: process VO packets without workqueue to avoid PTK rekey failed (bsc#1227149). * wifi: rtw88: refine register based H2C command (bsc#1227149). * wifi: rtw88: regd: configure QATAR and UK (bsc#1227149). * wifi: rtw88: regd: update regulatory map to R64-R42 (bsc#1227149). * wifi: rtw88: remove unused USB bulkout size set (bsc#1227149). * wifi: rtw88: remove unused and set but unused leftovers (bsc#1227149). * wifi: rtw88: rtw8723d: Implement RTL8723DS (SDIO) efuse parsing (bsc#1227149). * wifi: rtw88: simplify __rtw_tx_work() (bsc#1227149). * wifi: rtw88: simplify vif iterators (bsc#1227149). * wifi: rtw88: use cfg80211_ssid_eq() instead of rtw_ssid_equal() (bsc#1227149). * wifi: rtw88: use kstrtoX_from_user() in debugfs handlers (bsc#1227149). * wifi: rtw88: use struct instead of macros to set TX desc (bsc#1227149). * wifi: rtw89: 52c: rfk: disable DPK during MCC (bsc#1227149). * wifi: rtw89: 52c: rfk: refine MCC channel info notification (bsc#1227149). * wifi: rtw89: 8851b: add 8851B basic chip_info (bsc#1227149). * wifi: rtw89: 8851b: add 8851be to Makefile and Kconfig (bsc#1227149). * wifi: rtw89: 8851b: add BT coexistence support function (bsc#1227149). * wifi: rtw89: 8851b: add DLE mem and HFC quota (bsc#1227149). * wifi: rtw89: 8851b: add MAC configurations to chip_info (bsc#1227149). * wifi: rtw89: 8851b: add NCTL post table (bsc#1227149). * wifi: rtw89: 8851b: add RF configurations (bsc#1227149). * wifi: rtw89: 8851b: add TX power related functions (bsc#1227149). * wifi: rtw89: 8851b: add basic power on function (bsc#1227149). * wifi: rtw89: 8851b: add set channel function (bsc#1227149). * wifi: rtw89: 8851b: add set_channel_rf() (bsc#1227149). * wifi: rtw89: 8851b: add support WoWLAN to 8851B (bsc#1227149). * wifi: rtw89: 8851b: add to parse efuse content (bsc#1227149). * wifi: rtw89: 8851b: add to read efuse version to recognize hardware version B (bsc#1227149). * wifi: rtw89: 8851b: configure CRASH_TRIGGER feature for 8851B (bsc#1227149). * wifi: rtw89: 8851b: configure GPIO according to RFE type (bsc#1227149). * wifi: rtw89: 8851b: configure to force 1 TX power value (bsc#1227149). * wifi: rtw89: 8851b: enable hw_scan support (bsc#1227149). * wifi: rtw89: 8851b: fill BB related capabilities to chip_info (bsc#1227149). * wifi: rtw89: 8851b: rfk: Fix spelling mistake KIP_RESOTRE -> KIP_RESTORE (bsc#1227149). * wifi: rtw89: 8851b: rfk: add AACK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add DACK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add DPK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add IQK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add LCK track (bsc#1227149). * wifi: rtw89: 8851b: rfk: add RCK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add RX DCK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add TSSI (bsc#1227149). * wifi: rtw89: 8851b: rfk: update IQK to version 0x8 (bsc#1227149). * wifi: rtw89: 8851b: update RF radio A parameters to R28 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R28 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R34 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R37 (bsc#1227149). * wifi: rtw89: 8851be: add 8851BE PCI entry and fill PCI capabilities (bsc#1227149). * wifi: rtw89: 8852b: fix definition of KIP register number (git-fixes). * wifi: rtw89: 8852b: update TX power tables to R35 (bsc#1227149). * wifi: rtw89: 8852b: update TX power tables to R36 (bsc#1227149). * wifi: rtw89: 8852c: Fix TSSI causes transmit power inaccuracy (bsc#1227149). * wifi: rtw89: 8852c: Update bandedge parameters for better performance (bsc#1227149). * wifi: rtw89: 8852c: add quirk to set PCI BER for certain platforms (bsc#1227149). * wifi: rtw89: 8852c: declare to support two chanctx (bsc#1227149). * wifi: rtw89: 8852c: read RX gain offset from efuse for 6GHz channels (bsc#1227149). * wifi: rtw89: 8852c: update RF radio A/B parameters to R63 (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (1 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (2 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (3 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R67 (bsc#1227149). * wifi: rtw89: 8922a: add 8922A basic chip info (bsc#1227149). * wifi: rtw89: 8922a: add BTG functions to assist BT coexistence to control TX/RX (bsc#1227149). * wifi: rtw89: 8922a: add NCTL pre-settings for WiFi 7 chips (bsc#1227149). * wifi: rtw89: 8922a: add RF read/write v2 (bsc#1227149). * wifi: rtw89: 8922a: add SER IMR tables (bsc#1227149). * wifi: rtw89: 8922a: add TX power related ops (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops related to BB init (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops to get thermal value (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::bb_preinit to enable BB before downloading firmware (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::cfg_txrx_path (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::rfk_hw_init (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::rfk_init_late to do initial RF calibrations later (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::{enable,disable}_bb_rf (bsc#1227149). * wifi: rtw89: 8922a: add coexistence helpers of SW grant (bsc#1227149). * wifi: rtw89: 8922a: add helper of set_channel (bsc#1227149). * wifi: rtw89: 8922a: add ieee80211_ops::hw_scan (bsc#1227149). * wifi: rtw89: 8922a: add more fields to beacon H2C command to support multi- links (bsc#1227149). * wifi: rtw89: 8922a: add power on/off functions (bsc#1227149). * wifi: rtw89: 8922a: add register definitions of H2C, C2H, page, RRSR and EDCCA (bsc#1227149). * wifi: rtw89: 8922a: add set_channel BB part (bsc#1227149). * wifi: rtw89: 8922a: add set_channel MAC part (bsc#1227149). * wifi: rtw89: 8922a: add set_channel RF part (bsc#1227149). * wifi: rtw89: 8922a: configure CRASH_TRIGGER FW feature (bsc#1227149). * wifi: rtw89: 8922a: correct register definition and merge IO for ctrl_nbtg_bt_tx() (bsc#1227149). * wifi: rtw89: 8922a: declare to support two chanctx (bsc#1227149). * wifi: rtw89: 8922a: dump MAC registers when SER occurs (bsc#1227149). * wifi: rtw89: 8922a: extend and add quota number (bsc#1227149). * wifi: rtw89: 8922a: hook handlers of TX/RX descriptors to chip_ops (bsc#1227149). * wifi: rtw89: 8922a: implement AP mode related reg for BE generation (bsc#1227149). * wifi: rtw89: 8922a: implement {stop,resume}_sch_tx and cfg_ppdu (bsc#1227149). * wifi: rtw89: 8922a: read efuse content from physical map (bsc#1227149). * wifi: rtw89: 8922a: read efuse content via efuse map struct from logic map (bsc#1227149). * wifi: rtw89: 8922a: rfk: implement chip_ops to call RF calibrations (bsc#1227149). * wifi: rtw89: 8922a: set RX gain along with set_channel operation (bsc#1227149). * wifi: rtw89: 8922a: set chip_ops FEM and GPIO to NULL (bsc#1227149). * wifi: rtw89: 8922a: set memory heap address for secure firmware (bsc#1227149). * wifi: rtw89: 8922a: update BA CAM number to 24 (bsc#1227149). * wifi: rtw89: 8922a: update the register used in DIG and the DIG flow (bsc#1227149). * wifi: rtw89: 8922ae: add 8922AE PCI entry and basic info (bsc#1227149). * wifi: rtw89: 8922ae: add v2 interrupt handlers for 8922AE (bsc#1227149). * wifi: rtw89: Add EHT rate mask as parameters of RA H2C command (bsc#1227149). * wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git- fixes). * wifi: rtw89: Fix clang -Wimplicit-fallthrough in rtw89_query_sar() (bsc#1227149). * wifi: rtw89: Introduce Time Averaged SAR (TAS) feature (bsc#1227149). * wifi: rtw89: Refine active scan behavior in 6 GHz (bsc#1227149). * wifi: rtw89: Set default CQM config if not present (bsc#1227149). * wifi: rtw89: TX power stuffs replace confusing naming of _max with _num (bsc#1227149). * wifi: rtw89: Update EHT PHY beamforming capability (bsc#1227149). * wifi: rtw89: acpi: process 6 GHz band policy from DSM (bsc#1227149). * wifi: rtw89: add C2H RA event V1 to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: add C2H event handlers of RFK log and report (bsc#1227149). * wifi: rtw89: add CFO XTAL registers field to support 8851B (bsc#1227149). * wifi: rtw89: add DBCC H2C to notify firmware the status (bsc#1227149). * wifi: rtw89: add EHT capabilities for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add EHT radiotap in monitor mode (bsc#1227149). * wifi: rtw89: add EVM and SNR statistics to debugfs (bsc#1227149). * wifi: rtw89: add EVM for antenna diversity (bsc#1227149). * wifi: rtw89: add H2C RA command V1 to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: add H2C command to download beacon frame for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add RSSI based antenna diversity (bsc#1227149). * wifi: rtw89: add RSSI statistics for the case of antenna diversity to debugfs (bsc#1227149). * wifi: rtw89: add XTAL SI for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add chip_info::chip_gen to determine chip generation (bsc#1227149). * wifi: rtw89: add chip_info::txwd_info size to generalize TX WD submit (bsc#1227149). * wifi: rtw89: add chip_ops::h2c_ba_cam() to configure BA CAM (bsc#1227149). * wifi: rtw89: add chip_ops::query_rxdesc() and rxd_len as helpers to support newer chips (bsc#1227149). * wifi: rtw89: add chip_ops::update_beacon to abstract update beacon operation (bsc#1227149). * wifi: rtw89: add firmware H2C command of BA CAM V1 (bsc#1227149). * wifi: rtw89: add firmware parser for v1 format (bsc#1227149). * wifi: rtw89: add firmware suit for BB MCU 0/1 (bsc#1227149). * wifi: rtw89: add function prototype for coex request duration (bsc#1227149). * wifi: rtw89: add mac_gen pointer to access mac port registers (bsc#1227149). * wifi: rtw89: add mlo_dbcc_mode for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add new H2C command to pause/sleep transmitting by MAC ID (bsc#1227149). * wifi: rtw89: add new H2C for PS mode in 802.11be chip (bsc#1227149). * wifi: rtw89: add reserved size as factor of DLE used size (bsc#1227149). * wifi: rtw89: add subband index of primary channel to struct rtw89_chan (bsc#1227149). * wifi: rtw89: add to display hardware rates v1 histogram in debugfs (bsc#1227149). * wifi: rtw89: add to fill TX descriptor for firmware command v2 (bsc#1227149). * wifi: rtw89: add to fill TX descriptor v2 (bsc#1227149). * wifi: rtw89: add to parse firmware elements of BB and RF tables (bsc#1227149). * wifi: rtw89: add to query RX descriptor format v2 (bsc#1227149). * wifi: rtw89: add tx_wake notify for 8851B (bsc#1227149). * wifi: rtw89: add wait/completion for abort scan (bsc#1227149). * wifi: rtw89: adjust init_he_cap() to add EHT cap into iftype_data (bsc#1227149). * wifi: rtw89: advertise missing extended scan feature (bsc#1227149). * wifi: rtw89: avoid stringop-overflow warning (bsc#1227149). * wifi: rtw89: call rtw89_chan_get() by vif chanctx if aware of vif (bsc#1227149). * wifi: rtw89: chan: MCC take reconfig into account (bsc#1227149). * wifi: rtw89: chan: add sub-entity swap function to cover replacing (bsc#1227149). * wifi: rtw89: chan: move handling from add/remove to assign/unassign for MLO (bsc#1227149). * wifi: rtw89: chan: support MCC on Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: chan: tweak bitmap recalc ahead before MLO (bsc#1227149). * wifi: rtw89: chan: tweak weight recalc ahead before MLO (bsc#1227149). * wifi: rtw89: change naming of BA CAM from V1 to V0_EXT (bsc#1227149). * wifi: rtw89: change qutoa to DBCC by default for WiFi 7 chips (bsc#1227149). * wifi: rtw89: change supported bandwidths of chip_info to bit mask (bsc#1227149). * wifi: rtw89: cleanup firmware elements parsing (bsc#1227149). * wifi: rtw89: cleanup private data structures (bsc#1227149). * wifi: rtw89: cleanup rtw89_iqk_info and related code (bsc#1227149). * wifi: rtw89: coex: Add Bluetooth RSSI level information (bsc#1227149). * wifi: rtw89: coex: Add Pre-AGC control to enhance Wi-Fi RX performance (bsc#1227149). * wifi: rtw89: coex: Add coexistence policy to decrease WiFi packet CRC-ERR (bsc#1227149). * wifi: rtw89: coex: Fix wrong Wi-Fi role info and FDDT parameter members (bsc#1227149). * wifi: rtw89: coex: Record down Wi-Fi initial mode information (bsc#1227149). * wifi: rtw89: coex: Reorder H2C command index to align with firmware (bsc#1227149). * wifi: rtw89: coex: Set Bluetooth scan low-priority when Wi-Fi link/scan (bsc#1227149). * wifi: rtw89: coex: Still show hardware grant signal info even Wi-Fi is PS (bsc#1227149). * wifi: rtw89: coex: To improve Wi-Fi performance while BT is idle (bsc#1227149). * wifi: rtw89: coex: Translate antenna configuration from ID to string (bsc#1227149). * wifi: rtw89: coex: Update BTG control related logic (bsc#1227149). * wifi: rtw89: coex: Update RF parameter control setting logic (bsc#1227149). * wifi: rtw89: coex: Update coexistence policy for Wi-Fi LPS (bsc#1227149). * wifi: rtw89: coex: When Bluetooth not available do not set power/gain (bsc#1227149). * wifi: rtw89: coex: add BTC ctrl_info version 7 and related logic (bsc#1227149). * wifi: rtw89: coex: add annotation __counted_by() for struct rtw89_btc_btf_set_slot_table (bsc#1227149). * wifi: rtw89: coex: add annotation __counted_by() to struct rtw89_btc_btf_set_mon_reg (bsc#1227149). * wifi: rtw89: coex: add init_info H2C command format version 7 (bsc#1227149). * wifi: rtw89: coex: add return value to ensure H2C command is success or not (bsc#1227149). * wifi: rtw89: coex: fix configuration for shared antenna for 8922A (bsc#1227149). * wifi: rtw89: coex: use struct assignment to replace memcpy() to append TDMA content (bsc#1227149). * wifi: rtw89: configure PPDU max user by chip (bsc#1227149). * wifi: rtw89: consider RX info for WiFi 7 chips (bsc#1227149). * wifi: rtw89: consolidate registers of mac port to struct (bsc#1227149). * wifi: rtw89: correct PHY register offset for PHY-1 (bsc#1227149). * wifi: rtw89: correct aSIFSTime for 6GHz band (stable-fixes). * wifi: rtw89: correct the DCFO tracking flow to improve CFO compensation (bsc#1227149). * wifi: rtw89: debug: add FW log component for scan (bsc#1227149). * wifi: rtw89: debug: add debugfs entry to disable dynamic mechanism (bsc#1227149). * wifi: rtw89: debug: add to check if debug mask is enabled (bsc#1227149). * wifi: rtw89: debug: remove wrapper of rtw89_debug() (bsc#1227149). * wifi: rtw89: debug: show txpwr table according to chip gen (bsc#1227149). * wifi: rtw89: debug: txpwr table access only valid page according to chip (bsc#1227149). * wifi: rtw89: debug: txpwr table supports Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: declare EXT NSS BW of VHT capability (bsc#1227149). * wifi: rtw89: declare MCC in interface combination (bsc#1227149). * wifi: rtw89: define hardware rate v1 for WiFi 7 chips (bsc#1227149). * wifi: rtw89: differentiate narrow_bw_ru_dis setting according to chip gen (bsc#1227149). * wifi: rtw89: disable RTS when broadcast/multicast (bsc#1227149). * wifi: rtw89: download firmware with five times retry (bsc#1227149). * wifi: rtw89: drop TIMING_BEACON_ONLY and sync beacon TSF by self (bsc#1227149). * wifi: rtw89: enlarge supported length of read_reg debugfs entry (bsc#1227149). * wifi: rtw89: extend PHY status parser to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: fix HW scan not aborting properly (git-fixes). * wifi: rtw89: fix HW scan timeout due to TSF sync issue (bsc#1227149). * wifi: rtw89: fix a width vs precision bug (bsc#1227149). * wifi: rtw89: fix disabling concurrent mode TX hang issue (bsc#1227149). * wifi: rtw89: fix misbehavior of TX beacon in concurrent mode (bsc#1227149). * wifi: rtw89: fix not entering PS mode after AP stops (bsc#1227149). * wifi: rtw89: fix spelling typo of IQK debug messages (bsc#1227149). * wifi: rtw89: fix typo of rtw89_fw_h2c_mcc_macid_bitmap() (bsc#1227149). * wifi: rtw89: fw: add H2C command to reset CMAC table for WiFi 7 (bsc#1227149). * wifi: rtw89: fw: add H2C command to reset DMAC table for WiFi 7 (bsc#1227149). * wifi: rtw89: fw: add H2C command to update security CAM v2 (bsc#1227149). * wifi: rtw89: fw: add checking type for variant type of firmware (bsc#1227149). * wifi: rtw89: fw: add chip_ops to update CMAC table to associated station (bsc#1227149). * wifi: rtw89: fw: add definition of H2C command and C2H event for MRC series (bsc#1227149). * wifi: rtw89: fw: add version field to BB MCU firmware element (bsc#1227149). * wifi: rtw89: fw: consider checksum length of security data (bsc#1227149). * wifi: rtw89: fw: download firmware with key data for secure boot (bsc#1227149). * wifi: rtw89: fw: extend JOIN H2C command to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: extend program counter dump for Wi-Fi 7 chip (bsc#1227149). * wifi: rtw89: fw: fill CMAC table to associated station for WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: generalize download firmware flow by mac_gen pointers (bsc#1227149). * wifi: rtw89: fw: implement MRC H2C command functions (bsc#1227149). * wifi: rtw89: fw: implement supported functions of download firmware for WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: load TX power track tables from fw_element (bsc#1227149). * wifi: rtw89: fw: move polling function of firmware path ready to an individual function (bsc#1227149). * wifi: rtw89: fw: parse secure section from firmware file (bsc#1227149). * wifi: rtw89: fw: propagate an argument include_bb for BB MCU firmware (bsc#1227149). * wifi: rtw89: fw: read firmware secure information from efuse (bsc#1227149). * wifi: rtw89: fw: refine download flow to support variant firmware suits (bsc#1227149). * wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (bsc#1227149). * wifi: rtw89: fw: update TX AMPDU parameter to CMAC table (bsc#1227149). * wifi: rtw89: fw: use struct to fill BA CAM H2C commands (bsc#1227149). * wifi: rtw89: fw: use struct to fill JOIN H2C command (bsc#1227149). * wifi: rtw89: get data rate mode/NSS/MCS v1 from RX descriptor (bsc#1227149). * wifi: rtw89: indicate TX power by rate table inside RFE parameter (bsc#1227149). * wifi: rtw89: indicate TX shape table inside RFE parameter (bsc#1227149). * wifi: rtw89: initialize antenna for antenna diversity (bsc#1227149). * wifi: rtw89: initialize multi-channel handling (bsc#1227149). * wifi: rtw89: introduce infrastructure of firmware elements (bsc#1227149). * wifi: rtw89: introduce realtek ACPI DSM method (bsc#1227149). * wifi: rtw89: introduce v1 format of firmware header (bsc#1227149). * wifi: rtw89: load BB parameters to PHY-1 (bsc#1227149). * wifi: rtw89: load RFK log format string from firmware file (bsc#1227149). * wifi: rtw89: load TX power by rate when RFE parms setup (bsc#1227149). * wifi: rtw89: load TX power related tables from FW elements (bsc#1227149). * wifi: rtw89: mac: Fix spelling mistakes "notfify" -> "notify" (bsc#1227149). * wifi: rtw89: mac: add coexistence helpers {cfg/get}_plt (bsc#1227149). * wifi: rtw89: mac: add feature_init to initialize BA CAM V1 (bsc#1227149). * wifi: rtw89: mac: add flags to check if CMAC and DMAC are enabled (bsc#1227149). * wifi: rtw89: mac: add mac_gen_def::band1_offset to map MAC band1 register address (bsc#1227149). * wifi: rtw89: mac: add registers of MU-EDCA parameters for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add suffix _ax to MAC functions (bsc#1227149). * wifi: rtw89: mac: add sys_init and filter option for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add to access efuse for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add to get DLE reserved quota (bsc#1227149). * wifi: rtw89: mac: check queue empty according to chip gen (bsc#1227149). * wifi: rtw89: mac: correct MUEDCA setting for MAC-1 (bsc#1227149). * wifi: rtw89: mac: define internal memory address for WiFi 7 chip (bsc#1227149). * wifi: rtw89: mac: define register address of rx_filter to generalize code (bsc#1227149). * wifi: rtw89: mac: do bf_monitor only if WiFi 6 chips (bsc#1227149). * wifi: rtw89: mac: functions to configure hardware engine and quota for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: generalize code to indirectly access WiFi internal memory (bsc#1227149). * wifi: rtw89: mac: generalize register of MU-EDCA switch according to chip gen (bsc#1227149). * wifi: rtw89: mac: get TX power control register according to chip gen (bsc#1227149). * wifi: rtw89: mac: handle C2H receive/done ACK in interrupt context (bsc#1227149). * wifi: rtw89: mac: implement MRC C2H event handling (bsc#1227149). * wifi: rtw89: mac: implement to configure TX/RX engines for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: move code related to hardware engine to individual functions (bsc#1227149). * wifi: rtw89: mac: refine SER setting during WiFi CPU power on (bsc#1227149). * wifi: rtw89: mac: reset PHY-1 hardware when going to enable/disable (bsc#1227149). * wifi: rtw89: mac: return held quota of DLE when changing MAC-1 (bsc#1227149). * wifi: rtw89: mac: set bf_assoc capabilities according to chip gen (bsc#1227149). * wifi: rtw89: mac: set bfee_ctrl() according to chip gen (bsc#1227149). * wifi: rtw89: mac: update RTS threshold according to chip gen (bsc#1227149). * wifi: rtw89: mac: use mac_gen pointer to access about efuse (bsc#1227149). * wifi: rtw89: mac: use pointer to access functions of hardware engine and quota (bsc#1227149). * wifi: rtw89: mcc: consider and determine BT duration (bsc#1227149). * wifi: rtw89: mcc: deal with BT slot change (bsc#1227149). * wifi: rtw89: mcc: deal with P2P PS change (bsc#1227149). * wifi: rtw89: mcc: deal with beacon NoA if GO exists (bsc#1227149). * wifi: rtw89: mcc: decide pattern and calculate parameters (bsc#1227149). * wifi: rtw89: mcc: fill fundamental configurations (bsc#1227149). * wifi: rtw89: mcc: fix NoA start time when GO is auxiliary (bsc#1227149). * wifi: rtw89: mcc: initialize start flow (bsc#1227149). * wifi: rtw89: mcc: track beacon offset and update when needed (bsc#1227149). * wifi: rtw89: mcc: trigger FW to start/stop MCC (bsc#1227149). * wifi: rtw89: mcc: update role bitmap when changed (bsc#1227149). * wifi: rtw89: modify the register setting and the flow of CFO tracking (bsc#1227149). * wifi: rtw89: move software DCFO compensation setting to proper position (bsc#1227149). * wifi: rtw89: only reset BB/RF for existing WiFi 6 chips while starting up (bsc#1227149). * wifi: rtw89: packet offload wait for FW response (bsc#1227149). * wifi: rtw89: parse EHT information from RX descriptor and PPDU status packet (bsc#1227149). * wifi: rtw89: parse TX EHT rate selected by firmware from RA C2H report (bsc#1227149). * wifi: rtw89: parse and print out RFK log from C2H events (bsc#1227149). * wifi: rtw89: pause/proceed MCC for ROC and HW scan (bsc#1227149). * wifi: rtw89: pci: add LTR v2 for WiFi 7 chip (bsc#1227149). * wifi: rtw89: pci: add PCI generation information to pci_info for each chip (bsc#1227149). * wifi: rtw89: pci: add new RX ring design to determine full RX ring efficiently (bsc#1227149). * wifi: rtw89: pci: add pre_deinit to be called after probe complete (bsc#1227149). * wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes). * wifi: rtw89: pci: correct interrupt mitigation register for 8852CE (bsc#1227149). * wifi: rtw89: pci: define PCI ring address for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: fix interrupt enable mask for HALT C2H of RTL8851B (bsc#1227149). * wifi: rtw89: pci: generalize code of PCI control DMA IO for WiFi 7 (bsc#1227149). * wifi: rtw89: pci: generalize interrupt status bits of interrupt handlers (bsc#1227149). * wifi: rtw89: pci: implement PCI CLK/ASPM/L1SS for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: implement PCI mac_post_init for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: implement PCI mac_pre_init for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: interrupt v2 refine IMR for SER (bsc#1227149). * wifi: rtw89: pci: reset BDRAM according to chip gen (bsc#1227149). * wifi: rtw89: pci: stop/start DMA for level 1 recovery according to chip gen (bsc#1227149). * wifi: rtw89: pci: update SER timer unit and timeout time (bsc#1227149). * wifi: rtw89: pci: update interrupt mitigation register for 8922AE (bsc#1227149). * wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE (bsc#1227149). * wifi: rtw89: pci: use gen_def pointer to configure mac_{pre,post}_init and clear PCI ring index (bsc#1227149). * wifi: rtw89: pci: validate RX tag for RXQ and RPQ (bsc#1227149). * wifi: rtw89: phy: add BB wrapper of TX power for WiFi 7 chips (bsc#1227149). * wifi: rtw89: phy: add parser to support RX gain dynamic setting flow (bsc#1227149). * wifi: rtw89: phy: add phy_gen_def::cr_base to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: phy: change naming related BT coexistence functions (bsc#1227149). * wifi: rtw89: phy: dynamically adjust EDCCA threshold (bsc#1227149). * wifi: rtw89: phy: extend TX power common stuffs for Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: phy: generalize valid bit of BSS color (bsc#1227149). * wifi: rtw89: phy: ignore special data from BB parameter file (bsc#1227149). * wifi: rtw89: phy: modify register setting of ENV_MNTR, PHYSTS and DIG (bsc#1227149). * wifi: rtw89: phy: move bb_gain_info used by WiFi 6 chips to union (bsc#1227149). * wifi: rtw89: phy: print out RFK log with formatted string (bsc#1227149). * wifi: rtw89: phy: rate pattern handles HW rate by chip gen (bsc#1227149). * wifi: rtw89: phy: refine helpers used for raw TX power (bsc#1227149). * wifi: rtw89: phy: set TX power RU limit according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power by rate according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power limit according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power offset according to chip gen (bsc#1227149). * wifi: rtw89: phy: set channel_info for WiFi 7 chips (bsc#1227149). * wifi: rtw89: prepare scan leaf functions for wifi 7 ICs (bsc#1227149). * wifi: rtw89: process regulatory for 6 GHz power type (bsc#1227149). * wifi: rtw89: provide functions to configure NoA for beacon update (bsc#1227149). * wifi: rtw89: recognize log format from firmware file (bsc#1227149). * wifi: rtw89: reference quota mode when setting Tx power (bsc#1227149). * wifi: rtw89: refine H2C command that pause transmitting by MAC ID (bsc#1227149). * wifi: rtw89: refine add_chan H2C command to encode_bits (bsc#1227149). * wifi: rtw89: refine bandwidth 160MHz uplink OFDMA performance (bsc#1227149). * wifi: rtw89: refine clearing supported bands to check 2/5 GHz first (bsc#1227149). * wifi: rtw89: refine element naming used by queue empty check (bsc#1227149). * wifi: rtw89: refine hardware scan C2H events (bsc#1227149). * wifi: rtw89: refine packet offload delete flow of 6 GHz probe (bsc#1227149). * wifi: rtw89: refine packet offload handling under SER (bsc#1227149). * wifi: rtw89: refine remain on channel flow to improve P2P connection (bsc#1227149). * wifi: rtw89: refine rtw89_correct_cck_chan() by rtw89_hw_to_nl80211_band() (bsc#1227149). * wifi: rtw89: refine uplink trigger based control mechanism (bsc#1227149). * wifi: rtw89: regd: configure Thailand in regulation type (bsc#1227149). * wifi: rtw89: regd: handle policy of 6 GHz according to BIOS (bsc#1227149). * wifi: rtw89: regd: judge 6 GHz according to chip and BIOS (bsc#1227149). * wifi: rtw89: regd: judge UNII-4 according to BIOS and chip (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R64-R40 (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R64-R43 (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R65-R44 (bsc#1227149). * wifi: rtw89: release bit in rtw89_fw_h2c_del_pkt_offload() (bsc#1227149). * wifi: rtw89: return failure if needed firmware elements are not recognized (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger DACK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger DPK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger IQK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger RX DCK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger TSSI (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger TXGAPK (bsc#1227149). * wifi: rtw89: rfk: add a completion to wait RF calibration report from C2H event (bsc#1227149). * wifi: rtw89: rfk: disable driver tracking during MCC (bsc#1227149). * wifi: rtw89: rfk: send channel information to firmware for RF calibrations (bsc#1227149). * wifi: rtw89: sar: let caller decide the center frequency to query (bsc#1227149). * wifi: rtw89: scan offload wait for FW done ACK (bsc#1227149). * wifi: rtw89: ser: L1 add pre-M0 and post-M0 states (bsc#1227149). * wifi: rtw89: ser: reset total_sta_assoc and tdls_peer when L2 (bsc#1227149). * wifi: rtw89: set TX power without precondition during setting channel (bsc#1227149). * wifi: rtw89: set capability of TX antenna diversity (bsc#1227149). * wifi: rtw89: set entry size of address CAM to H2C field by chip (bsc#1227149). * wifi: rtw89: show EHT rate in debugfs (bsc#1227149). * wifi: rtw89: support U-NII-4 channels on 5GHz band (bsc#1227149). * wifi: rtw89: support firmware log with formatted text (bsc#1227149). * wifi: rtw89: suppress the log for specific SER called CMDPSR_FRZTO (bsc#1227149). * wifi: rtw89: tweak H2C TX waiting function for SER (bsc#1227149). * wifi: rtw89: update DMA function with different generation (bsc#1227149). * wifi: rtw89: update ps_state register for chips with different generation (bsc#1227149). * wifi: rtw89: update scan C2H messages for wifi 7 IC (bsc#1227149). * wifi: rtw89: update suspend/resume for different generation (bsc#1227149). * wifi: rtw89: use PLCP information to match BSS_COLOR and AID (bsc#1227149). * wifi: rtw89: use chip_info::small_fifo_size to choose debug_mask (bsc#1227149). * wifi: rtw89: use flexible array member in rtw89_btc_btf_tlv (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits to access RX info (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits() to access RX descriptor (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits() to access received PHY status IEs (bsc#1227149). * wifi: rtw89: use struct rtw89_phy_sts_ie0 instead of macro to access PHY IE0 status (bsc#1227149). * wifi: rtw89: use struct to access RA report (bsc#1227149). * wifi: rtw89: use struct to access firmware C2H event header (bsc#1227149). * wifi: rtw89: use struct to access register-based H2C/C2H (bsc#1227149). * wifi: rtw89: use struct to fill H2C command to download beacon frame (bsc#1227149). * wifi: rtw89: use struct to parse firmware header (bsc#1227149). * wifi: rtw89: use struct to set RA H2C command (bsc#1227149). * wifi: rtw89: wow: move release offload packet earlier for WoWLAN mode (bsc#1227149). * wifi: rtw89: wow: refine WoWLAN flows of HCI interrupts and low power mode (bsc#1227149). * wifi: rtw89: wow: set security engine options for 802.11ax chips only (bsc#1227149). * wifi: rtw89: wow: update WoWLAN reason register for different chips (bsc#1227149). * wifi: rtw89: wow: update WoWLAN status register for different generation (bsc#1227149). * wifi: rtw89: wow: update config mac function with different generation (bsc#1227149). * wifi: ti: wlcore: sdio: Drop unused include (bsc#1227149). * wifi: virt_wifi: avoid reporting connection success with wrong SSID (git- fixes). * wifi: virt_wifi: do not use strlen() in const context (git-fixes). * wifi: wcn36xx: Annotate struct wcn36xx_hal_ind_msg with __counted_by (bsc#1227149). * wifi: wcn36xx: Convert to platform remove callback returning void (bsc#1227149). * wifi: wcn36xx: remove unnecessary (void*) conversions (bsc#1227149). * wifi: wext: avoid extra calls to strlen() in ieee80211_bss() (bsc#1227149). * wifi: wfx: Use devm_kmemdup to replace devm_kmalloc + memcpy (bsc#1227149). * wifi: wfx: allow to send frames during ROC (bsc#1227149). * wifi: wfx: fix power_save setting when AP is stopped (bsc#1227149). * wifi: wfx: implement wfx_remain_on_channel() (bsc#1227149). * wifi: wfx: introduce hif_scan_uniq() (bsc#1227149). * wifi: wfx: move wfx_skb_*() out of the header file (bsc#1227149). * wifi: wfx: relocate wfx_rate_mask_to_hw() (bsc#1227149). * wifi: wfx: scan_lock is global to the device (bsc#1227149). * wifi: wfx: simplify exclusion between scan and Rx filters (bsc#1227149). * wifi: wil6210: fw: Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper (bsc#1227149). * wifi: wil6210: wmi: Replace zero-length array with DECLARE_FLEX_ARRAY() helper (bsc#1227149). * wifi: wilc1000: Increase ASSOC response buffer (bsc#1227149). * wifi: wilc1000: Remove unused declarations (bsc#1227149). * wifi: wilc1000: add SPI commands retry mechanism (bsc#1227149). * wifi: wilc1000: add back-off algorithm to balance tx queue packets (bsc#1227149). * wifi: wilc1000: add missing read critical sections around vif list traversal (bsc#1227149). * wifi: wilc1000: always release SDIO host in wilc_sdio_cmd53() (bsc#1227149). * wifi: wilc1000: cleanup struct wilc_conn_info (bsc#1227149). * wifi: wilc1000: correct CRC7 calculation (bsc#1227149). * wifi: wilc1000: fix declarations ordering (bsc#1227149). * wifi: wilc1000: fix driver_handler when committing initial configuration (bsc#1227149). * wifi: wilc1000: fix ies_len type in connect path (git-fixes). * wifi: wilc1000: fix incorrect power down sequence (bsc#1227149). * wifi: wilc1000: remove AKM suite be32 conversion for external auth request (bsc#1227149). * wifi: wilc1000: remove setting msg.spi (bsc#1227149). * wifi: wilc1000: remove use of has_thrpt_enh3 flag (bsc#1227149). * wifi: wilc1000: set preamble size to auto as default in wilc_init_fw_config() (bsc#1227149). * wifi: wilc1000: simplify remain on channel support (bsc#1227149). * wifi: wilc1000: simplify wilc_scan() (bsc#1227149). * wifi: wilc1000: split deeply nested RCU list traversal in dedicated helper (bsc#1227149). * wifi: wilc1000: use SRCU instead of RCU for vif list traversal (bsc#1227149). * wifi: wilc1000: validate chip id during bus probe (bsc#1227149). * wifi: wl1251: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wl18xx: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: boot: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: main: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: sdio: Rate limit wl12xx_sdio_raw_{read,write}() failures warns (bsc#1227149). * wifi: wlcore: sdio: Use module_sdio_driver macro to simplify the code (bsc#1227149). * wifi: zd1211rw: fix typo "tranmits" (bsc#1227149). * wifi: zd1211rw: remove __nocast from zd_addr_t (bsc#1227149). * wifi: zd1211rw: silence sparse warnings (bsc#1227149). * wlcore: spi: Remove redundant of_match_ptr() (bsc#1227149). * work around gcc bugs with 'asm goto' with outputs (git-fixes). * x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes). * x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes). * x86/amd_nb: Check for invalid SMN reads (git-fixes). * x86/apic: Force native_apic_mem_read() to use the MOV instruction (git- fixes). * x86/asm: Fix build of UML with KASAN (git-fixes). * x86/asm: Remove the __iomem annotation of movdir64b()'s dst argument (git- fixes). * x86/bhi: Avoid warning in #DB handler due to BHI mitigation :(git-fixes). * x86/boot: Ignore NMIs during very early boot (git-fixes). * x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes). * x86/bugs: Remove default case for fully switched enums (git-fixes). * x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git- fixes). * x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes). * x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes). * x86/cpu: Provide default cache line size if not enumerated (git-fixes). * x86/csum: Fix clang -Wuninitialized in csum_partial() (git-fixes). * x86/csum: Improve performance of `csum_partial` (git-fixes). * x86/csum: Remove unnecessary odd handling (git-fixes). * x86/csum: clean up `csum_partial' further (git-fixes). * x86/efistub: Add missing boot_params for mixed mode compat entry (git- fixes). * x86/efistub: Call mixed mode boot services on the firmware's stack (git- fixes). * x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes). * x86/head/64: Move the __head definition to <asm/init.h> (git-fixes). * x86/insn: Add VEX versions of VPDPBUSD, VPDPBUSDS, VPDPWSSD and VPDPWSSDS (git-fixes). * x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git- fixes). * x86/kconfig: Add as-instr64 macro to properly evaluate AS_WRUSS (git-fixes). * x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes). * x86/kexec: Fix bug with call depth tracking (git-fixes). * x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes). * x86/mce: Dynamically size space for machine check records (bsc#1222241). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/mce: Mark fatal MCE's page as poison to avoid panic in the kdump kernel (git-fixes). * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes). * x86/nmi: Fix the inverse "in NMI handler" check (git-fixes). * x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes). * x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes). * x86/purgatory: Switch to the position-independent small code model (git- fixes). * x86/resctrl: Read supported bandwidth sources from CPUID (git-fixes). * x86/resctrl: Remove redundant variable in mbm_config_write_domain() (git- fixes). * x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes). * x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git- fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/sev: Fix position dependent variable references in startup code (git- fixes). * x86/shstk: Make return uprobe work with shadow stack (git-fixes). * x86/speculation, objtool: Use absolute relocations for annotations (git- fixes). * x86/srso: Disentangle rethunk-dependent options (git-fixes). * x86/srso: Fix unret validation dependencies (git-fixes). * x86/srso: Improve i-cache locality for alias mitigation (git-fixes). * x86/srso: Print actual mitigation if requested mitigation isn't possible (git-fixes). * x86/srso: Remove 'pred_cmd' label (git-fixes). * x86/srso: Unexport untraining functions (git-fixes). * x86/tdx: Preserve shared bit on mprotect() (git-fixes). * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962). * x86/uaccess: Fix missed zeroing of ia32 u64 get_user() range checking (git- fixes). * x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502) * xen/x86: add extra pages to unpopulated-alloc if available (git-fixes). * xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228211). * xfs: add lock protection when remove perag from radix tree (git-fixes). * xfs: fix perag leak when growfs fails (git-fixes). * xfs: force all buffers to be written during btree bulk load (git-fixes). * xfs: make xchk_iget safer in the presence of corrupt inode btrees (git- fixes). * xfs: pass the xfs_defer_pending object to iop_recover (git-fixes). * xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes). * xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes). * xfs: use roundup_pow_of_two instead of ffs during xlog_find_tail (git- fixes). * xfs: use xfs_defer_pending objects to recover intent items (git-fixes). * xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes). * xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes). * xhci: Handle TD clearing for multiple streams case (git-fixes). * xhci: Set correct transferred length for cancelled bulk transfers (stable- fixes). * xhci: always resume roothubs if xHC was reset during resume (stable-fixes). * xsk: Add truesize to skb_add_rx_frag() (bsc#1214683 (PREEMPT_RT prerequisite backports)). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-19=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-19=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-rt-6.4.0-9.1 * kernel-devel-rt-6.4.0-9.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-9.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-debuginfo-6.4.0-9.1 * kernel-rt-debugsource-6.4.0-9.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-9.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-9.1 * kernel-rt-devel-debuginfo-6.4.0-9.1 * kernel-rt-debugsource-6.4.0-9.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47432.html * https://www.suse.com/security/cve/CVE-2022-48669.html * https://www.suse.com/security/cve/CVE-2022-48772.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-38417.html * https://www.suse.com/security/cve/CVE-2023-47210.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-52434.html * https://www.suse.com/security/cve/CVE-2023-52435.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52483.html * https://www.suse.com/security/cve/CVE-2023-52616.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52622.html * https://www.suse.com/security/cve/CVE-2023-52635.html * https://www.suse.com/security/cve/CVE-2023-52641.html * https://www.suse.com/security/cve/CVE-2023-52647.html * https://www.suse.com/security/cve/CVE-2023-52648.html * https://www.suse.com/security/cve/CVE-2023-52649.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52652.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52656.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52672.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52685.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52699.html * https://www.suse.com/security/cve/CVE-2023-52735.html * https://www.suse.com/security/cve/CVE-2023-52749.html * https://www.suse.com/security/cve/CVE-2023-52750.html * https://www.suse.com/security/cve/CVE-2023-52751.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52757.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52762.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52765.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52767.html * https://www.suse.com/security/cve/CVE-2023-52768.html * https://www.suse.com/security/cve/CVE-2023-52769.html * https://www.suse.com/security/cve/CVE-2023-52771.html * https://www.suse.com/security/cve/CVE-2023-52772.html * https://www.suse.com/security/cve/CVE-2023-52773.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52775.html * https://www.suse.com/security/cve/CVE-2023-52776.html * https://www.suse.com/security/cve/CVE-2023-52777.html * https://www.suse.com/security/cve/CVE-2023-52780.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52782.html * https://www.suse.com/security/cve/CVE-2023-52783.html * https://www.suse.com/security/cve/CVE-2023-52784.html * https://www.suse.com/security/cve/CVE-2023-52786.html * https://www.suse.com/security/cve/CVE-2023-52787.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52792.html * https://www.suse.com/security/cve/CVE-2023-52794.html * https://www.suse.com/security/cve/CVE-2023-52795.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52801.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52807.html * https://www.suse.com/security/cve/CVE-2023-52808.html * https://www.suse.com/security/cve/CVE-2023-52809.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52812.html * https://www.suse.com/security/cve/CVE-2023-52813.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52815.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52827.html * https://www.suse.com/security/cve/CVE-2023-52829.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52835.html * https://www.suse.com/security/cve/CVE-2023-52836.html * https://www.suse.com/security/cve/CVE-2023-52837.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52842.html * https://www.suse.com/security/cve/CVE-2023-52843.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52845.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52849.html * https://www.suse.com/security/cve/CVE-2023-52850.html * https://www.suse.com/security/cve/CVE-2023-52851.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52857.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52861.html * https://www.suse.com/security/cve/CVE-2023-52862.html * https://www.suse.com/security/cve/CVE-2023-52863.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52866.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52869.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52874.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52879.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52883.html * https://www.suse.com/security/cve/CVE-2023-52884.html * https://www.suse.com/security/cve/CVE-2023-6238.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-21823.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-25741.html * https://www.suse.com/security/cve/CVE-2024-26582.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26615.html * https://www.suse.com/security/cve/CVE-2024-26623.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26632.html * https://www.suse.com/security/cve/CVE-2024-26633.html * https://www.suse.com/security/cve/CVE-2024-26635.html * https://www.suse.com/security/cve/CVE-2024-26636.html * https://www.suse.com/security/cve/CVE-2024-26638.html * https://www.suse.com/security/cve/CVE-2024-26641.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26663.html * https://www.suse.com/security/cve/CVE-2024-26665.html * https://www.suse.com/security/cve/CVE-2024-26671.html * https://www.suse.com/security/cve/CVE-2024-26673.html * https://www.suse.com/security/cve/CVE-2024-26674.html * https://www.suse.com/security/cve/CVE-2024-26676.html * https://www.suse.com/security/cve/CVE-2024-26679.html * https://www.suse.com/security/cve/CVE-2024-26691.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26726.html * https://www.suse.com/security/cve/CVE-2024-26734.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26750.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26760.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26772.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26780.html * https://www.suse.com/security/cve/CVE-2024-26783.html * https://www.suse.com/security/cve/CVE-2024-26785.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26813.html * https://www.suse.com/security/cve/CVE-2024-26814.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26826.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26832.html * https://www.suse.com/security/cve/CVE-2024-26845.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26860.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26862.html * https://www.suse.com/security/cve/CVE-2024-26863.html * https://www.suse.com/security/cve/CVE-2024-26865.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26877.html * https://www.suse.com/security/cve/CVE-2024-26878.html * https://www.suse.com/security/cve/CVE-2024-26880.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26883.html * https://www.suse.com/security/cve/CVE-2024-26884.html * https://www.suse.com/security/cve/CVE-2024-26885.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26890.html * https://www.suse.com/security/cve/CVE-2024-26892.html * https://www.suse.com/security/cve/CVE-2024-26893.html * https://www.suse.com/security/cve/CVE-2024-26895.html * https://www.suse.com/security/cve/CVE-2024-26897.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26899.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26901.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26907.html * https://www.suse.com/security/cve/CVE-2024-26909.html * https://www.suse.com/security/cve/CVE-2024-26913.html * https://www.suse.com/security/cve/CVE-2024-26914.html * https://www.suse.com/security/cve/CVE-2024-26915.html * https://www.suse.com/security/cve/CVE-2024-26916.html * https://www.suse.com/security/cve/CVE-2024-26919.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26927.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26933.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26939.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26944.html * https://www.suse.com/security/cve/CVE-2024-26945.html * https://www.suse.com/security/cve/CVE-2024-26946.html * https://www.suse.com/security/cve/CVE-2024-26948.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26955.html * https://www.suse.com/security/cve/CVE-2024-26956.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26959.html * https://www.suse.com/security/cve/CVE-2024-26960.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26965.html * https://www.suse.com/security/cve/CVE-2024-26966.html * https://www.suse.com/security/cve/CVE-2024-26968.html * https://www.suse.com/security/cve/CVE-2024-26969.html * https://www.suse.com/security/cve/CVE-2024-26970.html * https://www.suse.com/security/cve/CVE-2024-26972.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26974.html * https://www.suse.com/security/cve/CVE-2024-26975.html * https://www.suse.com/security/cve/CVE-2024-26977.html * https://www.suse.com/security/cve/CVE-2024-26978.html * https://www.suse.com/security/cve/CVE-2024-26981.html * https://www.suse.com/security/cve/CVE-2024-26982.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26990.html * https://www.suse.com/security/cve/CVE-2024-26991.html * https://www.suse.com/security/cve/CVE-2024-26992.html * https://www.suse.com/security/cve/CVE-2024-26993.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27009.html * https://www.suse.com/security/cve/CVE-2024-27012.html * https://www.suse.com/security/cve/CVE-2024-27013.html * https://www.suse.com/security/cve/CVE-2024-27014.html * https://www.suse.com/security/cve/CVE-2024-27015.html * https://www.suse.com/security/cve/CVE-2024-27016.html * https://www.suse.com/security/cve/CVE-2024-27019.html * https://www.suse.com/security/cve/CVE-2024-27020.html * https://www.suse.com/security/cve/CVE-2024-27022.html * https://www.suse.com/security/cve/CVE-2024-27023.html * https://www.suse.com/security/cve/CVE-2024-27025.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27036.html * https://www.suse.com/security/cve/CVE-2024-27037.html * https://www.suse.com/security/cve/CVE-2024-27038.html * https://www.suse.com/security/cve/CVE-2024-27039.html * https://www.suse.com/security/cve/CVE-2024-27040.html * https://www.suse.com/security/cve/CVE-2024-27041.html * https://www.suse.com/security/cve/CVE-2024-27042.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27044.html * https://www.suse.com/security/cve/CVE-2024-27045.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27047.html * https://www.suse.com/security/cve/CVE-2024-27048.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-27052.html * https://www.suse.com/security/cve/CVE-2024-27053.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27056.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27060.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27064.html * https://www.suse.com/security/cve/CVE-2024-27065.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27068.html * https://www.suse.com/security/cve/CVE-2024-27071.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27076.html * https://www.suse.com/security/cve/CVE-2024-27077.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27391.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27402.html * https://www.suse.com/security/cve/CVE-2024-27404.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27408.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27414.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27418.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-33619.html * https://www.suse.com/security/cve/CVE-2024-34777.html * https://www.suse.com/security/cve/CVE-2024-35247.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35803.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35805.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35807.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35814.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35827.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35831.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35843.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35848.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35853.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35857.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35880.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35884.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35886.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35890.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35892.html * https://www.suse.com/security/cve/CVE-2024-35893.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35896.html * https://www.suse.com/security/cve/CVE-2024-35898.html * https://www.suse.com/security/cve/CVE-2024-35899.html * https://www.suse.com/security/cve/CVE-2024-35900.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35903.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35908.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35917.html * https://www.suse.com/security/cve/CVE-2024-35921.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35925.html * https://www.suse.com/security/cve/CVE-2024-35926.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35931.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35934.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35942.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35957.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35962.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35970.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35976.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35979.html * https://www.suse.com/security/cve/CVE-2024-35981.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35991.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-35998.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36003.html * https://www.suse.com/security/cve/CVE-2024-36004.html * https://www.suse.com/security/cve/CVE-2024-36005.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36008.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36010.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36013.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36017.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36024.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36030.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36281.html * https://www.suse.com/security/cve/CVE-2024-36477.html * https://www.suse.com/security/cve/CVE-2024-36478.html * https://www.suse.com/security/cve/CVE-2024-36479.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36882.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36887.html * https://www.suse.com/security/cve/CVE-2024-36889.html * https://www.suse.com/security/cve/CVE-2024-36890.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36900.html * https://www.suse.com/security/cve/CVE-2024-36901.html * https://www.suse.com/security/cve/CVE-2024-36902.html * https://www.suse.com/security/cve/CVE-2024-36903.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36909.html * https://www.suse.com/security/cve/CVE-2024-36910.html * https://www.suse.com/security/cve/CVE-2024-36911.html * https://www.suse.com/security/cve/CVE-2024-36912.html * https://www.suse.com/security/cve/CVE-2024-36913.html * https://www.suse.com/security/cve/CVE-2024-36914.html * https://www.suse.com/security/cve/CVE-2024-36915.html * https://www.suse.com/security/cve/CVE-2024-36916.html * https://www.suse.com/security/cve/CVE-2024-36917.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36919.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36923.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36934.html * https://www.suse.com/security/cve/CVE-2024-36935.html * https://www.suse.com/security/cve/CVE-2024-36936.html * https://www.suse.com/security/cve/CVE-2024-36937.html * https://www.suse.com/security/cve/CVE-2024-36938.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36945.html * https://www.suse.com/security/cve/CVE-2024-36946.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36957.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-36960.html * https://www.suse.com/security/cve/CVE-2024-36962.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-36965.html * https://www.suse.com/security/cve/CVE-2024-36967.html * https://www.suse.com/security/cve/CVE-2024-36969.html * https://www.suse.com/security/cve/CVE-2024-36971.html * https://www.suse.com/security/cve/CVE-2024-36972.html * https://www.suse.com/security/cve/CVE-2024-36973.html * https://www.suse.com/security/cve/CVE-2024-36974.html * https://www.suse.com/security/cve/CVE-2024-36975.html * https://www.suse.com/security/cve/CVE-2024-36977.html * https://www.suse.com/security/cve/CVE-2024-36978.html * https://www.suse.com/security/cve/CVE-2024-37021.html * https://www.suse.com/security/cve/CVE-2024-37078.html * https://www.suse.com/security/cve/CVE-2024-37353.html * https://www.suse.com/security/cve/CVE-2024-37354.html * https://www.suse.com/security/cve/CVE-2024-38381.html * https://www.suse.com/security/cve/CVE-2024-38384.html * https://www.suse.com/security/cve/CVE-2024-38385.html * https://www.suse.com/security/cve/CVE-2024-38388.html * https://www.suse.com/security/cve/CVE-2024-38390.html * https://www.suse.com/security/cve/CVE-2024-38391.html * https://www.suse.com/security/cve/CVE-2024-38539.html * https://www.suse.com/security/cve/CVE-2024-38540.html * https://www.suse.com/security/cve/CVE-2024-38541.html * https://www.suse.com/security/cve/CVE-2024-38543.html * https://www.suse.com/security/cve/CVE-2024-38544.html * https://www.suse.com/security/cve/CVE-2024-38545.html * https://www.suse.com/security/cve/CVE-2024-38546.html * https://www.suse.com/security/cve/CVE-2024-38547.html * https://www.suse.com/security/cve/CVE-2024-38548.html * https://www.suse.com/security/cve/CVE-2024-38549.html * https://www.suse.com/security/cve/CVE-2024-38550.html * https://www.suse.com/security/cve/CVE-2024-38551.html * https://www.suse.com/security/cve/CVE-2024-38552.html * https://www.suse.com/security/cve/CVE-2024-38553.html * https://www.suse.com/security/cve/CVE-2024-38554.html * https://www.suse.com/security/cve/CVE-2024-38555.html * https://www.suse.com/security/cve/CVE-2024-38556.html * https://www.suse.com/security/cve/CVE-2024-38557.html * https://www.suse.com/security/cve/CVE-2024-38558.html * https://www.suse.com/security/cve/CVE-2024-38559.html * https://www.suse.com/security/cve/CVE-2024-38560.html * https://www.suse.com/security/cve/CVE-2024-38562.html * https://www.suse.com/security/cve/CVE-2024-38564.html * https://www.suse.com/security/cve/CVE-2024-38565.html * https://www.suse.com/security/cve/CVE-2024-38566.html * https://www.suse.com/security/cve/CVE-2024-38567.html * https://www.suse.com/security/cve/CVE-2024-38568.html * https://www.suse.com/security/cve/CVE-2024-38569.html * https://www.suse.com/security/cve/CVE-2024-38570.html * https://www.suse.com/security/cve/CVE-2024-38571.html * https://www.suse.com/security/cve/CVE-2024-38572.html * https://www.suse.com/security/cve/CVE-2024-38573.html * https://www.suse.com/security/cve/CVE-2024-38575.html * https://www.suse.com/security/cve/CVE-2024-38578.html * https://www.suse.com/security/cve/CVE-2024-38579.html * https://www.suse.com/security/cve/CVE-2024-38580.html * https://www.suse.com/security/cve/CVE-2024-38581.html * https://www.suse.com/security/cve/CVE-2024-38582.html * https://www.suse.com/security/cve/CVE-2024-38583.html * https://www.suse.com/security/cve/CVE-2024-38586.html * https://www.suse.com/security/cve/CVE-2024-38587.html * https://www.suse.com/security/cve/CVE-2024-38588.html * https://www.suse.com/security/cve/CVE-2024-38590.html * https://www.suse.com/security/cve/CVE-2024-38591.html * https://www.suse.com/security/cve/CVE-2024-38592.html * https://www.suse.com/security/cve/CVE-2024-38594.html * https://www.suse.com/security/cve/CVE-2024-38595.html * https://www.suse.com/security/cve/CVE-2024-38597.html * https://www.suse.com/security/cve/CVE-2024-38598.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-38600.html * https://www.suse.com/security/cve/CVE-2024-38601.html * https://www.suse.com/security/cve/CVE-2024-38602.html * https://www.suse.com/security/cve/CVE-2024-38603.html * https://www.suse.com/security/cve/CVE-2024-38604.html * https://www.suse.com/security/cve/CVE-2024-38605.html * https://www.suse.com/security/cve/CVE-2024-38608.html * https://www.suse.com/security/cve/CVE-2024-38610.html * https://www.suse.com/security/cve/CVE-2024-38611.html * https://www.suse.com/security/cve/CVE-2024-38615.html * https://www.suse.com/security/cve/CVE-2024-38616.html * https://www.suse.com/security/cve/CVE-2024-38617.html * https://www.suse.com/security/cve/CVE-2024-38618.html * https://www.suse.com/security/cve/CVE-2024-38619.html * https://www.suse.com/security/cve/CVE-2024-38621.html * https://www.suse.com/security/cve/CVE-2024-38622.html * https://www.suse.com/security/cve/CVE-2024-38627.html * https://www.suse.com/security/cve/CVE-2024-38628.html * https://www.suse.com/security/cve/CVE-2024-38629.html * https://www.suse.com/security/cve/CVE-2024-38630.html * https://www.suse.com/security/cve/CVE-2024-38633.html * https://www.suse.com/security/cve/CVE-2024-38634.html * https://www.suse.com/security/cve/CVE-2024-38635.html * https://www.suse.com/security/cve/CVE-2024-38636.html * https://www.suse.com/security/cve/CVE-2024-38659.html * https://www.suse.com/security/cve/CVE-2024-38661.html * https://www.suse.com/security/cve/CVE-2024-38663.html * https://www.suse.com/security/cve/CVE-2024-38664.html * https://www.suse.com/security/cve/CVE-2024-38780.html * https://www.suse.com/security/cve/CVE-2024-39276.html * https://www.suse.com/security/cve/CVE-2024-39277.html * https://www.suse.com/security/cve/CVE-2024-39291.html * https://www.suse.com/security/cve/CVE-2024-39296.html * https://www.suse.com/security/cve/CVE-2024-39301.html * https://www.suse.com/security/cve/CVE-2024-39362.html * https://www.suse.com/security/cve/CVE-2024-39371.html * https://www.suse.com/security/cve/CVE-2024-39463.html * https://www.suse.com/security/cve/CVE-2024-39466.html * https://www.suse.com/security/cve/CVE-2024-39468.html * https://www.suse.com/security/cve/CVE-2024-39469.html * https://www.suse.com/security/cve/CVE-2024-39471.html * https://www.suse.com/security/cve/CVE-2024-39472.html * https://www.suse.com/security/cve/CVE-2024-39473.html * https://www.suse.com/security/cve/CVE-2024-39474.html * https://www.suse.com/security/cve/CVE-2024-39475.html * https://www.suse.com/security/cve/CVE-2024-39479.html * https://www.suse.com/security/cve/CVE-2024-39481.html * https://www.suse.com/security/cve/CVE-2024-39482.html * https://www.suse.com/security/cve/CVE-2024-39487.html * https://www.suse.com/security/cve/CVE-2024-39490.html * https://www.suse.com/security/cve/CVE-2024-39494.html * https://www.suse.com/security/cve/CVE-2024-39496.html * https://www.suse.com/security/cve/CVE-2024-39498.html * https://www.suse.com/security/cve/CVE-2024-39502.html * https://www.suse.com/security/cve/CVE-2024-39504.html * https://www.suse.com/security/cve/CVE-2024-39507.html * https://www.suse.com/security/cve/CVE-2024-40901.html * https://www.suse.com/security/cve/CVE-2024-40906.html * https://www.suse.com/security/cve/CVE-2024-40908.html * https://www.suse.com/security/cve/CVE-2024-40919.html * https://www.suse.com/security/cve/CVE-2024-40923.html * https://www.suse.com/security/cve/CVE-2024-40925.html * https://www.suse.com/security/cve/CVE-2024-40928.html * https://www.suse.com/security/cve/CVE-2024-40931.html * https://www.suse.com/security/cve/CVE-2024-40935.html * https://www.suse.com/security/cve/CVE-2024-40937.html * https://www.suse.com/security/cve/CVE-2024-40940.html * https://www.suse.com/security/cve/CVE-2024-40947.html * https://www.suse.com/security/cve/CVE-2024-40948.html * https://www.suse.com/security/cve/CVE-2024-40953.html * https://www.suse.com/security/cve/CVE-2024-40960.html * https://www.suse.com/security/cve/CVE-2024-40961.html * https://www.suse.com/security/cve/CVE-2024-40966.html * https://www.suse.com/security/cve/CVE-2024-40970.html * https://www.suse.com/security/cve/CVE-2024-40972.html * https://www.suse.com/security/cve/CVE-2024-40975.html * https://www.suse.com/security/cve/CVE-2024-40979.html * https://www.suse.com/security/cve/CVE-2024-40998.html * https://www.suse.com/security/cve/CVE-2024-40999.html * https://www.suse.com/security/cve/CVE-2024-41006.html * https://www.suse.com/security/cve/CVE-2024-41011.html * https://www.suse.com/security/cve/CVE-2024-41013.html * https://www.suse.com/security/cve/CVE-2024-41014.html * https://www.suse.com/security/cve/CVE-2024-41017.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-41091.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1186716 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1193599 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1195775 * https://bugzilla.suse.com/show_bug.cgi?id=1204562 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208593 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1213573 * https://bugzilla.suse.com/show_bug.cgi?id=1214683 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215587 * https://bugzilla.suse.com/show_bug.cgi?id=1216196 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216436 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217384 * https://bugzilla.suse.com/show_bug.cgi?id=1217408 * https://bugzilla.suse.com/show_bug.cgi?id=1217481 * https://bugzilla.suse.com/show_bug.cgi?id=1217750 * https://bugzilla.suse.com/show_bug.cgi?id=1217912 * https://bugzilla.suse.com/show_bug.cgi?id=1218442 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218820 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219216 * https://bugzilla.suse.com/show_bug.cgi?id=1219224 * https://bugzilla.suse.com/show_bug.cgi?id=1219451 * https://bugzilla.suse.com/show_bug.cgi?id=1219478 * https://bugzilla.suse.com/show_bug.cgi?id=1219485 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219633 * https://bugzilla.suse.com/show_bug.cgi?id=1219832 * https://bugzilla.suse.com/show_bug.cgi?id=1219847 * https://bugzilla.suse.com/show_bug.cgi?id=1219953 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220120 * https://bugzilla.suse.com/show_bug.cgi?id=1220138 * https://bugzilla.suse.com/show_bug.cgi?id=1220148 * https://bugzilla.suse.com/show_bug.cgi?id=1220214 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220427 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220569 * https://bugzilla.suse.com/show_bug.cgi?id=1220738 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1220942 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221057 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221097 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221612 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221635 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221647 * https://bugzilla.suse.com/show_bug.cgi?id=1221649 * https://bugzilla.suse.com/show_bug.cgi?id=1221654 * https://bugzilla.suse.com/show_bug.cgi?id=1221656 * https://bugzilla.suse.com/show_bug.cgi?id=1221659 * https://bugzilla.suse.com/show_bug.cgi?id=1221765 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1221958 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222015 * https://bugzilla.suse.com/show_bug.cgi?id=1222080 * https://bugzilla.suse.com/show_bug.cgi?id=1222241 * https://bugzilla.suse.com/show_bug.cgi?id=1222294 * https://bugzilla.suse.com/show_bug.cgi?id=1222303 * https://bugzilla.suse.com/show_bug.cgi?id=1222326 * https://bugzilla.suse.com/show_bug.cgi?id=1222328 * https://bugzilla.suse.com/show_bug.cgi?id=1222357 * https://bugzilla.suse.com/show_bug.cgi?id=1222368 * https://bugzilla.suse.com/show_bug.cgi?id=1222378 * https://bugzilla.suse.com/show_bug.cgi?id=1222380 * https://bugzilla.suse.com/show_bug.cgi?id=1222385 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222438 * https://bugzilla.suse.com/show_bug.cgi?id=1222459 * https://bugzilla.suse.com/show_bug.cgi?id=1222463 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222532 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222588 * https://bugzilla.suse.com/show_bug.cgi?id=1222596 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222613 * https://bugzilla.suse.com/show_bug.cgi?id=1222615 * https://bugzilla.suse.com/show_bug.cgi?id=1222617 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222654 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222768 * https://bugzilla.suse.com/show_bug.cgi?id=1222769 * https://bugzilla.suse.com/show_bug.cgi?id=1222771 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222777 * https://bugzilla.suse.com/show_bug.cgi?id=1222779 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1222782 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222809 * https://bugzilla.suse.com/show_bug.cgi?id=1222810 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1223007 * https://bugzilla.suse.com/show_bug.cgi?id=1223010 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223018 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223021 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223035 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223045 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223057 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223060 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223062 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223077 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223111 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223137 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223140 * https://bugzilla.suse.com/show_bug.cgi?id=1223143 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223188 * https://bugzilla.suse.com/show_bug.cgi?id=1223189 * https://bugzilla.suse.com/show_bug.cgi?id=1223190 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223192 * https://bugzilla.suse.com/show_bug.cgi?id=1223195 * https://bugzilla.suse.com/show_bug.cgi?id=1223196 * https://bugzilla.suse.com/show_bug.cgi?id=1223197 * https://bugzilla.suse.com/show_bug.cgi?id=1223198 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223203 * https://bugzilla.suse.com/show_bug.cgi?id=1223204 * https://bugzilla.suse.com/show_bug.cgi?id=1223205 * https://bugzilla.suse.com/show_bug.cgi?id=1223207 * https://bugzilla.suse.com/show_bug.cgi?id=1223265 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223323 * https://bugzilla.suse.com/show_bug.cgi?id=1223338 * https://bugzilla.suse.com/show_bug.cgi?id=1223357 * https://bugzilla.suse.com/show_bug.cgi?id=1223369 * https://bugzilla.suse.com/show_bug.cgi?id=1223380 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223415 * https://bugzilla.suse.com/show_bug.cgi?id=1223439 * https://bugzilla.suse.com/show_bug.cgi?id=1223462 * https://bugzilla.suse.com/show_bug.cgi?id=1223525 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223570 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223590 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223593 * https://bugzilla.suse.com/show_bug.cgi?id=1223625 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223629 * https://bugzilla.suse.com/show_bug.cgi?id=1223631 * https://bugzilla.suse.com/show_bug.cgi?id=1223632 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223634 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223638 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223642 * https://bugzilla.suse.com/show_bug.cgi?id=1223643 * https://bugzilla.suse.com/show_bug.cgi?id=1223644 * https://bugzilla.suse.com/show_bug.cgi?id=1223645 * https://bugzilla.suse.com/show_bug.cgi?id=1223646 * https://bugzilla.suse.com/show_bug.cgi?id=1223648 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223655 * https://bugzilla.suse.com/show_bug.cgi?id=1223657 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223663 * https://bugzilla.suse.com/show_bug.cgi?id=1223664 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223667 * https://bugzilla.suse.com/show_bug.cgi?id=1223668 * https://bugzilla.suse.com/show_bug.cgi?id=1223669 * https://bugzilla.suse.com/show_bug.cgi?id=1223670 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223679 * https://bugzilla.suse.com/show_bug.cgi?id=1223686 * https://bugzilla.suse.com/show_bug.cgi?id=1223692 * https://bugzilla.suse.com/show_bug.cgi?id=1223693 * https://bugzilla.suse.com/show_bug.cgi?id=1223695 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223699 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223709 * https://bugzilla.suse.com/show_bug.cgi?id=1223711 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223714 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223717 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223723 * https://bugzilla.suse.com/show_bug.cgi?id=1223725 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223732 * https://bugzilla.suse.com/show_bug.cgi?id=1223734 * https://bugzilla.suse.com/show_bug.cgi?id=1223735 * https://bugzilla.suse.com/show_bug.cgi?id=1223737 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223740 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223745 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223749 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223756 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223760 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223764 * https://bugzilla.suse.com/show_bug.cgi?id=1223765 * https://bugzilla.suse.com/show_bug.cgi?id=1223768 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223774 * https://bugzilla.suse.com/show_bug.cgi?id=1223776 * https://bugzilla.suse.com/show_bug.cgi?id=1223778 * https://bugzilla.suse.com/show_bug.cgi?id=1223779 * https://bugzilla.suse.com/show_bug.cgi?id=1223780 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223804 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223806 * https://bugzilla.suse.com/show_bug.cgi?id=1223807 * https://bugzilla.suse.com/show_bug.cgi?id=1223808 * https://bugzilla.suse.com/show_bug.cgi?id=1223810 * https://bugzilla.suse.com/show_bug.cgi?id=1223813 * https://bugzilla.suse.com/show_bug.cgi?id=1223815 * https://bugzilla.suse.com/show_bug.cgi?id=1223816 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223821 * https://bugzilla.suse.com/show_bug.cgi?id=1223822 * https://bugzilla.suse.com/show_bug.cgi?id=1223823 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223826 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223828 * https://bugzilla.suse.com/show_bug.cgi?id=1223829 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223836 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223838 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223847 * https://bugzilla.suse.com/show_bug.cgi?id=1223863 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223870 * https://bugzilla.suse.com/show_bug.cgi?id=1223871 * https://bugzilla.suse.com/show_bug.cgi?id=1223872 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1223944 * https://bugzilla.suse.com/show_bug.cgi?id=1223945 * https://bugzilla.suse.com/show_bug.cgi?id=1223946 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224187 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224348 * https://bugzilla.suse.com/show_bug.cgi?id=1224414 * https://bugzilla.suse.com/show_bug.cgi?id=1224422 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224430 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224439 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224477 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224481 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224490 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224493 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224497 * https://bugzilla.suse.com/show_bug.cgi?id=1224498 * https://bugzilla.suse.com/show_bug.cgi?id=1224499 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224512 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224515 * https://bugzilla.suse.com/show_bug.cgi?id=1224516 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224520 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224523 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224539 * https://bugzilla.suse.com/show_bug.cgi?id=1224540 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224544 * https://bugzilla.suse.com/show_bug.cgi?id=1224545 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224549 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224553 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224565 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224572 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224575 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224583 * https://bugzilla.suse.com/show_bug.cgi?id=1224584 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224589 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224602 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224604 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224606 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224612 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224614 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224619 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224641 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224652 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224655 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224659 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224661 * https://bugzilla.suse.com/show_bug.cgi?id=1224662 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224670 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224673 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224698 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224720 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224728 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224735 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224742 * https://bugzilla.suse.com/show_bug.cgi?id=1224743 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224751 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224767 * https://bugzilla.suse.com/show_bug.cgi?id=1224790 * https://bugzilla.suse.com/show_bug.cgi?id=1224792 * https://bugzilla.suse.com/show_bug.cgi?id=1224793 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1224866 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224933 * https://bugzilla.suse.com/show_bug.cgi?id=1224935 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224939 * https://bugzilla.suse.com/show_bug.cgi?id=1224941 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224946 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224949 * https://bugzilla.suse.com/show_bug.cgi?id=1224951 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1224989 * https://bugzilla.suse.com/show_bug.cgi?id=1224992 * https://bugzilla.suse.com/show_bug.cgi?id=1224998 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225001 * https://bugzilla.suse.com/show_bug.cgi?id=1225004 * https://bugzilla.suse.com/show_bug.cgi?id=1225006 * https://bugzilla.suse.com/show_bug.cgi?id=1225007 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225014 * https://bugzilla.suse.com/show_bug.cgi?id=1225015 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225025 * https://bugzilla.suse.com/show_bug.cgi?id=1225028 * https://bugzilla.suse.com/show_bug.cgi?id=1225029 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225041 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225049 * https://bugzilla.suse.com/show_bug.cgi?id=1225050 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225078 * https://bugzilla.suse.com/show_bug.cgi?id=1225081 * https://bugzilla.suse.com/show_bug.cgi?id=1225085 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225088 * https://bugzilla.suse.com/show_bug.cgi?id=1225090 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225097 * https://bugzilla.suse.com/show_bug.cgi?id=1225098 * https://bugzilla.suse.com/show_bug.cgi?id=1225101 * https://bugzilla.suse.com/show_bug.cgi?id=1225103 * https://bugzilla.suse.com/show_bug.cgi?id=1225104 * https://bugzilla.suse.com/show_bug.cgi?id=1225105 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225120 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225133 * https://bugzilla.suse.com/show_bug.cgi?id=1225134 * https://bugzilla.suse.com/show_bug.cgi?id=1225136 * https://bugzilla.suse.com/show_bug.cgi?id=1225172 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225272 * https://bugzilla.suse.com/show_bug.cgi?id=1225300 * https://bugzilla.suse.com/show_bug.cgi?id=1225391 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225476 * https://bugzilla.suse.com/show_bug.cgi?id=1225477 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225485 * https://bugzilla.suse.com/show_bug.cgi?id=1225489 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225527 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225548 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225555 * https://bugzilla.suse.com/show_bug.cgi?id=1225556 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225564 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225568 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225573 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225578 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225580 * https://bugzilla.suse.com/show_bug.cgi?id=1225581 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225585 * https://bugzilla.suse.com/show_bug.cgi?id=1225586 * https://bugzilla.suse.com/show_bug.cgi?id=1225587 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225594 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://bugzilla.suse.com/show_bug.cgi?id=1225600 * https://bugzilla.suse.com/show_bug.cgi?id=1225601 * https://bugzilla.suse.com/show_bug.cgi?id=1225602 * https://bugzilla.suse.com/show_bug.cgi?id=1225605 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225609 * https://bugzilla.suse.com/show_bug.cgi?id=1225610 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225618 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225681 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225696 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225702 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225711 * https://bugzilla.suse.com/show_bug.cgi?id=1225712 * https://bugzilla.suse.com/show_bug.cgi?id=1225714 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225717 * https://bugzilla.suse.com/show_bug.cgi?id=1225719 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225723 * https://bugzilla.suse.com/show_bug.cgi?id=1225726 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225731 * https://bugzilla.suse.com/show_bug.cgi?id=1225732 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225737 * https://bugzilla.suse.com/show_bug.cgi?id=1225741 * https://bugzilla.suse.com/show_bug.cgi?id=1225744 * https://bugzilla.suse.com/show_bug.cgi?id=1225745 * https://bugzilla.suse.com/show_bug.cgi?id=1225746 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225752 * https://bugzilla.suse.com/show_bug.cgi?id=1225753 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225757 * https://bugzilla.suse.com/show_bug.cgi?id=1225758 * https://bugzilla.suse.com/show_bug.cgi?id=1225759 * https://bugzilla.suse.com/show_bug.cgi?id=1225760 * https://bugzilla.suse.com/show_bug.cgi?id=1225761 * https://bugzilla.suse.com/show_bug.cgi?id=1225762 * https://bugzilla.suse.com/show_bug.cgi?id=1225763 * https://bugzilla.suse.com/show_bug.cgi?id=1225765 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225767 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225773 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225805 * https://bugzilla.suse.com/show_bug.cgi?id=1225810 * https://bugzilla.suse.com/show_bug.cgi?id=1225815 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225823 * https://bugzilla.suse.com/show_bug.cgi?id=1225827 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1225830 * https://bugzilla.suse.com/show_bug.cgi?id=1225834 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225839 * https://bugzilla.suse.com/show_bug.cgi?id=1225840 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://bugzilla.suse.com/show_bug.cgi?id=1225843 * https://bugzilla.suse.com/show_bug.cgi?id=1225847 * https://bugzilla.suse.com/show_bug.cgi?id=1225851 * https://bugzilla.suse.com/show_bug.cgi?id=1225856 * https://bugzilla.suse.com/show_bug.cgi?id=1225866 * https://bugzilla.suse.com/show_bug.cgi?id=1225872 * https://bugzilla.suse.com/show_bug.cgi?id=1225894 * https://bugzilla.suse.com/show_bug.cgi?id=1225895 * https://bugzilla.suse.com/show_bug.cgi?id=1225896 * https://bugzilla.suse.com/show_bug.cgi?id=1225898 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1225945 * https://bugzilla.suse.com/show_bug.cgi?id=1226022 * https://bugzilla.suse.com/show_bug.cgi?id=1226131 * https://bugzilla.suse.com/show_bug.cgi?id=1226145 * https://bugzilla.suse.com/show_bug.cgi?id=1226149 * https://bugzilla.suse.com/show_bug.cgi?id=1226155 * https://bugzilla.suse.com/show_bug.cgi?id=1226158 * https://bugzilla.suse.com/show_bug.cgi?id=1226163 * https://bugzilla.suse.com/show_bug.cgi?id=1226202 * https://bugzilla.suse.com/show_bug.cgi?id=1226211 * https://bugzilla.suse.com/show_bug.cgi?id=1226212 * https://bugzilla.suse.com/show_bug.cgi?id=1226213 * https://bugzilla.suse.com/show_bug.cgi?id=1226226 * https://bugzilla.suse.com/show_bug.cgi?id=1226457 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226503 * https://bugzilla.suse.com/show_bug.cgi?id=1226513 * https://bugzilla.suse.com/show_bug.cgi?id=1226514 * https://bugzilla.suse.com/show_bug.cgi?id=1226519 * https://bugzilla.suse.com/show_bug.cgi?id=1226520 * https://bugzilla.suse.com/show_bug.cgi?id=1226582 * https://bugzilla.suse.com/show_bug.cgi?id=1226587 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226592 * https://bugzilla.suse.com/show_bug.cgi?id=1226593 * https://bugzilla.suse.com/show_bug.cgi?id=1226594 * https://bugzilla.suse.com/show_bug.cgi?id=1226595 * https://bugzilla.suse.com/show_bug.cgi?id=1226597 * https://bugzilla.suse.com/show_bug.cgi?id=1226607 * https://bugzilla.suse.com/show_bug.cgi?id=1226608 * https://bugzilla.suse.com/show_bug.cgi?id=1226610 * https://bugzilla.suse.com/show_bug.cgi?id=1226612 * https://bugzilla.suse.com/show_bug.cgi?id=1226613 * https://bugzilla.suse.com/show_bug.cgi?id=1226630 * https://bugzilla.suse.com/show_bug.cgi?id=1226632 * https://bugzilla.suse.com/show_bug.cgi?id=1226633 * https://bugzilla.suse.com/show_bug.cgi?id=1226634 * https://bugzilla.suse.com/show_bug.cgi?id=1226637 * https://bugzilla.suse.com/show_bug.cgi?id=1226657 * https://bugzilla.suse.com/show_bug.cgi?id=1226658 * https://bugzilla.suse.com/show_bug.cgi?id=1226734 * https://bugzilla.suse.com/show_bug.cgi?id=1226735 * https://bugzilla.suse.com/show_bug.cgi?id=1226737 * https://bugzilla.suse.com/show_bug.cgi?id=1226738 * https://bugzilla.suse.com/show_bug.cgi?id=1226739 * https://bugzilla.suse.com/show_bug.cgi?id=1226740 * https://bugzilla.suse.com/show_bug.cgi?id=1226741 * https://bugzilla.suse.com/show_bug.cgi?id=1226742 * https://bugzilla.suse.com/show_bug.cgi?id=1226744 * https://bugzilla.suse.com/show_bug.cgi?id=1226746 * https://bugzilla.suse.com/show_bug.cgi?id=1226747 * https://bugzilla.suse.com/show_bug.cgi?id=1226749 * https://bugzilla.suse.com/show_bug.cgi?id=1226750 * https://bugzilla.suse.com/show_bug.cgi?id=1226754 * https://bugzilla.suse.com/show_bug.cgi?id=1226757 * https://bugzilla.suse.com/show_bug.cgi?id=1226758 * https://bugzilla.suse.com/show_bug.cgi?id=1226760 * https://bugzilla.suse.com/show_bug.cgi?id=1226761 * https://bugzilla.suse.com/show_bug.cgi?id=1226764 * https://bugzilla.suse.com/show_bug.cgi?id=1226767 * https://bugzilla.suse.com/show_bug.cgi?id=1226768 * https://bugzilla.suse.com/show_bug.cgi?id=1226769 * https://bugzilla.suse.com/show_bug.cgi?id=1226771 * https://bugzilla.suse.com/show_bug.cgi?id=1226772 * https://bugzilla.suse.com/show_bug.cgi?id=1226774 * https://bugzilla.suse.com/show_bug.cgi?id=1226775 * https://bugzilla.suse.com/show_bug.cgi?id=1226776 * https://bugzilla.suse.com/show_bug.cgi?id=1226777 * https://bugzilla.suse.com/show_bug.cgi?id=1226780 * https://bugzilla.suse.com/show_bug.cgi?id=1226781 * https://bugzilla.suse.com/show_bug.cgi?id=1226783 * https://bugzilla.suse.com/show_bug.cgi?id=1226785 * https://bugzilla.suse.com/show_bug.cgi?id=1226786 * https://bugzilla.suse.com/show_bug.cgi?id=1226788 * https://bugzilla.suse.com/show_bug.cgi?id=1226789 * https://bugzilla.suse.com/show_bug.cgi?id=1226790 * https://bugzilla.suse.com/show_bug.cgi?id=1226791 * https://bugzilla.suse.com/show_bug.cgi?id=1226796 * https://bugzilla.suse.com/show_bug.cgi?id=1226799 * https://bugzilla.suse.com/show_bug.cgi?id=1226837 * https://bugzilla.suse.com/show_bug.cgi?id=1226839 * https://bugzilla.suse.com/show_bug.cgi?id=1226840 * https://bugzilla.suse.com/show_bug.cgi?id=1226841 * https://bugzilla.suse.com/show_bug.cgi?id=1226842 * https://bugzilla.suse.com/show_bug.cgi?id=1226844 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226852 * https://bugzilla.suse.com/show_bug.cgi?id=1226856 * https://bugzilla.suse.com/show_bug.cgi?id=1226857 * https://bugzilla.suse.com/show_bug.cgi?id=1226859 * https://bugzilla.suse.com/show_bug.cgi?id=1226861 * https://bugzilla.suse.com/show_bug.cgi?id=1226863 * https://bugzilla.suse.com/show_bug.cgi?id=1226864 * https://bugzilla.suse.com/show_bug.cgi?id=1226866 * https://bugzilla.suse.com/show_bug.cgi?id=1226867 * https://bugzilla.suse.com/show_bug.cgi?id=1226868 * https://bugzilla.suse.com/show_bug.cgi?id=1226875 * https://bugzilla.suse.com/show_bug.cgi?id=1226876 * https://bugzilla.suse.com/show_bug.cgi?id=1226878 * https://bugzilla.suse.com/show_bug.cgi?id=1226879 * https://bugzilla.suse.com/show_bug.cgi?id=1226883 * https://bugzilla.suse.com/show_bug.cgi?id=1226886 * https://bugzilla.suse.com/show_bug.cgi?id=1226890 * https://bugzilla.suse.com/show_bug.cgi?id=1226891 * https://bugzilla.suse.com/show_bug.cgi?id=1226894 * https://bugzilla.suse.com/show_bug.cgi?id=1226895 * https://bugzilla.suse.com/show_bug.cgi?id=1226905 * https://bugzilla.suse.com/show_bug.cgi?id=1226908 * https://bugzilla.suse.com/show_bug.cgi?id=1226909 * https://bugzilla.suse.com/show_bug.cgi?id=1226911 * https://bugzilla.suse.com/show_bug.cgi?id=1226915 * https://bugzilla.suse.com/show_bug.cgi?id=1226928 * https://bugzilla.suse.com/show_bug.cgi?id=1226934 * https://bugzilla.suse.com/show_bug.cgi?id=1226938 * https://bugzilla.suse.com/show_bug.cgi?id=1226939 * https://bugzilla.suse.com/show_bug.cgi?id=1226941 * https://bugzilla.suse.com/show_bug.cgi?id=1226948 * https://bugzilla.suse.com/show_bug.cgi?id=1226949 * https://bugzilla.suse.com/show_bug.cgi?id=1226950 * https://bugzilla.suse.com/show_bug.cgi?id=1226962 * https://bugzilla.suse.com/show_bug.cgi?id=1226976 * https://bugzilla.suse.com/show_bug.cgi?id=1226989 * https://bugzilla.suse.com/show_bug.cgi?id=1226990 * https://bugzilla.suse.com/show_bug.cgi?id=1226992 * https://bugzilla.suse.com/show_bug.cgi?id=1226993 * https://bugzilla.suse.com/show_bug.cgi?id=1226994 * https://bugzilla.suse.com/show_bug.cgi?id=1226995 * https://bugzilla.suse.com/show_bug.cgi?id=1226996 * https://bugzilla.suse.com/show_bug.cgi?id=1227066 * https://bugzilla.suse.com/show_bug.cgi?id=1227072 * https://bugzilla.suse.com/show_bug.cgi?id=1227085 * https://bugzilla.suse.com/show_bug.cgi?id=1227089 * https://bugzilla.suse.com/show_bug.cgi?id=1227090 * https://bugzilla.suse.com/show_bug.cgi?id=1227096 * https://bugzilla.suse.com/show_bug.cgi?id=1227101 * https://bugzilla.suse.com/show_bug.cgi?id=1227103 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227190 * https://bugzilla.suse.com/show_bug.cgi?id=1227282 * https://bugzilla.suse.com/show_bug.cgi?id=1227362 * https://bugzilla.suse.com/show_bug.cgi?id=1227363 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227432 * https://bugzilla.suse.com/show_bug.cgi?id=1227433 * https://bugzilla.suse.com/show_bug.cgi?id=1227434 * https://bugzilla.suse.com/show_bug.cgi?id=1227435 * https://bugzilla.suse.com/show_bug.cgi?id=1227443 * https://bugzilla.suse.com/show_bug.cgi?id=1227446 * https://bugzilla.suse.com/show_bug.cgi?id=1227447 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227573 * https://bugzilla.suse.com/show_bug.cgi?id=1227626 * https://bugzilla.suse.com/show_bug.cgi?id=1227716 * https://bugzilla.suse.com/show_bug.cgi?id=1227719 * https://bugzilla.suse.com/show_bug.cgi?id=1227723 * https://bugzilla.suse.com/show_bug.cgi?id=1227730 * https://bugzilla.suse.com/show_bug.cgi?id=1227736 * https://bugzilla.suse.com/show_bug.cgi?id=1227755 * https://bugzilla.suse.com/show_bug.cgi?id=1227757 * https://bugzilla.suse.com/show_bug.cgi?id=1227762 * https://bugzilla.suse.com/show_bug.cgi?id=1227763 * https://bugzilla.suse.com/show_bug.cgi?id=1227779 * https://bugzilla.suse.com/show_bug.cgi?id=1227780 * https://bugzilla.suse.com/show_bug.cgi?id=1227783 * https://bugzilla.suse.com/show_bug.cgi?id=1227786 * https://bugzilla.suse.com/show_bug.cgi?id=1227788 * https://bugzilla.suse.com/show_bug.cgi?id=1227789 * https://bugzilla.suse.com/show_bug.cgi?id=1227797 * https://bugzilla.suse.com/show_bug.cgi?id=1227800 * https://bugzilla.suse.com/show_bug.cgi?id=1227801 * https://bugzilla.suse.com/show_bug.cgi?id=1227803 * https://bugzilla.suse.com/show_bug.cgi?id=1227806 * https://bugzilla.suse.com/show_bug.cgi?id=1227813 * https://bugzilla.suse.com/show_bug.cgi?id=1227814 * https://bugzilla.suse.com/show_bug.cgi?id=1227836 * https://bugzilla.suse.com/show_bug.cgi?id=1227855 * https://bugzilla.suse.com/show_bug.cgi?id=1227862 * https://bugzilla.suse.com/show_bug.cgi?id=1227866 * https://bugzilla.suse.com/show_bug.cgi?id=1227886 * https://bugzilla.suse.com/show_bug.cgi?id=1227899 * https://bugzilla.suse.com/show_bug.cgi?id=1227910 * https://bugzilla.suse.com/show_bug.cgi?id=1227913 * https://bugzilla.suse.com/show_bug.cgi?id=1227926 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228114 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228193 * https://bugzilla.suse.com/show_bug.cgi?id=1228211 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228289 * https://bugzilla.suse.com/show_bug.cgi?id=1228327 * https://bugzilla.suse.com/show_bug.cgi?id=1228328 * https://bugzilla.suse.com/show_bug.cgi?id=1228403 * https://bugzilla.suse.com/show_bug.cgi?id=1228405 * https://bugzilla.suse.com/show_bug.cgi?id=1228408 * https://bugzilla.suse.com/show_bug.cgi?id=1228417 * https://bugzilla.suse.com/show_bug.cgi?id=1229025 * https://jira.suse.com/browse/PED-542 * https://jira.suse.com/browse/PED-8111 * https://jira.suse.com/browse/PED-8240 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8570 * https://jira.suse.com/browse/PED-8644 * https://jira.suse.com/browse/PED-8645 * https://jira.suse.com/browse/PED-8649 * https://jira.suse.com/browse/PED-8688 * https://jira.suse.com/browse/PED-8701 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:21:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:21:58 -0000 Subject: SUSE-RU-2025:20027-1: important: Recommended update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp Message-ID: <174902891891.655.16606214776765324218@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp Announcement ID: SUSE-RU-2025:20027-1 Release Date: 2025-02-03T08:51:00Z Rating: important References: * bsc#1007273 * bsc#1175678 * bsc#1218171 * bsc#1219004 * bsc#1221525 * bsc#1221963 * bsc#1222086 * bsc#1222398 * bsc#1223094 * bsc#1223107 * bsc#1223430 * bsc#1223766 * bsc#1224771 * bsc#1225267 * bsc#1226014 * bsc#1226030 * bsc#1226128 * bsc#1226493 * bsc#1227205 * bsc#1227625 * bsc#1227793 * bsc#1228138 * bsc#1228206 * bsc#1228208 * bsc#1228420 * bsc#1228647 * bsc#1228787 * bsc#1229014 * bsc#1230229 * bsc#1230267 * bsc#1230912 * bsc#1231043 * bsc#222971 * jsc#OBS-301 * jsc#PED-7982 * jsc#PED-8014 * jsc#PED-8018 * jsc#PED-8153 Affected Products: * SUSE Linux Micro 6.0 An update that contains five features and has 33 fixes can now be installed. ## Description: This update for suseconnect-ng, zypp-plugin, libsolv, zypper, libzypp fixes the following issues: libsolv version 0.7.30: * removed dependency on external find program in the repo2solv tool * bindings: fix return value of repodata.add_solv() * new SOLVER_FLAG_FOCUS_NEW flag * add a conflict to older libsolv-tools to libsolv-tools-base * report unsupported compression in solv_xfopen() with errno * fix return value of repodata.add_solv() in the bindings * fix SHA-224 oid in solv_pgpvrfy * improve updating of installed multiversion packages * fix decision introspection going into an endless loop in some cases * added experimental lua bindings * split libsolv-tools into libsolv-tools-base [jsc#PED-8153] * removed dependency on external find program in the repo2solv tool * bindings: fix return value of repodata.add_solv() * new SOLVER_FLAG_FOCUS_NEW flag * add a conflict to older libsolv-tools to libsolv-tools-base * report unsupported compression in solv_xfopen() with errno * fix return value of repodata.add_solv() in the bindings * fix SHA-224 oid in solv_pgpvrfy * improve updating of installed multiversion packages * fix decision introspection going into an endless loop in some cases * added experimental lua bindings * split libsolv-tools into libsolv-tools-base [jsc#PED-8153] libzypp update to 17.35.12: * PluginFrame: Send unescaped colons in header values (bsc#1231043) According to the STOMP protocol it would be correct to escape a colon in a header- value, but it breaks plugin receivers which do not expect this. The first colon separates header-name from header-value, so escaping in the header- value is not needed anyway. Escaping in the header-value affects especially the urlresolver plugins. The input URL is passed in a header, but sent back as raw data in the frames body. If the plugin receiver does not correctly unescape the URL we may get back a "https\c//" which is not usable. * Do not ignore return value of std::remove_if in MediaSyncFacade (fixes #579) * Fix hang in curl code with no network connection (bsc#1230912) * Deprecate librpmDb::db_const_iterator default ctor (bsc#1230267) It's preferred to explicitly tell the root directory of the system whose database you want to query. * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * Conflicts: zypper <= 1.14.76 * single_rpmtrans: fix installation of .src.rpms (bsc#1228647) * Make sure not to statically linked installed tools (bsc#1228787) * MediaPluginType must be resolved to a valid MediaHandler (bsc#1228208) * Export CredentialManager for legacy YAST versions (bsc#1228420) * Export asSolvable for YAST (bsc#1228420) * Fix 4 typos in zypp.conf. * Fix typo in the geoip update pipeline (bsc#1228206) * Export RepoVariablesStringReplacer for yast2 (bsc#1228138) * Translation: updated .pot file. * Conflict with python zypp-plugin < 0.6.4 (bsc#1227793) Older zypp-plugins reject stomp headers including a '-'. Like the 'content-length' header we may send. * Fix int overflow in Provider (fixes #559) This patch fixes an issue in safe_strtonum which caused timestamps to overflow in the Provider message parser. * Fix error reporting on repoindex.xml parse error (bsc#1227625) * Keep UrlResolverPlugin API public (fixes #560) * Blacklist /snap executables for 'zypper ps' (bsc#1226014) * Fix handling of buddies when applying locks (bsc#1225267) Buddy pairs (like -release package and product) internally share the same status object. When applying locks from query results the locked bit must be set if either item is locked. * Install zypp/APIConfig.h legacy include (fixes #557) * Update soname due to RepoManager refactoring and cleanup. * Workaround broken libsolv-tools-base requirements (fixes openSUSE/zypper#551) * Strip ssl_clientkey from repo urls (bsc#1226030) * Remove protobuf build dependency. * Lazily attach medium during refresh workflows (bsc#1223094) * Refactor RepoManager and add Service workflows. * zypp-tui: Make sure translated texts use the correct textdomain (fixes #551) * Skip libproxy1 requires for tumbleweed. * don't require libproxy1 on tumbleweed, it is optional now * Fix versioning scheme * add one more missing export for libyui-qt-pkg * Revert eintrSafeCall behavior to setting errno to 0. * fix up requires_eq usage for libsolv-tools-base * add one more missing export for PackageKit * switch to reduced size libsolv-tools-base (jsc#PED-8153) * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * Add ZYPP_API for exported functions and switch to visibility=hidden (jsc#PED-8153) * Dynamically resolve libproxy (jsc#PED-8153) * Fix download from gpgkey URL (bsc#1223430, fixes openSUSE/zypper#546) * Don't try to refresh volatile media as long as raw metadata are present (bsc#1223094) * Fix creation of sibling cache dirs with too restrictive mode (bsc#1222398) Some install workflows in YAST may lead to too restrictive (0700) raw cache directories in case of newly created repos. Later commands running with user privileges may not be able to access these repos. * Update RepoStatus fromCookieFile according to the files mtime (bsc#1222086) * TmpFile: Don't call chmod if makeSibling failed. * Fixup New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) Fixed the name of the keyword to "support_superseded" as it was agreed on in jsc#OBS-301. * Add resolver option 'removeUnneeded' to file weak remove jobs for unneeded packages (bsc#1175678) * Add resolver option 'removeOrphaned' for distupgrade (bsc#1221525) * New VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) * Tests: fix vsftpd.conf where SUSE and Fedora use different defaults (fixes #522) * Add default stripe minimum (#529) * Don't expose std::optional where YAST/PK explicitly use c++11. * Digest: Avoid using the deprecated OPENSSL_config. * ProblemSolution::skipsPatchesOnly overload to handout the patches. * Remove https->http redirection exceptions for download.opensuse.org. suseconnect-ng updated to 1.12: - Set the filesystem root on zypper when given (bsc#1230229,bsc#1229014) - Added uname as collector - Added SAP workload detection - Added detection of container runtimes - Multiple fixes on ARM64 detection - Use `read_values` for the CPU collector on Z - Fixed data collection for ppc64le - Grab the home directory from /etc/passwd if needed (bsc#1226128) - Build zypper-migration and zypper-packages-search as standalone binaries rather then one single binary - Add --gpg-auto-import-keys flag before action in zypper command (bsc#1219004) - Include /etc/products.d in directories whose content are backed up and restored if a zypper-migration rollback happens. (bsc#1219004) - Add the ability to upload the system uptime logs, produced by the suse-uptime-tracker daemon, to SCC/RMT as part of keepalive report. (jsc#PED-7982) (jsc#PED-8018) - Add support for third party packages in SUSEConnect - Refactor existing system information collection implementation - Fix certificate import for Yast when using a registration proxy with self-signed SSL certificate (bsc#1223107) zypp-plugin updated to 0.6.4: * Fix stomp header regex to include '-' (bsc#1227793) zypper updated to 1.14.77: * API refactoring. Prevent zypper from using now private libzypp symbols (bsc#1230267) * BuildRequires: libzypp-devel >= 17.35.10. * Fix wrong numbers used in CommitSummary skipped/failed messages. * Show rpm install size before installing (bsc#1224771) If filesystem snapshots are taken before the installation (e.g. by snapper) no disk space is freed by removing old packages. In this case the install size of all packages is a hint how much additional disk space is needed by the new packages static content. * Fix readline setup to handle Ctrl-C and Ctrl-D corrrectly (bsc#1227205) * Let_readline_abort_on_Ctrl-C (bsc#1226493) * packages: add '\--system' to show @System packages (bsc#222971) * Fixed check for outdated repo metadata as non-root user (bsc#1222086) * BuildRequires: libzypp-devel >= 17.33.0. * Delay zypp lock until command options are parsed (bsc#1223766) * Unify message format(fixes #485) * switch cmake build type to RelWithDebInfo * modernize spec file (remove Authors section, use proper macros, remove redundant clean section, don't mark man pages as doc) * switch to -O2 -fvisibility=hidden -fpie: * PIC is not needed as no shared lib is built * fstack-protector-strong is default on modern dists and would be downgraded by fstack-protector * default visibility hidden allows better optimisation * O2 is reducing inlining bloat -> 18% reduced binary size * remove procps requires (was only for ZMD which is dropped) (jsc#PED-8153) * Do not try to refresh repo metadata as non-root user (bsc#1222086) Instead show refresh stats and hint how to update them. * man: Explain how to protect orphaned packages by collecting them in a plaindir repo. * packages: Add --autoinstalled and --userinstalled options to list them. * Don't print 'reboot required' message if download-only or dry-run (fixes #529) Instead point out that a reboot would be required if the option was not used. * Resepect zypper.conf option `showAlias` search commands (bsc#1221963) Repository::asUserString (or Repository::label) respects the zypper.conf option, while name/alias return the property. * dup: New option --remove-orphaned to remove all orphaned packages in dup (bsc#1221525) * info,summary: Support VendorSupportOption flag VendorSupportSuperseded (jsc#OBS-301, jsc#PED-8014) * BuildRequires: libzypp-devel >= 17.32.0. API cleanup and changes for VendorSupportSuperseded. * Show active dry-run/download-only at the commit propmpt. * patch: Add --skip-not-applicable-patches option (closes #514) * Fix printing detailed solver problem description. The problem description() is one rule out possibly many in completeProblemInfo() the solver has chosen to represent the problem. So either description or completeProblemInfo should be printed, but not both. * Fix bash-completion to work with right adjusted numbers in the 1st column too (closes #505) * Set libzypp shutdown request signal on Ctrl+C (fixes #522) * lr REPO: In the detailed view show all baseurls not just the first one (bsc#1218171) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-82=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsolv-tools-base-0.7.30-1.1 * libzypp-debuginfo-17.35.12-1.1 * libsolv-tools-debuginfo-0.7.30-1.1 * zypper-1.14.77-1.1 * libsolv-tools-base-debuginfo-0.7.30-1.1 * libzypp-17.35.12-1.1 * zypper-debuginfo-1.14.77-1.1 * libsolv-debugsource-0.7.30-1.1 * zypper-debugsource-1.14.77-1.1 * suseconnect-ng-1.12.0-1.1 * libsolv-tools-0.7.30-1.1 * libzypp-debugsource-17.35.12-1.1 * SUSE Linux Micro 6.0 (noarch) * zypper-needs-restarting-1.14.77-1.1 * python311-zypp-plugin-0.6.4-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1007273 * https://bugzilla.suse.com/show_bug.cgi?id=1175678 * https://bugzilla.suse.com/show_bug.cgi?id=1218171 * https://bugzilla.suse.com/show_bug.cgi?id=1219004 * https://bugzilla.suse.com/show_bug.cgi?id=1221525 * https://bugzilla.suse.com/show_bug.cgi?id=1221963 * https://bugzilla.suse.com/show_bug.cgi?id=1222086 * https://bugzilla.suse.com/show_bug.cgi?id=1222398 * https://bugzilla.suse.com/show_bug.cgi?id=1223094 * https://bugzilla.suse.com/show_bug.cgi?id=1223107 * https://bugzilla.suse.com/show_bug.cgi?id=1223430 * https://bugzilla.suse.com/show_bug.cgi?id=1223766 * https://bugzilla.suse.com/show_bug.cgi?id=1224771 * https://bugzilla.suse.com/show_bug.cgi?id=1225267 * https://bugzilla.suse.com/show_bug.cgi?id=1226014 * https://bugzilla.suse.com/show_bug.cgi?id=1226030 * https://bugzilla.suse.com/show_bug.cgi?id=1226128 * https://bugzilla.suse.com/show_bug.cgi?id=1226493 * https://bugzilla.suse.com/show_bug.cgi?id=1227205 * https://bugzilla.suse.com/show_bug.cgi?id=1227625 * https://bugzilla.suse.com/show_bug.cgi?id=1227793 * https://bugzilla.suse.com/show_bug.cgi?id=1228138 * https://bugzilla.suse.com/show_bug.cgi?id=1228206 * https://bugzilla.suse.com/show_bug.cgi?id=1228208 * https://bugzilla.suse.com/show_bug.cgi?id=1228420 * https://bugzilla.suse.com/show_bug.cgi?id=1228647 * https://bugzilla.suse.com/show_bug.cgi?id=1228787 * https://bugzilla.suse.com/show_bug.cgi?id=1229014 * https://bugzilla.suse.com/show_bug.cgi?id=1230229 * https://bugzilla.suse.com/show_bug.cgi?id=1230267 * https://bugzilla.suse.com/show_bug.cgi?id=1230912 * https://bugzilla.suse.com/show_bug.cgi?id=1231043 * https://bugzilla.suse.com/show_bug.cgi?id=222971 * https://jira.suse.com/browse/OBS-301 * https://jira.suse.com/browse/PED-7982 * https://jira.suse.com/browse/PED-8014 * https://jira.suse.com/browse/PED-8018 * https://jira.suse.com/browse/PED-8153 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:51 -0000 Subject: SUSE-RU-2025:20006-1: important: Recommended update for gcc13 Message-ID: <174902903163.655.2649675099961416169@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2025:20006-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1188441 * bsc#1220724 * bsc#1221239 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has three fixes can now be installed. ## Description: This update for gcc13 fixes the following issues: * Update to GCC 13.3 release * Removed Fiji support from the GCN offload compiler as that is requiring Code Object version 3 which is no longer supported by llvm18. * Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441] * Make requirement to lld version specific to avoid requiring the meta- package. * Fix unwinding for JIT code. [bsc#1221239] * Revert libgccjit dependency change. [bsc#1220724] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-29=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-29=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libstdc++6-debuginfo-13.3.0+git8781-1.1 * libatomic1-13.3.0+git8781-1.1 * libgomp1-13.3.0+git8781-1.1 * libgcc_s1-debuginfo-13.3.0+git8781-1.1 * gcc13-debugsource-13.3.0+git8781-1.1 * libgomp1-debuginfo-13.3.0+git8781-1.1 * libatomic1-debuginfo-13.3.0+git8781-1.1 * libgcc_s1-13.3.0+git8781-1.1 * libstdc++6-13.3.0+git8781-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * libitm1-debuginfo-13.3.0+git8781-1.1 * cpp13-debuginfo-13.3.0+git8781-1.1 * libtsan2-13.3.0+git8781-1.1 * gcc13-c++-13.3.0+git8781-1.1 * liblsan0-13.3.0+git8781-1.1 * liblsan0-debuginfo-13.3.0+git8781-1.1 * libasan8-debuginfo-13.3.0+git8781-1.1 * libubsan1-13.3.0+git8781-1.1 * libasan8-13.3.0+git8781-1.1 * libtsan2-debuginfo-13.3.0+git8781-1.1 * gcc13-debuginfo-13.3.0+git8781-1.1 * gcc13-debugsource-13.3.0+git8781-1.1 * libitm1-13.3.0+git8781-1.1 * libstdc++6-devel-gcc13-13.3.0+git8781-1.1 * libubsan1-debuginfo-13.3.0+git8781-1.1 * cpp13-13.3.0+git8781-1.1 * gcc13-c++-debuginfo-13.3.0+git8781-1.1 * gcc13-PIE-13.3.0+git8781-1.1 * gcc13-13.3.0+git8781-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-1.1 * libhwasan0-13.3.0+git8781-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1188441 * https://bugzilla.suse.com/show_bug.cgi?id=1220724 * https://bugzilla.suse.com/show_bug.cgi?id=1221239 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:18 -0000 Subject: SUSE-SU-2025:20024-1: important: Security update for unbound Message-ID: <174902893851.655.9460709812411023835@smelt2.prg2.suse.org> # Security update for unbound Announcement ID: SUSE-SU-2025:20024-1 Release Date: 2025-02-03T08:50:21Z Rating: important References: * bsc#1215628 * bsc#1219823 * bsc#1219826 * bsc#1221164 Cross-References: * CVE-2023-50387 * CVE-2023-50868 * CVE-2024-1931 * CVE-2024-33655 CVSS scores: * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-1931 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1931 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-1931 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-33655 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for unbound fixes the following issues: * Update to 1.20.0: Features: * The config for discard-timeout, wait-limit, wait-limit-cookie, wait-limit- netblock and wait-limit-cookie-netblock was added, for the fix to the DNSBomb issue. * Merge GH#1027: Introduce 'cache-min-negative-ttl' option. * Merge GH#1043 from xiaoxiaoafeifei: Add loongarch support; updates config.guess(2024-01-01) and config.sub(2024-01-01), verified with upstream. * Implement cachedb-check-when-serve-expired: yes option, default is enabled. When serve expired is enabled with cachedb, it first checks cachedb before serving the expired response. * Fix GH#876: [FR] can unbound-checkconf be silenced when configuration is valid? Bug Fixes: * Fix for the DNSBomb vulnerability CVE-2024-33655. Thanks to Xiang Li from the Network and Information Security Lab of Tsinghua University for reporting it. * Update doc/unbound.doxygen with 'doxygen -u'. Fixes option deprecation warnings and updates with newer defaults. * Remove unused portion from iter_dname_ttl unit test. * Fix validator classification of qtype DNAME for positive and redirection answers, and fix validator signature routine for dealing with the synthesized CNAME for a DNAME without previously encountering it and also for when the qtype is DNAME. * Fix qname minimisation for reply with a DNAME for qtype CNAME that answers it. * Fix doc test so it ignores but outputs unsupported doxygen options. * Fix GH#1021 Inconsistent Behavior with Changing rpz-cname-override and doing a unbound-control reload. * Merge GH#1028: Clearer documentation for tcp-idle-timeout and edns-tcp-keepalive-timeout. * Fix GH#1029: rpz trigger clientip and action rpz-passthru not working as expected. * Fix rpz that the rpz override is taken in case of clientip triggers. Fix that the clientip passthru action is logged. Fix that the clientip localdata action is logged. Fix rpz override action cname for the clientip trigger. * Fix to unify codepath for local alias for rpz cname action override. * Fix rpz for cname override action after nsdname and nsip triggers. * Fix that addrinfo is not kept around but copied and freed, so that log-destaddr uses a copy of the information, much like NSD does. * Merge GH#1030: Persist the openssl and expat directories for repeated Windows builds. * Fix that rpz CNAME content is limited to the max number of cnames. * Fix rpz, it follows iterator CNAMEs for nsip and nsdname and sets the reply query_info values, that is better for debug logging. * Fix rpz that copies the cname override completely to the temp region, so there are no references to the rpz region. * Add rpz unit test for nsip action override. * Fix rpz for qtype CNAME after nameserver trigger. * Fix rpz so that rpz CNAME can apply after rpz CNAME. And fix that clientip and nsip can give a CNAME. * Fix localdata and rpz localdata to match CNAME only if no direct type match is available. * Merge GH#831 from Pierre4012: Improve Windows NSIS installer script (setup.nsi). * For GH#831: Format text, use exclamation icon and explicit label names. * Fix name of unit test for subnet cache response. * Fix GH#1032: The size of subnet_msg_cache calculation mistake cause memory usage increased beyond expectations. * Fix for GH#1032, add safeguard to make table space positive. * Fix comment in lruhash space function. * Fix to add unit test for lruhash space that exercises the routines. * Fix that when the server truncates the pidfile, it does not follow symbolic links. * Fix that the server does not chown the pidfile. * Fix GH#1034: DoT forward-zone via unbound-control. * Fix for crypto related failures to have a better error string. * Fix GH#1035: Potential Bug while parsing port from the "stub-host" string; also affected forward-zones and remote-control host directives. * Fix GH#369: dnstap showing extra responses; for client responses right from the cache when replying with expired data or prefetching. * Fix GH#1040: fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c. * For GH#1040: adjust error text and disallow negative ports in other parts of cfg_mark_ports. * Fix comment syntax for view function views_find_view. * Fix GH#595: unbound-anchor cannot deal with full disk; it will now first write out to a temp file before replacing the original one, like Unbound already does for auto-trust-anchor-file. * Fixup compile without cachedb. * Add test for cachedb serve expired. * Extended test for cachedb serve expired. * Fix makefile dependencies for fake_event.c. * Fix cachedb for serve-expired with serve-expired-reply-ttl. * Fix to not reply serve expired unless enabled for cachedb. * Fix cachedb for serve-expired with serve- expired-client-timeout. * Fixup unit test for cachedb server expired client timeout with a check if response if from upstream or from cachedb. * Fixup cachedb to not refetch when serve-expired-client-timeout is used. * Merge GH#1049 from Petr Men??k: Py_NoSiteFlag is not needed since Python 3.8 * Fix GH#1048: Update ax_pkg_swig.m4 and ax_pthread.m4. * Fix configure, autoconf for GH#1048. * Add checklock feature verbose_locking to trace locks and unlocks. * Fix edns subnet to sort rrset references when storing messages in the cache. This fixes a race condition in the rrset locks. * Merge GH#1053: Remove child delegations from cache when grandchild delegations are returned from parent. * Fix ci workflow for macos for moved install locations. * Fix configure flto check error, by finding grep for it. * Merge GH#1041: Stub and Forward unshare. This has one structure for them and fixes GH#1038: fatal error: Could not initialize thread / error: reading root hints. * Fix to disable fragmentation on systems with IP_DONTFRAG, with a nonzero value for the socket option argument. * Fix doc unit test for out of directory build. * Fix cachedb with serve-expired- client-timeout disabled. The edns subnet module deletes global cache and cachedb cache when it stores a result, and serve-expired is enabled, so that the global reply, that is older than the ecs reply, does not return after the ecs reply expires. * Add unit tests for cachedb and subnet cache expired data. * Man page entry for unbound-checkconf -q. * Cleanup unnecessary strdup calls for EDE strings. * Fix doxygen comment for errinf_to_str_bogus. * Update to 1.19.3: * Features: * Merge PR #973: Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672. * Bug Fixes * Fix unit test parse of origin syntax. * Use 127.0.0.1 explicitly in tests to avoid delays and errors on newer systems. * Fix #964: config.h.in~ backup file in release tar balls. * Merge #968: Replace the obsolescent fgrep with grep -F in tests. * Merge #971: fix 'WARNING: Message has 41 extra bytes at end'. * Fix #969: [FR] distinguish Do53, DoT and DoH in the logs. * Fix dnstap that assertion failed on logging other than UDP and TCP traffic. It lists it as TCP traffic. * Fix to sync the tests script file common.sh. * iana portlist update. * Updated IPv4 and IPv6 address for b.root-servers.net in root hints. * Update test script file common.sh. * Fix tests to use new common.sh functions, wait_logfile and kill_from_pidfile. * Fix #974: doc: default number of outgoing ports without libevent. * Merge #975: Fixed some syntax errors in rpl files. * Fix root_zonemd unit test, it checks that the root ZONEMD verifies, now that the root has a valid ZONEMD. * Update example.conf with cookie options. * Merge #980: DoH: reject non-h2 early. To fix #979: Improve errors for non-HTTP/2 DoH clients. * Merge #985: Add DoH and DoT to dnstap message. * Fix #983: Sha1 runtime insecure change was incomplete. * Remove unneeded newlines and improve indentation in remote control code. * Merge #987: skip edns frag retry if advertised udp payload size is not smaller. * Fix unit test for #987 change in udp1xxx retry packet send. * Merge #988: Fix NLnetLabs#981: dump_cache truncates large records. * Fix to link with -lcrypt32 for OpenSSL 3.2.0 on Windows. * Fix to link with libssp for libcrypto and getaddrinfo check for only header. Also update crosscompile to remove ssp for 32bit. * Merge #993: Update b.root-servers.net also in example config file. * Update workflow for ports to use newer openssl on windows compile. * Fix warning for windres on resource files due to redefinition. * Fix for #997: Print details for SSL certificate failure. * Update error printout for duplicate trust anchors to include the trust anchor name (relates to #920). * Update message TTL when using cached RRSETs. It could result in non-expired messages with expired RRSETs (non-usable messages by Unbound). * Merge #999: Search for protobuf-c with pkg-config. * Fix #1006: Can't find protobuf-c package since #999. * Fix documentation for access-control in the unbound.conf man page. * Merge #1010: Mention REFUSED has the TC bit set with unmatched allow_cookie acl in the manpage. It also fixes the code to match the documentation about clients with a valid cookie that bypass the ratelimit regardless of the allow_cookie acl. * Document the suspend argument for process_ds_response(). * Move github workflows to use checkoutv4. * Fix edns subnet replies for scope zero answers to not get stored in the global cache, and in cachedb, when the upstream replies without an EDNS record. * Fix for #1022: Fix ede prohibited in access control refused answers. * Fix unbound-control-setup.cmd to use 3072 bits so that certificates are long enough for newer OpenSSL versions. * Fix TTL of synthesized CNAME when a DNAME is used from cache. * Fix unbound-control-setup.cmd to have CA v3 basicConstraints, like unbound-control-setup.sh has. * Update to 1.19.2: * Bug Fixes: * Fix CVE-2024-1931, Denial of service when trimming EDE text on positive replies. [bsc#1221164] * Update to 1.19.1: * Bug Fixes: [bsc#1219823, CVE-2023-50387][bsc#1219826, CVE-2023-50868] * Fix CVE-2023-50387, DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers. * Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU. * as we use --disable-explicit-port-randomisation, also disable outgoing-port- permit and outgoing-port-avoid in config file to suppress the related unbound-checkconf warnings on every start * Update to 1.19.0: * Features: * Fix #850: [FR] Ability to use specific database in Redis, with new redis-logical-db configuration option. * Merge #944: Disable EDNS DO. Disable the EDNS DO flag in upstream requests. This can be helpful for devices that cannot handle DNSSEC information. But it should not be enabled otherwise, because that would stop DNSSEC validation. The DNSSEC validation would not work for Unbound itself, and also not for downstream users. Default is no. The option is disable-edns-do: no * Expose the script filename in the Python module environment 'mod_env' instead of the config_file structure which includes the linked list of scripts in a multi Python module setup; fixes #79. * Expose the configured listening and outgoing interfaces, if any, as a list of strings in the Python 'config_file' class instead of the current Swig object proxy; fixes #79. * Mailing list patches from Daniel Gr?ber for DNS64 fallback to plain AAAA when no A record exists for synthesis, and minor DNS64 code refactoring for better readability. * Merge #951: Cachedb no store. The cachedb-no-store: yes option is used to stop cachedb from writing messages to the backend storage. It reads messages when data is available from the backend. The default is no. * Bug Fixes: * Fix for version generation race condition that ignored changes. * Fix #942: 1.18.0 libunbound DNS regression when built without OpenSSL. * Fix for WKS call to getservbyname that creates allocation on exit in unit test by testing numbers first and testing from the services list later. * Fix autoconf 2.69 warnings in configure. * Fix #927: unbound 1.18.0 make test error. Fix make test without SHA1. * Merge #931: Prevent warnings from -Wmissing-prototypes. * Fix to scrub resource records of type A and AAAA that have an inappropriate size. They are removed from responses. * Fix to move msgparse_rrset_remove_rr code to util/msgparse.c. * Fix to add EDE text when RRs have been removed due to length. * Fix to set ede match in unit test for rr length removal. * Fix to print EDE text in readable form in output logs. * Fix send of udp retries when ENOBUFS is returned. It stops looping and also waits for the condition to go away. Reported by Florian Obser. * Fix authority zone answers for obscured DNAMEs and delegations. * Merge #936: Check for c99 with autoconf versions prior to 2.70. * Fix to remove two c99 notations. * Fix rpz tcp-only action with rpz triggers nsdname and nsip. * Fix misplaced comment. * Merge #881: Generalise the proxy protocol code. * Fix #946: Forwarder returns servfail on upstream response noerror no data. * Fix edns subnet so that queries with a source prefix of zero cause the recursor send no edns subnet option to the upstream. * Fix that printout of EDNS options shows the EDNS cookie option by name. * Fix infinite loop when reading multiple lines of input on a broken remote control socket. Addesses #947 and #948. * Fix #949: "could not create control compt". * Fix that cachedb does not warn when serve-expired is disabled about use of serve-expired-reply-ttl and serve-expired-client-timeout. * Fix for #949: Fix pythonmod/ubmodule-tst.py for Python 3.x. * Better fix for infinite loop when reading multiple lines of input on a broken remote control socket, by treating a zero byte line the same as transmission end. Addesses #947 and #948. * For multi Python module setups, clean previously parsed module functions in **main** 's dictionary, if any, so that only current module functions are registered. * Fix #954: Inconsistent RPZ handling for A record returned along with CNAME. * Fixes for the DNS64 patches. * Update the dns64_lookup.rpl test for the DNS64 fallback patch. * Merge #955 from buevsan: fix ipset wrong behavior. * Update testdata/ipset.tdir test for ipset fix. * Fix to print detailed errors when an SSL IO routine fails via SSL_get_error. * Clearer configure text for missing protobuf-c development libraries. * autoconf. * Merge #930 from Stuart Henderson: add void to log_ident_revert_to_default declaration. * Fix #941: dnscrypt doesn't work after upgrade to 1.18 with suggestion by dukeartem to also fix the udp_ancil with dnscrypt. * Fix SSL compile failure for definition in log_crypto_err_io_code_arg. * Fix SSL compile failure for other missing definitions in log_crypto_err_io_code_arg. * Fix compilation without openssl, remove unused function warning. * Mention flex and bison in README.md when building from repository source. * Update to 1.18.0: * Features: * ?dd a metric about the maximum number of collisions in lrushah. * Set max-udp-size default to 1232. This is the same default value as the default value for edns-buffer-size. It restricts client edns buffer size choices, and makes unbound behave similar to other DNS resolvers. * Add harden-unknown-additional option. It removes unknown records from the authority section and additional section. * Added new static zone type block_a to suppress all A queries for specific zones. * [FR] Ability to use Redis unix sockets. * [FR] Ability to set the Redis password. * Features/dropqueuedpackets, with sock-queue-timeout option that drops packets that have been in the socket queue for too long. Added statistics num.queries_timed_out and query.queue_time_us.max that track the socket queue timeouts. * 'eqvinox' Lamparter: NAT64 support. * [FR] Use kernel timestamps for dnstap. * Add cachedb hit stat. Introduces 'num.query.cachedb' as a new statistical counter. * Add SVCB dohpath support. * Add validation EDEs to queries where the CD bit is set. * Add prefetch support for subnet cache entries. * Add EDE (RFC8914) caching. * Add support for EDE caching in cachedb and subnetcache. * Downstream DNS Server Cookies a la RFC7873 and RFC9018. Create server cookies for clients that send client cookies. This needs to be explicitly turned on in the config file with: `answer-cookie: yes`. * Bug Fixes * Response change to NODATA for some ANY queries since 1.12. * Fix not following cleared RD flags potentially enables amplification DDoS attacks. * Set default for harden-unknown-additional to no. So that it does not hamper future protocol developments. * Fix to ignore entirely empty responses, and try at another authority. This turns completely empty responses, a type of noerror/nodata into a servfail, but they do not conform to RFC2308, and the retry can fetch improved content. * Allow TTL refresh of expired error responses. * Fix: Unexpected behavior with client-subnet-always-forward and serve-expired * Fix unbound-dnstap-socket test program to reply the finish frame over a TLS connection correctly. * Fix: reserved identifier violation * Fix: Unencrypted query is sent when forward-tls-upstream: yes is used without tls-cert-bundle * Extra consistency check to make sure that when TLS is requested, either we set up a TLS connection or we return an error. * Fix: NXDOMAIN instead of NOERROR rcode when asked for existing CNAME record. * Fix: Bad interaction with 0 TTL records and serve-expired * Fix RPZ IP responses with trigger rpz-drop on cache entries. * Fix RPZ removal of client-ip, nsip, nsdname triggers from IXFR. * Fix dereference of NULL variable warning in mesh_do_callback. * Fix ip_ratelimit test to work with dig that enables DNS cookies. * Fix for iter_dec_attempts that could cause a hang, part of capsforid and qname minimisation, depending on the settings. * Fix uninitialized memory passed in padding bytes of cmsg to sendmsg. * Fix stat_values test to work with dig that enables DNS cookies. * unbound.service: Main process exited, code=killed, status=11/SEGV. Fixes cachedb configuration handling. * Fix: processQueryResponse() THROWAWAY should be mindful of fail_reply. * Update to 1.20.0: Features: * The config for discard-timeout, wait-limit, wait-limit-cookie, wait-limit- netblock and wait-limit-cookie-netblock was added, for the fix to the DNSBomb issue. * Merge GH#1027: Introduce 'cache-min-negative-ttl' option. * Merge GH#1043 from xiaoxiaoafeifei: Add loongarch support; updates config.guess(2024-01-01) and config.sub(2024-01-01), verified with upstream. * Implement cachedb-check-when-serve-expired: yes option, default is enabled. When serve expired is enabled with cachedb, it first checks cachedb before serving the expired response. * Fix GH#876: [FR] can unbound-checkconf be silenced when configuration is valid? Bug Fixes: * Fix for the DNSBomb vulnerability CVE-2024-33655. Thanks to Xiang Li from the Network and Information Security Lab of Tsinghua University for reporting it. * Update doc/unbound.doxygen with 'doxygen -u'. Fixes option deprecation warnings and updates with newer defaults. * Remove unused portion from iter_dname_ttl unit test. * Fix validator classification of qtype DNAME for positive and redirection answers, and fix validator signature routine for dealing with the synthesized CNAME for a DNAME without previously encountering it and also for when the qtype is DNAME. * Fix qname minimisation for reply with a DNAME for qtype CNAME that answers it. * Fix doc test so it ignores but outputs unsupported doxygen options. * Fix GH#1021 Inconsistent Behavior with Changing rpz-cname-override and doing a unbound-control reload. * Merge GH#1028: Clearer documentation for tcp-idle-timeout and edns-tcp-keepalive-timeout. * Fix GH#1029: rpz trigger clientip and action rpz-passthru not working as expected. * Fix rpz that the rpz override is taken in case of clientip triggers. Fix that the clientip passthru action is logged. Fix that the clientip localdata action is logged. Fix rpz override action cname for the clientip trigger. * Fix to unify codepath for local alias for rpz cname action override. * Fix rpz for cname override action after nsdname and nsip triggers. * Fix that addrinfo is not kept around but copied and freed, so that log-destaddr uses a copy of the information, much like NSD does. * Merge GH#1030: Persist the openssl and expat directories for repeated Windows builds. * Fix that rpz CNAME content is limited to the max number of cnames. * Fix rpz, it follows iterator CNAMEs for nsip and nsdname and sets the reply query_info values, that is better for debug logging. * Fix rpz that copies the cname override completely to the temp region, so there are no references to the rpz region. * Add rpz unit test for nsip action override. * Fix rpz for qtype CNAME after nameserver trigger. * Fix rpz so that rpz CNAME can apply after rpz CNAME. And fix that clientip and nsip can give a CNAME. * Fix localdata and rpz localdata to match CNAME only if no direct type match is available. * Merge GH#831 from Pierre4012: Improve Windows NSIS installer script (setup.nsi). * For GH#831: Format text, use exclamation icon and explicit label names. * Fix name of unit test for subnet cache response. * Fix GH#1032: The size of subnet_msg_cache calculation mistake cause memory usage increased beyond expectations. * Fix for GH#1032, add safeguard to make table space positive. * Fix comment in lruhash space function. * Fix to add unit test for lruhash space that exercises the routines. * Fix that when the server truncates the pidfile, it does not follow symbolic links. * Fix that the server does not chown the pidfile. * Fix GH#1034: DoT forward-zone via unbound-control. * Fix for crypto related failures to have a better error string. * Fix GH#1035: Potential Bug while parsing port from the "stub-host" string; also affected forward-zones and remote-control host directives. * Fix GH#369: dnstap showing extra responses; for client responses right from the cache when replying with expired data or prefetching. * Fix GH#1040: fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c. * For GH#1040: adjust error text and disallow negative ports in other parts of cfg_mark_ports. * Fix comment syntax for view function views_find_view. * Fix GH#595: unbound-anchor cannot deal with full disk; it will now first write out to a temp file before replacing the original one, like Unbound already does for auto-trust-anchor-file. * Fixup compile without cachedb. * Add test for cachedb serve expired. * Extended test for cachedb serve expired. * Fix makefile dependencies for fake_event.c. * Fix cachedb for serve-expired with serve-expired-reply-ttl. * Fix to not reply serve expired unless enabled for cachedb. * Fix cachedb for serve-expired with serve- expired-client-timeout. * Fixup unit test for cachedb server expired client timeout with a check if response if from upstream or from cachedb. * Fixup cachedb to not refetch when serve-expired-client-timeout is used. * Merge GH#1049 from Petr Men??k: Py_NoSiteFlag is not needed since Python 3.8 * Fix GH#1048: Update ax_pkg_swig.m4 and ax_pthread.m4. * Fix configure, autoconf for GH#1048. * Add checklock feature verbose_locking to trace locks and unlocks. * Fix edns subnet to sort rrset references when storing messages in the cache. This fixes a race condition in the rrset locks. * Merge GH#1053: Remove child delegations from cache when grandchild delegations are returned from parent. * Fix ci workflow for macos for moved install locations. * Fix configure flto check error, by finding grep for it. * Merge GH#1041: Stub and Forward unshare. This has one structure for them and fixes GH#1038: fatal error: Could not initialize thread / error: reading root hints. * Fix to disable fragmentation on systems with IP_DONTFRAG, with a nonzero value for the socket option argument. * Fix doc unit test for out of directory build. * Fix cachedb with serve-expired- client-timeout disabled. The edns subnet module deletes global cache and cachedb cache when it stores a result, and serve-expired is enabled, so that the global reply, that is older than the ecs reply, does not return after the ecs reply expires. * Add unit tests for cachedb and subnet cache expired data. * Man page entry for unbound-checkconf -q. * Cleanup unnecessary strdup calls for EDE strings. * Fix doxygen comment for errinf_to_str_bogus. * Update to 1.19.3: * Features: * Merge PR #973: Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672. * Bug Fixes * Fix unit test parse of origin syntax. * Use 127.0.0.1 explicitly in tests to avoid delays and errors on newer systems. * Fix #964: config.h.in~ backup file in release tar balls. * Merge #968: Replace the obsolescent fgrep with grep -F in tests. * Merge #971: fix 'WARNING: Message has 41 extra bytes at end'. * Fix #969: [FR] distinguish Do53, DoT and DoH in the logs. * Fix dnstap that assertion failed on logging other than UDP and TCP traffic. It lists it as TCP traffic. * Fix to sync the tests script file common.sh. * iana portlist update. * Updated IPv4 and IPv6 address for b.root-servers.net in root hints. * Update test script file common.sh. * Fix tests to use new common.sh functions, wait_logfile and kill_from_pidfile. * Fix #974: doc: default number of outgoing ports without libevent. * Merge #975: Fixed some syntax errors in rpl files. * Fix root_zonemd unit test, it checks that the root ZONEMD verifies, now that the root has a valid ZONEMD. * Update example.conf with cookie options. * Merge #980: DoH: reject non-h2 early. To fix #979: Improve errors for non-HTTP/2 DoH clients. * Merge #985: Add DoH and DoT to dnstap message. * Fix #983: Sha1 runtime insecure change was incomplete. * Remove unneeded newlines and improve indentation in remote control code. * Merge #987: skip edns frag retry if advertised udp payload size is not smaller. * Fix unit test for #987 change in udp1xxx retry packet send. * Merge #988: Fix NLnetLabs#981: dump_cache truncates large records. * Fix to link with -lcrypt32 for OpenSSL 3.2.0 on Windows. * Fix to link with libssp for libcrypto and getaddrinfo check for only header. Also update crosscompile to remove ssp for 32bit. * Merge #993: Update b.root-servers.net also in example config file. * Update workflow for ports to use newer openssl on windows compile. * Fix warning for windres on resource files due to redefinition. * Fix for #997: Print details for SSL certificate failure. * Update error printout for duplicate trust anchors to include the trust anchor name (relates to #920). * Update message TTL when using cached RRSETs. It could result in non-expired messages with expired RRSETs (non-usable messages by Unbound). * Merge #999: Search for protobuf-c with pkg-config. * Fix #1006: Can't find protobuf-c package since #999. * Fix documentation for access-control in the unbound.conf man page. * Merge #1010: Mention REFUSED has the TC bit set with unmatched allow_cookie acl in the manpage. It also fixes the code to match the documentation about clients with a valid cookie that bypass the ratelimit regardless of the allow_cookie acl. * Document the suspend argument for process_ds_response(). * Move github workflows to use checkoutv4. * Fix edns subnet replies for scope zero answers to not get stored in the global cache, and in cachedb, when the upstream replies without an EDNS record. * Fix for #1022: Fix ede prohibited in access control refused answers. * Fix unbound-control-setup.cmd to use 3072 bits so that certificates are long enough for newer OpenSSL versions. * Fix TTL of synthesized CNAME when a DNAME is used from cache. * Fix unbound-control-setup.cmd to have CA v3 basicConstraints, like unbound-control-setup.sh has. * Update to 1.19.2: * Bug Fixes: * Fix CVE-2024-1931, Denial of service when trimming EDE text on positive replies. [bsc#1221164] * Update to 1.19.1: * Bug Fixes: [bsc#1219823, CVE-2023-50387][bsc#1219826, CVE-2023-50868] * Fix CVE-2023-50387, DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers. * Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU. * as we use --disable-explicit-port-randomisation, also disable outgoing-port- permit and outgoing-port-avoid in config file to suppress the related unbound-checkconf warnings on every start * Use prefixes instead of sudo in unbound.service (bsc#1215628) * Update to 1.19.0: * Features: * Fix #850: [FR] Ability to use specific database in Redis, with new redis-logical-db configuration option. * Merge #944: Disable EDNS DO. Disable the EDNS DO flag in upstream requests. This can be helpful for devices that cannot handle DNSSEC information. But it should not be enabled otherwise, because that would stop DNSSEC validation. The DNSSEC validation would not work for Unbound itself, and also not for downstream users. Default is no. The option is disable-edns-do: no * Expose the script filename in the Python module environment 'mod_env' instead of the config_file structure which includes the linked list of scripts in a multi Python module setup; fixes #79. * Expose the configured listening and outgoing interfaces, if any, as a list of strings in the Python 'config_file' class instead of the current Swig object proxy; fixes #79. * Mailing list patches from Daniel Gr?ber for DNS64 fallback to plain AAAA when no A record exists for synthesis, and minor DNS64 code refactoring for better readability. * Merge #951: Cachedb no store. The cachedb-no-store: yes option is used to stop cachedb from writing messages to the backend storage. It reads messages when data is available from the backend. The default is no. * Bug Fixes: * Fix for version generation race condition that ignored changes. * Fix #942: 1.18.0 libunbound DNS regression when built without OpenSSL. * Fix for WKS call to getservbyname that creates allocation on exit in unit test by testing numbers first and testing from the services list later. * Fix autoconf 2.69 warnings in configure. * Fix #927: unbound 1.18.0 make test error. Fix make test without SHA1. * Merge #931: Prevent warnings from -Wmissing-prototypes. * Fix to scrub resource records of type A and AAAA that have an inappropriate size. They are removed from responses. * Fix to move msgparse_rrset_remove_rr code to util/msgparse.c. * Fix to add EDE text when RRs have been removed due to length. * Fix to set ede match in unit test for rr length removal. * Fix to print EDE text in readable form in output logs. * Fix send of udp retries when ENOBUFS is returned. It stops looping and also waits for the condition to go away. Reported by Florian Obser. * Fix authority zone answers for obscured DNAMEs and delegations. * Merge #936: Check for c99 with autoconf versions prior to 2.70. * Fix to remove two c99 notations. * Fix rpz tcp-only action with rpz triggers nsdname and nsip. * Fix misplaced comment. * Merge #881: Generalise the proxy protocol code. * Fix #946: Forwarder returns servfail on upstream response noerror no data. * Fix edns subnet so that queries with a source prefix of zero cause the recursor send no edns subnet option to the upstream. * Fix that printout of EDNS options shows the EDNS cookie option by name. * Fix infinite loop when reading multiple lines of input on a broken remote control socket. Addesses #947 and #948. * Fix #949: "could not create control compt". * Fix that cachedb does not warn when serve-expired is disabled about use of serve-expired-reply-ttl and serve-expired-client-timeout. * Fix for #949: Fix pythonmod/ubmodule-tst.py for Python 3.x. * Better fix for infinite loop when reading multiple lines of input on a broken remote control socket, by treating a zero byte line the same as transmission end. Addesses #947 and #948. * For multi Python module setups, clean previously parsed module functions in **main** 's dictionary, if any, so that only current module functions are registered. * Fix #954: Inconsistent RPZ handling for A record returned along with CNAME. * Fixes for the DNS64 patches. * Update the dns64_lookup.rpl test for the DNS64 fallback patch. * Merge #955 from buevsan: fix ipset wrong behavior. * Update testdata/ipset.tdir test for ipset fix. * Fix to print detailed errors when an SSL IO routine fails via SSL_get_error. * Clearer configure text for missing protobuf-c development libraries. * autoconf. * Merge #930 from Stuart Henderson: add void to log_ident_revert_to_default declaration. * Fix #941: dnscrypt doesn't work after upgrade to 1.18 with suggestion by dukeartem to also fix the udp_ancil with dnscrypt. * Fix SSL compile failure for definition in log_crypto_err_io_code_arg. * Fix SSL compile failure for other missing definitions in log_crypto_err_io_code_arg. * Fix compilation without openssl, remove unused function warning. * Mention flex and bison in README.md when building from repository source. * Update to 1.18.0: * Features: * ?dd a metric about the maximum number of collisions in lrushah. * Set max-udp-size default to 1232. This is the same default value as the default value for edns-buffer-size. It restricts client edns buffer size choices, and makes unbound behave similar to other DNS resolvers. * Add harden-unknown-additional option. It removes unknown records from the authority section and additional section. * Added new static zone type block_a to suppress all A queries for specific zones. * [FR] Ability to use Redis unix sockets. * [FR] Ability to set the Redis password. * Features/dropqueuedpackets, with sock-queue-timeout option that drops packets that have been in the socket queue for too long. Added statistics num.queries_timed_out and query.queue_time_us.max that track the socket queue timeouts. * 'eqvinox' Lamparter: NAT64 support. * [FR] Use kernel timestamps for dnstap. * Add cachedb hit stat. Introduces 'num.query.cachedb' as a new statistical counter. * Add SVCB dohpath support. * Add validation EDEs to queries where the CD bit is set. * Add prefetch support for subnet cache entries. * Add EDE (RFC8914) caching. * Add support for EDE caching in cachedb and subnetcache. * Downstream DNS Server Cookies a la RFC7873 and RFC9018. Create server cookies for clients that send client cookies. This needs to be explicitly turned on in the config file with: `answer-cookie: yes`. * Bug Fixes * Response change to NODATA for some ANY queries since 1.12. * Fix not following cleared RD flags potentially enables amplification DDoS attacks. * Set default for harden-unknown-additional to no. So that it does not hamper future protocol developments. * Fix to ignore entirely empty responses, and try at another authority. This turns completely empty responses, a type of noerror/nodata into a servfail, but they do not conform to RFC2308, and the retry can fetch improved content. * Allow TTL refresh of expired error responses. * Fix: Unexpected behavior with client-subnet-always-forward and serve-expired * Fix unbound-dnstap-socket test program to reply the finish frame over a TLS connection correctly. * Fix: reserved identifier violation * Fix: Unencrypted query is sent when forward-tls-upstream: yes is used without tls-cert-bundle * Extra consistency check to make sure that when TLS is requested, either we set up a TLS connection or we return an error. * Fix: NXDOMAIN instead of NOERROR rcode when asked for existing CNAME record. * Fix: Bad interaction with 0 TTL records and serve-expired * Fix RPZ IP responses with trigger rpz-drop on cache entries. * Fix RPZ removal of client-ip, nsip, nsdname triggers from IXFR. * Fix dereference of NULL variable warning in mesh_do_callback. * Fix ip_ratelimit test to work with dig that enables DNS cookies. * Fix for iter_dec_attempts that could cause a hang, part of capsforid and qname minimisation, depending on the settings. * Fix uninitialized memory passed in padding bytes of cmsg to sendmsg. * Fix stat_values test to work with dig that enables DNS cookies. * unbound.service: Main process exited, code=killed, status=11/SEGV. Fixes cachedb configuration handling. * Fix: processQueryResponse() THROWAWAY should be mindful of fail_reply. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-31=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * unbound-anchor-1.21.0-1.1 * unbound-anchor-debuginfo-1.21.0-1.1 * libunbound8-1.21.0-1.1 * unbound-debugsource-1.21.0-1.1 * libunbound8-debuginfo-1.21.0-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://www.suse.com/security/cve/CVE-2024-1931.html * https://www.suse.com/security/cve/CVE-2024-33655.html * https://bugzilla.suse.com/show_bug.cgi?id=1215628 * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1221164 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:41 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:41 -0000 Subject: SUSE-SU-2025:20018-1: moderate: Security update for kernel-firmware Message-ID: <174902896115.655.7838512833253367927@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2025:20018-1 Release Date: 2025-02-03T08:48:39Z Rating: moderate References: * bsc#1219458 * bsc#1222319 * bsc#1225600 * bsc#1225601 Cross-References: * CVE-2023-38417 * CVE-2023-47210 CVSS scores: * CVE-2023-38417 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47210 ( SUSE ): 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has two fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: Update to version 20240712: * amdgpu: update DMCUB to v0.0.225.0 for Various AMDGPU Asics * qcom: add gpu firmwares for x1e80100 chipset (bsc#1219458) * linux-firmware: add firmware for qat_402xx devices * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update SDMA 6.0.3 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update vega20 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update SDMA 6.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update PSP 13.0.11 firmware * amdgpu: update GC 11.0.4 firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update SDMA 6.0.1 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VPE 6.1.1 firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update SDMA 6.1.1 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update SDMA 6.1.0 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update SMU 13.0.7 firmware * amdgpu: update SDMA 6.0.2 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update raven2 firmware * amdgpu: update aldebaran firmware * linux-firmware: Update AMD cpu microcode * linux-firmware: Add ISH firmware file for Intel Lunar Lake platform * amdgpu: update DMCUB to v0.0.224.0 for Various AMDGPU Asics * cirrus: cs35l41: Update various firmware for ASUS laptops using CS35L41 * amdgpu: Update ISP FW for isp v4.1.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-20=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-firmware-amdgpu-20240728-1.1 * kernel-firmware-i915-20240728-1.1 * kernel-firmware-iwlwifi-20240728-1.1 * ucode-amd-20240728-1.1 * kernel-firmware-network-20240728-1.1 * kernel-firmware-nfp-20240728-1.1 * kernel-firmware-qlogic-20240728-1.1 * kernel-firmware-ath11k-20240728-1.1 * kernel-firmware-marvell-20240728-1.1 * kernel-firmware-nvidia-20240728-1.1 * kernel-firmware-dpaa2-20240728-1.1 * kernel-firmware-chelsio-20240728-1.1 * kernel-firmware-bluetooth-20240728-1.1 * kernel-firmware-qcom-20240728-1.1 * kernel-firmware-bnx2-20240728-1.1 * kernel-firmware-mediatek-20240728-1.1 * kernel-firmware-prestera-20240728-1.1 * kernel-firmware-realtek-20240728-1.1 * kernel-firmware-mellanox-20240728-1.1 * kernel-firmware-radeon-20240728-1.1 * kernel-firmware-ath10k-20240728-1.1 * kernel-firmware-ti-20240728-1.1 * kernel-firmware-liquidio-20240728-1.1 * kernel-firmware-mwifiex-20240728-1.1 * kernel-firmware-atheros-20240728-1.1 * kernel-firmware-intel-20240728-1.1 * kernel-firmware-brcm-20240728-1.1 * kernel-firmware-ueagle-20240728-1.1 * kernel-firmware-platform-20240728-1.1 * kernel-firmware-usb-network-20240728-1.1 * kernel-firmware-all-20240728-1.1 * kernel-firmware-ath12k-20240728-1.1 * kernel-firmware-media-20240728-1.1 * kernel-firmware-sound-20240728-1.1 * kernel-firmware-serial-20240728-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-38417.html * https://www.suse.com/security/cve/CVE-2023-47210.html * https://bugzilla.suse.com/show_bug.cgi?id=1219458 * https://bugzilla.suse.com/show_bug.cgi?id=1222319 * https://bugzilla.suse.com/show_bug.cgi?id=1225600 * https://bugzilla.suse.com/show_bug.cgi?id=1225601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:51 -0000 Subject: SUSE-RU-2025:20016-1: critical: Recommended update for python-azure-agent Message-ID: <174902897149.655.4164461470237317258@smelt2.prg2.suse.org> # Recommended update for python-azure-agent Announcement ID: SUSE-RU-2025:20016-1 Release Date: 2025-02-03T08:48:39Z Rating: critical References: * bsc#1222620 * bsc#1225946 * bsc#1227106 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for python-azure-agent fixes the following issues: * Set Provisioning.Agent parameter to 'cloud-init' in SLE Micro >= 5.5 (bsc#1227106). * Do not require wicked in non-SUSE build environments * Apply python3 interpreter patch in non SLE build environments (bcs#1227067) * Properly handle SELinux context (bsc#1225946) * Preserve an existing config file on upgrade (bsc#1222620) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-15=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python-azure-agent-config-micro-2.9.1.1-2.1 * python-azure-agent-2.9.1.1-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222620 * https://bugzilla.suse.com/show_bug.cgi?id=1225946 * https://bugzilla.suse.com/show_bug.cgi?id=1227106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:57 -0000 Subject: SUSE-RU-2025:20005-1: important: Recommended update for salt Message-ID: <174902903710.655.6923052553399472624@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20005-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1211649 * bsc#1211888 * bsc#1216063 * bsc#1219001 * bsc#1222684 Affected Products: * SUSE Linux Micro 6.0 An update that has five fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fix rich rule comparison in firewalld module (bsc#1222684) * test_vultrpy: adjust test expectation to prevent failure after Debian 10 EOL * Make auth.pam more robust with Salt Bundle and fix tests * Fix performance of user.list_groups with many remote groups * Fix "status.diskusage" function and exclude some tests for Salt Bundle * Skip certain tests if necessary for some OSes and set flaky ones * Add a timer to delete old env post update for venv-minion * Several fixes for tests to avoid errors and failures in some OSes * Speed up salt.matcher.confirm_top by using **context** * Do not call the async wrapper calls with the separate thread * Prevent OOM with high amount of batch async calls (bsc#1216063) * Add missing contextvars dependency in salt.version * Skip tests for unsupported algorithm on old OpenSSL version * Remove redundant `_file_find` call to the master * Prevent possible exception in tornado.concurrent.Future._set_done * Make reactor engine less blocking the EventPublisher * Make salt-master self recoverable on killing EventPublisher * Improve broken events catching and reporting * Make logging calls lighter * Remove unused import causing delays on starting salt-master * Mark python3-CherryPy as recommended package for the testsuite * Make "man" a recommended package instead of required * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Provide user(salt)/group(salt) capabilities for RPM 4.19 * Extend dependencies for python3-salt-testsuite and python3-salt packages * Improve Salt and testsuite packages multibuild * Enable multibuilld and create test flavor ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-39=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-minion-3006.0-6.8 * salt-3006.0-6.8 * salt-master-3006.0-6.8 * salt-transactional-update-3006.0-6.8 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216063 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1222684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:49 -0000 Subject: SUSE-SU-2025:20007-1: important: Security update for less Message-ID: <174902902909.655.11754172543996700790@smelt2.prg2.suse.org> # Security update for less Announcement ID: SUSE-SU-2025:20007-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1222849 Cross-References: * CVE-2024-32487 CVSS scores: * CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for less fixes the following issues: * CVE-2024-32487: Fix a bug where mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-7=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * less-debugsource-633-3.1 * less-633-3.1 * less-debuginfo-633-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32487.html * https://bugzilla.suse.com/show_bug.cgi?id=1222849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:26 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:26 -0000 Subject: SUSE-RU-2025:20021-1: low: Recommended update for bash, libcap-ng, libselinux, libselinux-bindings, libsemanage, zypper Message-ID: <174902894640.655.5118264449282905667@smelt2.prg2.suse.org> # Recommended update for bash, libcap-ng, libselinux, libselinux-bindings, libsemanage, zypper Announcement ID: SUSE-RU-2025:20021-1 Release Date: 2025-02-03T08:49:10Z Rating: low References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update fixes the following issues: * No change rebuild due to dependency changes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-9=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * zypper-debugsource-1.14.68-2.1 * libcap-ng0-0.8.3-4.1 * bash-5.2.15-3.1 * zypper-1.14.68-2.1 * bash-debugsource-5.2.15-3.1 * libcap-ng0-debuginfo-0.8.3-4.1 * libselinux-bindings-debugsource-3.5-3.1 * zypper-debuginfo-1.14.68-2.1 * python3-selinux-3.5-3.1 * python3-selinux-debuginfo-3.5-3.1 * bash-debuginfo-5.2.15-3.1 * libselinux-debugsource-3.5-3.1 * libsemanage2-debuginfo-3.5-3.1 * libcap-ng-debugsource-0.8.3-4.1 * libselinux1-debuginfo-3.5-3.1 * libsemanage-conf-3.5-3.1 * selinux-tools-debuginfo-3.5-3.1 * selinux-tools-3.5-3.1 * libsemanage-debugsource-3.5-3.1 * libselinux1-3.5-3.1 * libsemanage2-3.5-3.1 * SUSE Linux Micro 6.0 (noarch) * zypper-needs-restarting-1.14.68-2.1 * bash-sh-5.2.15-3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:34 -0000 Subject: SUSE-SU-2025:20011-1: critical: Security update for qemu Message-ID: <174902901410.655.7205839505915575048@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2025:20011-1 Release Date: 2025-02-03T08:47:43Z Rating: critical References: * bsc#1084909 * bsc#1220065 * bsc#1220310 * bsc#1222218 * bsc#1222841 * bsc#1222843 * bsc#1222845 * bsc#1224179 Cross-References: * CVE-2024-26328 * CVE-2024-3446 * CVE-2024-3447 * CVE-2024-3567 CVSS scores: * CVE-2024-26328 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-26328 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-26328 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-3446 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-3446 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2024-3447 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-3447 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-3567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities and has four fixes can now be installed. ## Description: This update for qemu fixes the following issues: * Update to version 8.2.5: * target/loongarch: fix a wrong print in cpu dump * ui/sdl2: Allow host to power down screen * target/i386: fix SSE and SSE2 feature check * target/i386: fix xsave.flat from kvm-unit-tests * disas/riscv: Decode all of the pmpcfg and pmpaddr CSRs * target/riscv/kvm.c: Fix the hart bit setting of AIA * target/riscv: rvzicbo: Fixup CBO extension register calculation * target/riscv: do not set mtval2 for non guest-page faults * target/riscv: prioritize pmp errors in raise_mmu_exception() * target/riscv: rvv: Remove redudant SEW checking for vector fp narrow/widen instructions * target/riscv: rvv: Check single width operator for vfncvt.rod.f.f.w * target/riscv: rvv: Check single width operator for vector fp widen instructions * target/riscv: rvv: Fix Zvfhmin checking for vfwcvt.f.f.v and vfncvt.f.f.w instructions * target/riscv/cpu.c: fix Zvkb extension config * target/riscv: Fix the element agnostic function problem * target/riscv/kvm: tolerate KVM disable ext errors * hw/intc/riscv_aplic: APLICs should add child earlier than realize * iotests: test NBD+TLS+iothread * qio: Inherit follow_coroutine_ctx across TLS * target/arm: Disable SVE extensions when SVE is disabled * hw/intc/arm_gic: Fix handling of NS view of GICC_APR * hvf: arm: Fix encodings for ID_AA64PFR1_EL1 and debug System registers * gitlab: use 'setarch -R' to workaround tsan bug * gitlab: use $MAKE instead of 'make' * dockerfiles: add 'MAKE' env variable to remaining containers * gitlab: Update msys2-64bit runner tags * target/i386: no single-step exception after MOV or POP SS * Update to version 8.2.4. * target/sh4: Fix SUBV opcode * target/sh4: Fix ADDV opcode * hw/arm/npcm7xx: Store derivative OTP fuse key in little endian * hw/dmax/xlnx_dpdma: fix handling of address_extension descriptor fields * hw/ufs: Fix buffer overflow bug * tests/avocado: update sunxi kernel from armbian to 6.6.16 * target/loongarch/cpu.c: typo fix: expection * backends/cryptodev-builtin: Fix local_error leaks * nbd/server: Mark negotiation functions as coroutine_fn * nbd/server: do not poll within a coroutine context * linux-user: do_setsockopt: fix SOL_ALG.ALG_SET_KEY * target/riscv/kvm: change timer regs size to u64 * target/riscv/kvm: change KVM_REG_RISCV_FP_D to u64 * target/riscv/kvm: change KVM_REG_RISCV_FP_F to u32 * Update to version 8.2.3. * Update version for 8.2.3 release * ppc/spapr: Initialize max_cpus limit to SPAPR_IRQ_NR_IPIS. * ppc/spapr: Introduce SPAPR_IRQ_NR_IPIS to refer IRQ range for CPU IPIs. * hw/pci-host/ppc440_pcix: Do not expose a bridge device on PCI bus * hw/isa/vt82c686: Keep track of PIRQ/PINT pins separately * virtio-pci: fix use of a released vector * linux-user/x86_64: Handle the vsyscall page in open_self_maps_{2,4} * hw/audio/virtio-snd: Remove unused assignment * hw/net/net_tx_pkt: Fix overrun in update_sctp_checksum() * hw/sd/sdhci: Do not update TRNMOD when Command Inhibit (DAT) is set * hw/net/lan9118: Fix overflow in MIL TX FIFO * hw/net/lan9118: Replace magic '2048' value by MIL_TXFIFO_SIZE definition * backends/cryptodev: Do not abort for invalid session ID * hw/misc/applesmc: Fix memory leak in reset() handler * hw/block/nand: Fix out-of-bound access in NAND block buffer * hw/block/nand: Have blk_load() take unsigned offset and return boolean * hw/block/nand: Factor nand_load_iolen() method out * qemu-options: Fix CXL Fixed Memory Window interleave-granularity typo * hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs * hw/char/virtio-serial-bus: Protect from DMA re-entrancy bugs * hw/display/virtio-gpu: Protect from DMA re-entrancy bugs * mirror: Don't call job_pause_point() under graph lock (bsc#1224179) * Backports and bugfixes: * hw/net/net_tx_pkt: Fix overrun in update_sctp_checksum() (bsc#1222841, CVE-2024-3567) * hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs (bsc#1222843, CVE-2024-3446) * hw/char/virtio-serial-bus: Protect from DMA re-entrancy bugs (bsc#1222843, CVE-2024-3446) * hw/display/virtio-gpu: Protect from DMA re-entrancy bugs (bsc#1222843, CVE-2024-3446) * hw/virtio: Introduce virtio_bh_new_guarded() helper (bsc#1222843, CVE-2024-3446) * hw/sd/sdhci: Do not update TRNMOD when Command Inhibit (DAT) is set (bsc#1222845, CVE-2024-3447) * hw/nvme: Use pcie_sriov_num_vfs() (bsc#1220065, CVE-2024-26328) * Update to version 8.2.2 * chardev/char-socket: Fix TLS io channels sending too much data to the backend * tests/unit/test-util-sockets: Remove temporary file after test * hw/usb/bus.c: PCAP adding 0xA in Windows version * hw/intc/Kconfig: Fix GIC settings when using "\--without-default-devices" * gitlab: force allow use of pip in Cirrus jobs * tests/vm: avoid re-building the VM images all the time * tests/vm: update openbsd image to 7.4 * target/i386: leave the A20 bit set in the final NPT walk * target/i386: remove unnecessary/wrong application of the A20 mask * target/i386: Fix physical address truncation * target/i386: check validity of VMCB addresses * target/i386: mask high bits of CR3 in 32-bit mode * pl031: Update last RTCLR value on write in case it's read back * hw/nvme: fix invalid endian conversion * update edk2 binaries to edk2-stable202402 * update edk2 submodule to edk2-stable202402 * target/ppc: Fix crash on machine check caused by ifetch * target/ppc: Fix lxv/stxv MSR facility check * .gitlab-ci.d/windows.yml: Drop msys2-32bit job * system/vl: Update description for input grab key * docs/system: Update description for input grab key * hw/hppa/Kconfig: Fix building with "configure --without-default-devices" * tests/qtest: Depend on dbus_display1_dep * meson: Explicitly specify dbus-display1.h dependency * audio: Depend on dbus_display1_dep * ui/console: Fix console resize with placeholder surface * ui/clipboard: add asserts for update and request * ui/clipboard: mark type as not available when there is no data * ui: reject extended clipboard message if not activated * target/i386: Generate an illegal opcode exception on cmp instructions with lock prefix * i386/cpuid: Move leaf 7 to correct group * i386/cpuid: Decrease cpuid_i when skipping CPUID leaf 1F * i386/cpu: Mask with XCR0/XSS mask for FEAT_XSAVE_XCR0_HI and FEAT_XSAVE_XSS_HI leafs * i386/cpu: Clear FEAT_XSAVE_XSS_LO/HI leafs when CPUID_EXT_XSAVE is not available * .gitlab-ci/windows.yml: Don't install libusb or spice packages on 32-bit * iotests: Make 144 deterministic again * target/arm: Don't get MDCR_EL2 in pmu_counter_enabled() before checking ARM_FEATURE_PMU * target/arm: Fix SVE/SME gross MTE suppression checks * target/arm: Handle mte in do_ldrq, do_ldro * Address bsc#1220310. Backported upstream commits: * ppc/spapr: Initialize max_cpus limit to SPAPR_IRQ_NR_IPIS * ppc/spapr: Introduce SPAPR_IRQ_NR_IPIS to refer IRQ range for CPU IPIs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-10=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-hw-display-qxl-8.2.5-1.1 * qemu-block-ssh-debuginfo-8.2.5-1.1 * qemu-ui-opengl-8.2.5-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.5-1.1 * qemu-ui-opengl-debuginfo-8.2.5-1.1 * qemu-guest-agent-8.2.5-1.1 * qemu-hw-usb-redirect-8.2.5-1.1 * qemu-audio-spice-8.2.5-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.5-1.1 * qemu-chardev-spice-8.2.5-1.1 * qemu-block-curl-8.2.5-1.1 * qemu-tools-8.2.5-1.1 * qemu-tools-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-gpu-8.2.5-1.1 * qemu-debuginfo-8.2.5-1.1 * qemu-8.2.5-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.5-1.1 * qemu-ui-spice-core-debuginfo-8.2.5-1.1 * qemu-block-iscsi-8.2.5-1.1 * qemu-chardev-spice-debuginfo-8.2.5-1.1 * qemu-debugsource-8.2.5-1.1 * qemu-ui-spice-core-8.2.5-1.1 * qemu-block-rbd-debuginfo-8.2.5-1.1 * qemu-block-ssh-8.2.5-1.1 * qemu-hw-display-qxl-debuginfo-8.2.5-1.1 * qemu-block-rbd-8.2.5-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.5-1.1 * qemu-hw-usb-host-debuginfo-8.2.5-1.1 * qemu-ksm-8.2.5-1.1 * qemu-block-curl-debuginfo-8.2.5-1.1 * qemu-pr-helper-8.2.5-1.1 * qemu-hw-usb-host-8.2.5-1.1 * qemu-img-8.2.5-1.1 * qemu-img-debuginfo-8.2.5-1.1 * qemu-audio-spice-debuginfo-8.2.5-1.1 * qemu-hw-display-virtio-vga-8.2.5-1.1 * qemu-block-iscsi-debuginfo-8.2.5-1.1 * qemu-pr-helper-debuginfo-8.2.5-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.5-1.1 * qemu-guest-agent-debuginfo-8.2.5-1.1 * qemu-lang-8.2.5-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-accel-tcg-x86-8.2.5-1.1 * qemu-x86-8.2.5-1.1 * qemu-accel-tcg-x86-debuginfo-8.2.5-1.1 * qemu-x86-debuginfo-8.2.5-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-vgabios-8.2.51.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.5-1.1 * qemu-seabios-8.2.51.16.3_3_ga95067eb-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-debuginfo-8.2.5-1.1 * qemu-s390x-8.2.5-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-8.2.5-1.1 * qemu-arm-debuginfo-8.2.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-26328.html * https://www.suse.com/security/cve/CVE-2024-3446.html * https://www.suse.com/security/cve/CVE-2024-3447.html * https://www.suse.com/security/cve/CVE-2024-3567.html * https://bugzilla.suse.com/show_bug.cgi?id=1084909 * https://bugzilla.suse.com/show_bug.cgi?id=1220065 * https://bugzilla.suse.com/show_bug.cgi?id=1220310 * https://bugzilla.suse.com/show_bug.cgi?id=1222218 * https://bugzilla.suse.com/show_bug.cgi?id=1222841 * https://bugzilla.suse.com/show_bug.cgi?id=1222843 * https://bugzilla.suse.com/show_bug.cgi?id=1222845 * https://bugzilla.suse.com/show_bug.cgi?id=1224179 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:17 -0000 Subject: SUSE-SU-2025:20014-1: important: Security update for openssl-3, libpulp, ulp-macros Message-ID: <174902899708.655.8845731861761960702@smelt2.prg2.suse.org> # Security update for openssl-3, libpulp, ulp-macros Announcement ID: SUSE-SU-2025:20014-1 Release Date: 2025-02-03T08:48:39Z Rating: important References: * bsc#1220523 * bsc#1220690 * bsc#1220693 * bsc#1220696 * bsc#1221365 * bsc#1221751 * bsc#1221752 * bsc#1221753 * bsc#1221760 * bsc#1221763 * bsc#1221786 * bsc#1221787 * bsc#1221821 * bsc#1221822 * bsc#1221824 * bsc#1221827 * bsc#1222548 * bsc#1222899 * bsc#1223306 * bsc#1223336 * bsc#1223428 * bsc#1224388 * bsc#1225291 * bsc#1225551 * bsc#1226463 * bsc#1227138 * bsc#1229465 Cross-References: * CVE-2024-2511 * CVE-2024-4603 * CVE-2024-4741 * CVE-2024-5535 * CVE-2024-6119 CVSS scores: * CVE-2024-2511 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2511 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4603 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-4603 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-4741 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6119 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6119 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6119 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities and has 22 fixes can now be installed. ## Description: This update for openssl-3, libpulp, ulp-macros fixes the following issues: openssl-3: \- CVE-2024-6119: possible denial of service in X.509 name checks (bsc#1229465) \- CVE-2024-5535: SSL_select_next_proto buffer overread (bsc#1227138) \- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers (bsc#1225551) \- CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388) \- CVE-2024-2511: Fix unconstrained session cache growth in TLSv1.3 (bsc#1222548) \- FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365) \- FIPS: RSA keygen PCT requirements. (bsc#1221760, bsc#1221753) \- FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. (bsc#1220523) \- FIPS: Port openssl to use jitterentropy (bsc#1220523) \- FIPS: Block non-Approved Elliptic Curves (bsc#1221786) \- FIPS: Service Level Indicator (bsc#1221365) \- FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. (bsc#1221751) \- FIPS: Add required selftests (bsc#1221760) \- FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821) \- FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827) \- FIPS: Zeroization is required (bsc#1221752) \- FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696) \- FIPS: NIST SP 800-56Brev2 (bsc#1221824) \- FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787) \- FIPS: Port openssl to use jitterentropy (bsc#1220523) \- FIPS: NIST SP 800-56Arev3 (bsc#1221822) \- FIPS: Error state has to be enforced (bsc#1221753) \- Build with enabled sm2 and sm4 support (bsc#1222899) \- fix non-reproducible build issue \- Fix HDKF key derivation (bsc#1225291) \- Enable livepatching support (bsc#1223428) libpulp: \- Update package with libpulp-0.3.5 * Change .so load policy from lazy to eager. * Fix patch of references when mprotect is enabled. * Fix tramposed calloc arguments. * Fix crash of ulp packer on empty lines. * Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763). * Update package with libpulp-0.3.4: * Add debuginfo into ulp extract. * Disabled ptrace_scope when building the package (bsc#1221763). * Update package with libpulp-0.3.3: * Fixed a race condition when process list is empty. * Removed "Unable to get section data" error message (bsc#1223306). * Bumped asunsafe_conversion attempts from 100 to 2000. * Fixed banner test on clang-18. * Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763). * Update package with libpulp-0.3.1: * Add timestamp information on `ulp patches`. ulp-macros: \- Initial release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-58=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * libpulp0-debuginfo-0.3.5-1.1 * libpulp-tools-debuginfo-0.3.5-1.1 * libpulp-debugsource-0.3.5-1.1 * libpulp0-0.3.5-1.1 * libpulp-tools-0.3.5-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libopenssl-3-fips-provider-debuginfo-3.1.4-6.1 * openssl-3-debuginfo-3.1.4-6.1 * jitterentropy-devel-3.4.1-3.1 * libopenssl3-3.1.4-6.1 * openssl-3-debugsource-3.1.4-6.1 * openssl-3-3.1.4-6.1 * libopenssl-3-fips-provider-3.1.4-6.1 * libjitterentropy3-3.4.1-3.1 * libopenssl-3-devel-3.1.4-6.1 * libopenssl3-debuginfo-3.1.4-6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2511.html * https://www.suse.com/security/cve/CVE-2024-4603.html * https://www.suse.com/security/cve/CVE-2024-4741.html * https://www.suse.com/security/cve/CVE-2024-5535.html * https://www.suse.com/security/cve/CVE-2024-6119.html * https://bugzilla.suse.com/show_bug.cgi?id=1220523 * https://bugzilla.suse.com/show_bug.cgi?id=1220690 * https://bugzilla.suse.com/show_bug.cgi?id=1220693 * https://bugzilla.suse.com/show_bug.cgi?id=1220696 * https://bugzilla.suse.com/show_bug.cgi?id=1221365 * https://bugzilla.suse.com/show_bug.cgi?id=1221751 * https://bugzilla.suse.com/show_bug.cgi?id=1221752 * https://bugzilla.suse.com/show_bug.cgi?id=1221753 * https://bugzilla.suse.com/show_bug.cgi?id=1221760 * https://bugzilla.suse.com/show_bug.cgi?id=1221763 * https://bugzilla.suse.com/show_bug.cgi?id=1221786 * https://bugzilla.suse.com/show_bug.cgi?id=1221787 * https://bugzilla.suse.com/show_bug.cgi?id=1221821 * https://bugzilla.suse.com/show_bug.cgi?id=1221822 * https://bugzilla.suse.com/show_bug.cgi?id=1221824 * https://bugzilla.suse.com/show_bug.cgi?id=1221827 * https://bugzilla.suse.com/show_bug.cgi?id=1222548 * https://bugzilla.suse.com/show_bug.cgi?id=1222899 * https://bugzilla.suse.com/show_bug.cgi?id=1223306 * https://bugzilla.suse.com/show_bug.cgi?id=1223336 * https://bugzilla.suse.com/show_bug.cgi?id=1223428 * https://bugzilla.suse.com/show_bug.cgi?id=1224388 * https://bugzilla.suse.com/show_bug.cgi?id=1225291 * https://bugzilla.suse.com/show_bug.cgi?id=1225551 * https://bugzilla.suse.com/show_bug.cgi?id=1226463 * https://bugzilla.suse.com/show_bug.cgi?id=1227138 * https://bugzilla.suse.com/show_bug.cgi?id=1229465 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:25 -0000 Subject: SUSE-SU-2025:20012-1: important: Security update for libvirt Message-ID: <174902900542.655.16618070916374522644@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2025:20012-1 Release Date: 2025-02-03T08:47:44Z Rating: important References: * bsc#1222584 * bsc#1223849 * bsc#1226492 Cross-References: * CVE-2024-4418 CVSS scores: * CVE-2024-4418 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4418 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for libvirt fixes the following issues: Security issue fixed: * CVE-2024-4418: rpc: ensure temporary GSource is removed from client event loop (bsc#1223849) Non-security issue fixed: * libxl: Fix domxml-to-native conversion (bsc#1222584) * qemu: Fix migration with custom XML (bsc#1226492) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-40=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libvirt-client-debuginfo-10.0.0-3.1 * libvirt-libs-debuginfo-10.0.0-3.1 * libvirt-daemon-proxy-10.0.0-3.1 * libvirt-daemon-driver-nwfilter-debuginfo-10.0.0-3.1 * libvirt-daemon-lock-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-core-10.0.0-3.1 * libvirt-client-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-10.0.0-3.1 * libvirt-debugsource-10.0.0-3.1 * libvirt-nss-10.0.0-3.1 * libvirt-daemon-driver-storage-logical-10.0.0-3.1 * libvirt-daemon-driver-storage-mpath-10.0.0-3.1 * libvirt-nss-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-10.0.0-3.1 * libvirt-daemon-plugin-lockd-10.0.0-3.1 * libvirt-daemon-driver-storage-core-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-network-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-qemu-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-logical-debuginfo-10.0.0-3.1 * libvirt-daemon-lock-10.0.0-3.1 * libvirt-daemon-driver-qemu-10.0.0-3.1 * libvirt-daemon-driver-secret-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-nodedev-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-mpath-debuginfo-10.0.0-3.1 * libvirt-daemon-plugin-lockd-debuginfo-10.0.0-3.1 * libvirt-client-qemu-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-direct-10.0.0-3.1 * libvirt-libs-10.0.0-3.1 * libvirt-daemon-driver-secret-10.0.0-3.1 * libvirt-daemon-hooks-10.0.0-3.1 * libvirt-daemon-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-scsi-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-scsi-10.0.0-3.1 * libvirt-daemon-10.0.0-3.1 * libvirt-daemon-driver-nodedev-10.0.0-3.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-10.0.0-3.1 * libvirt-daemon-log-10.0.0-3.1 * libvirt-daemon-qemu-10.0.0-3.1 * libvirt-daemon-log-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-disk-10.0.0-3.1 * libvirt-daemon-driver-nwfilter-10.0.0-3.1 * libvirt-daemon-common-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-network-10.0.0-3.1 * libvirt-daemon-driver-storage-disk-debuginfo-10.0.0-3.1 * libvirt-daemon-common-10.0.0-3.1 * libvirt-daemon-driver-storage-10.0.0-3.1 * libvirt-daemon-proxy-debuginfo-10.0.0-3.1 * libvirt-daemon-config-network-10.0.0-3.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-debuginfo-10.0.0-3.1 * libvirt-daemon-driver-storage-rbd-10.0.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4418.html * https://bugzilla.suse.com/show_bug.cgi?id=1222584 * https://bugzilla.suse.com/show_bug.cgi?id=1223849 * https://bugzilla.suse.com/show_bug.cgi?id=1226492 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:20 -0000 Subject: SUSE-SU-2025:20013-1: moderate: Security update for podman Message-ID: <174902900010.655.14046018372024299234@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20013-1 Release Date: 2025-02-03T08:48:39Z Rating: moderate References: * bsc#1227052 Cross-References: * CVE-2024-1753 * CVE-2024-24786 * CVE-2024-3727 * CVE-2024-6104 CVSS scores: * CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-1753 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24786 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2024-6104: Fixed dependency issue with go-retryablehttp: url might write sensitive information to log file (bsc#1227052). * Update to version 4.9.5: * Bump to v4.9.5 * Update release notes for v4.9.5 * fix "concurrent map writes" in network ls compat endpoint * [v4.9] Fix for CVE-2024-3727 * Disable failing bud test * CI Maintenance: Disable machine tests * [CI:DOCS] Allow downgrade of WiX * [CI:DOCS] Force WiX 3.11 * [CI:DOCS] Fix windows installer action * Bump to v4.9.5-dev * Bump to v4.9.4 * Update release notes for v4.9.4 * [v4.9] Bump Buildah to v1.33.7, CVE-2024-1753, CVE-2024-24786 * Add farm command to commands list * Bump to FreeBSD 13.3 (13.2 vanished) * Update health-start-periods docs * Don't update health check status during initialDelaySeconds * image scp: don't require port for ssh URL * Ignore docker's end point config when the final network mode isn't bridge. * Fix running container from docker client with rootful in rootless podman. * [skip-ci] Packit: remove koji and bodhi tasks for v4.9 * Bump to v4.9.4-dev * Remove gitleaks scanning ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-46=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-1.1 * podman-remote-4.9.5-1.1 * podman-remote-debuginfo-4.9.5-1.1 * podman-4.9.5-1.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1753.html * https://www.suse.com/security/cve/CVE-2024-24786.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://bugzilla.suse.com/show_bug.cgi?id=1227052 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:35 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:35 -0000 Subject: SUSE-SU-2025:20019-1: important: Security update for skopeo Message-ID: <174902895588.655.3994697653516860680@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2025:20019-1 Release Date: 2025-02-03T08:48:40Z Rating: important References: * bsc#1219563 * bsc#1224123 Cross-References: * CVE-2024-28180 * CVE-2024-3727 CVSS scores: * CVE-2024-28180 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-28180 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-28180 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-3727 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for skopeo fixes the following issues: * Update to version 1.14.4: * CVE-2024-3727: digest type does not guarantee valid type (bsc#1224123) * Packit: update packit targets * Bump gopkg.in/go-jose to v2.6.3 * Bump ocicrypt and go-jose CVE-2024-28180 * Freeze the fedora-minimal image reference at Fedora 38 * Bump c/common to v0.57.4 * Bump google.golang.org/protobuf to v1.33.0 * Bump Skopeo to v1.14.3-dev * Update to version 1.14.2: * Bump c/image to v5.29.2, c/common to v0.57.3 (fixes bsc#1219563) * Update to version 1.14.1: * fix(deps): update module github.com/containers/common to v0.57.2 * fix(deps): update module github.com/containers/image/v5 to v5.29.1 * chore(deps): update dependency containers/automation_images to v20240102 * Fix libsubid detection * fix(deps): update module golang.org/x/term to v0.16.0 * fix(deps): update golang.org/x/exp digest to 02704c9 * chore(deps): update dependency containers/automation_images to v20231208 * [skip-ci] Update actions/stale action to v9 * fix(deps): update module github.com/containers/common to v0.57.1 * fix(deps): update golang.org/x/exp digest to 6522937 * fix(deps): update module golang.org/x/term to v0.15.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-21=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * skopeo-debuginfo-1.14.4-1.1 * skopeo-1.14.4-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28180.html * https://www.suse.com/security/cve/CVE-2024-3727.html * https://bugzilla.suse.com/show_bug.cgi?id=1219563 * https://bugzilla.suse.com/show_bug.cgi?id=1224123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:25 -0000 Subject: SUSE-SU-2025:20022-1: important: Security update for ca-certificates-mozilla Message-ID: <174902894514.655.3389322888331161588@smelt2.prg2.suse.org> # Security update for ca-certificates-mozilla Announcement ID: SUSE-SU-2025:20022-1 Release Date: 2025-02-03T08:49:50Z Rating: important References: * bsc#1199079 * bsc#1220356 * bsc#1227525 Affected Products: * SUSE Linux Micro 6.0 An update that has three fixes can now be installed. ## Description: This update for ca-certificates-mozilla fixes the following issues: * Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525) * Added: FIRMAPROFESIONAL CA ROOT-A WEB * Distrust: GLOBALTRUST 2020 * Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356) Added: * CommScope Public Trust ECC Root-01 * CommScope Public Trust ECC Root-02 * CommScope Public Trust RSA Root-01 * CommScope Public Trust RSA Root-02 * D-Trust SBR Root CA 1 2022 * D-Trust SBR Root CA 2 2022 * Telekom Security SMIME ECC Root 2021 * Telekom Security SMIME RSA Root 2023 * Telekom Security TLS ECC Root 2020 * Telekom Security TLS RSA Root 2023 * TrustAsia Global Root CA G3 * TrustAsia Global Root CA G4 Removed: * Autoridad de Certificacion Firmaprofesional CIF A62634068 * Chambers of Commerce Root - 2008 * Global Chambersign Root - 2008 * Security Communication Root CA * Symantec Class 1 Public Primary Certification Authority - G6 * Symantec Class 2 Public Primary Certification Authority - G6 * TrustCor ECA-1 * TrustCor RootCert CA-1 * TrustCor RootCert CA-2 * VeriSign Class 1 Public Primary Certification Authority - G3 * VeriSign Class 2 Public Primary Certification Authority - G3 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-24=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * ca-certificates-mozilla-2.68-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199079 * https://bugzilla.suse.com/show_bug.cgi?id=1220356 * https://bugzilla.suse.com/show_bug.cgi?id=1227525 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:24:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:24:04 -0000 Subject: SUSE-SU-2025:20003-1: important: Security update for util-linux Message-ID: <174902904461.655.14147218787668823180@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2025:20003-1 Release Date: 2025-02-03T08:46:06Z Rating: important References: * bsc#1218609 * bsc#1220117 * bsc#1221831 * bsc#1223605 * bsc#1225598 Cross-References: * CVE-2024-28085 CVSS scores: * CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N * CVE-2024-28085 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has four fixes can now be installed. ## Description: This update for util-linux fixes the following issues: Security issue fixed: * CVE-2024-28085: Properly neutralize escape sequences in wall to avoid potential account takeover. (bsc#1221831) Non-security issues fixed: * Fix hang of lscpu -e (bsc#1225598) * lscpu: Add more ARM cores (bsc#1223605) * Document that chcpu -g is not supported on IBM z/VM (bsc#1218609) * Processes not cleaned up after failed SSH session are using up 100% CPU (bsc#1220117) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-117=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * util-linux-systemd-debuginfo-2.39.3-3.1 * libblkid1-debuginfo-2.39.3-3.1 * libuuid1-2.39.3-3.1 * util-linux-debuginfo-2.39.3-3.1 * libuuid1-debuginfo-2.39.3-3.1 * util-linux-debugsource-2.39.3-3.1 * libsmartcols1-2.39.3-3.1 * util-linux-systemd-debugsource-2.39.3-3.1 * util-linux-systemd-2.39.3-3.1 * libfdisk1-debuginfo-2.39.3-3.1 * libmount1-debuginfo-2.39.3-3.1 * libmount1-2.39.3-3.1 * util-linux-2.39.3-3.1 * libfdisk1-2.39.3-3.1 * libblkid1-2.39.3-3.1 * libsmartcols1-debuginfo-2.39.3-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28085.html * https://bugzilla.suse.com/show_bug.cgi?id=1218609 * https://bugzilla.suse.com/show_bug.cgi?id=1220117 * https://bugzilla.suse.com/show_bug.cgi?id=1221831 * https://bugzilla.suse.com/show_bug.cgi?id=1223605 * https://bugzilla.suse.com/show_bug.cgi?id=1225598 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:37 -0000 Subject: SUSE-SU-2025:20010-1: moderate: Security update for wget Message-ID: <174902901705.655.7881495746489458832@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2025:20010-1 Release Date: 2025-02-03T08:47:43Z Rating: moderate References: * bsc#1226419 Cross-References: * CVE-2024-38428 CVSS scores: * CVE-2024-38428 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-38428 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-38428 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419) * Update to GNU wget 1.24.5: * Fix how subdomain matches are checked for HSTS. * Wget will now also parse the srcset attribute in HTML tags * Support reading fetchmail style "user" and "passwd" fields from netrc * In some cases, prevent the confusing "Cannot write to... (success)" error messages * Support extremely fast download speeds (TB/s) * Ensure that CSS URLs are corectly quoted * libproxy support is now upstream- drop wget-libproxy.patch ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-11=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * wget-1.24.5-1.1 * wget-debugsource-1.24.5-1.1 * wget-debuginfo-1.24.5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38428.html * https://bugzilla.suse.com/show_bug.cgi?id=1226419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:53 -0000 Subject: SUSE-RU-2025:20015-1: moderate: Recommended update for transactional-update Message-ID: <174902897394.655.15566543119069264722@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2025:20015-1 Release Date: 2025-02-03T08:48:39Z Rating: moderate References: * bsc#1223504 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for transactional-update fixes the following issues: * Version 4.6.8 * tukit: Properly handle overlay syncing failures * soft-reboot: Log requested reboot type * soft-reboot: Don't force hard reboot on version change only * Version 4.6.7 * Add support for snapper 0.11.0; also significantly decreases cleanup time (bsc#1223504) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-38=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * transactional-update-zypp-config-4.8.1-1.1 * dracut-transactional-update-4.8.1-1.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtukit4-4.8.1-1.1 * transactional-update-debugsource-4.8.1-1.1 * tukitd-4.8.1-1.1 * transactional-update-4.8.1-1.1 * tukit-4.8.1-1.1 * transactional-update-debuginfo-4.8.1-1.1 * tukitd-debuginfo-4.8.1-1.1 * tukit-debuginfo-4.8.1-1.1 * libtukit4-debuginfo-4.8.1-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223504 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:24:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:24:06 -0000 Subject: SUSE-SU-2025:20002-1: important: Security update for nghttp2 Message-ID: <174902904640.655.9237628044029723171@smelt2.prg2.suse.org> # Security update for nghttp2 Announcement ID: SUSE-SU-2025:20002-1 Release Date: 2025-02-03T08:46:06Z Rating: important References: * bsc#1221399 Cross-References: * CVE-2024-28182 CVSS scores: * CVE-2024-28182 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for nghttp2 fixes the following issues: * CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-18=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * nghttp2-debugsource-1.52.0-5.1 * libnghttp2-14-debuginfo-1.52.0-5.1 * libnghttp2-14-1.52.0-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28182.html * https://bugzilla.suse.com/show_bug.cgi?id=1221399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:24:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:24:10 -0000 Subject: SUSE-RU-2025:20001-1: moderate: Recommended update for cockpit Message-ID: <174902905043.655.17782895480699179239@smelt2.prg2.suse.org> # Recommended update for cockpit Announcement ID: SUSE-RU-2025:20001-1 Release Date: 2025-02-03T08:46:06Z Rating: moderate References: * bsc#1220551 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cockpit fixes the following issues: * Support for watching lastlog2 and wtpmdb. (bsc#1220551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-17=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cockpit-debuginfo-309-6.1 * cockpit-bridge-debuginfo-309-6.1 * cockpit-ws-debuginfo-309-6.1 * cockpit-ws-309-6.1 * cockpit-309-6.1 * cockpit-bridge-309-6.1 * cockpit-debugsource-309-6.1 * SUSE Linux Micro 6.0 (noarch) * cockpit-storaged-309-6.1 * cockpit-selinux-309-6.1 * cockpit-system-309-6.1 * cockpit-networkmanager-309-6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:22:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:22:11 -0000 Subject: SUSE-SU-2025:20025-1: important: Security update for python311, python-rpm-macros Message-ID: <174902893133.655.17016815132438273294@smelt2.prg2.suse.org> # Security update for python311, python-rpm-macros Announcement ID: SUSE-SU-2025:20025-1 Release Date: 2025-02-03T08:50:41Z Rating: important References: * bsc#1174091 * bsc#1189495 * bsc#1221854 * bsc#1226447 * bsc#1226448 * bsc#1227378 * bsc#1228780 * bsc#831629 Cross-References: * CVE-2019-20907 * CVE-2019-9947 * CVE-2020-15523 * CVE-2020-15801 * CVE-2022-25236 * CVE-2023-52425 * CVE-2024-0397 * CVE-2024-0450 * CVE-2024-4032 * CVE-2024-6923 CVSS scores: * CVE-2019-20907 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2019-20907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2019-9947 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2019-9947 ( NVD ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2020-15523 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-15801 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0397 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0397 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-0450 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0450 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-6923 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for python311, python-rpm-macros fixes the following issues: python311: \- CVE-2024-0450: Fixed zipfile module vulnerability with "quoted- overlap" zipbomb (bsc#1221854) \- CVE-2024-4032: Fixed incorrect IPv4 and IPv6 private ranges (bsc#1226448) \- CVE-2024-0397: Fixed memory race condition in ssl.SSLContext certificate store methods (bsc#1226447) \- CVE-2024-6923: Prevent email header injection due to unquoted newlines (bsc#1228780) \- Fixed executable bits for /usr/bin/idle* (bsc#1227378). python-rpm-macros: * Update to version 20240618.c146b29: * Add %FLAVOR_pytest and %FLAVOR_pyunittest variants * Update to version 20240618.1e386da: * Fix python_clone sed regex * Update to version 20240614.02920b8: * Make sure that RPM_BUILD_ROOT env is set * don't eliminate any cmdline arguments in the shebang line * Create python313 macros * Update to version 20240415.c664b45: * Fix typo 310 -> 312 in default-prjconf * Update to version 20240202.501440e: * SPEC0: Drop python39, add python312 to buildset (#169) * Update to version 20231220.98427f3: * fix python2_compile macro * Update to version 20231207.46c2ec3: * make FLAVOR_compile compatible with python2 * Update to version 20231204.dd64e74: * Combine fix_shebang in one line * New macro FLAVOR_fix_shebang_path * Use realpath in %python_clone macro shebang replacement * Compile and fix_shebang in %python_install macros * Update to version 20231010.0a1f0d9: * Revert "Compile and fix_shebang in %python_install macros" * gh#openSUSE/python-rpm-macros#163 * Update to version 20231010.a32e110: * Compile and fix_shebang in %python_install macros * Update to version 20231005.bf2d3ab: * Fix shebang also in sbin with macro _fix_shebang ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-23=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-23=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-core-debugsource-3.11.8-3.1 * libpython3_11-1_0-debuginfo-3.11.8-3.1 * libpython3_11-1_0-3.11.8-3.1 * python311-debugsource-3.11.8-3.1 * python311-curses-debuginfo-3.11.8-3.1 * python311-base-3.11.8-3.1 * python311-debuginfo-3.11.8-3.1 * python311-curses-3.11.8-3.1 * python311-base-debuginfo-3.11.8-3.1 * python311-3.11.8-3.1 * SUSE Linux Micro Extras 6.0 (noarch) * python-rpm-macros-20240618.c146b29-1.1 ## References: * https://www.suse.com/security/cve/CVE-2019-20907.html * https://www.suse.com/security/cve/CVE-2019-9947.html * https://www.suse.com/security/cve/CVE-2020-15523.html * https://www.suse.com/security/cve/CVE-2020-15801.html * https://www.suse.com/security/cve/CVE-2022-25236.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2024-0397.html * https://www.suse.com/security/cve/CVE-2024-0450.html * https://www.suse.com/security/cve/CVE-2024-4032.html * https://www.suse.com/security/cve/CVE-2024-6923.html * https://bugzilla.suse.com/show_bug.cgi?id=1174091 * https://bugzilla.suse.com/show_bug.cgi?id=1189495 * https://bugzilla.suse.com/show_bug.cgi?id=1221854 * https://bugzilla.suse.com/show_bug.cgi?id=1226447 * https://bugzilla.suse.com/show_bug.cgi?id=1226448 * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1228780 * https://bugzilla.suse.com/show_bug.cgi?id=831629 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:45 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:45 -0000 Subject: SUSE-SU-2025:20009-1: critical: Security update for openssh Message-ID: <174902902548.655.5505933316512977061@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:20009-1 Release Date: 2025-02-03T08:47:41Z Rating: critical References: * bsc#1217950 * bsc#1218215 * bsc#1226642 * bsc#1227318 Cross-References: * CVE-2023-48795 * CVE-2023-51385 * CVE-2024-39894 * CVE-2024-6387 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-51385 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51385 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-39894 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39894 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-6387 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-6387 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-6387 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2024-39894: Fixed timing attacks against echo-off password entry (bsc#1227318) * CVE-2024-6387: Fixed race condition in a signal handler (bsc#1226642). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-8=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssh-server-debuginfo-9.6p1-2.1 * openssh-common-debuginfo-9.6p1-2.1 * openssh-common-9.6p1-2.1 * openssh-server-config-rootlogin-9.6p1-2.1 * openssh-debuginfo-9.6p1-2.1 * openssh-clients-debuginfo-9.6p1-2.1 * openssh-debugsource-9.6p1-2.1 * openssh-fips-9.6p1-2.1 * openssh-server-9.6p1-2.1 * openssh-clients-9.6p1-2.1 * openssh-9.6p1-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://www.suse.com/security/cve/CVE-2023-51385.html * https://www.suse.com/security/cve/CVE-2024-39894.html * https://www.suse.com/security/cve/CVE-2024-6387.html * https://bugzilla.suse.com/show_bug.cgi?id=1217950 * https://bugzilla.suse.com/show_bug.cgi?id=1218215 * https://bugzilla.suse.com/show_bug.cgi?id=1226642 * https://bugzilla.suse.com/show_bug.cgi?id=1227318 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:23:58 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:23:58 -0000 Subject: SUSE-RU-2025:20004-1: important: Recommended update for cloud-init Message-ID: <174902903872.655.4632715533613616595@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20004-1 Release Date: 2025-02-03T08:46:09Z Rating: important References: * bsc#1219680 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cloud-init fixes the following issue: * skip renames if the device is already present (bsc#1219680) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-2=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cloud-init-23.3-7.1 * cloud-init-config-suse-23.3-7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:48 -0000 Subject: SUSE-SU-2025:20002-1: important: Security update for nghttp2 Message-ID: <174902920874.1737.228236398470081949@smelt2.prg2.suse.org> # Security update for nghttp2 Announcement ID: SUSE-SU-2025:20002-1 Release Date: 2025-02-03T08:46:06Z Rating: important References: * bsc#1221399 Cross-References: * CVE-2024-28182 CVSS scores: * CVE-2024-28182 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for nghttp2 fixes the following issues: * CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-18=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libnghttp2-14-1.52.0-5.1 * nghttp2-debugsource-1.52.0-5.1 * libnghttp2-14-debuginfo-1.52.0-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28182.html * https://bugzilla.suse.com/show_bug.cgi?id=1221399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:29 -0000 Subject: SUSE-SU-2025:20007-1: important: Security update for less Message-ID: <174902918982.1737.737753296691400207@smelt2.prg2.suse.org> # Security update for less Announcement ID: SUSE-SU-2025:20007-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1222849 Cross-References: * CVE-2024-32487 CVSS scores: * CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for less fixes the following issues: * CVE-2024-32487: Fix a bug where mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-7=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * less-633-3.1 * less-debuginfo-633-3.1 * less-debugsource-633-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32487.html * https://bugzilla.suse.com/show_bug.cgi?id=1222849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:32 -0000 Subject: SUSE-RU-2025:20006-1: important: Recommended update for gcc13 Message-ID: <174902919272.1737.13774182141383836942@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2025:20006-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1188441 * bsc#1220724 * bsc#1221239 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has three fixes can now be installed. ## Description: This update for gcc13 fixes the following issues: * Update to GCC 13.3 release * Removed Fiji support from the GCN offload compiler as that is requiring Code Object version 3 which is no longer supported by llvm18. * Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441] * Make requirement to lld version specific to avoid requiring the meta- package. * Fix unwinding for JIT code. [bsc#1221239] * Revert libgccjit dependency change. [bsc#1220724] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-29=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-29=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libgomp1-13.3.0+git8781-1.1 * libstdc++6-13.3.0+git8781-1.1 * libstdc++6-debuginfo-13.3.0+git8781-1.1 * libatomic1-13.3.0+git8781-1.1 * libatomic1-debuginfo-13.3.0+git8781-1.1 * gcc13-debugsource-13.3.0+git8781-1.1 * libgcc_s1-13.3.0+git8781-1.1 * libgcc_s1-debuginfo-13.3.0+git8781-1.1 * libgomp1-debuginfo-13.3.0+git8781-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * libtsan2-13.3.0+git8781-1.1 * libitm1-13.3.0+git8781-1.1 * gcc13-c++-debuginfo-13.3.0+git8781-1.1 * libasan8-debuginfo-13.3.0+git8781-1.1 * libubsan1-13.3.0+git8781-1.1 * libitm1-debuginfo-13.3.0+git8781-1.1 * libasan8-13.3.0+git8781-1.1 * gcc13-PIE-13.3.0+git8781-1.1 * gcc13-13.3.0+git8781-1.1 * gcc13-debuginfo-13.3.0+git8781-1.1 * libstdc++6-devel-gcc13-13.3.0+git8781-1.1 * gcc13-debugsource-13.3.0+git8781-1.1 * libubsan1-debuginfo-13.3.0+git8781-1.1 * cpp13-13.3.0+git8781-1.1 * liblsan0-13.3.0+git8781-1.1 * liblsan0-debuginfo-13.3.0+git8781-1.1 * gcc13-c++-13.3.0+git8781-1.1 * libtsan2-debuginfo-13.3.0+git8781-1.1 * cpp13-debuginfo-13.3.0+git8781-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 x86_64) * libhwasan0-13.3.0+git8781-1.1 * libhwasan0-debuginfo-13.3.0+git8781-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1188441 * https://bugzilla.suse.com/show_bug.cgi?id=1220724 * https://bugzilla.suse.com/show_bug.cgi?id=1221239 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:44 -0000 Subject: SUSE-SU-2025:20003-1: important: Security update for util-linux Message-ID: <174902920497.1737.5585352429714175554@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2025:20003-1 Release Date: 2025-02-03T08:46:06Z Rating: important References: * bsc#1218609 * bsc#1220117 * bsc#1221831 * bsc#1223605 * bsc#1225598 Cross-References: * CVE-2024-28085 CVSS scores: * CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N * CVE-2024-28085 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has four fixes can now be installed. ## Description: This update for util-linux fixes the following issues: Security issue fixed: * CVE-2024-28085: Properly neutralize escape sequences in wall to avoid potential account takeover. (bsc#1221831) Non-security issues fixed: * Fix hang of lscpu -e (bsc#1225598) * lscpu: Add more ARM cores (bsc#1223605) * Document that chcpu -g is not supported on IBM z/VM (bsc#1218609) * Processes not cleaned up after failed SSH session are using up 100% CPU (bsc#1220117) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-117=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libfdisk1-debuginfo-2.39.3-3.1 * util-linux-systemd-debugsource-2.39.3-3.1 * libblkid1-2.39.3-3.1 * util-linux-debuginfo-2.39.3-3.1 * util-linux-systemd-debuginfo-2.39.3-3.1 * libblkid1-debuginfo-2.39.3-3.1 * libsmartcols1-debuginfo-2.39.3-3.1 * libuuid1-2.39.3-3.1 * util-linux-debugsource-2.39.3-3.1 * libfdisk1-2.39.3-3.1 * libuuid1-debuginfo-2.39.3-3.1 * util-linux-2.39.3-3.1 * libmount1-2.39.3-3.1 * libsmartcols1-2.39.3-3.1 * util-linux-systemd-2.39.3-3.1 * libmount1-debuginfo-2.39.3-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28085.html * https://bugzilla.suse.com/show_bug.cgi?id=1218609 * https://bugzilla.suse.com/show_bug.cgi?id=1220117 * https://bugzilla.suse.com/show_bug.cgi?id=1221831 * https://bugzilla.suse.com/show_bug.cgi?id=1223605 * https://bugzilla.suse.com/show_bug.cgi?id=1225598 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:22 -0000 Subject: SUSE-SU-2025:20008-1: important: Security update for the Linux Kernel Message-ID: <174902918221.1737.9228496357516845523@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20008-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1141539 * bsc#1181674 * bsc#1186716 * bsc#1187716 * bsc#1193599 * bsc#1194869 * bsc#1195775 * bsc#1204562 * bsc#1207948 * bsc#1208593 * bsc#1209657 * bsc#1209834 * bsc#1213573 * bsc#1214852 * bsc#1215199 * bsc#1215587 * bsc#1216196 * bsc#1216358 * bsc#1216702 * bsc#1217169 * bsc#1217384 * bsc#1217408 * bsc#1217481 * bsc#1217489 * bsc#1217750 * bsc#1217912 * bsc#1217959 * bsc#1218205 * bsc#1218336 * bsc#1218442 * bsc#1218447 * bsc#1218562 * bsc#1218730 * bsc#1218779 * bsc#1218820 * bsc#1218917 * bsc#1219104 * bsc#1219170 * bsc#1219224 * bsc#1219451 * bsc#1219478 * bsc#1219485 * bsc#1219596 * bsc#1219623 * bsc#1219633 * bsc#1219832 * bsc#1219834 * bsc#1219847 * bsc#1219953 * bsc#1220021 * bsc#1220045 * bsc#1220120 * bsc#1220138 * bsc#1220148 * bsc#1220328 * bsc#1220342 * bsc#1220427 * bsc#1220428 * bsc#1220430 * bsc#1220569 * bsc#1220587 * bsc#1220738 * bsc#1220783 * bsc#1220915 * bsc#1220942 * bsc#1221044 * bsc#1221057 * bsc#1221086 * bsc#1221293 * bsc#1221303 * bsc#1221504 * bsc#1221612 * bsc#1221615 * bsc#1221635 * bsc#1221645 * bsc#1221647 * bsc#1221649 * bsc#1221654 * bsc#1221656 * bsc#1221659 * bsc#1221765 * bsc#1221777 * bsc#1221783 * bsc#1221816 * bsc#1221829 * bsc#1221830 * bsc#1221858 * bsc#1221958 * bsc#1222011 * bsc#1222015 * bsc#1222080 * bsc#1222173 * bsc#1222241 * bsc#1222264 * bsc#1222273 * bsc#1222294 * bsc#1222301 * bsc#1222303 * bsc#1222304 * bsc#1222307 * bsc#1222326 * bsc#1222328 * bsc#1222357 * bsc#1222366 * bsc#1222368 * bsc#1222371 * bsc#1222378 * bsc#1222380 * bsc#1222385 * bsc#1222422 * bsc#1222426 * bsc#1222428 * bsc#1222437 * bsc#1222438 * bsc#1222445 * bsc#1222459 * bsc#1222463 * bsc#1222464 * bsc#1222489 * bsc#1222522 * bsc#1222525 * bsc#1222532 * bsc#1222557 * bsc#1222559 * bsc#1222563 * bsc#1222585 * bsc#1222588 * bsc#1222596 * bsc#1222606 * bsc#1222608 * bsc#1222613 * bsc#1222615 * bsc#1222617 * bsc#1222618 * bsc#1222619 * bsc#1222622 * bsc#1222624 * bsc#1222627 * bsc#1222630 * bsc#1222635 * bsc#1222654 * bsc#1222721 * bsc#1222727 * bsc#1222768 * bsc#1222769 * bsc#1222771 * bsc#1222775 * bsc#1222777 * bsc#1222779 * bsc#1222780 * bsc#1222782 * bsc#1222793 * bsc#1222799 * bsc#1222801 * bsc#1222809 * bsc#1222810 * bsc#1222893 * bsc#1222968 * bsc#1223007 * bsc#1223010 * bsc#1223011 * bsc#1223015 * bsc#1223016 * bsc#1223018 * bsc#1223020 * bsc#1223021 * bsc#1223023 * bsc#1223024 * bsc#1223033 * bsc#1223034 * bsc#1223035 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223045 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223060 * bsc#1223061 * bsc#1223062 * bsc#1223076 * bsc#1223077 * bsc#1223084 * bsc#1223111 * bsc#1223113 * bsc#1223138 * bsc#1223143 * bsc#1223187 * bsc#1223189 * bsc#1223190 * bsc#1223191 * bsc#1223198 * bsc#1223202 * bsc#1223265 * bsc#1223285 * bsc#1223315 * bsc#1223338 * bsc#1223369 * bsc#1223380 * bsc#1223384 * bsc#1223390 * bsc#1223439 * bsc#1223462 * bsc#1223532 * bsc#1223539 * bsc#1223570 * bsc#1223575 * bsc#1223590 * bsc#1223591 * bsc#1223592 * bsc#1223593 * bsc#1223625 * bsc#1223626 * bsc#1223627 * bsc#1223629 * bsc#1223631 * bsc#1223632 * bsc#1223633 * bsc#1223634 * bsc#1223637 * bsc#1223638 * bsc#1223641 * bsc#1223642 * bsc#1223643 * bsc#1223644 * bsc#1223645 * bsc#1223646 * bsc#1223648 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223653 * bsc#1223654 * bsc#1223655 * bsc#1223657 * bsc#1223660 * bsc#1223661 * bsc#1223663 * bsc#1223664 * bsc#1223665 * bsc#1223666 * bsc#1223667 * bsc#1223668 * bsc#1223669 * bsc#1223670 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223679 * bsc#1223686 * bsc#1223692 * bsc#1223693 * bsc#1223695 * bsc#1223696 * bsc#1223698 * bsc#1223699 * bsc#1223705 * bsc#1223709 * bsc#1223711 * bsc#1223712 * bsc#1223714 * bsc#1223715 * bsc#1223717 * bsc#1223718 * bsc#1223723 * bsc#1223725 * bsc#1223728 * bsc#1223731 * bsc#1223732 * bsc#1223734 * bsc#1223735 * bsc#1223737 * bsc#1223738 * bsc#1223739 * bsc#1223740 * bsc#1223741 * bsc#1223744 * bsc#1223745 * bsc#1223747 * bsc#1223748 * bsc#1223749 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223756 * bsc#1223757 * bsc#1223759 * bsc#1223760 * bsc#1223761 * bsc#1223762 * bsc#1223764 * bsc#1223765 * bsc#1223768 * bsc#1223769 * bsc#1223770 * bsc#1223774 * bsc#1223776 * bsc#1223778 * bsc#1223779 * bsc#1223780 * bsc#1223781 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223804 * bsc#1223805 * bsc#1223806 * bsc#1223807 * bsc#1223808 * bsc#1223810 * bsc#1223813 * bsc#1223815 * bsc#1223816 * bsc#1223819 * bsc#1223821 * bsc#1223822 * bsc#1223823 * bsc#1223824 * bsc#1223826 * bsc#1223827 * bsc#1223828 * bsc#1223829 * bsc#1223831 * bsc#1223834 * bsc#1223836 * bsc#1223837 * bsc#1223838 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223847 * bsc#1223863 * bsc#1223869 * bsc#1223870 * bsc#1223871 * bsc#1223872 * bsc#1223874 * bsc#1223944 * bsc#1223945 * bsc#1223946 * bsc#1223991 * bsc#1224049 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224187 * bsc#1224331 * bsc#1224348 * bsc#1224414 * bsc#1224422 * bsc#1224423 * bsc#1224429 * bsc#1224430 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224439 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224477 * bsc#1224479 * bsc#1224480 * bsc#1224481 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224488 * bsc#1224490 * bsc#1224491 * bsc#1224492 * bsc#1224493 * bsc#1224494 * bsc#1224495 * bsc#1224497 * bsc#1224498 * bsc#1224499 * bsc#1224500 * bsc#1224501 * bsc#1224502 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224512 * bsc#1224513 * bsc#1224515 * bsc#1224516 * bsc#1224517 * bsc#1224519 * bsc#1224520 * bsc#1224521 * bsc#1224523 * bsc#1224524 * bsc#1224525 * bsc#1224526 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224537 * bsc#1224539 * bsc#1224540 * bsc#1224541 * bsc#1224542 * bsc#1224543 * bsc#1224544 * bsc#1224545 * bsc#1224546 * bsc#1224549 * bsc#1224550 * bsc#1224552 * bsc#1224553 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224565 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224572 * bsc#1224573 * bsc#1224575 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224583 * bsc#1224584 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224589 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224602 * bsc#1224603 * bsc#1224604 * bsc#1224605 * bsc#1224606 * bsc#1224607 * bsc#1224608 * bsc#1224609 * bsc#1224611 * bsc#1224612 * bsc#1224613 * bsc#1224614 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224619 * bsc#1224620 * bsc#1224621 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224639 * bsc#1224640 * bsc#1224641 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224646 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224652 * bsc#1224653 * bsc#1224654 * bsc#1224655 * bsc#1224657 * bsc#1224659 * bsc#1224660 * bsc#1224661 * bsc#1224662 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224670 * bsc#1224671 * bsc#1224672 * bsc#1224673 * bsc#1224674 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224698 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224718 * bsc#1224719 * bsc#1224720 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224735 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224742 * bsc#1224743 * bsc#1224747 * bsc#1224749 * bsc#1224751 * bsc#1224759 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224767 * bsc#1224790 * bsc#1224792 * bsc#1224793 * bsc#1224803 * bsc#1224804 * bsc#1224866 * bsc#1224928 * bsc#1224930 * bsc#1224932 * bsc#1224933 * bsc#1224935 * bsc#1224936 * bsc#1224937 * bsc#1224939 * bsc#1224941 * bsc#1224944 * bsc#1224946 * bsc#1224947 * bsc#1224949 * bsc#1224951 * bsc#1224988 * bsc#1224989 * bsc#1224992 * bsc#1224998 * bsc#1225000 * bsc#1225001 * bsc#1225004 * bsc#1225006 * bsc#1225007 * bsc#1225008 * bsc#1225009 * bsc#1225014 * bsc#1225015 * bsc#1225022 * bsc#1225025 * bsc#1225028 * bsc#1225029 * bsc#1225031 * bsc#1225036 * bsc#1225041 * bsc#1225044 * bsc#1225049 * bsc#1225050 * bsc#1225053 * bsc#1225076 * bsc#1225077 * bsc#1225078 * bsc#1225081 * bsc#1225085 * bsc#1225086 * bsc#1225088 * bsc#1225090 * bsc#1225092 * bsc#1225096 * bsc#1225097 * bsc#1225098 * bsc#1225101 * bsc#1225103 * bsc#1225104 * bsc#1225105 * bsc#1225106 * bsc#1225108 * bsc#1225120 * bsc#1225132 * bsc#1225133 * bsc#1225134 * bsc#1225136 * bsc#1225172 * bsc#1225180 * bsc#1225272 * bsc#1225300 * bsc#1225391 * bsc#1225472 * bsc#1225475 * bsc#1225476 * bsc#1225477 * bsc#1225478 * bsc#1225485 * bsc#1225489 * bsc#1225490 * bsc#1225502 * bsc#1225527 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225548 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225555 * bsc#1225556 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225564 * bsc#1225565 * bsc#1225566 * bsc#1225568 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225573 * bsc#1225577 * bsc#1225578 * bsc#1225579 * bsc#1225580 * bsc#1225581 * bsc#1225583 * bsc#1225584 * bsc#1225585 * bsc#1225586 * bsc#1225587 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225593 * bsc#1225594 * bsc#1225595 * bsc#1225599 * bsc#1225600 * bsc#1225601 * bsc#1225602 * bsc#1225605 * bsc#1225607 * bsc#1225609 * bsc#1225610 * bsc#1225611 * bsc#1225616 * bsc#1225618 * bsc#1225640 * bsc#1225642 * bsc#1225681 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225696 * bsc#1225698 * bsc#1225699 * bsc#1225702 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225711 * bsc#1225712 * bsc#1225714 * bsc#1225715 * bsc#1225717 * bsc#1225719 * bsc#1225720 * bsc#1225722 * bsc#1225723 * bsc#1225726 * bsc#1225728 * bsc#1225731 * bsc#1225732 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225737 * bsc#1225741 * bsc#1225744 * bsc#1225745 * bsc#1225746 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225752 * bsc#1225753 * bsc#1225756 * bsc#1225757 * bsc#1225758 * bsc#1225759 * bsc#1225760 * bsc#1225761 * bsc#1225762 * bsc#1225763 * bsc#1225765 * bsc#1225766 * bsc#1225767 * bsc#1225769 * bsc#1225770 * bsc#1225773 * bsc#1225775 * bsc#1225805 * bsc#1225810 * bsc#1225815 * bsc#1225820 * bsc#1225823 * bsc#1225827 * bsc#1225829 * bsc#1225830 * bsc#1225834 * bsc#1225835 * bsc#1225839 * bsc#1225840 * bsc#1225842 * bsc#1225843 * bsc#1225847 * bsc#1225851 * bsc#1225856 * bsc#1225866 * bsc#1225872 * bsc#1225894 * bsc#1225895 * bsc#1225896 * bsc#1225898 * bsc#1225903 * bsc#1225945 * bsc#1226022 * bsc#1226131 * bsc#1226145 * bsc#1226149 * bsc#1226155 * bsc#1226158 * bsc#1226163 * bsc#1226202 * bsc#1226211 * bsc#1226212 * bsc#1226213 * bsc#1226226 * bsc#1226457 * bsc#1226502 * bsc#1226503 * bsc#1226513 * bsc#1226514 * bsc#1226519 * bsc#1226520 * bsc#1226582 * bsc#1226587 * bsc#1226588 * bsc#1226592 * bsc#1226593 * bsc#1226594 * bsc#1226595 * bsc#1226597 * bsc#1226607 * bsc#1226608 * bsc#1226610 * bsc#1226612 * bsc#1226613 * bsc#1226630 * bsc#1226632 * bsc#1226633 * bsc#1226634 * bsc#1226637 * bsc#1226657 * bsc#1226658 * bsc#1226734 * bsc#1226735 * bsc#1226737 * bsc#1226738 * bsc#1226739 * bsc#1226740 * bsc#1226741 * bsc#1226742 * bsc#1226744 * bsc#1226746 * bsc#1226747 * bsc#1226749 * bsc#1226750 * bsc#1226754 * bsc#1226757 * bsc#1226758 * bsc#1226760 * bsc#1226761 * bsc#1226764 * bsc#1226767 * bsc#1226768 * bsc#1226769 * bsc#1226771 * bsc#1226772 * bsc#1226774 * bsc#1226775 * bsc#1226776 * bsc#1226777 * bsc#1226780 * bsc#1226781 * bsc#1226783 * bsc#1226785 * bsc#1226786 * bsc#1226788 * bsc#1226789 * bsc#1226790 * bsc#1226791 * bsc#1226796 * bsc#1226799 * bsc#1226837 * bsc#1226839 * bsc#1226840 * bsc#1226841 * bsc#1226842 * bsc#1226844 * bsc#1226848 * bsc#1226852 * bsc#1226856 * bsc#1226857 * bsc#1226859 * bsc#1226861 * bsc#1226863 * bsc#1226864 * bsc#1226866 * bsc#1226867 * bsc#1226868 * bsc#1226875 * bsc#1226876 * bsc#1226878 * bsc#1226879 * bsc#1226883 * bsc#1226886 * bsc#1226890 * bsc#1226891 * bsc#1226894 * bsc#1226895 * bsc#1226905 * bsc#1226908 * bsc#1226909 * bsc#1226911 * bsc#1226915 * bsc#1226928 * bsc#1226934 * bsc#1226938 * bsc#1226939 * bsc#1226941 * bsc#1226948 * bsc#1226949 * bsc#1226950 * bsc#1226962 * bsc#1226976 * bsc#1226989 * bsc#1226990 * bsc#1226992 * bsc#1226993 * bsc#1226994 * bsc#1226995 * bsc#1226996 * bsc#1227066 * bsc#1227072 * bsc#1227085 * bsc#1227089 * bsc#1227090 * bsc#1227096 * bsc#1227101 * bsc#1227103 * bsc#1227149 * bsc#1227190 * bsc#1227282 * bsc#1227362 * bsc#1227363 * bsc#1227383 * bsc#1227432 * bsc#1227434 * bsc#1227435 * bsc#1227443 * bsc#1227446 * bsc#1227447 * bsc#1227487 * bsc#1227573 * bsc#1227626 * bsc#1227716 * bsc#1227719 * bsc#1227723 * bsc#1227730 * bsc#1227736 * bsc#1227755 * bsc#1227757 * bsc#1227762 * bsc#1227763 * bsc#1227779 * bsc#1227780 * bsc#1227783 * bsc#1227786 * bsc#1227788 * bsc#1227789 * bsc#1227797 * bsc#1227800 * bsc#1227801 * bsc#1227803 * bsc#1227806 * bsc#1227813 * bsc#1227814 * bsc#1227836 * bsc#1227855 * bsc#1227862 * bsc#1227866 * bsc#1227886 * bsc#1227899 * bsc#1227910 * bsc#1227913 * bsc#1227926 * bsc#1228090 * bsc#1228192 * bsc#1228193 * bsc#1228211 * bsc#1228269 * bsc#1228289 * bsc#1228327 * bsc#1228328 * bsc#1228403 * bsc#1228405 * bsc#1228408 * bsc#1228417 * jsc#PED-542 * jsc#PED-8111 * jsc#PED-8240 * jsc#PED-8491 * jsc#PED-8570 * jsc#PED-8644 * jsc#PED-8645 * jsc#PED-8649 * jsc#PED-8688 * jsc#PED-8701 * jsc#PED-8954 Cross-References: * CVE-2021-47432 * CVE-2022-48669 * CVE-2022-48772 * CVE-2023-0160 * CVE-2023-38417 * CVE-2023-47210 * CVE-2023-51780 * CVE-2023-52434 * CVE-2023-52435 * CVE-2023-52458 * CVE-2023-52472 * CVE-2023-52483 * CVE-2023-52503 * CVE-2023-52616 * CVE-2023-52618 * CVE-2023-52622 * CVE-2023-52631 * CVE-2023-52635 * CVE-2023-52640 * CVE-2023-52641 * CVE-2023-52645 * CVE-2023-52647 * CVE-2023-52648 * CVE-2023-52649 * CVE-2023-52650 * CVE-2023-52652 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52656 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52672 * CVE-2023-52673 * CVE-2023-52674 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52698 * CVE-2023-52699 * CVE-2023-52735 * CVE-2023-52749 * CVE-2023-52750 * CVE-2023-52751 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52757 * CVE-2023-52759 * CVE-2023-52762 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52765 * CVE-2023-52766 * CVE-2023-52767 * CVE-2023-52768 * CVE-2023-52769 * CVE-2023-52771 * CVE-2023-52772 * CVE-2023-52773 * CVE-2023-52774 * CVE-2023-52775 * CVE-2023-52776 * CVE-2023-52777 * CVE-2023-52780 * CVE-2023-52781 * CVE-2023-52782 * CVE-2023-52783 * CVE-2023-52784 * CVE-2023-52786 * CVE-2023-52787 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52792 * CVE-2023-52794 * CVE-2023-52795 * CVE-2023-52796 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52801 * CVE-2023-52803 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52807 * CVE-2023-52808 * CVE-2023-52809 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52812 * CVE-2023-52813 * CVE-2023-52814 * CVE-2023-52815 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52827 * CVE-2023-52829 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52835 * CVE-2023-52836 * CVE-2023-52837 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52842 * CVE-2023-52843 * CVE-2023-52844 * CVE-2023-52845 * CVE-2023-52846 * CVE-2023-52847 * CVE-2023-52849 * CVE-2023-52850 * CVE-2023-52851 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52857 * CVE-2023-52858 * CVE-2023-52860 * CVE-2023-52861 * CVE-2023-52862 * CVE-2023-52863 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52866 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52869 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52874 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52879 * CVE-2023-52880 * CVE-2023-52881 * CVE-2023-52882 * CVE-2023-52883 * CVE-2023-52884 * CVE-2023-6238 * CVE-2023-6270 * CVE-2023-7042 * CVE-2024-0639 * CVE-2024-21823 * CVE-2024-22099 * CVE-2024-23848 * CVE-2024-24861 * CVE-2024-25739 * CVE-2024-25741 * CVE-2024-26601 * CVE-2024-26611 * CVE-2024-26614 * CVE-2024-26615 * CVE-2024-26623 * CVE-2024-26625 * CVE-2024-26632 * CVE-2024-26633 * CVE-2024-26635 * CVE-2024-26636 * CVE-2024-26638 * CVE-2024-26641 * CVE-2024-26642 * CVE-2024-26643 * CVE-2024-26654 * CVE-2024-26656 * CVE-2024-26657 * CVE-2024-26663 * CVE-2024-26665 * CVE-2024-26671 * CVE-2024-26673 * CVE-2024-26674 * CVE-2024-26676 * CVE-2024-26679 * CVE-2024-26684 * CVE-2024-26685 * CVE-2024-26691 * CVE-2024-26692 * CVE-2024-26704 * CVE-2024-26714 * CVE-2024-26726 * CVE-2024-26731 * CVE-2024-26733 * CVE-2024-26734 * CVE-2024-26737 * CVE-2024-26739 * CVE-2024-26740 * CVE-2024-26742 * CVE-2024-26750 * CVE-2024-26758 * CVE-2024-26760 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26767 * CVE-2024-26769 * CVE-2024-26772 * CVE-2024-26773 * CVE-2024-26774 * CVE-2024-26775 * CVE-2024-26780 * CVE-2024-26783 * CVE-2024-26785 * CVE-2024-26786 * CVE-2024-26791 * CVE-2024-26793 * CVE-2024-26794 * CVE-2024-26802 * CVE-2024-26805 * CVE-2024-26807 * CVE-2024-26813 * CVE-2024-26814 * CVE-2024-26815 * CVE-2024-26816 * CVE-2024-26822 * CVE-2024-26826 * CVE-2024-26828 * CVE-2024-26832 * CVE-2024-26836 * CVE-2024-26844 * CVE-2024-26845 * CVE-2024-26846 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26860 * CVE-2024-26861 * CVE-2024-26862 * CVE-2024-26863 * CVE-2024-26865 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26878 * CVE-2024-26881 * CVE-2024-26882 * CVE-2024-26883 * CVE-2024-26884 * CVE-2024-26885 * CVE-2024-26889 * CVE-2024-26898 * CVE-2024-26899 * CVE-2024-26900 * CVE-2024-26901 * CVE-2024-26903 * CVE-2024-26906 * CVE-2024-26909 * CVE-2024-26919 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26923 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26932 * CVE-2024-26933 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26939 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26944 * CVE-2024-26945 * CVE-2024-26946 * CVE-2024-26948 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26955 * CVE-2024-26956 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26959 * CVE-2024-26960 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26965 * CVE-2024-26966 * CVE-2024-26968 * CVE-2024-26969 * CVE-2024-26970 * CVE-2024-26972 * CVE-2024-26973 * CVE-2024-26974 * CVE-2024-26975 * CVE-2024-26977 * CVE-2024-26978 * CVE-2024-26981 * CVE-2024-26982 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26990 * CVE-2024-26991 * CVE-2024-26992 * CVE-2024-26993 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27009 * CVE-2024-27012 * CVE-2024-27013 * CVE-2024-27014 * CVE-2024-27015 * CVE-2024-27016 * CVE-2024-27019 * CVE-2024-27020 * CVE-2024-27022 * CVE-2024-27023 * CVE-2024-27025 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27036 * CVE-2024-27037 * CVE-2024-27038 * CVE-2024-27039 * CVE-2024-27040 * CVE-2024-27041 * CVE-2024-27042 * CVE-2024-27043 * CVE-2024-27044 * CVE-2024-27045 * CVE-2024-27046 * CVE-2024-27047 * CVE-2024-27048 * CVE-2024-27051 * CVE-2024-27052 * CVE-2024-27053 * CVE-2024-27054 * CVE-2024-27056 * CVE-2024-27057 * CVE-2024-27059 * CVE-2024-27060 * CVE-2024-27062 * CVE-2024-27064 * CVE-2024-27065 * CVE-2024-27067 * CVE-2024-27068 * CVE-2024-27071 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27076 * CVE-2024-27077 * CVE-2024-27078 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27391 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27402 * CVE-2024-27404 * CVE-2024-27405 * CVE-2024-27408 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27414 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27418 * CVE-2024-27419 * CVE-2024-27431 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-33619 * CVE-2024-34777 * CVE-2024-35247 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35791 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35803 * CVE-2024-35804 * CVE-2024-35805 * CVE-2024-35806 * CVE-2024-35807 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35814 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35827 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35831 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35843 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35848 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35853 * CVE-2024-35854 * CVE-2024-35857 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35880 * CVE-2024-35883 * CVE-2024-35884 * CVE-2024-35885 * CVE-2024-35886 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35890 * CVE-2024-35891 * CVE-2024-35892 * CVE-2024-35893 * CVE-2024-35895 * CVE-2024-35896 * CVE-2024-35898 * CVE-2024-35899 * CVE-2024-35900 * CVE-2024-35901 * CVE-2024-35903 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35908 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35917 * CVE-2024-35921 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35925 * CVE-2024-35926 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35931 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35934 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35942 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35956 * CVE-2024-35957 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35962 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35970 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35976 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35979 * CVE-2024-35981 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35991 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-35998 * CVE-2024-35999 * CVE-2024-36002 * CVE-2024-36003 * CVE-2024-36004 * CVE-2024-36005 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36008 * CVE-2024-36009 * CVE-2024-36010 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36013 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36017 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36024 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36030 * CVE-2024-36032 * CVE-2024-36281 * CVE-2024-36477 * CVE-2024-36478 * CVE-2024-36479 * CVE-2024-36880 * CVE-2024-36882 * CVE-2024-36885 * CVE-2024-36887 * CVE-2024-36889 * CVE-2024-36890 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36899 * CVE-2024-36900 * CVE-2024-36901 * CVE-2024-36902 * CVE-2024-36903 * CVE-2024-36904 * CVE-2024-36906 * CVE-2024-36909 * CVE-2024-36910 * CVE-2024-36911 * CVE-2024-36912 * CVE-2024-36913 * CVE-2024-36914 * CVE-2024-36915 * CVE-2024-36916 * CVE-2024-36917 * CVE-2024-36918 * CVE-2024-36919 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36923 * CVE-2024-36924 * CVE-2024-36926 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36934 * CVE-2024-36935 * CVE-2024-36936 * CVE-2024-36937 * CVE-2024-36938 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36945 * CVE-2024-36946 * CVE-2024-36947 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36952 * CVE-2024-36955 * CVE-2024-36957 * CVE-2024-36959 * CVE-2024-36960 * CVE-2024-36962 * CVE-2024-36964 * CVE-2024-36965 * CVE-2024-36967 * CVE-2024-36969 * CVE-2024-36971 * CVE-2024-36972 * CVE-2024-36973 * CVE-2024-36974 * CVE-2024-36975 * CVE-2024-36977 * CVE-2024-36978 * CVE-2024-37021 * CVE-2024-37078 * CVE-2024-37353 * CVE-2024-37354 * CVE-2024-38381 * CVE-2024-38384 * CVE-2024-38385 * CVE-2024-38388 * CVE-2024-38390 * CVE-2024-38391 * CVE-2024-38539 * CVE-2024-38540 * CVE-2024-38541 * CVE-2024-38543 * CVE-2024-38544 * CVE-2024-38545 * CVE-2024-38546 * CVE-2024-38547 * CVE-2024-38548 * CVE-2024-38549 * CVE-2024-38550 * CVE-2024-38551 * CVE-2024-38552 * CVE-2024-38553 * CVE-2024-38554 * CVE-2024-38555 * CVE-2024-38556 * CVE-2024-38557 * CVE-2024-38558 * CVE-2024-38559 * CVE-2024-38560 * CVE-2024-38562 * CVE-2024-38564 * CVE-2024-38565 * CVE-2024-38566 * CVE-2024-38567 * CVE-2024-38568 * CVE-2024-38569 * CVE-2024-38570 * CVE-2024-38571 * CVE-2024-38572 * CVE-2024-38573 * CVE-2024-38575 * CVE-2024-38578 * CVE-2024-38579 * CVE-2024-38580 * CVE-2024-38581 * CVE-2024-38582 * CVE-2024-38583 * CVE-2024-38586 * CVE-2024-38587 * CVE-2024-38588 * CVE-2024-38590 * CVE-2024-38591 * CVE-2024-38592 * CVE-2024-38594 * CVE-2024-38595 * CVE-2024-38597 * CVE-2024-38598 * CVE-2024-38599 * CVE-2024-38600 * CVE-2024-38601 * CVE-2024-38602 * CVE-2024-38603 * CVE-2024-38604 * CVE-2024-38605 * CVE-2024-38608 * CVE-2024-38610 * CVE-2024-38611 * CVE-2024-38615 * CVE-2024-38616 * CVE-2024-38617 * CVE-2024-38618 * CVE-2024-38619 * CVE-2024-38621 * CVE-2024-38622 * CVE-2024-38627 * CVE-2024-38628 * CVE-2024-38629 * CVE-2024-38630 * CVE-2024-38633 * CVE-2024-38634 * CVE-2024-38635 * CVE-2024-38636 * CVE-2024-38659 * CVE-2024-38661 * CVE-2024-38663 * CVE-2024-38664 * CVE-2024-38780 * CVE-2024-39276 * CVE-2024-39277 * CVE-2024-39291 * CVE-2024-39296 * CVE-2024-39301 * CVE-2024-39362 * CVE-2024-39371 * CVE-2024-39463 * CVE-2024-39466 * CVE-2024-39468 * CVE-2024-39469 * CVE-2024-39471 * CVE-2024-39472 * CVE-2024-39473 * CVE-2024-39474 * CVE-2024-39475 * CVE-2024-39479 * CVE-2024-39481 * CVE-2024-39482 * CVE-2024-39487 * CVE-2024-39490 * CVE-2024-39494 * CVE-2024-39496 * CVE-2024-39498 * CVE-2024-39502 * CVE-2024-39504 * CVE-2024-39507 * CVE-2024-40901 * CVE-2024-40906 * CVE-2024-40908 * CVE-2024-40919 * CVE-2024-40923 * CVE-2024-40925 * CVE-2024-40928 * CVE-2024-40931 * CVE-2024-40935 * CVE-2024-40937 * CVE-2024-40940 * CVE-2024-40947 * CVE-2024-40948 * CVE-2024-40953 * CVE-2024-40960 * CVE-2024-40961 * CVE-2024-40966 * CVE-2024-40970 * CVE-2024-40972 * CVE-2024-40975 * CVE-2024-40979 * CVE-2024-40998 * CVE-2024-40999 * CVE-2024-41006 * CVE-2024-41011 * CVE-2024-41013 * CVE-2024-41014 * CVE-2024-41017 * CVE-2024-41090 * CVE-2024-41091 CVSS scores: * CVE-2021-47432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47432 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38417 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47210 ( SUSE ): 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52483 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52503 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52503 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52616 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52622 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52640 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52649 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52655 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52735 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52749 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52765 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52765 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52768 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52768 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52769 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52769 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52771 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52771 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52772 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52772 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52775 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52776 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52777 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52780 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52782 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52783 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52786 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52798 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52799 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52801 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52801 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52807 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52811 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52827 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52827 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52829 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52829 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52836 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52837 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52838 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52840 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52842 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52862 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52862 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52866 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52879 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52883 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52883 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52884 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52884 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6238 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6238 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21823 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-24861 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25741 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-25741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26614 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26623 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26632 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26635 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26638 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26638 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26641 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26654 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26665 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26731 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26734 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26737 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26764 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26769 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26785 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26793 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26865 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26865 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26882 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26901 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26939 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26945 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26966 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26982 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26992 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-26993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27009 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27022 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27040 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27044 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27045 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27047 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27052 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27053 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27054 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27402 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27402 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27404 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27408 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27414 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27431 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-33619 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34777 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35803 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35843 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35843 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35853 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35857 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35868 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35884 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35896 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35899 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35942 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35957 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35970 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36013 ( NVD ): 6.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36016 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36017 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36030 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36030 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36281 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36477 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36478 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36478 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36479 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36889 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-36890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36900 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36903 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-36910 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36912 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36913 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36916 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36916 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-36917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36934 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36935 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36935 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36937 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36947 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36960 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36960 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36962 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36965 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36972 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36973 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36977 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-37021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-37354 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38384 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38385 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38388 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38388 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38390 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38391 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38539 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38540 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38541 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38543 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-38545 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38548 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38550 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38550 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38552 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-38552 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38553 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38553 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38555 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38556 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38557 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38559 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38560 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38562 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38562 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38564 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38565 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-38565 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-38566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38568 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38569 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38569 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38571 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38571 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38572 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38573 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38578 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38579 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-38580 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38582 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38583 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38587 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38587 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38588 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38588 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38591 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38594 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38595 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38597 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-38600 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38601 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38603 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38605 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38608 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38611 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38616 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38618 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38627 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38628 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38630 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38636 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38659 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H * CVE-2024-38661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39276 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39291 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39362 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39371 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39466 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39466 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39468 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39468 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39469 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39471 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39472 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-39472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39473 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39474 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39481 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39482 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39482 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39487 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39490 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39496 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39496 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39498 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39502 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39504 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39504 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-40906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40906 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40928 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40931 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-40931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40947 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40975 ( SUSE ): 2.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-41006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 848 vulnerabilities, contains 11 features and has 149 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408). * CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405). * CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403). * CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910). * CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993). * CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789). * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866). * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716). * CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719). * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328). * CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913). * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886). * CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926). * CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899). * CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803). * CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783). * CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813). * CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797). * CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814). * CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757). * CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836). * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730). * CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800). * CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788). * CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731). * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786). * CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780). * CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779). * CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573) * CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490) * CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499) * CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641) * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512) * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non- allocated memory (bsc#1227762). * CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432). * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806). * CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422) * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815) * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813) * CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801). * CVE-2024-35890: gro: fix ownership transfer (bsc#1224516). * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719). * CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851). * CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750). * CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103. * CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763). * CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804). * CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723) * CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755). * CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807). * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711) * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545) * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778) * CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604). * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). * CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414). * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). * CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836). * CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806). * CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740). * CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326). * CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600). * CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088). * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783). * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626). * CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010). * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). * CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589). * CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463). * CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744). * CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717). * CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745). * CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752). * CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753). * CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328). * CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883). * CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489). * CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447). * CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434). * CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659). * CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656). * CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757). * CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544). * CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866). * CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654). * CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021). * CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647). * CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057). * CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779). * CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438). * CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743). * CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098). * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758). * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101). * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767). * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732). * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994). * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751). * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066). * CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948). * CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949). * CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950). * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799). * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610). * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841). * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879). * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996). * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789). * CVE-2024-38566: bpf: Fix verifier assumptions about socket->sk (bsc#1226790). * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514). * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770). * CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519). * CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857). * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842). * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744). * CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607). * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774). * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781). * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746). * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749). * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734). * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772). * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771). * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810). * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809). * CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823). * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815). * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145). * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439). * CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497). * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670). * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702). * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741). * CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737). * CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572). * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735). * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080). * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951). * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498). * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). * CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681). * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723). * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759). * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726). * CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105). * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661). * CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935). * CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939). * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760). * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763). * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834). * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614). * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585). * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539). * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018). * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515). * CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612). * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520). * CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619). * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674) * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2024-36030: Fixed the double free in rvu_npc_freemem() (bsc#1225712) * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621) * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148). * CVE-2024-26860: Fixed a memory leak when rechecking the data (bsc#1223077). * CVE-2023-52772: Fixed use-after-free in unix_stream_read_actor() (bsc#1224989). * CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2024-35895: Fixed lock inversion deadlock in map delete elem (bsc#1224511). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-27036: Fixed writeback data corruption (bsc#1223810). * CVE-2024-35903: Fixed IP after emitting call depth accounting (bsc#1224493). * CVE-2024-35931: Fixed PCI error slot reset during RAS recovery (bsc#1224652). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523). * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502). * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fixed warning during rehash (bsc#1224543). * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2023-52771: Fixed delete_endpoint() vs parent unregistration race (bsc#1225007). * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606). * CVE-2024-27408: Fixed race condition in dmaengine w-edma/eDMA (bsc#1224430). * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649). * CVE-2024-35921: Fixed oops when HEVC init fails (bsc#1224477). * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936). * CVE-2024-35991: Fixed kABI workaround for struct idxd_evl (bsc#1224553). * CVE-2024-27418: Fixed memory leak in mctp_local_output (bsc#1224720) * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721) * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2024-35917: Fixed Fix bpf_plt pointer arithmetic (bsc#1224481). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727). * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608). * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2023-52659: Fixed to pfn_to_kaddr() not treated as a 64-bit type (bsc#1224442). * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659). * CVE-2024-21823: Fixed safety flag to struct ends (bsc#1223625). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098). * CVE-2023-52483: mctp: perform route lookups under a RCU read-side lock (bsc#1220738). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-26632: Fixed iterating over an empty bio with bio_for_each_folio_all (bsc#1221635). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829). * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615). * CVE-2023-6238: Fixed kcalloc() arguments order (bsc#1217384). * CVE-2024-26946: Fixed copy_from_kernel_nofault() to read from unsafe address (bsc#1223669). * CVE-2024-26945: Fixed nr_cpus < nr_iaa case (bsc#1223732). * CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2023-52641: Fixed NULL ptr dereference checking at the end of attr_allocate_frame() (bsc#1222303) * CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679). * CVE-2024-26865: rds: tcp: Fix use-after-free of net in reqsk_timer_handler() (bsc#1223062). * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). * CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368). * CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693). * CVE-2024-26726: Fixed invalid drop extent_map for free space inode on write error (bsc#1222532) * CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745). * CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735). * CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664). * CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822). * CVE-2024-26991: Fixed overflow lpage_info when checking attributes (bsc#1223695). * CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655). * CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686). * CVE-2024-27022: Fixed linking file vma until vma is fully initialized (bsc#1223774). * CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104). * CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634). * CVE-2024-26899: Fixed deadlock between bd_link_disk_holder and partition scan (bsc#1223045). * CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060). * CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198). * CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357). * CVE-2024-26638: Fixed uninitialize struct msghdr completely (bsc#1221649 CVE-2024-26638). * CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613). * CVE-2024-26909: Fixed drm bridge use-after-free (bsc#1223143). * CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (bsc#1222378). * CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624). * CVE-2024-26832: Fixed missing folio cleanup in writeback race path (bsc#1223007). * CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615). * CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294). * CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035). * CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189). * CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190). * CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034). * CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033). * CVE-2024-26844: Fixed WARNING in _copy_from_iter (bsc#1223015). * CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968). * CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342). * CVE-2024-26774: Fixed dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (bsc#1222622). * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). * CVE-2024-26815: Fixed improper TCA_TAPRIO_TC_ENTRY_INDEX check (bsc#1222635). * CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801). * CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557). * CVE-2024-26731: Fixed NULL pointer dereference in sk_psock_verdict_data_ready() (bsc#1222371). * CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585). * CVE-2024-26740: Fixed use the backlog for mirred ingress (bsc#1222563). * CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445). * CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2023-52640: Fixed out-of-bounds in ntfs_listxattr (bsc#1222301). * CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915). * CVE-2023-52631: Fixed an NULL dereference bug (bsc#1222264 CVE-2023-52631). * CVE-2024-24861: Fixed an overflow due to race condition in media/xc4000 device driver in xc4000 xc4000_get_frequency() function (bsc#1219623). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2023-52458: Fixed check that partition length needs to be aligned with block size (bsc#1220428). * CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336). * CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). The following non-security bugs were fixed: * 9p: add missing locking around taking dentry fid list (git-fixes) * ACPI: CPPC: Fix access width used for PCC registers (git-fixes). * ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes). * ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes). * ACPI: EC: Abort address space access upon error (stable-fixes). * ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable- fixes). * ACPI: EC: Evaluate orphan _REG under EC device (git-fixes). * ACPI: EC: Install address space handler at the namespace root (stable- fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git- fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes). * ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes). * ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes). * ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable- fixes). * ACPI: scan: Do not increase dep_unmet for already met dependencies (git- fixes). * ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750). * ACPI: x86: Add PNP_UART1_SKIP quirk for Lenovo Blade2 tablets (stable- fixes). * ACPI: x86: Force StorageD3Enable on more products (stable-fixes). * ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes). * ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (git-fixes). * ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes). * ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes). * ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes). * ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes). * ALSA: PCM: Allow resume only for suspended streams (stable-fixes). * ALSA: aoa: avoid false-positive format truncation warning (git-fixes). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: core: Remove debugfs at disconnection (git-fixes). * ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes). * ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes). * ALSA: emux: improve patch ioctl data validation (stable-fixes). * ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes). * ALSA: hda/conexant: Mute speakers at suspend / shutdown (bsc#1228269). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (bsc#1228269). * ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes). * ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes). * ALSA: hda/realtek - fixed headset Mic not show (stable-fixes). * ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes). * ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14AHP9 (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ARP8 (stable-fixes). * ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes). * ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable- fixes). * ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable- fixes). * ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes). * ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes). * ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes). * ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes). * ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes). * ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes). * ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes). * ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes). * ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes). * ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462). * ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes). * ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes). * ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes). * ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes). * ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes). * ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes). * ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes). * ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes). * ALSA: hda/realtek: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes). * ALSA: hda/realtek: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes). * ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes). * ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes). * ALSA: hda/realtek: cs35l41: Fixup remaining asus strix models (git-fixes). * ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes). * ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable- fixes). * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Hera2 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 (stable-fixes). * ALSA: hda/tas2781: add locks to kcontrols (git-fixes). * ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes). * ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes). * ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes). * ALSA: hda: clarify Copyright information (stable-fixes). * ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes). * ALSA: hda: cs35l41: Component should be unbound before deconstruction (git- fixes). * ALSA: hda: cs35l41: Fix swapped l/r audio channels for Lenovo ThinBook 13x Gen4 (git-fixes). * ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes). * ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind() (git-fixes). * ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git- fixes). * ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes). * ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable- fixes). * ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes). * ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes). * ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes). * ALSA: hda: cs35l56: Component should be unbound before deconstruction (git- fixes). * ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes). * ALSA: hda: cs35l56: Fix lifecycle of codec pointer (stable-fixes). * ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes). * ALSA: hda: cs35l56: Set the init_done flag before component_add() (git- fixes). * ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable- fixes). * ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes). * ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git- fixes). * ALSA: hda: tas2781: Component should be unbound before deconstruction (git- fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git- fixes). * ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable- fixes). * ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable- fixes). * ALSA: scarlett2: Add correct product series name to messages (stable-fixes). * ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git- fixes). * ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes). * ALSA: scarlett2: Default mixer driver to enabled (stable-fixes). * ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes). * ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes). * ALSA: seq: Fix incorrect UMP type for system messages (git-fixes). * ALSA: seq: Fix missing MSB in MIDI2 SPP conversion (git-fixes). * ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git- fixes). * ALSA: seq: Fix missing channel at encoding RPN/NRPN MIDI2 messages (git- fixes). * ALSA: seq: Fix yet another spot for system message conversion (git-fixes). * ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes). * ALSA: seq: ump: Fix missing System Reset message handling (git-fixes). * ALSA: seq: ump: Fix swapped song position pointer data (git-fixes). * ALSA: seq: ump: Skip useless ports for static blocks (git-fixes). * ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes). * ALSA: timer: Set lower bound of start tick time (stable-fixes). * ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes). * ALSA: ump: Do not clear bank selection after sending a program change (git- fixes). * ALSA: ump: Do not update FB name for static blocks (git-fixes). * ALSA: ump: Force 1 Group for MIDI1 FBs (git-fixes). * ALSA: ump: Set default protocol when not given explicitly (git-fixes). * ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes). * ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes). * ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes). * ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes). * ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git- fixes). * ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes). * ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes). * ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: Populate board selection with new I2S entries (stable- fixes). * ASoC: Intel: avs: Set name of control as in topology (git-fixes). * ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git- fixes). * ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops (stable-fixes). * ASoC: Intel: common: add ACPI matching tables for Arrow Lake (stable-fixes). * ASoC: Intel: sof-sdw: really remove FOUR_SPEAKER quirk (git-fixes). * ASoC: Intel: sof_sdw: add JD2 quirk for HP Omen 14 (stable-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0C0F (stable-fixes). * ASoC: Intel: use soc_intel_is_byt_cr() only when IOSF_MBI is reachable (git- fixes). * ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes). * ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes). * ASoC: SOF: Intel: hda-pcm: Limit the maximum number of periods by MAX_BDL_ENTRIES (stable-fixes). * ASoC: SOF: Intel: hda: fix null deref on system suspend entry (git-fixes). * ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git- fixes). * ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes). * ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes). * ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes). * ASoC: SOF: imx8m: Fix DSP control regmap retrieval (git-fixes). * ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (stable-fixes). * ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes). * ASoC: SOF: ipc4-topology: Preserve the DMA Link ID for ChainDMA on unprepare (git-fixes). * ASoC: SOF: ipc4-topology: Use correct queue_id for requesting input pin format (stable-fixes). * ASoC: SOF: pcm: Restrict DSP D0i3 during S0ix to IPC3 (stable-fixes). * ASoC: SOF: sof-audio: Skip unprepare for in-use widgets on error rollback (stable-fixes). * ASoC: TAS2781: Fix tasdev_load_calibrated_data() (git-fixes). * ASoC: acp: Support microphone from device Acer 315-24p (git-fixes). * ASoC: amd: Adjust error handling in case of absent codec device (git-fixes). * ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes). * ASoC: amd: acp: fix for acp_init function error handling (git-fixes). * ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git- fixes). * ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable- fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M5602RA (stable-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes). * ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes). * ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable- fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E16 Gen 2 (bsc#1228269). * ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes). * ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes). * ASoC: cs35l56: Accept values greater than 0 as IRQ numbers (git-fixes). * ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes). * ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes). * ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes). * ASoC: fsl-asoc-card: set priv->pdev before using it (git-fixes). * ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: max98088: Check for clk_prepare_enable() error (git-fixes). * ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git- fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-card: make links nonatomic (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes). * ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes). * ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes). * ASoC: q6apm-lpass-dai: close graph on prepare errors (git-fixes). * ASoC: qcom: Adjust issues in case of DT error in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes). * ASoC: rockchip: i2s-tdm: Fix trcm mode by setting clock on right mclk (git- fixes). * ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git- fixes). * ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes). * ASoC: rt5682-sdw: fix locking sequence (git-fixes). * ASoC: rt711-sdca: fix locking sequence (git-fixes). * ASoC: rt711-sdw: add missing readable registers (stable-fixes). * ASoC: rt711-sdw: fix locking sequence (git-fixes). * ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt715-sdca: volume step modification (git-fixes). * ASoC: rt715: add vendor clear control register (git-fixes). * ASoC: rt722-sdca-sdw: add debounce time for type detection (stable-fixes). * ASoC: rt722-sdca-sdw: add silence detection register as volatile (stable- fixes). * ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes). * ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes). * ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes). * ASoC: sof: amd: fix for firmware reload failure in Vangogh platform (git- fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes). * ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes). * ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes). * ASoC: tegra: Fix DSPK 16-bit playback (git-fixes). * ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes). * ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes). * ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable- fixes). * ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes). * ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin (git-fixes). * ASoC: topology: Do not assign fields that are already set (stable-fixes). * ASoC: topology: Fix references to freed memory (stable-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes). * ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes). * ASoc: tas2781: Enable RCA-based playback without DSP firmware download (git- fixes). * Bluetooth: Add new quirk for broken read key length on ATS2851 (stable- fixes). * Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes). * Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes). * Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable- fixes). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes). * Bluetooth: ISO: Align broadcast sync_timeout with connection timeout (stable-fixes). * Bluetooth: ISO: Check socket flag instead of hcon (git-fixes). * Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git- fixes). * Bluetooth: ISO: Fix BIS cleanup (stable-fixes). * Bluetooth: Ignore too large handle values in BIG (git-fixes). * Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes). * Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes). * Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes). * Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (bsc#1221504). * Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes). * Bluetooth: Remove usage of the deprecated ida_simple_xx() API (stable- fixes). * Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes). * Bluetooth: add quirk for broken address properties (git-fixes). * Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable- fixes). * Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable- fixes). * Bluetooth: btintel: Fixe build regression (git-fixes). * Bluetooth: btintel: Refactor btintel_set_ppag() (git-fixes). * Bluetooth: btnxpuart: Add handling for boot-signature timeout errors (git- fixes). * Bluetooth: btnxpuart: Enable Power Save feature on startup (stable-fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable- fixes). * Bluetooth: btusb: Fix triggering coredump implementation for QCA (git- fixes). * Bluetooth: hci_bcm4377: Fix msgid release (git-fixes). * Bluetooth: hci_bcm4377: Use correct unit for timeouts (git-fixes). * Bluetooth: hci_core: Cancel request on command timeout (stable-fixes). * Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable- fixes). * Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes). * Bluetooth: hci_event: Fix setting of unicast qos interval (git-fixes). * Bluetooth: hci_event: Remove code to removed CONFIG_BT_HS (stable-fixes). * Bluetooth: hci_event: Set QoS encryption from BIGInfo report (git-fixes). * Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes). * Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes). * Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync (git-fixes). * Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY (git-fixes). * Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes). * Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git- fixes). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * Bluetooth: qca: fix device-address endianness (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: set power_ctrl_enabled on NULL returned by gpiod_get_optional() (git-fixes). * EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes). * Edit "amdkfd: use calloc instead of kzalloc to avoid integer overflow" Reference CVE and bug numbers. * Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771) * Enable CONFIG_SCHED_CLUSTER=y on arm64 (jsc#PED-8701). * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA. * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA. * Fix a potential infinite loop in extract_user_to_sg() (git-fixes). * Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes). * HID: Add quirk for Logitech Casa touchpad (stable-fixes). * HID: Ignore battery for ELAN touchscreens 2F2C and 4116 (stable-fixes). * HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes). * HID: core: remove unnecessary WARN_ON() in implement() (git-fixes). * HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git- fixes). * HID: input: avoid polling stylus battery on Chromebook Pompom (stable- fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes). * HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git- fixes). * HID: logitech-dj: allow mice to use all types of reports (git-fixes). * HID: mcp-2221: cancel delayed_work only when CONFIG_IIO is enabled (stable- fixes). * HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable- fixes). * HID: wacom: Modify pen IDs (git-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * Input: ads7846 - use spi_device_id table (stable-fixes). * Input: allocate keycode for Display refresh rate toggle (stable-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: elan_i2c - do not leave interrupt disabled on suspend failure (git- fixes). * Input: elantech - fix touchpad state on resume for Lenovo N24 (stable- fixes). * Input: ff-core - prefer struct_size over open coded arithmetic (stable- fixes). * Input: gpio_keys_polled - suppress deferred probe error for gpio (stable- fixes). * Input: i8042 - add Ayaneo Kun to i8042 quirk table (stable-fixes). * Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes). * Input: imagis - use FIELD_GET where applicable (stable-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * Input: qt1050 - handle CHIP_ID reading error (git-fixes). * Input: silead - Always support 10 fingers (stable-fixes). * Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes). * Input: xpad - add additional HyperX Controller Identifiers (stable-fixes). * Input: xpad - add support for ASUS ROG RAIKIRI (git-fixes). * Input: xpad - add support for ASUS ROG RAIKIRI PRO (stable-fixes). * Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes). * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: SEV-ES: Delegate LBR virtualization to the processor (git-fixes). * KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (git- fixes). * KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes). * KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes). * KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes). * KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (git- fixes). * KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes). * KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes). * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478). * KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790). * KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes). * KVM: x86/mmu: Move private vs. shared check above slot validity checks (git- fixes). * KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes). * KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes). * KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes). * KVM: x86/pmu: Always treat Fixed counters as available when supported (git- fixes). * KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes). * KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes). * KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git- fixes). * KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes). * KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git- fixes). * KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes). * KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes). * KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes). * KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes). * KVM: x86/xen: improve accuracy of Xen timers (git-fixes). * KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git- fixes). * KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes). * KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git- fixes). * KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git- fixes). * KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes). * KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes). * KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git- fixes). * KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes). * KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git- fixes). * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git- fixes). * KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP (git-fixes). * KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git- fixes). * NFC: trf7970a: disable all regulators on removal (git-fixes). * NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes). * NFS: Fix an off by one in root_nfs_cat() (git-fixes). * NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git- fixes). * NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes). * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847). * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847). * NFS: add barriers when testing for NFS_FSDATA_BLOCKED (git-fixes). * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226). * NFSD: Convert the callback workqueue to use delayed_work (git-fixes). * NFSD: Fix checksum mismatches in the duplicate reply cache (git-fixes). * NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes). * NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git- fixes). * NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes). * NFSD: Retransmit callbacks after client reconnects (git-fixes). * NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes). * NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes). * NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes). * NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes). * NFSv4.1 enforce rootpath check in fs_location query (git-fixes). * NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes). * NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes). * NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes). * NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362). * NFSv4: Fixup smatch warning for ambiguous return (git-fixes). * Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes). * PCI/AER: Block runtime suspend when handling errors (stable-fixes). * PCI/ASPM: Update save_state when configuration changes (bsc#1226915) * PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes). * PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes). * PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes). * PCI/DPC: Use FIELD_GET() (stable-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/MSI: Fix UAF in msi_capability_init (git-fixes). * PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes). * PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes). * PCI: Clear Secondary Status errors after enumeration (bsc#1226928) * PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes). * PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes). * PCI: Do not wait for disconnected devices when resuming (git-fixes). * PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes). * PCI: Extend ACS configurability (bsc#1228090). * PCI: Fix resource double counting on remove & rescan (git-fixes). * PCI: Fix typos in docs and comments (stable-fixes). * PCI: Introduce cleanup helpers for device reference counts and locks (stable-fixes). * PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes). * PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes). * PCI: dw-rockchip: Fix initial PERST# GPIO value (git-fixes). * PCI: dwc: Fix index 0 incorrectly being interpreted as a free ATU slot (git- fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: endpoint: Clean up error handling in vpci_scan_bus() (git-fixes). * PCI: endpoint: Fix error handling in epf_ntb_epc_cleanup() (git-fixes). * PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init() (git-fixes). * PCI: hv: Fix ring buffer size calculation (git-fixes). * PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes). * PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes). * PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes). * PCI: qcom-ep: Disable resources unconditionally during PERST# assert (git- fixes). * PCI: qcom: Add support for sa8775p SoC (git-fixes). * PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes). * PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup() (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes). * PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888). * PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes). * PCI: switchtec: Use normal comment style (stable-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes). * PCI: vmd: Create domain symlink before pci_bus_add_devices() (bsc#1227363). * PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes). * PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes). * Port "certs: Add ECDSA signature verification self-test". * Port "certs: Move RSA self-test data to separate file". * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300). * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300). * RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619). * RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619). * RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619). * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/bnxt_re: Fix the max msix vectors macro (git-fixes) * RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes) * RDMA/cm: add timeout to cm_destroy_id wait (git-fixes) * RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes). * RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes). * RDMA/mlx5: Add check for srq max_sge attribute (git-fixes) * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Change check for cacheable mkeys (git-fixes) * RDMA/mlx5: Ensure created mkeys always have a populated rb_key (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/mlx5: Fix unwind flow as part of mlx5_ib_stage_init_init (git-fixes) * RDMA/mlx5: Follow rb_key.ats when creating new mkeys (git-fixes) * RDMA/mlx5: Remove extra unlock on error path (git-fixes) * RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes) * RDMA/restrack: Fix potential invalid address access (git-fixes) * RDMA/rxe: Allow good work requests to be executed (git-fixes) * RDMA/rxe: Fix data copy for IB_SEND_INLINE (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix responder length checking for UD request packets (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes). * Refresh kabi workaround ath updates (bsc#1227149#) * Refresh the previous ASoC patch, landed in subsystem tree (bsc#1228269) * Remove NTFSv3 from configs (bsc#1224429) * SEV: disable SEV-ES DebugSwap by default (git-fixes). * SUNRPC: Fix gss_free_in_token_pages() (git-fixes). * SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git- fixes). * SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272). * SUNRPC: fix a memleak in gss_import_v2_context (git-fixes). * SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes). * SUNRPC: return proper error from gss_wrap_req_priv (git-fixes). * Temporarily drop KVM patch that caused a regression (bsc#1226158) * USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes). * USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes). * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git- fixes). * USB: core: Add hub_get() and hub_put() routines (stable-fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes). * USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes). * USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes). * USB: serial: add device ID for VeriFone adapter (stable-fixes). * USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes). * USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable- fixes). * USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable- fixes). * USB: serial: mos7840: fix crash on resume (git-fixes). * USB: serial: option: add Fibocom FM135-GL variants (stable-fixes). * USB: serial: option: add Fibocom FM350-GL (stable-fixes). * USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes). * USB: serial: option: add MeiG Smart SLM320 product (stable-fixes). * USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes). * USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable- fixes). * USB: serial: option: add Rolling RW350-GL variants (stable-fixes). * USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes). * USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes). * USB: serial: option: add Telit generic core-dump composition (stable-fixes). * USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes). * USB: serial: option: add support for Foxconn T99W651 (stable-fixes). * USB: serial: option: support Quectel EM060K sub-models (stable-fixes). * USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git- fixes). * Update ath11k suspend patches from the latest subsystem tree (bsc#1207948). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * Workaround broken chacha crypto fallback (bsc#1218205). * X.509: Fix the parser of extended key usage for length (bsc#1218820). * accel/ivpu: Fix deadlock in context_xa (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * ahci: asm1064: asm1166: do not limit reported ports (git-fixes). * ahci: asm1064: correct count of reported ports (stable-fixes). * amd/amdkfd: sync all devices to wait all processes being evicted (stable- fixes). * amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable- fixes). * arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes). * arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502) * arm64/io: add constant-argument check (bsc#1226502 git-fixes) * arm64/ptrace: Use saved floating point state type to determine SVE (git- fixes) * arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git- fixes) * arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). * arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes). * arm64: bpf: fix 32bit unconditional bswap (git-fixes). * arm64: dts: Fix dtc interrupt_provider warnings (git-fixes) * arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes) * arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes) * arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes) * arm64: dts: freescale: imx8mm-verdin: enable hysteresis on slow input (git- fixes) * arm64: dts: hi3798cv200: fix the size of GICR (git-fixes) * arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes) * arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes) * arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes) * arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes) * arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes) * arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx93-11x11-evk: Remove the 'no-sdio' property (git-fixes) * arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes) * arm64: dts: microchip: sparx5: fix mdio reg (git-fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add mdio and ethernet-phy nodes to (git-fixes) * arm64: dts: rockchip: Add missing power-domains for rk356x vop_mmu (git- fixes) * arm64: dts: rockchip: Add pinctrl for UART0 to rk3308-rock-pi-s (git-fixes) * arm64: dts: rockchip: Add sdmmc related properties on (git-fixes) * arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes) * arm64: dts: rockchip: Drop invalid mic-in-differential on (git-fixes) * arm64: dts: rockchip: Fix SD NAND and eMMC init on rk3308-rock-pi-s (git- fixes) * arm64: dts: rockchip: Fix mic-in-differential usage on (git-fixes) * arm64: dts: rockchip: Fix mic-in-differential usage on rk3566-roc-pc (git- fixes) * arm64: dts: rockchip: Fix the DCDC_REG2 minimum voltage on Quartz64 (git- fixes) * arm64: dts: rockchip: Fix the value of `dlg,jack-det-rate` mismatch (git- fixes) * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes) * arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git- fixes) * arm64: dts: rockchip: Rename LED related pinctrl nodes on (git-fixes) * arm64: dts: rockchip: Update WIFi/BT related nodes on (git-fixes) * arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git- fixes) * arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes) * arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git- fixes) * arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes) * arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes) * arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes) * arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes) * arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes) * arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes). * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688). * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688). * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688). * arm64: tegra: Correct Tegra132 I2C alias (git-fixes) * arm64: tegra: Set the correct PHY mode for MGBE (git-fixes) * arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587) * arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587) * asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable- fixes). * ata,scsi: libata-core: Do not leak memory for ata_port struct members (git- fixes). * ata: ahci: Clean up sysfs file on error (git-fixes). * ata: libata-core: Allow command duration limits detection for ACS-4 drives (git-fixes). * ata: libata-core: Fix double free on error (git-fixes). * ata: libata-core: Fix null pointer dereference on error (git-fixes). * ata: libata-scsi: Fix offsets for the fixed format sense data (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * ata: sata_mv: Fix PCI device ID table declaration compilation warning (git- fixes). * ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * auxdisplay: ht16k33: Drop reference after LED registration (git-fixes). * ax25: Fix netdev refcount issue (git-fixes). * ax25: Fix refcount imbalance on inbound connections (git-fixes). * ax25: Fix reference count leak issue of net_device (git-fixes). * ax25: Fix reference count leak issues of ax25_dev (git-fixes). * ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes). * batman-adv: Avoid infinite loop trying to resize local TT (git-fixes). * batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes). * batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes). * bitops: add missing prototype check (git-fixes). * blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605). * blk-cgroup: fix list corruption from resetting io stat (bsc#1225605). * block: Move checking GENHD_FL_NO_PART to bdev_add_partition() (bsc#1226213). * block: fix q->blkg_list corruption during disk rebind (bsc#1223591). * bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (git- fixes). * bnx2x: Fix firmware version string character counts (git-fixes). * bnxt_en: Fix error recovery for RoCE ulp client (git-fixes). * bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git- fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes). * bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes). * bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes). * bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes). * bpf, arm64: Fix incorrect runtime stats (git-fixes) * bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes) * bpf, scripts: Correct GPL license name (git-fixes). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903). * bpf: correct loop detection for iterators convergence (bsc#1225903). * bpf: exact states comparison for iterator convergence checks (bsc#1225903). * bpf: extract __check_reg_arg() utility function (bsc#1225903). * bpf: extract same_callsites() as utility function (bsc#1225903). * bpf: extract setup_func_entry() utility function (bsc#1225903). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903). * bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903). * bpf: print full verifier states on infinite loop detection (bsc#1225903). * bpf: verify callbacks as if they are called unknown number of times (bsc#1225903). * bpf: widening for callback iterators (bsc#1225903). * btrfs: add a helper to read the superblock metadata_uuid (git-fixes) * btrfs: add and use helper to check if block group is used (bsc#1220120). * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: add new unused block groups to the list of unused block groups (bsc#1220120). * btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120). * btrfs: always clear PERTRANS metadata during commit (git-fixes) * btrfs: always print transaction aborted messages with an error level (git- fixes) * btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120). * btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120). * btrfs: assert delayed node locked when removing delayed item (git-fixes) * btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120). * btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120). * btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120). * btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120). * btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes) * btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git- fixes) * btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes) * btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git- fixes) * btrfs: do not allow non subvolume root targets for snapshot (git-fixes) * btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes) * btrfs: do not delete unused block group if it may be used soon (bsc#1220120). * btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120). * btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git- fixes) * btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120). * btrfs: do not warn if discard range is not aligned to sector (git-fixes) * btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285). * btrfs: error out when COWing block using a stale transaction (git-fixes) * btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes) * btrfs: error when COWing block from a root that is being deleted (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: fail priority metadata ticket with real fs error (bsc#1220120). * btrfs: file_remove_privs needs an exclusive lock in direct io write (git- fixes) * btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes) * btrfs: fix deadlock with fiemap and extent locking (bsc#1223285). * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix off-by-one when checking chunk map includes logical address (git- fixes) * btrfs: fix race between ordered extent completion and fiemap (bsc#1223285). * btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285). * btrfs: fix race when refilling delayed refs block reserve (git-fixes) * btrfs: fix start transaction qgroup rsv double free (git-fixes) * btrfs: fix stripe length calculation for non-zoned data chunk allocation (bsc#1217489). * btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) * btrfs: free qgroup rsv on io failure (git-fixes) * btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git- fixes) * btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120). * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: handle errors properly in update_inline_extent_backref() (git-fixes) * btrfs: initialize key where it's used when running delayed data ref (bsc#1220120). * btrfs: log message if extent item not found when running delayed extent op (bsc#1220120). * btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120). * btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120). * btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120). * btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120). * btrfs: make error messages more clear when getting a chunk map (git-fixes) * btrfs: make find_first_extent_bit() return a boolean (bsc#1220120). * btrfs: make find_free_dev_extent() static (bsc#1220120). * btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120). * btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120). * btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120). * btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120). * btrfs: output extra debug info if we failed to find an inline backref (git- fixes) * btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120). * btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes) * btrfs: print available space across all block groups when dumping space info (bsc#1220120). * btrfs: print available space for a block group when dumping a space info (bsc#1220120). * btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120). * btrfs: print target number of bytes when dumping free space (bsc#1220120). * btrfs: qgroup: always free reserved space for extent records (bsc#1216196). * btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git- fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: reject encoded write if inode has nodatasum flag set (git-fixes) * btrfs: release path before inode lookup during the ino lookup ioctl (git- fixes) * btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref() (bsc#1220120). * btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120). * btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120). * btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120). * btrfs: remove unnecessary logic when running new delayed references (bsc#1220120). * btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120). * btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120). * btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120). * btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120). * btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes) * btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes) * btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120). * btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120). * btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459). * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: set page extent mapped after read_folio in relocate_one_page (git- fixes) * btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120). * btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120). * btrfs: store the error that turned the fs into error state (bsc#1220120). * btrfs: sysfs: validate scrub_speed_max value (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120). * btrfs: update documentation for add_new_free_space() (bsc#1220120). * btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120). * btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120). * btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120). * btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120). * btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120). * btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes) * btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes) * btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120). * bus: mhi: ep: check the correct variable in mhi_ep_register_controller() (git-fixes). * bus: mhi: host: allow MHI client drivers to provide the firmware via a pointer (bsc#1227149). * bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes). * cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git- fixes). * cachefiles: remove requests from xarray during flushing requests (bsc#1226588). * can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes). * can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes). * can: mcp251xfd: fix infinite loop when xmit fails (git-fixes). * cdrom: rearrange last_media_change check to avoid unintentional overflow (stable-fixes). * ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022). * ceph: always check dir caps asynchronously (bsc#1226022). * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022). * ceph: break the check delayed cap loop every 5s (bsc#1226022). * ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228417). * ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866). * ceph: stop copying to iter at EOF on sync reads (bsc#1222606). * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022). * certs: Add ECDSA signature verification self-test (bsc#1222777). * certs: Move RSA self-test data to separate file (bsc#1222777). * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git- fixes). * checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes). * cifs: Add a laundromat thread for cached directories (git-fixes, bsc#1225172). * cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172). * cifs: account for primary channel in the interface list (bsc#1225172). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1225172). * cifs: distribute channels across interfaces based on speed (bsc#1225172). * cifs: do not pass cifs_sb when trying to add channels (bsc#1225172). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1225172). * cifs: fix charset issue in reconnection (bsc#1225172). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172). * cifs: handle cases where a channel is closed (bsc#1225172). * cifs: handle cases where multiple sessions share connection (bsc#1225172). * cifs: reconnect work should have reference on server struct (bsc#1225172). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: Get runtime PM before walking tree during disable_unused (git-fixes). * clk: Get runtime PM before walking tree for clk_summary (git-fixes). * clk: Initialize struct clk_core kref earlier (stable-fixes). * clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes). * clk: Show active consumers of clocks in debugfs (stable-fixes). * clk: davinci: da8xx-cfgchip: Initialize clk_init_data before use (git- fixes). * clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes). * clk: mediatek: mt8183: Only enable runtime PM on mt8183-mfgcfg (git-fixes). * clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes). * clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes). * clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes). * clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git- fixes). * clk: qcom: clk-alpha-pll: set ALPHA_EN bit for Stromer Plus PLLs (git- fixes). * clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes). * clk: qcom: gcc-sm6350: Fix gpll6* & gpll7 parents (git-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * clk: qcom: reset: Commonize the de/assert functions (stable-fixes). * clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes). * clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes). * clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes). * clk: rs9: fix wrong default value for clock amplitude (git-fixes). * clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes). * clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes). * clkdev: Update clkdev id usage to allow for longer names (stable-fixes). * clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git- fixes). * clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes). * comedi: vmk80xx: fix incomplete endpoint checking (git-fixes). * config/arm64: Enable CoreSight PMU drivers (bsc#1228289 jsc#PED-7859) * coresight: trbe: Add a representative coresight_platform_data for (bsc#1220587) * coresight: trbe: Allocate platform data per device (bsc#1220587) * coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587) * counter: linux/counter.h: fix Excess kernel-doc description warning (git- fixes). * counter: ti-eqep: enable clock at probe (git-fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpufreq/amd-pstate: Fix the scaling_max_freq setting on shared memory CPPC systems (git-fixes). * cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git- fixes). * cpufreq: amd-pstate: fix memory leak on CPU EPP exit (stable-fixes). * cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git- fixes). * cpufreq: exit() callback is optional (git-fixes). * cpufreq: ti-cpufreq: Handle deferred probe with dev_err_probe() (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto/ecdh: make ecdh_compute_value() to zeroize the public key (bsc#1222768). * crypto/ecdsa: make ecdsa_ecc_ctx_deinit() to zeroize the public key (bsc#1222768). * crypto: aead,cipher - zeroize key buffer after use (stable-fixes). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - Add support for PCI device 0x156E (bsc#1223338). * crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338). * crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked (git-fixes). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: deflate - Add aliases to deflate (bsc#1227190). * crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782). * crypto: ecdh - explicitly zeroize private_key (stable-fixes). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: ecdsa - Fix the public key format description (git-fixes). * crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes). * crypto: hisilicon/debugfs - Fix debugfs uninit process issue (stable-fixes). * crypto: hisilicon/qm - Add the err memory release process to qm uninit (stable-fixes). * crypto: hisilicon/sec - Fix memory leak for sec resource release (stable- fixes). * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190). * crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes). * crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes). * crypto: qat - extend scope of lock in adf_cfg_add_key_value_param() (git- fixes). * crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes). * crypto: qat - improve error logging to be consistent across features (git- fixes). * crypto: qat - relocate and rename get_service_enabled() (stable-fixes). * crypto: qat - specify firmware files for 402xx (git-fixes). * crypto: rsa - add a check for allocation failure (bsc#1222775). * crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775). * crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * cxl/acpi: Fix load failures due to single window creation failure (git- fixes). * cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (git-fixes). * cxl/region: Fix cxlr_pmem leaks (git-fixes). * cxl/region: Fix memregion leaks in devm_cxl_add_region() (git-fixes). * cxl/test: Add missing vmalloc.h for tools/testing/cxl/test/mem.c (git- fixes). * cxl/trace: Correct DPA field masks for general_media & dram events (git- fixes). * cxl/trace: Properly initialize cxl_poison region name (git-fixes). * dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853). * dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853). * dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n (jsc#PED-5853). * decompress_bunzip2: fix rare decompression failure (git-fixes). * device-dax: make dax_bus_type const (jsc#PED-5853). * devres: Fix devm_krealloc() wasting memory (git-fixes). * devres: Fix memory leakage caused by driver API devm_free_percpu() (git- fixes). * dlm: fix user space lkb refcounting (git-fixes). * dlm: fix user space lock decision to copy lvb (git-fixes). * dm crypt: remove redundant state settings after waking up (jsc#PED-7542). * dm thin: add braces around conditional code that spans lines (jsc#PED-7542). * dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542). * dm-integrity: set max_integrity_segments in dm_integrity_io_hints (jsc#PED-7542). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (bsc#1219596) * dm-raid: add a new helper prepare_suspend() in md_personality (jsc#PED-7542). * dm-raid: really frozen sync_thread during suspend (jsc#PED-7542). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list (jsc#PED-7542). * dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes). * dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes). * dma-mapping: benchmark: fix node id validation (git-fixes). * dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes). * dma: fix call order in dmam_free_coherent (git-fixes). * dma: xilinx_dpdma: Fix locking (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes). * dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes). * dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git- fixes). * dmaengine: ioatdma: Fix error path in ioat3_dma_probe() (git-fixes). * dmaengine: ioatdma: Fix kmemleak in ioat_pci_probe() (git-fixes). * dmaengine: ioatdma: Fix leaking on version mismatch (git-fixes). * dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes). * dmaengine: owl: fix register access functions (git-fixes). * dmaengine: tegra186: Fix residual calculation (git-fixes). * dmaengine: ti: k3-udma: Fix BCHAN count with UHC and HC channels (git- fixes). * docs: Restore "smart quotes" for quotes (stable-fixes). * docs: crypto: async-tx-api: fix broken code example (git-fixes). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * docs: netdev: Fix typo in Signed-off-by tag (git-fixes). * dpll: spec: use proper enum for pin capabilities attribute (git-fixes). * driver core: Introduce device_link_wait_removal() (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drivers/xen: Improve the late XenStore init protocol (git-fixes). * drivers: core: synchronize really_probe() and dev_uevent() (git-fixes). * drivers: soc: xilinx: check return status of get_api_version() (git-fixes). * drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (stable-fixes). * drm/amd/amdgpu: Fix uninitialized variable warnings (git-fixes). * drm/amd/display: ASSERT when failing to find index by plane/stream id (stable-fixes). * drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes). * drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes). * drm/amd/display: Add dml2 copy functions (stable-fixes). * drm/amd/display: Add dtbclk access to dcn315 (stable-fixes). * drm/amd/display: Add refresh rate range check (stable-fixes). * drm/amd/display: Allocate zero bw after bw alloc enable (stable-fixes). * drm/amd/display: Allow dirty rects to be sent to dmub when abm is active (stable-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes). * drm/amd/display: Check index msg_id before read or write (stable-fixes). * drm/amd/display: Check pipe offset before setting vblank (stable-fixes). * drm/amd/display: Disable seamless boot on 128b/132b encoding (stable-fixes). * drm/amd/display: Do not recursively call manual trigger programming (stable- fixes). * drm/amd/display: Enable colorspace property for MST connectors (git-fixes). * drm/amd/display: Exit idle optimizations before HDCP execution (stable- fixes). * drm/amd/display: Fix DC mode screen flickering on DCN321 (stable-fixes). * drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport (stable-fixes). * drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix idle check for shared firmware state (stable-fixes). * drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes). * drm/amd/display: Fix nanosec stat overflow (stable-fixes). * drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes). * drm/amd/display: Fix overlapping copy within dml_core_mode_programming (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Fix refresh rate range for some panel (stable-fixes). * drm/amd/display: Fix uninitialized variables in DM (stable-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes). * drm/amd/display: Move 'struct scaler_data' off stack (git-fixes). * drm/amd/display: Override min required DCFCLK in dml1_validate (stable- fixes). * drm/amd/display: Prevent crash when disable stream (stable-fixes). * drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 (stable-fixes). * drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable- fixes). * drm/amd/display: Remove pixle rate limit for subvp (stable-fixes). * drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes). * drm/amd/display: Return the correct HDCP error code (stable-fixes). * drm/amd/display: Revert Remove pixle rate limit for subvp (stable-fixes). * drm/amd/display: Send DP_TOTAL_LTTPR_CNT during detection if LTTPR is present (stable-fixes). * drm/amd/display: Send DTBCLK disable message on first commit (git-fixes). * drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes). * drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable- fixes). * drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes). * drm/amd/display: Skip finding free audio for unknown engine_id (stable- fixes). * drm/amd/display: Skip pipe if the pipe idx not set properly (stable-fixes). * drm/amd/display: Update efficiency bandwidth for dcn351 (stable-fixes). * drm/amd/display: Update odm when ODM combine is changed on an otg master pipe with no plane (stable-fixes). * drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found (stable-fixes). * drm/amd/display: Workaround register access in idle race with cursor (stable-fixes). * drm/amd/display: change dram_clock_latency to 34us for dcn35 (stable-fixes). * drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes). * drm/amd/display: fix input states translation error for dcn35 & dcn351 (stable-fixes). * drm/amd/display: handle range offsets in VRR ranges (stable-fixes). * drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes). * drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes). * drm/amd/pm: Restore config space after reset (stable-fixes). * drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes). * drm/amd/pm: remove logically dead code for renoir (git-fixes). * drm/amd/swsmu: modify the gfx activity scaling (stable-fixes). * drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes). * drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes). * drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes). * drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects' (git-fixes). * drm/amdgpu/mes: fix use-after-free issue (stable-fixes). * drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes). * drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git- fixes). * drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes). * drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes). * drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes). * drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git- fixes). * drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable- fixes). * drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes). * drm/amdgpu: Fix VRAM memory accounting (stable-fixes). * drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (git-fixes). * drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes). * drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes). * drm/amdgpu: Fix memory range calculation (git-fixes). * drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes). * drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes). * drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes). * drm/amdgpu: Fix uninitialized variable warnings (stable-fixes). * drm/amdgpu: Indicate CU havest info to CP (stable-fixes). * drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes). * drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes). * drm/amdgpu: Update BO eviction priorities (stable-fixes). * drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (stable-fixes). * drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes). * drm/amdgpu: always force full reset for SOC21 (stable-fixes). * drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes). * drm/amdgpu: avoid using null object of framebuffer (stable-fixes). * drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes). * drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes). * drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes). * drm/amdgpu: fix doorbell regression (git-fixes). * drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes). * drm/amdgpu: fix locking scope when flushing tlb (stable-fixes). * drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes). * drm/amdgpu: fix the warning about the expression (int)size - len (stable- fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: fix use-after-free bug (stable-fixes). * drm/amdgpu: fix visible VRAM handling during faults (git-fixes). * drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes). * drm/amdgpu: init microcode chip name from ip versions (stable-fixes). * drm/amdgpu: make damage clips support configurable (stable-fixes). * drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes). * drm/amdgpu: remove invalid resource->start check v2 (git-fixes). * drm/amdgpu: silence UBSAN warning (stable-fixes). * drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes). * drm/amdkfd: Add VRAM accounting for SVM migration (stable-fixes). * drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes). * drm/amdkfd: Fix CU Masking for GFX 9.4.3 (git-fixes). * drm/amdkfd: Fix memory leak in create_process failure (git-fixes). * drm/amdkfd: Flush the process wq before creating a kfd_process (stable- fixes). * drm/amdkfd: Let VRAM allocations go to GTT domain on small APUs (stable- fixes). * drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes). * drm/amdkfd: range check cp bad op exception interrupts (stable-fixes). * drm/arm/komeda: Fix komeda probe failing if there are no links in the secondary pipeline (git-fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/ast: Fix soft lockup (git-fixes). * drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes). * drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git- fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: anx7625: Update audio status while detecting (git-fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: it6505: fix hibernate to resume no display issue (git-fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found (git-fixes). * drm/bridge: samsung-dsim: Set P divider based on min/max of fin pll (git- fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/buddy: check range allocation matches alignment (stable-fixes). * drm/ci: update device type for volteer devices (git-fixes). * drm/client: Fully protect modes[] with dev->mode_config.mutex (stable- fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/display: fix typo (git-fixes). * drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git- fixes). * drm/drm_file: Fix pid refcounting race (git-fixes). * drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes). * drm/etnaviv: fix tx clock gating on some GC7000 variants (stable-fixes). * drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes). * drm/exynos: do not return negative values from .get_modes() (stable-fixes). * drm/exynos: dp: drop driver owner initialization (stable-fixes). * drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes). * drm/fbdev-dma: Fix framebuffer mode for big endian devices (git-fixes). * drm/fbdev-dma: Only set smem_start is enable per module option (git-fixes). * drm/fbdev-generic: Do not set physical framebuffer address (git-fixes). * drm/fbdev-generic: Fix framebuffer on big endian devices (git-fixes). * drm/gma500: Remove lid code (git-fixes). * drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git- fixes). * drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git- fixes). * drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes). * drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git- fixes). * drm/i915/display: Use i915_gem_object_get_dma_address to get dma address (stable-fixes). * drm/i915/dp: Do not switch the LTTPR mode on an active link (git-fixes). * drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13 (git-fixes). * drm/i915/dp: Remove support for UHBR13.5 (git-fixes). * drm/i915/dpt: Make DPT object unshrinkable (git-fixes). * drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes). * drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly (git-fixes). * drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes). * drm/i915/gt: Disable HW load balancing for CCS (git-fixes). * drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes). * drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes). * drm/i915/gt: Do not generate the command streamer for all the CCS (git- fixes). * drm/i915/gt: Enable only one CCS for compute workload (git-fixes). * drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes). * drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes). * drm/i915/gt: Reset queue_priority_hint on parking (git-fixes). * drm/i915/guc: avoid FIELD_PREP warning (git-fixes). * drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes). * drm/i915/hwmon: Get rid of devm (stable-fixes). * drm/i915/lspcon: Separate function to set expected mode (bsc#1193599). * drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599). * drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes). * drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes). * drm/i915/mst: Reject FEC+MST on ICL (git-fixes). * drm/i915/mtl: Update workaround 14018575942 (git-fixes). * drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes). * drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes). * drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes). * drm/i915: Disable port sync when bigjoiner is used (stable-fixes). * drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git- fixes). * drm/i915: Fix audio component initialization (git-fixes). * drm/i915: Include the PLL name in the debug messages (stable-fixes). * drm/i915: Pre-populate the cursor physical dma address (git-fixes). * drm/i915: Replace a memset() with zero initialization (stable-fixes). * drm/i915: Stop printing pipe name as hex (stable-fixes). * drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable- fixes). * drm/i915: Try to preserve the current shared_dpll for fastset on type-c ports (stable-fixes). * drm/i915: Use named initializers for DPLL info (stable-fixes). * drm/imx/ipuv3: do not return negative values from .get_modes() (stable- fixes). * drm/komeda: check for error-valued pointer (git-fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/lima: Mark simple_ondemand governor as softdep (git-fixes). * drm/lima: add mask irq callback to gp and pp (stable-fixes). * drm/lima: fix shared irq handling on driver remove (stable-fixes). * drm/lima: mask irqs in timeout path before hard reset (stable-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/mediatek: Add DRM_MODE_ROTATE_0 to rotation property (git-fixes). * drm/mediatek: Add OVL compatible name for MT8195 (git-fixes). * drm/mediatek: Add missing plane settings when async update (git-fixes). * drm/mediatek: Call drm_atomic_helper_shutdown() at shutdown time (stable- fixes). * drm/mediatek: Fix XRGB setting error in Mixer (git-fixes). * drm/mediatek: Fix XRGB setting error in OVL (git-fixes). * drm/mediatek: Fix bit depth overwritten for mtk_ovl_set bit_depth() (git- fixes). * drm/mediatek: Fix destination alpha error in OVL (git-fixes). * drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes). * drm/mediatek: Remove less-than-zero comparison of an unsigned value (git- fixes). * drm/mediatek: Set DRM mode configs accordingly (git-fixes). * drm/mediatek: Support DRM plane alpha in Mixer (git-fixes). * drm/mediatek: Support DRM plane alpha in OVL (git-fixes). * drm/mediatek: Support RGBA8888 and RGBX8888 in OVL on MT8195 (git-fixes). * drm/mediatek: Turn off the layers with zero width or height (git-fixes). * drm/mediatek: Use 8-bit alpha in ETHDR (git-fixes). * drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: fix canvas release in bind function (git-fixes). * drm/meson: gate px_clk when setting rate (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/mgag200: Bind I2C lifetime to DRM device (git-fixes). * drm/mgag200: Set DDC timeout in milliseconds (git-fixes). * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git- fixes). * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_generic_write_seq() (git-fixes). * drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git- fixes). * drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes). * drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git- fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes). * drm/msm/dpu: Add callback function pointer check before its call (git- fixes). * drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dpu: do not allow overriding data from catalog (git-fixes). * drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git- fixes). * drm/msm/dpu: fix encoder irq wait skip (git-fixes). * drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible (git-fixes). * drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/msm/dsi: set VIDEO_COMPRESSION_MODE_CTRL_WC (git-fixes). * drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes). * drm/msm: Add newlines to some debug prints (git-fixes). * drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838). * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes). * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes). * drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable- fixes). * drm/nouveau: do not attempt to schedule hpd_work on headless cards (git- fixes). * drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes). * drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git- fixes). * drm/omapdrm: Fix console by implementing fb_dirty (git-fixes). * drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git- fixes). * drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes). * drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes). * drm/panel: himax-hx8394: Handle errors from mipi_dsi_dcs_set_display_on() better (git-fixes). * drm/panel: ili9341: Respect deferred probe (git-fixes). * drm/panel: ili9341: Use predefined error codes (git-fixes). * drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes). * drm/panel: ilitek-ili9882t: Check for errors on the NOP in prepare() (git- fixes). * drm/panel: ilitek-ili9882t: If prepare fails, disable GPIO before regulators (git-fixes). * drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git- fixes). * drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes). * drm/panel: sitronix-st7789v: Add check for of_drm_get_panel_orientation (git-fixes). * drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git- fixes). * drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes). * drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git- fixes). * drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes). * drm/panfrost: fix power transition timeout warnings (git-fixes). * drm/prime: Unbreak virtgpu dma-buf export (git-fixes). * drm/probe-helper: warn about negative .get_modes() (stable-fixes). * drm/qxl: Add check for drm_cvt_mode (git-fixes). * drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git- fixes). * drm/qxl: remove unused variable from `qxl_process_single_command()` (git- fixes). * drm/radeon/radeon_display: Decrease the size of allocated memory (stable- fixes). * drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes). * drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes). * drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes). * drm/radeon: silence UBSAN warning (v3) (stable-fixes). * drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes). * drm/rockchip: vop2: Fix the port mux of VP2 (git-fixes). * drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes). * drm/sched: fix null-ptr-deref in init entity (git-fixes). * drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes). * drm/sun4i: hdmi: Convert encoder to atomic (stable-fixes). * drm/sun4i: hdmi: Move mode_set into enable (stable-fixes). * drm/ttm: Always take the bo delayed cleanup path for imported bos (git- fixes). * drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes). * drm/ttm: stop pooling cached NUMA pages v2 (git-fixes). * drm/udl: Remove DRM_CONNECTOR_POLL_HPD (git-fixes). * drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes). * drm/vc4: hdmi: do not return negative values from .get_modes() (stable- fixes). * drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes). * drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git- fixes). * drm/vmwgfx: Do not memcmp equivalent pointers (git-fixes). * drm/vmwgfx: Enable DMA mappings with SEV (git-fixes). * drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes). * drm/vmwgfx: Fix Legacy Display Unit (git-fixes). * drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes). * drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes). * drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes). * drm/vmwgfx: Fix prime import/export (git-fixes). * drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes). * drm: Check output polling initialized before disabling (stable-fixes). * drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes (stable-fixes). * drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes). * drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm: nv04: Fix out of bounds access (git-fixes). * drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes). * drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * drm: zynqmp_dpsub: Always register bridge (git-fixes). * drm: zynqmp_dpsub: Fix an error handling path in zynqmp_dpsub_probe() (git- fixes). * drm: zynqmp_kms: Fix AUX bus not getting unregistered (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607). * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * e1000e: Minor flow correction in e1000_shutdown function (git-fixes). * e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git- fixes). * e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes). * ecryptfs: Fix buffer size for tag 66 packet (git-fixes) * ecryptfs: Reject casefold directory inodes (git-fixes) * eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (stable-fixes). * eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes). * efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes). * efi/unaccepted: touch soft lockup during memory accept (git-fixes). * efi/x86: Free EFI memory map only when installing a new one (git-fixes). * efi: disable mirror feature during crashkernel (stable-fixes). * efi: fix panic in kdump kernel (git-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * erofs: ensure m_llen is reset to 0 if metadata is invalid (git-fixes). * exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * f2fs: fix error path of __f2fs_build_free_nids (git-fixes). * fast_dput(): handle underflows gracefully (git-fixes) * fat: fix uninitialized field in nostale filehandles (git-fixes) * fbdev: fix incorrect address computation in deferred IO (git-fixes). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: sh7760fb: allow modular build (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes). * fbmon: prevent division by zero in fb_videomode_from_videomode() (stable- fixes). * filelock: fix potential use-after-free in posix_lock_inode (git-fixes). * firewire: core: use long bus reset on gap count error (stable-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes). * firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes). * firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes). * firmware: cs_dsp: Return error if block header overflows file (git-fixes). * firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes). * firmware: cs_dsp: Validate payload length before processing block (git- fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: dmi: Stop decoding on broken entry (stable-fixes). * firmware: psci: Fix return value from psci_system_suspend() (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() (stable-fixes). * firmware: turris-mox-rwtm: Do not complete if there are no waiters (git- fixes). * firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes). * firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes). * fpga: dfl-pci: add PCI subdevice ID for Intel D5005 card (stable-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes) * fs/9p: translate O_TRUNC into OTRUNC (git-fixes) * fs/file: fix the check in find_next_fd() (git-fixes). * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes) * fs: indicate request originates from old mount API (git-fixes) * fs: relax mount_setattr() permission checks (git-fixes) * fsverity: skip PKCS#7 parser when keyring is empty (git-fixes) * ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes). * fuse: do not unhash root (bsc#1223946). * fuse: fix root lookup with nonzero generation (bsc#1223945). * fuse: verify {g,u}id mount options correctly (bsc#1228193). * geneve: fix header validation in geneve[6]_xmit_skb (git-fixes). * geneve: make sure to pull inner header in geneve_rx() (git-fixes). * genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after() (git- fixes). * gfs2: Do not forget to complete delayed withdraw (git-fixes). * gfs2: Fix "ignore unlock failures after withdraw" (git-fixes). * gfs2: Fix invalid metadata access in punch_hole (git-fixes). * gfs2: Get rid of gfs2_alloc_blocks generation parameter (git-fixes). * gfs2: Rename gfs2_lookup_{ simple => meta } (git-fixes). * gfs2: Use mapping->gfp_mask for metadata inodes (git-fixes). * gfs2: convert to ctime accessor functions (git-fixes). * gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes). * gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes). * gpio: cdev: sanitize the label before requesting the interrupt (stable- fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: davinci: Validate the obtained number of IRQs (git-fixes). * gpio: lpc32xx: fix module autoloading (stable-fixes). * gpio: mc33880: Convert comma to semicolon (git-fixes). * gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (stable-fixes). * gpio: tangier: Use correct type for the IRQ chip data (git-fixes). * gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes). * gpio: tqmx86: fix broken IRQ_TYPE_EDGE_BOTH interrupt type (git-fixes). * gpio: tqmx86: fix typo in Kconfig label (git-fixes). * gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes). * gpio: tqmx86: store IRQ trigger type and unmask status separately (git- fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git- fixes). * gpiolib: cdev: fix uninitialised kfifo (git-fixes). * gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable- fixes). * gpiolib: swnode: Remove wrong header inclusion (git-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes). * hfsplus: fix to avoid false alarm of circular locking (git-fixes). * hfsplus: fix uninit-value in copy_name (git-fixes). * hpet: Support 32-bit userspace (git-fixes). * hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes). * hwmon: (amc6821) add of_match table (stable-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes). * hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * hwmon: (shtc1) Fix property misspelling (git-fixes). * hwrng: amd - Convert PCIBIOS_* return codes to errnos (git-fixes). * hwrng: core - Fix wrong quality calculation at hw rng registration (git- fixes). * hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() (git-fixes). * i2c: acpi: Unbind mux adapters before delete (git-fixes). * i2c: at91: Fix the functionality flags of the slave-only interface (git- fixes). * i2c: cadence: Avoid fifo clear after start (git-fixes). * i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes). * i2c: i801: Annotate apanel_addr as __ro_after_init (stable-fixes). * i2c: mark HostNotify target address as used (git-fixes). * i2c: ocores: set IACK bit after core is enabled (git-fixes). * i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr (git-fixes). * i2c: pxa: hide unused icr_bits[] variable (git-fixes). * i2c: rcar: bring hardware to known state when probing (git-fixes). * i2c: smbus: fix NULL function pointer dereference (git-fixes). * i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git- fixes). * i2c: testunit: avoid re-issued work after read message (git-fixes). * i2c: testunit: correct Kconfig description (git-fixes). * i2c: testunit: discard write requests while old command is running (git- fixes). * i2c: testunit: do not erase registers after STOP (git-fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * i40e: Enforce software interrupt during busy-poll exit (git-fixes). * i40e: Fix VF MAC filter removal (git-fixes). * i40e: Fix firmware version comparison function (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: fix i40e_count_filters() to count only active/new filters (git-fixes). * i40e: fix vf may be used uninitialized in this function warning (git-fixes). * i40e: fix: remove needless retries of NVM update (bsc#1227736). * i915: make inject_virtual_interrupt() void (stable-fixes). * ice: Refactor FW data type and fix bitmap casting issue (git-fixes). * ice: fix enabling RX VLAN filtering (git-fixes). * ice: fix memory corruption bug with suspend and rebuild (git-fixes). * ice: fix stats being updated by way too large values (git-fixes). * ice: fix typo in assignment (git-fixes). * ice: fix uninitialized dplls mutex usage (git-fixes). * ice: reconfig host after changing MSI-X on VF (git-fixes). * ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes). * ice: use relative VSI index for VFs instead of PF VSI number (git-fixes). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * ida: make 'ida_dump' static (git-fixes). * idma64: Do not try to serve interrupts when device is powered off (git- fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: extend tx watchdog timeout (bsc#1224137). * idpf: fix kernel panic on unknown packet types (git-fixes). * igb: Fix missing time sync events (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove stale comment about Tx timestamping (git-fixes). * igc: avoid returning frame twice in XDP_REDIRECT (git-fixes). * iio: Fix the sorting functionality in iio_gts_build_avail_time_table (git- fixes). * iio: accel: fxls8962af: select IIO_BUFFER & IIO_KFIFO_BUF (git-fixes). * iio: accel: mxc4005: Interrupt handling fixes (git-fixes). * iio: accel: mxc4005: Reset chip on probe() and resume() (stable-fixes). * iio: accel: mxc4005: allow module autoloading via OF compatible (stable- fixes). * iio: adc: ad7266: Fix variable checking bug (git-fixes). * iio: adc: ad9467: fix scan type sign (git-fixes). * iio: adc: ad9467: use chip_info variables instead of array (stable-fixes). * iio: adc: ad9467: use spi_get_device_match_data() (stable-fixes). * iio: adc: stm32: Fixing err code to not indicate success (git-fixes). * iio: chemical: bme680: Fix calibration data variable (git-fixes). * iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes). * iio: chemical: bme680: Fix pressure value output (git-fixes). * iio: chemical: bme680: Fix sensor data read operation (git-fixes). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: dac: ad5592r: fix temperature channel scaling value (git-fixes). * iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes). * iio: frequency: adrf6780: rm clk provider include (git-fixes). * iio: gts-helper: Fix division loop (git-fixes). * iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes). * iio: pressure: Fixes BME280 SPI driver data (git-fixes). * iio: pressure: bmp280: Fix BMP580 temperature reading (stable-fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * iio: pressure: fix some word spelling errors (stable-fixes). * iio: xilinx-ams: Do not include ams_ctrl_channels in scan_mask (git-fixes). * iio:imu: adis16475: Fix sync mode setting (git-fixes). * inet: frags: eliminate kernel-doc warning (git-fixes). * inet_diag: annotate data-races around inet_diag_table[] (git-fixes). * init/main.c: Fix potential static_command_line memory overflow (git-fixes). * init: open /initrd.image with O_LARGEFILE (stable-fixes). * input/touchscreen: imagis: Correct the maximum touch area value (stable- fixes). * input: Add event code for accessibility key (stable-fixes). * input: Add support for "Do Not Disturb" (stable-fixes). * intel: legacy: Partial revert of field get conversion (git-fixes). * intel_th: pci: Add Granite Rapids SOC support (stable-fixes). * intel_th: pci: Add Granite Rapids support (stable-fixes). * intel_th: pci: Add Lunar Lake support (stable-fixes). * intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes). * intel_th: pci: Add Meteor Lake-S support (stable-fixes). * intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes). * interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS() (git-fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git- fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc RPM master ID (git-fixes). * interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes). * interconnect: qcom: sm8550: Enable sync_state (git-fixes). * io-wq: write next_work before dropping acct_lock (git-fixes). * io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (git-fixes). * io_uring/io-wq: avoid garbage value of 'match' in io_wq_enqueue() (git- fixes). * io_uring/kbuf: get rid of bl->is_ready (git-fixes). * io_uring/kbuf: get rid of lower BGID lists (git-fixes). * io_uring/kbuf: protect io_buffer_list teardown with a reference (git-fixes). * io_uring/kbuf: rename is_mapped (git-fixes). * io_uring/net: correct the type of variable (git-fixes). * io_uring/net: correctly handle multishot recvmsg retry setup (git-fixes). * io_uring/net: fix sendzc lazy wake polling (git-fixes). * io_uring/net: move receive multishot out of the generic msghdr path (git- fixes). * io_uring/net: restore msg_control on sendzc retry (git-fixes). * io_uring/net: unify how recvmsg and sendmsg copy in the msghdr (git-fixes). * io_uring/rsrc: do not lock while !TASK_RUNNING (git-fixes). * io_uring/rsrc: fix incorrect assignment of iter->nr_segs in io_import_fixed (git-fixes). * io_uring/rw: do not allow multishot reads without NOWAIT support (git- fixes). * io_uring/rw: return IOU_ISSUE_SKIP_COMPLETE for multishot retry (git-fixes). * io_uring/sqpoll: work around a potential audit memory leak (git-fixes). * io_uring/unix: drop usage of io_uring socket (git-fixes). * io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64() failure (git-fixes). * io_uring: clean rings on NO_MMAP alloc fail (git-fixes). * io_uring: clear opcode specific data for an early failure (git-fixes). * io_uring: do not save/restore iowait state (git-fixes). * io_uring: fail NOP if non-zero op flags is passed in (git-fixes). * io_uring: fix io_queue_proc modifying req->flags (git-fixes). * io_uring: fix mshot io-wq checks (git-fixes). * io_uring: fix mshot read defer taskrun cqe posting (git-fixes). * io_uring: fix poll_remove stalled req completion (git-fixes). * io_uring: kabi cookie remove (bsc#1217384). * io_uring: remove looping around handling traditional task_work (git-fixes). * io_uring: remove unconditional looping in local task_work handling (git- fixes). * io_uring: use private workqueue for exit work (git-fixes). * io_uring: use the right type for work_llist empty check (git-fixes). * iomap: clear the per-folio dirty bits on all writeback failures (git-fixes) * iommu/amd: Enhance def_domain_type to handle untrusted device (git-fixes). * iommu/amd: Fix panic accessing amd_iommu_enable_faulting (bsc#1224767). * iommu/amd: Fix sysfs leak in iommu init (git-fixes). * iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes). * iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes). * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes). * iommu/vt-d: Allocate DMAR fault interrupts locally (bsc#1224767). * iommu/vt-d: Allocate local memory for page request queue (git-fixes). * iommu/vt-d: Fix WARN_ON in iommu probe path (git-fixes). * iommu/vt-d: Fix wrong use of pasid config (git-fixes). * iommu/vt-d: Improve ITE fault handling if target device isn't present (git- fixes). * iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git- fixes). * iommu/vt-d: Update iotlb in nested domain attach (git-fixes). * iommu/vt-d: Use rbtree to track iommu probed devices (git-fixes). * iommu: Fix compilation without CONFIG_IOMMU_INTEL (git-fixes). * iommu: Map reserved memory as cacheable if device is coherent (git-fixes). * iommu: Return right value in iommu_sva_bind_device() (git-fixes). * iommu: Undo pasid attachment only for the devices that have succeeded (git- fixes). * iommu: mtk: fix module autoloading (git-fixes). * iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes). * iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git- fixes). * iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes). * iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes). * iommufd: Fix iopt_access_list_id overwrite bug (git-fixes). * iommufd: Reject non-zero data_type if no data_len is provided (git-fixes). * ionic: set adminq irq affinity (git-fixes). * ipmi: ssif_bmc: prevent integer overflow on 32bit systems (git-fixes). * ipv4: annotate data-races around fi->fib_dead (git-fixes). * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) * irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes). * irqchip/armada-370-xp: Suppress unused-function warning (git-fixes). * irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git- fixes). * irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git- fixes). * irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index (stable-fixes). * irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes). * irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes). * irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes). * iwlwifi: fw: fix more kernel-doc warnings (bsc#1227149). * iwlwifi: mvm: Drop unused fw_trips_index[] from iwl_mvm_thermal_device (bsc#1227149). * iwlwifi: mvm: Populate trip table before registering thermal zone (bsc#1227149). * iwlwifi: mvm: Use for_each_thermal_trip() for walking trip points (bsc#1227149). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * jfs: Fix array-index-out-of-bounds in diFree (git-fixes). * jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383). * kABI fix of KVM: x86/pmu: Allow programming events that match unsupported arch events (bsc#1225696). * kABI fix of KVM: x86/pmu: Prioritize VMX interception over * kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * kABI workaround for cs35l56 (git-fixes). * kABI workaround for of driver changes (git-fixes). * kABI workaround for sof_ipc_pcm_ops (git-fixes). * kABI workaround for wireless updates (bsc#1227149). * kABI: Adjust trace_iterator.wait_index (git-fixes). * kABI: bpf: verifier kABI workaround (bsc#1225903). * kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git fixes). * kabi/severities: Ignore io_uring internal symbols * kabi/severities: Remove mitigation-related symbols * kabi/severities: cleanup and update for WiFi driver entries (bsc#1227149) * kabi/severities: cover all ath/* drivers (bsc#1227149) * kabi/severities: cover all mt76 modules (bsc#1227149) * kabi/severities: ignore IMS functions * kabi/severities: ignore TAS2781 symbol drop, it's only locally used * kabi/severities: ignore Wangxun ethernet driver local symbols * kabi/severities: ignore amd pds internal symbols * kabi/severities: ignore brcmfmac-specific local symbols * kabi/severities: ignore kABI changes Realtek WiFi drivers (bsc#1227149) * kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502) * kasan, fortify: properly rename memintrinsics (git-fixes). * kasan/test: avoid gcc warning for intentional overflow (git-fixes). * kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes). * kasan: print the original fault addr when access invalid shadow (git-fixes). * kbuild: Fix build target deb-pkg: ln: failed to create hard link (git- fixes). * kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes). * kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 (stable- fixes). * kbuild: avoid build error when single DTB is turned into composite DTB (git- fixes). * kconfig: doc: fix a typo in the note about 'imply' (git-fixes). * kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes). * kconfig: fix infinite loop when expanding a macro at the end of file (git- fixes). * kconfig: gconf: give a proper initial state to the Save button (stable- fixes). * kconfig: remove wrong expr_trans_bool() (stable-fixes). * kcov: do not lose track of remote references during softirqs (git-fixes). * kernel-binary: vdso: Own module_dir * kernel-doc: fix struct_group_tagged() parsing (git-fixes). * kexec: do syscore_shutdown() in kernel_kexec (git-fixes). * kheaders: explicitly define file modes for archived headers (stable-fixes). * knfsd: LOOKUP can return an illegal error value (git-fixes). * kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes). * kprobe/ftrace: bail out if ftrace was killed (git-fixes). * kprobe/ftrace: fix build error due to bad function definition (git-fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * kselftest: Add a ksft_perror() helper (stable-fixes). * kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes). * kunit: Fix checksum tests on big endian CPUs (git-fixed). * leds: flash: leds-qcom-flash: Test the correct variable in init (git-fixes). * leds: mt6360: Fix memory leak in mt6360_init_isnk_properties() (git-fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes). * leds: trigger: Unregister sysfs attributes before calling deactivate() (git- fixes). * leds: triggers: Flush pending brightness before activating trigger (git- fixes). * lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes). * lib: objagg: Fix general protection fault (git-fixes). * lib: objagg: Fix spelling (git-fixes). * lib: test_objagg: Fix spelling (git-fixes). * libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228192). * libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853). * libperf evlist: Avoid out-of-bounds access (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes) * lsm: fix the logic in security_inode_getsecctx() (git-fixes). * mISDN: Fix a use after free in hfcmulti_tx() (git-fixes). * mISDN: fix MISDN_TIME_STAMP handling (git-fixes). * mac802154: fix llsec key resources release in mac802154_llsec_key_del (git- fixes). * mac802154: fix time calculation in ieee802154_configure_durations() (git- fixes). * mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (git-fixes). * maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes). * md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542). * md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542). * md/raid1-10: factor out a new helper raid1_should_read_first() (jsc#PED-7542). * md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542). * md/raid1: factor out helpers to choose the best rdev from read_balance() (jsc#PED-7542). * md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out the code to manage sequential IO (jsc#PED-7542). * md/raid1: fix choose next idle in read_balance() (jsc#PED-7542). * md/raid1: record nonrot rdevs while adding/removing rdevs to conf (jsc#PED-7542). * md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542). * md: add a new helper rdev_has_badblock() (jsc#PED-7542). * md: add a new helper reshape_interrupted() (jsc#PED-7542). * md: changed the switch of RAID_VERSION to if (jsc#PED-7542). * md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542). * md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542). * md: clean up openers check in do_md_stop() and md_set_readonly() (jsc#PED-7542). * md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (jsc#PED-7542). * md: export helper md_is_rdwr() (jsc#PED-7542). * md: export helpers to stop sync_thread (jsc#PED-7542). * md: factor out a helper to sync mddev (jsc#PED-7542). * md: fix kmemleak of rdev->serial (jsc#PED-7542). * md: get rdev->mddev with READ_ONCE() (jsc#PED-7542). * md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542). * md: preserve KABI in struct md_personality (jsc#PED-7542). * md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542). * md: remove redundant md_wakeup_thread() (jsc#PED-7542). * md: return directly before setting did_set_md_closing (jsc#PED-7542). * md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542). * md: use RCU lock to protect traversal in md_spares_need_change() (jsc#PED-7542). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: cadence: csi2rx: use match fwnode for media link (git-fixes). * media: cec: core: remove length check of Timer Status (stable-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes). * media: dvb-frontends: tda18271c2dd: Remove casting during div (stable- fixes). * media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes). * media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable- fixes). * media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes). * media: dvbdev: Initialize sbuf (stable-fixes). * media: dw2102: Do not translate i2c read into write (stable-fixes). * media: dw2102: fix a potential buffer overflow (git-fixes). * media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes). * media: i2c: Fix imx412 exposure control (git-fixes). * media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes). * media: imon: Fix race getting ictx->lock (git-fixes). * media: imx-jpeg: Drop initial source change event if capture has been setup (git-fixes). * media: imx-jpeg: Remove some redundant error logs (git-fixes). * media: imx-pxp: Fix ERR_PTR dereference in pxp_probe() (git-fixes). * media: ipu3-cio2: Request IRQ earlier (git-fixes). * media: lgdt3306a: Add a check against null-pointer-def (stable-fixes). * media: mc: Fix flags handling when creating pad links (stable-fixes). * media: mc: Fix graph walk in media_pipeline_start (git-fixes). * media: mc: Rename pad variable to clarify intent (stable-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: mxl5xx: Move xpt structures off stack (stable-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: pci: ivtv: Add check for DMA map result (git-fixes). * media: radio-shark2: Avoid led_names truncations (git-fixes). * media: rcar-vin: Fix YUYV8_1X16 handling for CSI-2 (git-fixes). * media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes). * media: renesas: vsp1: Fix _irqsave and _irq mix (git-fixes). * media: renesas: vsp1: Store RPF partition configuration per RPF instance (git-fixes). * media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes). * media: s2255: Use refcount_t instead of atomic_t for num_channels (stable- fixes). * media: sta2x11: fix irq handler cast (stable-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes). * media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes). * media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes). * media: uvcvideo: Override default flags (git-fixes). * media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes). * media: v4l2-subdev: Fix stream handling for crop API (git-fixes). * media: v4l: Do not turn on privacy LED if streamon fails (git-fixes). * media: v4l: async: Fix NULL pointer dereference in adding ancillary links (git-fixes). * media: v4l: subdev: Fix typo in documentation (git-fixes). * media: venus: fix use after free in vdec_close (git-fixes). * media: venus: flush all buffers in output plane streamoff (git-fixes). * mei: demote client disconnect warning on suspend to debug (stable-fixes). * mei: me: add arrow lake point H DID (stable-fixes). * mei: me: add arrow lake point S DID (stable-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes). * mei: me: release irq in mei_me_pci_resume error path (git-fixes). * mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes). * mfd: pm8008: Fix regmap irq chip initialisation (git-fixes). * misc: fastrpc: Avoid updating PD type for capability request (git-fixes). * misc: fastrpc: Copy the complete capability structure to user (git-fixes). * misc: fastrpc: Fix DSP capabilities request (git-fixes). * misc: fastrpc: Fix memory leak in audio daemon attach operation (git-fixes). * misc: fastrpc: Fix ownership reassignment of remote heap (git-fixes). * misc: fastrpc: Restrict untrusted app to attach to privileged PD (git- fixes). * misc: microchip: pci1xxxx: Fix a memory leak in the error handling of gp_aux_bus_probe() (git-fixes). * misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe() (git-fixes). * mlxbf_gige: call request_irq() after NAPI initialized (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mlxbf_gige: stop interface during shutdown (git-fixes). * mlxsw: Use refcount_t for reference counting (git-fixes). * mm,page_owner: Defer enablement of static branch (bsc#1222366). * mm,page_owner: Fix accounting of pages when migrating (bsc#1222366). * mm,page_owner: Fix printing of stack records (bsc#1222366). * mm,page_owner: Fix refcount imbalance (bsc#1222366). * mm,page_owner: Update metadata for tail pages (bsc#1222366). * mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366). * mm,page_owner: drop unnecessary check (bsc#1222366). * mm,page_owner: fix recursion (bsc#1222366). * mm/slab: make __free(kfree) accept error pointers (git-fixes). * mm: memcg: do not periodically flush stats when memcg is disabled (bsc#1222525). * mm: memcg: use larger batches for proactive reclaim (bsc#1222522). * mm: page_owner: fix wrong information in dump_page_owner (git-fixes). * mm_init kABI workaround (git-fixes). * mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes). * mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes). * mmc: core: Avoid negative index with array access (git-fixes). * mmc: core: Do not force a retune before RPMB switch (stable-fixes). * mmc: core: Initialize mmc_blk_ioc_data (git-fixes). * mmc: davinci: Do not strip remove function when driver is builtin (git- fixes). * mmc: omap: fix broken slot switch lookup (git-fixes). * mmc: omap: fix deferred probe (git-fixes). * mmc: omap: restore original power up/down steps (git-fixes). * mmc: sdhci-acpi: Add quirk to enable pull-up on the card-detect GPIO on Asus T100TA (git-fixes). * mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable- fixes). * mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes). * mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes). * mmc: sdhci-brcmstb: check R1_STATUS for erase/trim/discard (git-fixes). * mmc: sdhci-msm: pervent access to suspended controller (git-fixes). * mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode (git-fixes). * mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes). * mmc: sdhci: Add support for "Tuning Error" interrupts (stable-fixes). * mmc: sdhci: Do not invert write-protect twice (git-fixes). * mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes). * mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes). * mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes). * module: do not ignore sysfs_create_link() failures (git-fixes). * mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes). * mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes). * mptcp: fix bogus receive window shrinkage with multiple subflows (git- fixes). * mptcp: move __mptcp_error_report in protocol.c (git-fixes). * mptcp: process pending subflow error on close (git-fixes). * mt76: connac: move more mt7921/mt7915 mac shared code in connac lib (bsc#1227149). * mt76: mt7996: rely on mt76_sta_stats in mt76_wcid (bsc#1227149). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: diskonchip: work around ubsan link failure (stable-fixes). * mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes). * mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes). * mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git- fixes). * mtd: rawnand: Fix the nand_read_data_op() early check (git-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes). * mtd: spinand: Add support for 5-byte IDs (stable-fixes). * net/dcb: check for detached device before executing callbacks (bsc#1215587). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: E-switch, Change flow rule destination checking (git-fixes). * net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes). * net/mlx5: Fix MTMP register capability offset in MCAM register (git-fixes). * net/mlx5: Fix fw reporter diagnose output (git-fixes). * net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Properly link new fs rules into the tree (git-fixes). * net/mlx5: Register devlink first under devlink lock (git-fixes). * net/mlx5: Restore mistakenly dropped parts in register devlink flow (git- fixes). * net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes). * net/mlx5: offset comp irq index in name by one (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes). * net/mlx5e: Fix MACsec state loss upon state update in offload path (git- fixes). * net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes). * net/mlx5e: RSS, Block changing channels number when RXFH is configured (git- fixes). * net/mlx5e: Switch to using _bh variant of of spinlock API in port timestamping NAPI poll context (git-fixes). * net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (git-fixes). * net/smc: bugfix for smcr v2 server connect success statistic (git-fixes). * net/smc: fix documentation of buffer sizes (git-fixes). * net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes). * net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes). * net: NSH: fix kernel-doc notation warning (git-fixes). * net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes). * net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes). * net: annotate data-races around sk->sk_bind_phc (git-fixes). * net: annotate data-races around sk->sk_forward_alloc (git-fixes). * net: annotate data-races around sk->sk_lingertime (git-fixes). * net: annotate data-races around sk->sk_tsflags (git-fixes). * net: bonding: remove kernel-doc comment marker (git-fixes). * net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes). * net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes). * net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes). * net: cfg802154: fix kernel-doc notation warnings (git-fixes). * net: dsa: microchip: fix register write order in ksz8_ind_write8() (git- fixes). * net: dsa: mt7530: fix handling of all link-local frames (git-fixes). * net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports (git-fixes). * net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git- fixes). * net: dsa: mt7530: trap link-local frames regardless of ST Port State (git- fixes). * net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes). * net: ena: Fix incorrect descriptor free behavior (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Fix redundant device NUMA node override (jsc#PED-8688). * net: ena: Move XDP code to its new files (git-fixes). * net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git- fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Set tx_info->xdpf value to NULL (git-fixes). * net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes). * net: ethernet: mtk_wed: introduce mtk_wed_buf structure (bsc#1227149). * net: ethernet: mtk_wed: rename mtk_rxbm_desc in mtk_wed_bm_desc (bsc#1227149). * net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes). * net: fec: Set mac_managed_pm during probe (git-fixes). * net: fill in MODULE_DESCRIPTION()s in kuba@'s modules (bsc#1227149). * net: hns3: Remove io_stop_wc() calls after __iowrite64_copy() (bsc#1226502) * net: hns3: fix index limit to support all queue stats (git-fixes). * net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git- fixes). * net: hns3: fix kernel crash when devlink reload during pf initialization (git-fixes). * net: hns3: fix port duplex configure error in IMP reset (git-fixes). * net: hns3: fix wrong judgment condition issue (git-fixes). * net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes). * net: hns3: tracing: fix hclgevf trace event strings (git-fixes). * net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (git-fixes). * net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git- fixes). * net: ks8851: Inline ks8851_rx_skb() (git-fixes). * net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git- fixes). * net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes). * net: lan743x: Support WOL at both the PHY and MAC appropriately (git-fixes). * net: lan743x: disable WOL upon resume to restore full data path operation (git-fixes). * net: libwx: fix memory leak on free page (git-fixes). * net: ll_temac: platform_get_resource replaced by wrong function (git-fixes). * net: llc: fix kernel-doc notation warnings (git-fixes). * net: mac802154: Fix racy device stats updates by DEV_STATS_INC() and DEV_STATS_ADD() (stable-fixes). * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491). * net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes). * net: mana: Fix possible double free in error handling path (git-fixes). * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes). * net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up (git-fixes). * net: nfc: remove inappropriate attrs check (stable-fixes). * net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes). * net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes). * net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git- fixes). * net: phy: micrel: Fix potential null pointer dereference (git-fixes). * net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes). * net: phy: micrel: fix KSZ9477 PHY issues after suspend/resume (git-fixes). * net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping (git-fixes). * net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes). * net: phy: microchip: lan87xx: reinit PHY after cable test (git-fixes). * net: phy: mxl-gpy: Remove interrupt mask clearing from config_init (git- fixes). * net: phy: phy_device: Fix PHY LED blinking code comment (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes). * net: ravb: Always process TX descriptor ring (git-fixes). * net: ravb: Always update error counters (git-fixes). * net: ravb: Let IP-specific receive function to interrogate descriptors (git- fixes). * net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes). * net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes). * net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes). * net: sparx5: flower: fix fragment flags handling (git-fixes). * net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes). * net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes). * net: stmmac: fix rx queue priority assignment (git-fixes). * net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net: tls, fix WARNIING in __sk_msg_free (bsc#1221858). * net: tls: fix returned read length with async decrypt (bsc#1221858). * net: tls: fix use-after-free with partial reads and async (bsc#1221858). * net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes). * net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net: usb: ax88179_178a: improve link status logs (git-fixes). * net: usb: ax88179_178a: improve reset check (git-fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: qmi_wwan: add Telit FN912 compositions (stable-fixes). * net: usb: qmi_wwan: add Telit FN920C04 compositions (git-fixes). * net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes). * net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git- fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: veth: do not manipulate GRO when using XDP (git-fixes). * net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes). * netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes). * netfilter: nft_ct: fix l3num expectations with inet pseudo family (git- fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * nf_conntrack: fix -Wunused-const-variable= (git-fixes). * nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix kcov check in nci_rx_work() (git-fixes). * nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nfp: flower: handle acti_netdevs allocation failure (git-fixes). * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442). * nfs: Block on write congestion (bsc#1218442). * nfs: Bump default write congestion size (bsc#1218442). * nfs: Drop pointless check from nfs_commit_release_pages() (bsc#1218442). * nfs: Fix up kabi after adding write_congestion_wait (bsc#1218442). * nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes). * nfs: Properly initialize server->writeback (bsc#1218442). * nfs: drop the incorrect assertion in nfs_swap_rw() (git-fixes). * nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes). * nfs: fix undefined behavior in nfs_block_bits() (git-fixes). * nfs: keep server info for remounts (git-fixes). * nfsd: Fix a regression in nfsd_setattr() (git-fixes). * nfsd: do not call locks_release_private() twice concurrently (git-fixes). * nfsd: hold a lighter-weight client reference over CB_RECALL_ANY (git-fixes). * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912). * nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408). * nilfs2: add missing check for inode numbers on directory entries (stable- fixes). * nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes). * nilfs2: convert persistent object allocator to use kmap_local (git-fixes). * nilfs2: fix OOB in nilfs_set_de_type (git-fixes). * nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes). * nilfs2: fix inode number range checks (stable-fixes). * nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (git- fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix potential bug in end_buffer_async_write (git-fixes). * nilfs2: fix potential hang in nilfs_detach_log_writer() (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nilfs2: return the mapped address from nilfs_get_page() (stable-fixes). * nouveau/dmem: handle kcalloc() allocation failure (git-fixes). * nouveau/gsp: do not check devinit disable on GSP (git-fixes). * nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes). * nouveau: add an ioctl to report vram usage (stable-fixes). * nouveau: add an ioctl to return vram bar size (stable-fixes). * nouveau: fix devinit paths to only handle display on GSP (git-fixes). * nouveau: fix function cast warning (git-fixes). * nouveau: fix instmem race condition around ptr stores (git-fixes). * nouveau: lock the client object tree (stable-fixes). * nouveau: report byte usage in VRAM usage (git-fixes). * nouveau: reset the bo resource bus info after an eviction (git-fixes). * nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal (jsc#PED-5853). * nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853). * nvdimm: make nvdimm_bus_type const (jsc#PED-5853). * nvme-fabrics: short-circuit reconnect retries (bsc#1186716). * nvme-fc: do not wait in vain when unloading module (git-fixes). * nvme-multipath: fix io accounting on failover (git-fixes). * nvme-pci: Add quirk for broken MSIs (git-fixes). * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049). * nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858). * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049). * nvme: cancel pending I/O if nvme controller is in terminal state (bsc#1226503). * nvme: do not retry authentication failures (bsc#1186716). * nvme: find numa distance only if controller has valid numa id (git-fixes). * nvme: fix multipath batched completion accounting (git-fixes). * nvme: fix nvme_pr_* status code parsing (git-fixes). * nvme: fix reconnection fail due to reserved tag allocation (git-fixes). * nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes). * nvme: return kernel error codes for admin queue connect (bsc#1186716). * nvmet-auth: replace pr_debug() with pr_err() to report an error (git-fixes). * nvmet-auth: return the error code to the nvmet_auth_host_hash() callers (git-fixes). * nvmet-fc: abort command when there is no binding (git-fixes). * nvmet-fc: avoid deadlock on delete association path (git-fixes). * nvmet-fc: defer cleanup using RCU properly (git-fixes). * nvmet-fc: hold reference on hostport match (git-fixes). * nvmet-fc: release reference on target port (git-fixes). * nvmet-fc: take ref count on tgtport before delete assoc (git-fixes). * nvmet-fcloop: swap the list_add_tail arguments (git-fixes). * nvmet-passthru: propagate status from id override functions (git-fixes). * nvmet-tcp: fix nvme tcp ida memory leak (git-fixes). * nvmet-tcp: fix possible memory leak when tearing down a controller (git- fixes). * nvmet: fix ns enable/disable possible hang (git-fixes). * nvmet: fix nvme status code when namespace is disabled (git-fixes). * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716). * nvmet: prevent sprintf() overflow in nvmet_subsys_nsid_exists() (git-fixes). * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716). * ocfs2: adjust enabling place for la window (bsc#1219224). * ocfs2: fix DIO failure due to insufficient transaction credits (git-fixes). * ocfs2: fix races between hole punching and AIO+DIO (git-fixes). * ocfs2: fix sparse warnings (bsc#1219224). * ocfs2: improve write IO performance when fragmentation is high (bsc#1219224). * ocfs2: speed up chain-list searching (bsc#1219224). * ocfs2: use coarse time for new created files (git-fixes). * octeontx2-af: Add array index check (git-fixes). * octeontx2-af: Fix NIX SQ mode and BP config (git-fixes). * octeontx2-af: Fix devlink params (git-fixes). * octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes). * octeontx2-af: Use matching wake_up API variant in CGX command interface (git-fixes). * octeontx2-af: Use separate handlers for interrupts (git-fixes). * octeontx2-pf: Fix transmit scheduler resource leak (git-fixes). * octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes). * octeontx2-pf: Use default max_active works instead of one (git-fixes). * octeontx2-pf: Wait till detach_resources msg is complete (git-fixes). * octeontx2-pf: check negative error code in otx2_open() (git-fixes). * octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes). * octeontx2: Detect the mbox up or down message via register (git-fixes). * of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes). * of: module: add buffer overflow check in of_modalias() (git-fixes). * of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes). * of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes). * of: property: Improve finding the consumer of a remote-endpoint property (git-fixes). * of: property: Improve finding the supplier of a remote-endpoint property (git-fixes). * of: property: fix typo in io-channels (git-fixes). * of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git- fixes). * of: unittest: Fix compile in the non-dynamic case (git-fixes). * orangefs: fix out-of-bounds fsid access (git-fixes). * overflow: Allow non-type arg to type_max() and type_min() (stable-fixes). * pNFS/filelayout: fixup pNfs allocation modes (git-fixes). * peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes). * perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes). * perf annotate: Get rid of duplicate --group option item (git-fixes). * perf auxtrace: Fix multiple use of --itrace option (git-fixes). * perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes). * perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes). * perf bpf: Clean up the generated/copied vmlinux.h (git-fixes). * perf daemon: Fix file leak in daemon_session__control (git-fixes). * perf docs: Document bpf event modifier (git-fixes). * perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes). * perf expr: Fix "has_event" function for metric style events (git-fixes). * perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes). * perf jevents: Drop or simplify small integer values (git-fixes). * perf list: fix short description for some cache events (git-fixes). * perf lock contention: Add a missing NULL check (git-fixes). * perf metric: Do not remove scale from counts (git-fixes). * perf pmu: Count sys and cpuid JSON events separately (git fixes). * perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes). * perf pmu: Treat the msr pmu as software (git-fixes). * perf print-events: make is_event_supported() more robust (git-fixes). * perf probe: Add missing libgen.h header needed for using basename() (git- fixes). * perf record: Check conflict between '\--timestamp-filename' option and pipe mode before recording (git-fixes). * perf record: Delete session after stopping sideband thread (git-fixes). * perf record: Fix debug message placement for test consumption (git-fixes). * perf record: Fix possible incorrect free in record__switch_output() (git- fixes). * perf report: Avoid SEGV in report__setup_sample_type() (git-fixes). * perf sched timehist: Fix -g/--call-graph option failure (git-fixes). * perf script: Show also errors for --insn-trace option (git-fixes). * perf srcline: Add missed addr2line closes (git-fixes). * perf stat: Avoid metric-only segv (git-fixes). * perf stat: Do not display metric header for non-leader uncore events (git- fixes). * perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes). * perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes). * perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes). * perf tests: Apply attributes to all events in object code reading test (git- fixes). * perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes). * perf tests: Make data symbol test wait for perf to start (bsc#1220045). * perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045). * perf thread: Fixes to thread__new() related to initializing comm (git- fixes). * perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes). * perf top: Uniform the event name for the hybrid machine (git-fixes). * perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes). * perf ui browser: Avoid SEGV on title (git fixes). * perf ui browser: Do not save pointer to stack memory (git-fixes). * perf vendor events amd: Add Zen 4 memory controller events (git-fixes). * perf vendor events amd: Fix Zen 4 cache latency events (git-fixes). * perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes). * perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later (git-fixes). * perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes). * perf/x86/amd/lbr: Use freeze based on availability (git-fixes). * perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event (git-fixes). * perf/x86/intel: Expose existence of callback support to KVM (git-fixes). * perf/x86: Fix out of range data (git-fixes). * phy: cadence-torrent: Check return value on register read (git-fixes). * phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes). * phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes). * phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes). * phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes). * phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes). * phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes). * phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git- fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git- fixes). * pinctrl: freescale: mxs: Fix refcount of child (git-fixes). * pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git- fixes). * pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git- fixes). * pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes). * pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes). * pinctrl: renesas: r8a779g0: FIX PWM suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix (H)SCIF1 suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix (H)SCIF3 suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix CANFD5 suffix (git-fixes). * pinctrl: renesas: r8a779g0: Fix FXR_TXEN[AB] suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix IRQ suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix TCLK suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix TPU suffixes (git-fixes). * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes). * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes). * pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes). * pinctrl: rockchip: update rk3308 iomux routes (git-fixes). * pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes). * pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git- fixes). * pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes). * platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes). * platform/chrome: cros_ec_uart: properly fix race condition (git-fixes). * platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * platform/x86/intel/tpmi: Handle error from tpmi_process_info() (stable- fixes). * platform/x86: ISST: Add Grand Ridge to HPM CPU list (stable-fixes). * platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes). * platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes). * platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git- fixes). * platform/x86: lg-laptop: Change ACPI device id (stable-fixes). * platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes). * platform/x86: lg-laptop: Use ACPI device handle when evaluating WMAB/WMBB (stable-fixes). * platform/x86: thinkpad_acpi: Take hotkey_mutex during hotkey_exit() (git- fixes). * platform/x86: toshiba_acpi: Add quirk for buttons on Z830 (stable-fixes). * platform/x86: toshiba_acpi: Fix array out-of-bounds access (git-fixes). * platform/x86: toshiba_acpi: Fix quickstart quirk handling (git-fixes). * platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes). * platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6" tablet (stable-fixes). * platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes). * platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable- fixes). * platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name (stable-fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * power: supply: ab8500: Fix error handling when calling iio_read_channel_processed() (git-fixes). * power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes). * power: supply: ingenic: Fix some error handling paths in ingenic_battery_get_property() (git-fixes). * power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git- fixes). * powerpc/64s/radix/kfence: map __kfence_pool at page granularity (bsc#1223570 ltc#205770). * powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks (git-fixes). * powerpc/prom: Add CPU info to hardware description string later (bsc#1215199). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869). * powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199). * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * ppdev: Add an error check in register_device (git-fixes). * prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610). * printk: Add this_cpu_in_panic() (bsc#1225607). * printk: Adjust mapping for 32bit seq macros (bsc#1225607). * printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607). * printk: Consolidate console deferred printing (bsc#1225607). * printk: Disable passing console lock owner completely during panic() (bsc#1225607). * printk: Do not take console lock for console_flush_on_panic() (bsc#1225607). * printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607). * printk: Keep non-panic-CPUs out of console lock (bsc#1225607). * printk: Let no_printk() use _printk() (bsc#1225618). * printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607). * printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607). * printk: Wait for all reserved records with pr_flush() (bsc#1225607). * printk: nbcon: Relocate 32bit seq macros (bsc#1225607). * printk: ringbuffer: Clarify special lpos values (bsc#1225607). * printk: ringbuffer: Cleanup reader terminology (bsc#1225607). * printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607). * printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607). * proc/kcore: do not try to access unaccepted memory (git-fixes). * pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes). * pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes). * pstore: inode: Only d_invalidate() is needed (git-fixes). * pwm: img: fix pwm clock lookup (git-fixes). * pwm: sti: Prepare removing pwm_chip from driver data (stable-fixes). * pwm: sti: Simplify probe function using devm functions (git-fixes). * pwm: stm32: Always do lazy disabling (git-fixes). * qibfs: fix dentry leak (git-fixes) * r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git- fixes). * r8169: skip DASH fw status checks when DASH is disabled (git-fixes). * random: handle creditable entropy from atomic process context (git-fixes). * regmap-i2c: Subtract reg size from max_write (stable-fixes). * regmap: Add regmap_read_bypassed() (git-fixes). * regmap: kunit: Ensure that changed bytes are actually different (stable- fixes). * regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes). * regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes). * regulator: bd71815: fix ramp values (git-fixes). * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes). * regulator: change stubbed devm_regulator_get_enable to return Ok (git- fixes). * regulator: core: Fix modpost error "regulator_get_regmap" undefined (git- fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: irq_helpers: duplicate IRQ name (stable-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * regulator: tps65132: Add of_match table (stable-fixes). * regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes). * remoteproc: imx_rproc: Fix refcount mistake in imx_rproc_addr_init (git- fixes). * remoteproc: imx_rproc: Skip over memory region when node value is NULL (git- fixes). * remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes). * remoteproc: k3-r5: Fix IPC-only mode detection (git-fixes). * remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git- fixes). * remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git- fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef (git-fixes). * remoteproc: stm32_rproc: Fix mailbox interrupts queuing (git-fixes). * remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes). * ring-buffer: Do not set shortest_full when full target is hit (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * ring-buffer: Fix full_waiters_pending in poll (git-fixes). * ring-buffer: Fix resetting of shortest_full (git-fixes). * ring-buffer: Fix waking up ring buffer readers (git-fixes). * ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes). * ring-buffer: Only update pages_touched when a new page is touched (git- fixes). * ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git- fixes). * ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes). * rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes). * rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build. * rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter. * rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable. * rtc: abx80x: Fix return value of nvmem callback on read (git-fixes). * rtc: cmos: Fix return value of nvmem callbacks (git-fixes). * rtc: interface: Add RTC offset to alarm after fix-up (git-fixes). * rtc: isl1208: Fix return value of nvmem callbacks (git-fixes). * rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792). * s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793). * s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227072). * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134). * s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590). * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871). * s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872). * s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874). * s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870). * s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593). * s390/vtime: fix average steal time calculation (git-fixes bsc#1221783). * s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592). * s390: Implement __iowrite32_copy() (bsc#1226502) * s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502) * saa7134: Unchecked i2c_transfer function result fixed (git-fixes). * sched/balancing: Rename newidle_balance() => sched_balance_newidle() (bsc#1222173). * sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791). * sched/fair: Check root_domain::overload value before update (bsc#1222173). * sched/fair: Use helper functions to access root_domain::overload (bsc#1222173). * sched/psi: Select KERNFS as needed (git-fixes). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes). * scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes). * scsi: libsas: Fix disk not being scanned in after being removed (git-fixes). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777). * scsi: lpfc: Correct size for wqe for memset() (bsc#1221777). * scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777). * scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777). * scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777). * scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777). * scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959). * scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777). * scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777). * scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777). * scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Change debug message during driver unload (bsc1221816). * scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816). * scsi: qla2xxx: Fix N2N stuck connection (bsc1221816). * scsi: qla2xxx: Fix command flush on cable pull (bsc1221816). * scsi: qla2xxx: Fix double free of fcport (bsc1221816). * scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816). * scsi: qla2xxx: Prevent command send on chip reset (bsc1221816). * scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816). * scsi: qla2xxx: Update manufacturer detail (bsc1221816). * scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes). * scsi: sg: Avoid sg device teardown race (git-fixes). * scsi: smartpqi: Fix disable_managed_interrupts (git-fixes). * sctp: annotate data-races around sk->sk_wmem_queued (git-fixes). * sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes). * selftests/binderfs: use the Makefile's rules, not Make's implicit rules (git-fixes). * selftests/bpf: add edge case backtracking logic test (bsc#1225756). * selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756). * selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903). * selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903). * selftests/bpf: test widening for iterating callbacks (bsc#1225903). * selftests/bpf: tests for iterating callbacks (bsc#1225903). * selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903). * selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903). * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903). * selftests/ftrace: Fix event filter target_func selection (stable-fixes). * selftests/ftrace: Limit length in subsystem-enable tests (git-fixes). * selftests/kcmp: remove unused open mode (git-fixes). * selftests/mm: compaction_test: fix incorrect write of zero to nr_hugepages (git-fixes). * selftests/mm: fix build warnings on ppc64 (stable-fixes). * selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes). * selftests/powerpc/papr-vpd: Fix missing variable initialization (jsc#PED-4486 git-fixes). * selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes). * selftests/sigaltstack: Fix ppc64 GCC build (git-fixes). * selftests/timers/posix_timers: Reimplement check_timer_distribution() (git- fixes). * selftests: default to host arch for LLVM builds (git-fixes). * selftests: fix OOM in msg_zerocopy selftest (git-fixes). * selftests: forwarding: Fix ping failure due to short timeout (git-fixes). * selftests: kselftest: Fix build failure with NOLIBC (git-fixes). * selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes). * selftests: make order checking verbose in msg_zerocopy selftest (git-fixes). * selftests: mptcp: add ms units for tc-netem delay (stable-fixes). * selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes). * selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes). * selftests: net: move amt to socat for better compatibility (git-fixes). * selftests: sud_test: return correct emulated syscall value on RISC-V (stable-fixes). * selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes). * selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes). * selftests: timers: Fix abs() warning in posix_timers test (git-fixes). * selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes). * selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes). * selftests: vxlan_mdb: Fix failures with old libnet (git-fixes). * selinux: avoid dereference of garbage after mount failure (git-fixes). * selinux: introduce an initial SID for early boot processes (bsc#1208593). * serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: 8250_dw: Revert: Do not reclock if already at correct rate (git- fixes). * serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes). * serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes). * serial: Lock console when calling into driver before registration (git- fixes). * serial: bcm63xx-uart: fix tx after conversion to uart_port_tx_limited() (git-fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: core: introduce uart_port_tx_limited_flags() (git-fixes). * serial: core: only stop transmit when HW fifo is empty (git-fixes). * serial: exar: adding missing CTI and Exar PCI ids (stable-fixes). * serial: imx: Introduce timeout when waiting on transmitter empty (stable- fixes). * serial: imx: Raise TX trigger level to 8 (stable-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max3100: Update uart_driver_registered on driver removal (git- fixes). * serial: max310x: fix NULL pointer dereference in I2C instantiation (git- fixes). * serial: max310x: fix syntax error in IRQ error message (git-fixes). * serial: mxs-auart: add spinlock around changing cts state (git-fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * serial: stm32: Reset .throttled state in .startup() (git-fixes). * series.conf: cleanup Fix subsection header to silence series_insert error. * slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git- fixes). * slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes). * smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes, bsc#1225172). * smb3: allow controlling maximum number of cached directories (git-fixes, bsc#1225172). * smb3: do not start laundromat thread when dir leases disabled (git-fixes, bsc#1225172). * smb3: show beginning time for per share stats (bsc#1225172). * smb: client: do not start laundromat thread on nohandlecache (git-fixes, bsc#1225172). * smb: client: ensure to try all targets when finding nested links (bsc#1225172). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1225172). * smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes, bsc#1225172). * smb: client: get rid of dfs code dep in namespace.c (bsc#1225172). * smb: client: get rid of dfs naming in automount code (bsc#1225172). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172). * smb: client: make laundromat a delayed worker (git-fixes, bsc#1225172). * smb: client: prevent new fids from being removed by laundromat (git-fixes, bsc#1225172). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1225172). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172). * soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes). * soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes). * soc: qcom: pdr: fix parsing of domains lists (git-fixes). * soc: qcom: pdr: protect locator_addr with the main mutex (git-fixes). * soc: qcom: pmic_glink: Handle the return value of pmic_glink_init (git- fixes). * soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes). * soc: qcom: pmic_glink: do not traverse clients list without a lock (git- fixes). * soc: qcom: pmic_glink: notify clients about the current state (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * soc: qcom: rpmh-rsc: Ensure irqs are not disabled by rpmh_rsc_send_data() callers (git-fixes). * soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes). * soc: xilinx: rename cpu_number1 to dummy_cpu_number (git-fixes). * sock_diag: annotate data-races around sock_diag_handlers[family] (git- fixes). * soundwire: amd: fix for wake interrupt handling for clockstop mode (git- fixes). * soundwire: cadence: fix invalid PDI offset (stable-fixes). * speakup: Avoid crash on very long word (git-fixes). * speakup: Fix 8bit characters from direct synth (git-fixes). * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spi: Do not mark message DMA mapped when no transfer in it is (git-fixes). * spi: atmel-quadspi: Add missing check for clk_prepare (git-fixes). * spi: cadence: Ensure data lines set to low during dummy-cycle period (stable-fixes). * spi: fix null pointer dereference within spi_sync (git-fixes). * spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes). * spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable- fixes). * spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable- fixes). * spi: lm70llp: fix links in doc and comments (git-fixes). * spi: lpspi: Avoid potential use-after-free in probe() (git-fixes). * spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe (git-fixes). * spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes). * spi: microchip-core: defer asserting chip select until just before write to TX FIFO (git-fixes). * spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer (git-fixes). * spi: microchip-core: fix the issues in the isr (git-fixes). * spi: microchip-core: only disable SPI controller when register value change requires it (git-fixes). * spi: mux: set ctlr->bits_per_word_mask (stable-fixes). * spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes). * spi: spi-microchip-core: Fix the number of chip selects supported (git- fixes). * spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes). * spi: spidev: add correct compatible for Rohm BH2228FV (git-fixes). * spi: stm32: Do not warn about spurious interrupts (git-fixes). * spi: stm32: qspi: Clamp stm32_qspi_get_mode() output to CCR_BUSWIDTH_4 (git- fixes). * spi: stm32: qspi: Fix dual flash mode sanity test in stm32_qspi_setup() (git-fixes). * spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (stable- fixes). * staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes). * staging: vc04_services: fix information leak in create_component() (git- fixes). * staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes). * stmmac: Clear variable when destroying workqueue (git-fixes). * struct acpi_ec kABI workaround (git-fixes). * sunrpc: fix NFSACL RPC retry on soft mount (git-fixes). * supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570) * supported.conf: Add APM X-Gene SoC hardware monitoring driver (jsc#PED-8649) Module is marked supported because of merge from SP6, but lets add reference to SLM6.0 maintenance task. * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8644) * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional. * supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems. * supported.conf: mark vdpa modules supported (jsc#PED-8954) * supported.conf: support tcp_dctcp module (jsc#PED-8111) * supported.conf: update for mt76 stuff (bsc#1227149) * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331) * swiotlb: use the calculated number of areas (git-fixes). * tcp: Dump bound-only sockets in inet_diag (bsc#1204562). * thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Return error in case of invalid efuse data (git-fixes). * thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes). * thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git- fixes). * thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes). * thunderbolt: Do not create DisplayPort tunnels on adapters of the same router (git-fixes). * thunderbolt: Fix wake configurations after device unplug (stable-fixes). * thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes). * thunderbolt: Introduce tb_port_reset() (stable-fixes). * thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes). * thunderbolt: Reset only non-USB4 host routers in resume (git-fixes). * thunderbolt: debugfs: Fix margin debugfs node creation condition (git- fixes). * tls: break out of main loop when PEEK gets a non-data record (bsc#1221858). * tls: do not skip over different type records from the rx_list (bsc#1221858). * tls: fix peeking with sync+async decryption (bsc#1221858). * tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858). * tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tools/memory-model: Fix bug in lock.cat (git-fixes). * tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765). * tools/power turbostat: Remember global max_die_id (stable-fixes). * tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah CPUs (stable-fixes). * tools/power/turbostat: Fix uncore frequency file string (bsc#1221765). * tools: ynl: do not leak mcast_groups on init error (git-fixes). * tools: ynl: fix handling of multiple mcast groups (git-fixes). * tools: ynl: make sure we always pass yarg to mnl_cb_run (git-fixes). * tpm_tis: Do _not_ flush uninitialized work (git-fixes). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes). * tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git- fixes). * tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes). * tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: Build event generation tests only as modules (git-fixes). * tracing: Have saved_cmdlines arrays all in one allocation (git-fixes). * tracing: Remove precision vsnprintf() check from print event (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: mcf: MCF54418 has 10 UARTS (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * tty: n_tty: Fix buffer offsets when lookahead is used (git-fixes). * tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes). * tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes). * ubifs: Queue up space reservation tasks if retrying many times (git-fixes). * ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes). * ubifs: Set page uptodate in the correct place (git-fixes). * ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes). * ubifs: fix sort function prototype (git-fixes). * usb-storage: alauda: Check whether the media is initialized (git-fixes). * usb: Disable USB3 LPM at shutdown (stable-fixes). * usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569). * usb: aqc111: stop lying about skb->truesize (git-fixes). * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes). * usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes). * usb: cdc-wdm: close race between read and workqueue (git-fixes). * usb: dwc2: gadget: Fix exiting from clock gating (git-fixes). * usb: dwc2: gadget: LPM flow fix (git-fixes). * usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes). * usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes). * usb: dwc2: host: Fix hibernation flow (git-fixes). * usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes). * usb: dwc3-am62: Disable wakeup at remove (git-fixes). * usb: dwc3-am62: Rename private data (git-fixes). * usb: dwc3-am62: fix module unload/reload behavior (git-fixes). * usb: dwc3: Properly set system wakeup (git-fixes). * usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes). * usb: dwc3: core: Add DWC31 version 2.00a controller (stable-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: dwc3: core: Workaround for CSR read timeout (stable-fixes). * usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes). * usb: dwc3: pci: Do not set "linux,phy_charger_detect" property on Lenovo Yoga Tab2 1380 (stable-fixes). * usb: dwc3: pci: Drop duplicate ID (git-fixes). * usb: dwc3: pci: add support for the Intel Panther Lake (stable-fixes). * usb: fotg210: Add missing kernel doc description (git-fixes). * usb: gadget: aspeed_udc: fix device address configuration (git-fixes). * usb: gadget: composite: fix OS descriptors w_value logic (git-fixes). * usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable- fixes). * usb: gadget: f_fs: Fix a race condition when processing setup packets (git- fixes). * usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes). * usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes). * usb: gadget: function: Remove usage of the deprecated ida_simple_xx() API (stable-fixes). * usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git- fixes). * usb: gadget: printer: SS+ support (stable-fixes). * usb: gadget: printer: fix races against disable (git-fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes). * usb: gadget: uvc: configfs: ensure guid to be valid before set (stable- fixes). * usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes). * usb: gadget: uvc: use correct buffer size when parsing configfs lists (git- fixes). * usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes). * usb: musb: da8xx: fix a resource leak in probe() (git-fixes). * usb: ohci: Prevent missed ohci interrupts (git-fixes). * usb: phy: generic: Get the vbus supply (git-fixes). * usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes). * usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes). * usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes). * usb: typec: tcpm: Check for port partner validity before consuming it (git- fixes). * usb: typec: tcpm: Correct port source pdo array in pd_set callback (git- fixes). * usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes). * usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes). * usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes). * usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes). * usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git- fixes). * usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git- fixes). * usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: Ack also failed Get Error commands (git-fixes). * usb: typec: ucsi: Ack unsupported commands (stable-fixes). * usb: typec: ucsi: Check for notifications after init (git-fixes). * usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes). * usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes). * usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes). * usb: typec: ucsi: Fix connector check on init (git-fixes). * usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes). * usb: typec: ucsi: Limit read size on v1.2 (stable-fixes). * usb: typec: ucsi: Never send a lone connector change ack (stable-fixes). * usb: typec: ucsi: always register a link to USB PD device (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * usb: typec: ucsi: glink: fix child node release in probe function (git- fixes). * usb: typec: ucsi: simplify partner's PD caps registration (git-fixes). * usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes). * usb: typec: ucsi_glink: drop special handling for CCI_BUSY (stable-fixes). * usb: ucsi: stm32: fix command completion handling (git-fixes). * usb: udc: remove warning when queue disabled ep (stable-fixes). * usb: xhci-plat: Do not include xhci.h (stable-fixes). * usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes). * usb: xhci: Implement xhci_handshake_check_state() helper. * usb: xhci: correct return value in case of STS_HCE (git-fixes). * usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (stable-fixes). * vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes). * vboxsf: explicitly deny setlease attempts (stable-fixes). * vdpa/mlx5: Allow CVQ size changes (git-fixes). * vdpa_sim: reset must not run (git-fixes). * veth: try harder when allocating queue memory (git-fixes). * vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944). * virtio_net: Do not send RSS key if it is not supported (git-fixes). * virtio_net: avoid data-races on dev->stats fields (git-fixes). * virtio_net: checksum offloading handling fix (git-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * vmlinux.lds.h: catch .bss..L* sections into BSS") (git-fixes). * vsock/virtio: fix packet delivery to tap device (git-fixes). * watchdog: bd9576: Drop "always-running" property (git-fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * watchdog: rzg2l_wdt: Check return status of pm_runtime_put() (git-fixes). * watchdog: rzg2l_wdt: Use pm_runtime_resume_and_get() (git-fixes). * watchdog: rzn1: Convert comma to semicolon (git-fixes). * watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes). * wifi: add HAS_IOPORT dependencies (bsc#1227149). * wifi: ar5523: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10/11/12k: Use alloc_ordered_workqueue() to create ordered workqueues (bsc#1227149). * wifi: ath10k: Annotate struct ath10k_ce_ring with __counted_by (bsc#1227149). * wifi: ath10k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath10k: Drop checks that are always false (bsc#1227149). * wifi: ath10k: Drop cleaning of driver data from probe error path and remove (bsc#1227149). * wifi: ath10k: Fix a few spelling errors (bsc#1227149). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: Fix enum ath10k_fw_crash_dump_type kernel-doc (bsc#1227149). * wifi: ath10k: Fix htt_data_tx_completion kernel-doc warning (bsc#1227149). * wifi: ath10k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath10k: Remove unused struct ath10k_htc_frame (bsc#1227149). * wifi: ath10k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149). * wifi: ath10k: Use DECLARE_FLEX_ARRAY() for ath10k_htc_record (bsc#1227149). * wifi: ath10k: Use list_count_nodes() (bsc#1227149). * wifi: ath10k: add missing wmi_10_4_feature_mask documentation (bsc#1227149). * wifi: ath10k: add support to allow broadcast action frame RX (bsc#1227149). * wifi: ath10k: consistently use kstrtoX_from_user() functions (bsc#1227149). * wifi: ath10k: correctly document enum wmi_tlv_tx_pause_id (bsc#1227149). * wifi: ath10k: drop HTT_DATA_TX_STATUS_DOWNLOAD_FAIL (bsc#1227149). * wifi: ath10k: fix QCOM_RPROC_COMMON dependency (git-fixes). * wifi: ath10k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149). * wifi: ath10k: fix htt_q_state_conf & htt_q_state kernel-doc (bsc#1227149). * wifi: ath10k: improve structure padding (bsc#1227149). * wifi: ath10k: indicate to mac80211 scan complete with aborted flag for ATH10K_SCAN_STARTING state (bsc#1227149). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath10k: remove ath10k_htc_record::pauload[] (bsc#1227149). * wifi: ath10k: remove duplicate memset() in 10.4 TDLS peer update (bsc#1227149). * wifi: ath10k: remove struct wmi_pdev_chanlist_update_event (bsc#1227149). * wifi: ath10k: remove unused template structs (bsc#1227149). * wifi: ath10k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath10k: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: ath10k: simplify __ath10k_htt_tx_txq_recalc() (bsc#1227149). * wifi: ath10k: simplify ath10k_peer_create() (bsc#1227149). * wifi: ath10k: use flexible array in struct wmi_host_mem_chunks (bsc#1227149). * wifi: ath10k: use flexible array in struct wmi_tdls_peer_capabilities (bsc#1227149). * wifi: ath10k: use flexible arrays for WMI start scan TLVs (bsc#1227149). * wifi: ath11k: Add HTT stats for PHY reset case (bsc#1227149). * wifi: ath11k: Add coldboot calibration support for QCN9074 (bsc#1227149). * wifi: ath11k: Allow ath11k to boot without caldata in ftm mode (bsc#1227149). * wifi: ath11k: Consistently use ath11k_vif_to_arvif() (bsc#1227149). * wifi: ath11k: Consolidate WMI peer flags (bsc#1227149). * wifi: ath11k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath11k: Do not directly use scan_flags in struct scan_req_params (bsc#1227149). * wifi: ath11k: EMA beacon support (bsc#1227149). * wifi: ath11k: Fix a few spelling errors (bsc#1227149). * wifi: ath11k: Fix ath11k_htc_record flexible record (bsc#1227149). * wifi: ath11k: Introduce and use ath11k_sta_to_arsta() (bsc#1227149). * wifi: ath11k: MBSSID beacon support (bsc#1227149). * wifi: ath11k: MBSSID configuration during vdev create/start (bsc#1227149). * wifi: ath11k: MBSSID parameter configuration in AP mode (bsc#1227149). * wifi: ath11k: Really consistently use ath11k_vif_to_arvif() (bsc#1227149). * wifi: ath11k: Relocate the func ath11k_mac_bitrate_mask_num_ht_rates() and change hweight16 to hweight8 (bsc#1227149). * wifi: ath11k: Remove ath11k_base::bd_api (bsc#1227149). * wifi: ath11k: Remove cal_done check during probe (bsc#1227149). * wifi: ath11k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149). * wifi: ath11k: Remove scan_flags union from struct scan_req_params (bsc#1227149). * wifi: ath11k: Remove struct ath11k::ops (bsc#1227149). * wifi: ath11k: Remove unneeded semicolon (bsc#1227149). * wifi: ath11k: Remove unused declarations (bsc#1227149). * wifi: ath11k: Remove unused struct ath11k_htc_frame (bsc#1227149). * wifi: ath11k: Send HT fixed rate in WMI peer fixed param (bsc#1227149). * wifi: ath11k: Split coldboot calibration hw_param (bsc#1227149). * wifi: ath11k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149). * wifi: ath11k: Use device_get_match_data() (bsc#1227149). * wifi: ath11k: Use list_count_nodes() (bsc#1227149). * wifi: ath11k: add WMI event debug messages (bsc#1227149). * wifi: ath11k: add WMI_TLV_SERVICE_EXT_TPC_REG_SUPPORT service bit (bsc#1227149). * wifi: ath11k: add chip id board name while searching board-2.bin for WCN6855 (bsc#1227149). * wifi: ath11k: add firmware-2.bin support (bsc#1227149). * wifi: ath11k: add handler for WMI_VDEV_SET_TPC_POWER_CMDID (bsc#1227149). * wifi: ath11k: add parse of transmit power envelope element (bsc#1227149). * wifi: ath11k: add parsing of phy bitmap for reg rules (bsc#1227149). * wifi: ath11k: add support for QCA2066 (bsc#1227149). * wifi: ath11k: add support to select 6 GHz regulatory type (bsc#1227149). * wifi: ath11k: ath11k_debugfs_register(): fix format-truncation warning (bsc#1227149). * wifi: ath11k: avoid forward declaration of ath11k_mac_start_vdev_delay() (bsc#1227149). * wifi: ath11k: call ath11k_mac_fils_discovery() without condition (bsc#1227149). * wifi: ath11k: constify MHI channel and controller configs (bsc#1227149). * wifi: ath11k: debug: add ATH11K_DBG_CE (bsc#1227149). * wifi: ath11k: debug: remove unused ATH11K_DBG_ANY (bsc#1227149). * wifi: ath11k: debug: use all upper case in ATH11k_DBG_HAL (bsc#1227149). * wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: ath11k: do not use %pK (bsc#1227149). * wifi: ath11k: document HAL_RX_BUF_RBM_SW4_BM (bsc#1227149). * wifi: ath11k: dp: cleanup debug message (bsc#1227149). * wifi: ath11k: driver settings for MBSSID and EMA (bsc#1227149). * wifi: ath11k: drop NULL pointer check in ath11k_update_per_peer_tx_stats() (bsc#1227149). * wifi: ath11k: drop redundant check in ath11k_dp_rx_mon_dest_process() (bsc#1227149). * wifi: ath11k: enable 36 bit mask for stream DMA (bsc#1227149). * wifi: ath11k: factory test mode support (bsc#1227149). * wifi: ath11k: fill parameters for vdev set tpc power WMI command (bsc#1227149). * wifi: ath11k: fix CAC running state during virtual interface start (bsc#1227149). * wifi: ath11k: fix IOMMU errors on buffer rings (bsc#1227149). * wifi: ath11k: fix RCU documentation in ath11k_mac_op_ipv6_changed() (git- fixes). * wifi: ath11k: fix WCN6750 firmware crash caused by 17 num_vdevs (bsc#1227149). * wifi: ath11k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149). * wifi: ath11k: fix a possible dead lock caused by ab->base_lock (bsc#1227149). * wifi: ath11k: fix ath11k_mac_op_remain_on_channel() stack usage (bsc#1227149). * wifi: ath11k: fix connection failure due to unexpected peer delete (bsc#1227149). * wifi: ath11k: fix tid bitmap is 0 in peer rx mu stats (bsc#1227149). * wifi: ath11k: fix wrong definition of CE ring's base address (git-fixes). * wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath11k: hal: cleanup debug message (bsc#1227149). * wifi: ath11k: htc: cleanup debug messages (bsc#1227149). * wifi: ath11k: initialize eirp_power before use (bsc#1227149). * wifi: ath11k: mac: fix struct ieee80211_sband_iftype_data handling (bsc#1227149). * wifi: ath11k: mhi: add a warning message for MHI_CB_EE_RDDM crash (bsc#1227149). * wifi: ath11k: move pci.ops registration ahead (bsc#1227149). * wifi: ath11k: move power type check to ASSOC stage when connecting to 6 GHz AP (bsc#1227149). * wifi: ath11k: move references from rsvd2 to info fields (bsc#1227149). * wifi: ath11k: pci: cleanup debug logging (bsc#1227149). * wifi: ath11k: print debug level in debug messages (bsc#1227149). * wifi: ath11k: provide address list if chip supports 2 stations (bsc#1227149). * wifi: ath11k: qmi: refactor ath11k_qmi_m3_load() (bsc#1227149). * wifi: ath11k: refactor ath11k_wmi_tlv_parse_alloc() (bsc#1227149). * wifi: ath11k: refactor setting country code logic (stable-fixes). * wifi: ath11k: refactor vif parameter configurations (bsc#1227149). * wifi: ath11k: rely on mac80211 debugfs handling for vif (bsc#1227149). * wifi: ath11k: remove ath11k_htc_record::pauload[] (bsc#1227149). * wifi: ath11k: remove invalid peer create logic (bsc#1227149). * wifi: ath11k: remove manual mask names from debug messages (bsc#1227149). * wifi: ath11k: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath11k: remove unsupported event handlers (bsc#1227149). * wifi: ath11k: remove unused function ath11k_tm_event_wmi() (bsc#1227149). * wifi: ath11k: remove unused members of 'struct ath11k_base' (bsc#1227149). * wifi: ath11k: remove unused scan_events from struct scan_req_params (bsc#1227149). * wifi: ath11k: rename MBSSID fields in wmi_vdev_up_cmd (bsc#1227149). * wifi: ath11k: rename ath11k_start_vdev_delay() (bsc#1227149). * wifi: ath11k: rename the sc naming convention to ab (bsc#1227149). * wifi: ath11k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149). * wifi: ath11k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath11k: restore country code during resume (git-fixes). * wifi: ath11k: save max transmit power in vdev start response event from firmware (bsc#1227149). * wifi: ath11k: save power spectral density(PSD) of regulatory rule (bsc#1227149). * wifi: ath11k: simplify ath11k_mac_validate_vht_he_fixed_rate_settings() (bsc#1227149). * wifi: ath11k: simplify the code with module_platform_driver (bsc#1227149). * wifi: ath11k: store cur_regulatory_info for each radio (bsc#1227149). * wifi: ath11k: support 2 station interfaces (bsc#1227149). * wifi: ath11k: update proper pdev/vdev id for testmode command (bsc#1227149). * wifi: ath11k: update regulatory rules when connect to AP on 6 GHz band for station (bsc#1227149). * wifi: ath11k: update regulatory rules when interface added (bsc#1227149). * wifi: ath11k: use RCU when accessing struct inet6_dev::ac_list (bsc#1227149). * wifi: ath11k: use WMI_VDEV_SET_TPC_POWER_CMDID when EXT_TPC_REG_SUPPORT for 6 GHz (bsc#1227149). * wifi: ath11k: use kstrtoul_from_user() where appropriate (bsc#1227149). * wifi: ath11k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149). * wifi: ath11k: wmi: add unified command debug messages (bsc#1227149). * wifi: ath11k: wmi: cleanup error handling in ath11k_wmi_send_init_country_cmd() (bsc#1227149). * wifi: ath11k: wmi: use common error handling style (bsc#1227149). * wifi: ath11k: workaround too long expansion sparse warnings (bsc#1227149). * wifi: ath12k: Add logic to write QRTR node id to scratch (bsc#1227149). * wifi: ath12k: Add missing qmi_txn_cancel() calls (bsc#1227149). * wifi: ath12k: Add support to parse new WMI event for 6 GHz regulatory (bsc#1227149). * wifi: ath12k: Consistently use ath12k_vif_to_arvif() (bsc#1227149). * wifi: ath12k: Consolidate WMI peer flags (bsc#1227149). * wifi: ath12k: Correct 6 GHz frequency value in rx status (git-fixes). * wifi: ath12k: Do not drop tx_status in failure case (git-fixes). * wifi: ath12k: Do not use scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: Enable Mesh support for QCN9274 (bsc#1227149). * wifi: ath12k: Fix a few spelling errors (bsc#1227149). * wifi: ath12k: Fix tx completion ring (WBM2SW) setup failure (git-fixes). * wifi: ath12k: Fix uninitialized use of ret in ath12k_mac_allocate() (bsc#1227149). * wifi: ath12k: Introduce and use ath12k_sta_to_arsta() (bsc#1227149). * wifi: ath12k: Introduce the container for mac80211 hw (bsc#1227149). * wifi: ath12k: Make QMI message rules const (bsc#1227149). * wifi: ath12k: Optimize the mac80211 hw data access (bsc#1227149). * wifi: ath12k: Read board id to support split-PHY QCN9274 (bsc#1227149). * wifi: ath12k: Refactor the mac80211 hw access from link/radio (bsc#1227149). * wifi: ath12k: Remove ath12k_base::bd_api (bsc#1227149). * wifi: ath12k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149). * wifi: ath12k: Remove some dead code (bsc#1227149). * wifi: ath12k: Remove struct ath12k::ops (bsc#1227149). * wifi: ath12k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath12k: Remove unnecessary struct qmi_txn initializers (bsc#1227149). * wifi: ath12k: Remove unused declarations (bsc#1227149). * wifi: ath12k: Remove unused scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: Set default beacon mode to burst mode (bsc#1227149). * wifi: ath12k: Update Qualcomm Innovation Center, Inc. copyrights (stable- fixes). * wifi: ath12k: Use initializers for QMI message buffers (bsc#1227149). * wifi: ath12k: Use msdu_end to check MCBC (bsc#1227149). * wifi: ath12k: Use pdev_id rather than mac_id to get pdev (bsc#1227149). * wifi: ath12k: WMI support to process EHT capabilities (bsc#1227149). * wifi: ath12k: add 320 MHz bandwidth enums (bsc#1227149). * wifi: ath12k: add CE and ext IRQ flag to indicate irq_handler (bsc#1227149). * wifi: ath12k: add EHT PHY modes (bsc#1227149). * wifi: ath12k: add MAC id support in WBM error path (bsc#1227149). * wifi: ath12k: add MLO header in peer association (bsc#1227149). * wifi: ath12k: add P2P IE in beacon template (bsc#1227149). * wifi: ath12k: add QMI PHY capability learn support (bsc#1227149). * wifi: ath12k: add WMI support for EHT peer (bsc#1227149). * wifi: ath12k: add ath12k_qmi_free_resource() for recovery (bsc#1227149). * wifi: ath12k: add fallback board name without variant while searching board-2.bin (bsc#1227149). * wifi: ath12k: add firmware-2.bin support (bsc#1227149). * wifi: ath12k: add handler for scan event WMI_SCAN_EVENT_DEQUEUED (bsc#1227149). * wifi: ath12k: add keep backward compatibility of PHY mode to avoid firmware crash (bsc#1227149). * wifi: ath12k: add msdu_end structure for WCN7850 (bsc#1227149). * wifi: ath12k: add parsing of phy bitmap for reg rules (bsc#1227149). * wifi: ath12k: add processing for TWT disable event (bsc#1227149). * wifi: ath12k: add processing for TWT enable event (bsc#1227149). * wifi: ath12k: add qmi_cnss_feature_bitmap field to hardware parameters (bsc#1227149). * wifi: ath12k: add rcu lock for ath12k_wmi_p2p_noa_event() (bsc#1227149). * wifi: ath12k: add read variant from SMBIOS for download board data (bsc#1227149). * wifi: ath12k: add string type to search board data in board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: add support for BA1024 (bsc#1227149). * wifi: ath12k: add support for collecting firmware log (bsc#1227149). * wifi: ath12k: add support for hardware rfkill for WCN7850 (bsc#1227149). * wifi: ath12k: add support for peer meta data version (bsc#1227149). * wifi: ath12k: add support one MSI vector (bsc#1227149). * wifi: ath12k: add support to search regdb data in board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: add wait operation for tx management packets for flush from mac80211 (bsc#1227149). * wifi: ath12k: advertise P2P dev support for WCN7850 (bsc#1227149). * wifi: ath12k: allow specific mgmt frame tx while vdev is not up (bsc#1227149). * wifi: ath12k: ath12k_start_vdev_delay(): convert to use ar (bsc#1227149). * wifi: ath12k: avoid deadlock by change ieee80211_queue_work for regd_update_work (bsc#1227149). * wifi: ath12k: avoid duplicated vdev stop (git-fixes). * wifi: ath12k: avoid explicit HW conversion argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid explicit RBM id argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid explicit mac id argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid repeated hw access from ar (bsc#1227149). * wifi: ath12k: avoid repeated wiphy access from hw (bsc#1227149). * wifi: ath12k: call ath12k_mac_fils_discovery() without condition (bsc#1227149). * wifi: ath12k: change DMA direction while mapping reinjected packets (git- fixes). * wifi: ath12k: change MAC buffer ring size to 2048 (bsc#1227149). * wifi: ath12k: change WLAN_SCAN_PARAMS_MAX_IE_LEN from 256 to 512 (bsc#1227149). * wifi: ath12k: change interface combination for P2P mode (bsc#1227149). * wifi: ath12k: change to initialize recovery variables earlier in ath12k_core_reset() (bsc#1227149). * wifi: ath12k: change to treat alpha code na as world wide regdomain (bsc#1227149). * wifi: ath12k: change to use dynamic memory for channel list of scan (bsc#1227149). * wifi: ath12k: check M3 buffer size as well whey trying to reuse it (bsc#1227149). * wifi: ath12k: check hardware major version for WCN7850 (bsc#1227149). * wifi: ath12k: configure RDDM size to MHI for device recovery (bsc#1227149). * wifi: ath12k: configure puncturing bitmap (bsc#1227149). * wifi: ath12k: correct the data_type from QMI_OPT_FLAG to QMI_UNSIGNED_1_BYTE for mlo_capable (bsc#1227149). * wifi: ath12k: delete the timer rx_replenish_retry during rmmod (bsc#1227149). * wifi: ath12k: designating channel frequency for ROC scan (bsc#1227149). * wifi: ath12k: disable QMI PHY capability learn in split-phy QCN9274 (bsc#1227149). * wifi: ath12k: do not drop data frames from unassociated stations (bsc#1227149). * wifi: ath12k: do not restore ASPM in case of single MSI vector (bsc#1227149). * wifi: ath12k: drop NULL pointer check in ath12k_update_per_peer_tx_stats() (bsc#1227149). * wifi: ath12k: drop failed transmitted frames from metric calculation (git- fixes). * wifi: ath12k: enable 320 MHz bandwidth for 6 GHz band in EHT PHY capability for WCN7850 (bsc#1227149). * wifi: ath12k: enable 802.11 power save mode in station mode (bsc#1227149). * wifi: ath12k: enable IEEE80211_HW_SINGLE_SCAN_ON_ALL_BANDS for WCN7850 (bsc#1227149). * wifi: ath12k: fetch correct pdev id from WMI_SERVICE_READY_EXT_EVENTID (bsc#1227149). * wifi: ath12k: fix PCI read and write (bsc#1227149). * wifi: ath12k: fix WARN_ON during ath12k_mac_update_vif_chan (bsc#1227149). * wifi: ath12k: fix broken structure wmi_vdev_create_cmd (bsc#1227149). * wifi: ath12k: fix conf_mutex in ath12k_mac_op_unassign_vif_chanctx() (bsc#1227149). * wifi: ath12k: fix debug messages (bsc#1227149). * wifi: ath12k: fix fetching MCBC flag for QCN9274 (bsc#1227149). * wifi: ath12k: fix firmware assert during insmod in memory segment mode (bsc#1227149). * wifi: ath12k: fix firmware crash during reo reinject (git-fixes). * wifi: ath12k: fix invalid m3 buffer address (bsc#1227149). * wifi: ath12k: fix invalid memory access while processing fragmented packets (git-fixes). * wifi: ath12k: fix kernel crash during resume (bsc#1227149). * wifi: ath12k: fix license in p2p.c and p2p.h (bsc#1227149). * wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes). * wifi: ath12k: fix peer metadata parsing (git-fixes). * wifi: ath12k: fix potential wmi_mgmt_tx_queue race condition (bsc#1227149). * wifi: ath12k: fix radar detection in 160 MHz (bsc#1227149). * wifi: ath12k: fix recovery fail while firmware crash when doing channel switch (bsc#1227149). * wifi: ath12k: fix the error handler of rfkill config (bsc#1227149). * wifi: ath12k: fix the issue that the multicast/broadcast indicator is not read correctly for WCN7850 (bsc#1227149). * wifi: ath12k: fix the problem that down grade phy mode operation (bsc#1227149). * wifi: ath12k: fix wrong definition of CE ring's base address (git-fixes). * wifi: ath12k: fix wrong definitions of hal_reo_update_rx_queue (bsc#1227149). * wifi: ath12k: get msi_data again after request_irq is called (bsc#1227149). * wifi: ath12k: implement handling of P2P NoA event (bsc#1227149). * wifi: ath12k: implement remain on channel for P2P mode (bsc#1227149). * wifi: ath12k: increase vdev setup timeout (bsc#1227149). * wifi: ath12k: indicate NON MBSSID vdev by default during vdev start (bsc#1227149). * wifi: ath12k: indicate scan complete for scan canceled when scan running (bsc#1227149). * wifi: ath12k: indicate to mac80211 scan complete with aborted flag for ATH12K_SCAN_STARTING state (bsc#1227149). * wifi: ath12k: move HE capabilities processing to a new function (bsc#1227149). * wifi: ath12k: move peer delete after vdev stop of station for WCN7850 (bsc#1227149). * wifi: ath12k: parse WMI service ready ext2 event (bsc#1227149). * wifi: ath12k: peer assoc for 320 MHz (bsc#1227149). * wifi: ath12k: prepare EHT peer assoc parameters (bsc#1227149). * wifi: ath12k: propagate EHT capabilities to userspace (bsc#1227149). * wifi: ath12k: refactor DP Rxdma ring structure (bsc#1227149). * wifi: ath12k: refactor QMI MLO host capability helper function (bsc#1227149). * wifi: ath12k: refactor ath12k_bss_assoc() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_allocate() and ath12k_mac_destroy() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_ampdu_action() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_conf_tx() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_config() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_configure_filter() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_flush() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_start() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_stop() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_update_vif_offload() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_register() and ath12k_mac_unregister() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_setup_channels_rates() (bsc#1227149). * wifi: ath12k: refactor ath12k_wmi_tlv_parse_alloc() (bsc#1227149). * wifi: ath12k: refactor multiple MSI vector implementation (bsc#1227149). * wifi: ath12k: refactor the rfkill worker (bsc#1227149). * wifi: ath12k: register EHT mesh capabilities (bsc#1227149). * wifi: ath12k: relax list iteration in ath12k_mac_vif_unref() (bsc#1227149). * wifi: ath12k: relocate ath12k_dp_pdev_pre_alloc() call (bsc#1227149). * wifi: ath12k: remove hal_desc_sz from hw params (bsc#1227149). * wifi: ath12k: remove redundant memset() in ath12k_hal_reo_qdesc_setup() (bsc#1227149). * wifi: ath12k: remove the unused scan_events from ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: remove unused ATH12K_BD_IE_BOARD_EXT (bsc#1227149). * wifi: ath12k: rename HE capabilities setup/copy functions (bsc#1227149). * wifi: ath12k: rename the sc naming convention to ab (bsc#1227149). * wifi: ath12k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149). * wifi: ath12k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath12k: send WMI_PEER_REORDER_QUEUE_SETUP_CMDID when ADDBA session starts (bsc#1227149). * wifi: ath12k: set IRQ affinity to CPU0 in case of one MSI vector (bsc#1227149). * wifi: ath12k: set PERST pin no pull request for WCN7850 (bsc#1227149). * wifi: ath12k: split hal_ops to support RX TLVs word mask compaction (bsc#1227149). * wifi: ath12k: subscribe required word mask from rx tlv (bsc#1227149). * wifi: ath12k: support default regdb while searching board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: trigger station disconnect on hardware restart (bsc#1227149). * wifi: ath12k: use ATH12K_PCI_IRQ_DP_OFFSET for DP IRQ (bsc#1227149). * wifi: ath12k: use correct flag field for 320 MHz channels (bsc#1227149). * wifi: ath12k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149). * wifi: ath5k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath5k: Remove redundant dev_err() (bsc#1227149). * wifi: ath5k: ath5k_hw_get_median_noise_floor(): use swap() (bsc#1227149). * wifi: ath5k: remove phydir check from ath5k_debug_init_device() (bsc#1227149). * wifi: ath5k: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath5k: remove unused ath5k_eeprom_info::ee_antenna (bsc#1227149). * wifi: ath5k: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: ath6kl: Remove error checking for debugfs_create_dir() (bsc#1227149). * wifi: ath6kl: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath6kl: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: ath9k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath9k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath9k: Remove unnecessary ternary operators (bsc#1227149). * wifi: ath9k: Remove unused declarations (bsc#1227149). * wifi: ath9k: avoid using uninitialized array (bsc#1227149). * wifi: ath9k: clean up function ath9k_hif_usb_resume (bsc#1227149). * wifi: ath9k: consistently use kstrtoX_from_user() functions (bsc#1227149). * wifi: ath9k: delete some unused/duplicate macros (bsc#1227149). * wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes). * wifi: ath9k: fix parameter check in ath9k_init_debug() (bsc#1227149). * wifi: ath9k: remove redundant assignment to variable ret (bsc#1227149). * wifi: ath9k: reset survey of current channel after a scan started (bsc#1227149). * wifi: ath9k: simplify ar9003_hw_process_ini() (bsc#1227149). * wifi: ath9k: use u32 for txgain indexes (bsc#1227149). * wifi: ath9k: work around memset overflow warning (bsc#1227149). * wifi: ath9k_htc: fix format-truncation warning (bsc#1227149). * wifi: ath: Use is_multicast_ether_addr() to check multicast Ether address (bsc#1227149). * wifi: ath: dfs_pattern_detector: Use flex array to simplify code (bsc#1227149). * wifi: ath: remove unused-but-set parameter (bsc#1227149). * wifi: ath: work around false-positive stringop-overread warning (bsc#1227149). * wifi: atk10k: Do not opencode ath10k_pci_priv() in ath10k_ahb_priv() (bsc#1227149). * wifi: atmel: remove unused ioctl function (bsc#1227149). * wifi: b43: silence sparse warnings (bsc#1227149). * wifi: brcm80211: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable- fixes). * wifi: brcmfmac: Annotate struct brcmf_gscan_config with __counted_by (bsc#1227149). * wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git- fixes). * wifi: brcmfmac: Detect corner error case earlier with log (bsc#1227149). * wifi: brcmfmac: add linefeed at end of file (bsc#1227149). * wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes). * wifi: brcmfmac: allow per-vendor event handling (bsc#1227149). * wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes). * wifi: brcmfmac: do not cast hidden SSID attribute value to boolean (bsc#1227149). * wifi: brcmfmac: do not pass hidden SSID attribute as value directly (bsc#1227149). * wifi: brcmfmac: export firmware interface functions (bsc#1227149). * wifi: brcmfmac: firmware: Annotate struct brcmf_fw_request with __counted_by (bsc#1227149). * wifi: brcmfmac: fix format-truncation warnings (bsc#1227149). * wifi: brcmfmac: fix gnu_printf warnings (bsc#1227149). * wifi: brcmfmac: fweh: Add __counted_by for struct brcmf_fweh_queue_item and use struct_size() (bsc#1227149). * wifi: brcmfmac: fweh: Fix boot crash on Raspberry Pi 4 (bsc#1227149). * wifi: brcmfmac: move feature overrides before feature_disable (bsc#1227149). * wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes). * wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes). * wifi: brcmsmac: cleanup SCB-related data types (bsc#1227149). * wifi: brcmsmac: fix gnu_printf warnings (bsc#1227149). * wifi: brcmsmac: phy: Remove unreachable code (bsc#1227149). * wifi: brcmsmac: remove more unused data types (bsc#1227149). * wifi: brcmsmac: remove unused data type (bsc#1227149). * wifi: brcmsmac: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: brcmsmac: silence sparse warnings (bsc#1227149). * wifi: brcmutil: use helper function pktq_empty() instead of open code (bsc#1227149). * wifi: carl9170: Remove redundant assignment to pointer super (bsc#1227149). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: carl9170: remove unnecessary (void*) conversions (bsc#1227149). * wifi: cfg80211: Add support for setting TID to link mapping (bsc#1227149). * wifi: cfg80211: Allow AP/P2PGO to indicate port authorization to peer STA/P2PClient (bsc#1227149). * wifi: cfg80211: Extend support for scanning while MLO connected (bsc#1227149). * wifi: cfg80211: Fix typo in documentation (bsc#1227149). * wifi: cfg80211: Handle specific BSSID in 6GHz scanning (bsc#1227149). * wifi: cfg80211: Include operating class 137 in 6GHz band (bsc#1227149). * wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes). * wifi: cfg80211: OWE DH IE handling offload (bsc#1227149). * wifi: cfg80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: cfg80211: Schedule regulatory check on BSS STA channel change (bsc#1227149). * wifi: cfg80211: Update the default DSCP-to-UP mapping (bsc#1227149). * wifi: cfg80211: add BSS usage reporting (bsc#1227149). * wifi: cfg80211: add RNR with reporting AP information (bsc#1227149). * wifi: cfg80211: add a flag to disable wireless extensions (bsc#1227149). * wifi: cfg80211: add local_state_change to deauth trace (bsc#1227149). * wifi: cfg80211: add locked debugfs wrappers (bsc#1227149). * wifi: cfg80211: add support for SPP A-MSDUs (bsc#1227149). * wifi: cfg80211: address several kerneldoc warnings (bsc#1227149). * wifi: cfg80211: allow reg update by driver even if wiphy->regd is set (bsc#1227149). * wifi: cfg80211: annotate iftype_data pointer with sparse (bsc#1227149). * wifi: cfg80211: avoid double free if updating BSS fails (bsc#1227149). * wifi: cfg80211: call reg_call_notifier on beacon hints (bsc#1227149). * wifi: cfg80211: check A-MSDU format more carefully (stable-fixes). * wifi: cfg80211: check RTNL when iterating devices (bsc#1227149). * wifi: cfg80211: check wiphy mutex is held for wdev mutex (bsc#1227149). * wifi: cfg80211: consume both probe response and beacon IEs (bsc#1227149). * wifi: cfg80211: detect stuck ECSA element in probe resp (bsc#1227149). * wifi: cfg80211: ensure cfg80211_bss_update frees IEs on error (bsc#1227149). * wifi: cfg80211: export DFS CAC time and usable state helper functions (bsc#1227149). * wifi: cfg80211: expose nl80211_chan_width_to_mhz for wide sharing (bsc#1227149). * wifi: cfg80211: fix 6 GHz scan request building (stable-fixes). * wifi: cfg80211: fix CQM for non-range use (bsc#1227149). * wifi: cfg80211: fix header kernel-doc typos (bsc#1227149). * wifi: cfg80211: fix kernel-doc for wiphy_delayed_work_flush() (bsc#1227149). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: cfg80211: fix spelling & punctutation (bsc#1227149). * wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes). * wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes). * wifi: cfg80211: fully move wiphy work to unbound workqueue (git-fixes). * wifi: cfg80211: generate an ML element for per-STA profiles (bsc#1227149). * wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes). * wifi: cfg80211: handle UHB AP and STA power type (bsc#1227149). * wifi: cfg80211: hold wiphy lock in cfg80211_any_wiphy_oper_chan() (bsc#1227149). * wifi: cfg80211: hold wiphy mutex for send_interface (bsc#1227149). * wifi: cfg80211: improve documentation for flag fields (bsc#1227149). * wifi: cfg80211: introduce cfg80211_ssid_eq() (bsc#1227149). * wifi: cfg80211: make RX assoc data const (bsc#1227149). * wifi: cfg80211: make read-only array centers_80mhz static const (bsc#1227149). * wifi: cfg80211: modify prototype for change_beacon (bsc#1227149). * wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes). * wifi: cfg80211: reg: Support P2P operation on DFS channels (bsc#1227149). * wifi: cfg80211: reg: describe return values in kernel-doc (bsc#1227149). * wifi: cfg80211: reg: fix various kernel-doc issues (bsc#1227149). * wifi: cfg80211: reg: hold wiphy mutex for wdev iteration (bsc#1227149). * wifi: cfg80211: remove scan_width support (bsc#1227149). * wifi: cfg80211: remove wdev mutex (bsc#1227149). * wifi: cfg80211: rename UHB to 6 GHz (bsc#1227149). * wifi: cfg80211: report per-link errors during association (bsc#1227149). * wifi: cfg80211: report unprotected deauth/disassoc in wowlan (bsc#1227149). * wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes). * wifi: cfg80211: save power spectral density(psd) of regulatory rule (bsc#1227149). * wifi: cfg80211: set correct param change count in ML element (bsc#1227149). * wifi: cfg80211: sme: hold wiphy lock for wdev iteration (bsc#1227149). * wifi: cfg80211: sort certificates in build (bsc#1227149). * wifi: cfg80211: split struct cfg80211_ap_settings (bsc#1227149). * wifi: cfg80211: validate HE operation element parsing (bsc#1227149). * wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes). * wifi: cfg80211: wext: convert return value to kernel-doc (bsc#1227149). * wifi: cfg80211: wext: set ssids=NULL for passive scans (git-fixes). * wifi: cw1200: Avoid processing an invalid TIM IE (bsc#1227149). * wifi: cw1200: Convert to GPIO descriptors (bsc#1227149). * wifi: cw1200: fix __le16 sparse warnings (bsc#1227149). * wifi: cw1200: restore endian swapping (bsc#1227149). * wifi: drivers: Explicitly include correct DT includes (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for Broadcom WLAN (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for ar5523 (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for mt76 drivers (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for p54spi (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wcn36xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wilc1000 (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wl1251 and wl12xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wl18xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wlcore (bsc#1227149). * wifi: hostap: Add __counted_by for struct prism2_download_data and use struct_size() (bsc#1227149). * wifi: hostap: fix stringop-truncations GCC warning (bsc#1227149). * wifi: hostap: remove unused ioctl function (bsc#1227149). * wifi: ieee80211: add UL-bandwidth definition of trigger frame (bsc#1227149). * wifi: ieee80211: add definitions for negotiated TID to Link map (bsc#1227149). * wifi: ieee80211: check for NULL in ieee80211_mle_size_ok() (stable-fixes). * wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes). * wifi: iwlmei: do not send SAP messages if AMT is disabled (bsc#1227149). * wifi: iwlmei: do not send nic info with invalid mac address (bsc#1227149). * wifi: iwlmei: send HOST_GOES_DOWN message even if wiamt is disabled (bsc#1227149). * wifi: iwlmei: send driver down SAP message only if wiamt is enabled (bsc#1227149). * wifi: iwlmvm: fw: Add new OEM vendor to tas approved list (bsc#1227149). * wifi: iwlwifi: Add rf_mapping of new wifi7 devices (bsc#1227149). * wifi: iwlwifi: Add support for PPAG cmd v5 and PPAG revision 3 (bsc#1227149). * wifi: iwlwifi: Add support for new 802.11be device (bsc#1227149). * wifi: iwlwifi: Do not mark DFS channels as NO-IR (bsc#1227149). * wifi: iwlwifi: Extract common prph mac/phy regions data dump logic (bsc#1227149). * wifi: iwlwifi: Fix spelling mistake "SESION" -> "SESSION" (bsc#1227149). * wifi: iwlwifi: Use request_module_nowait (bsc#1227149). * wifi: iwlwifi: abort scan when rfkill on but device enabled (bsc#1227149). * wifi: iwlwifi: add HONOR to PPAG approved list (bsc#1227149). * wifi: iwlwifi: add Razer to ppag approved list (bsc#1227149). * wifi: iwlwifi: add mapping of a periphery register crf for WH RF (bsc#1227149). * wifi: iwlwifi: add new RF support for wifi7 (bsc#1227149). * wifi: iwlwifi: add support for SNPS DPHYIP region type (bsc#1227149). * wifi: iwlwifi: add support for a wiphy_work rx handler (bsc#1227149). * wifi: iwlwifi: add support for activating UNII-1 in WW via BIOS (bsc#1227149). * wifi: iwlwifi: add support for new ini region types (bsc#1227149). * wifi: iwlwifi: adjust rx_phyinfo debugfs to MLO (bsc#1227149). * wifi: iwlwifi: always have 'uats_enabled' (bsc#1227149). * wifi: iwlwifi: api: clean up some kernel-doc/typos (bsc#1227149). * wifi: iwlwifi: api: dbg-tlv: fix up kernel-doc (bsc#1227149). * wifi: iwlwifi: api: fix a small upper/lower-case typo (bsc#1227149). * wifi: iwlwifi: api: fix center_freq label in PHY diagram (bsc#1227149). * wifi: iwlwifi: api: fix constant version to match FW (bsc#1227149). * wifi: iwlwifi: api: fix kernel-doc reference (bsc#1227149). * wifi: iwlwifi: bump FW API to 84 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 86 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 87 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 88 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: cancel session protection only if there is one (bsc#1227149). * wifi: iwlwifi: change link id in time event to s8 (bsc#1227149). * wifi: iwlwifi: check for kmemdup() return value in iwl_parse_tlv_firmware() (bsc#1227149). * wifi: iwlwifi: cleanup BT Shared Single Antenna code (bsc#1227149). * wifi: iwlwifi: cleanup sending PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1227149). * wifi: iwlwifi: cleanup uefi variables loading (bsc#1227149). * wifi: iwlwifi: clear link_id in time_event (bsc#1227149). * wifi: iwlwifi: dbg-tlv: avoid extra allocation/copy (bsc#1227149). * wifi: iwlwifi: dbg-tlv: use struct_size() for allocation (bsc#1227149). * wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git- fixes). * wifi: iwlwifi: disable 160 MHz based on subsystem device ID (bsc#1227149). * wifi: iwlwifi: disable eSR when BT is active (bsc#1227149). * wifi: iwlwifi: disable multi rx queue for 9000 (bsc#1227149). * wifi: iwlwifi: do not check TAS block list size twice (bsc#1227149). * wifi: iwlwifi: do not use TRUE/FALSE with bool (bsc#1227149). * wifi: iwlwifi: drop NULL pointer check in iwl_mvm_tzone_set_trip_temp() (bsc#1227149). * wifi: iwlwifi: dvm: remove kernel-doc warnings (bsc#1227149). * wifi: iwlwifi: error-dump: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fail NIC access fast on dead NIC (bsc#1227149). * wifi: iwlwifi: fix #ifdef CONFIG_ACPI check (bsc#1227149). * wifi: iwlwifi: fix iwl_mvm_get_valid_rx_ant() (git-fixes). * wifi: iwlwifi: fix opmode start/stop race (bsc#1227149). * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fix system commands group ordering (bsc#1227149). * wifi: iwlwifi: fix the rf step and flavor bits range (bsc#1227149). * wifi: iwlwifi: fw: Add support for UATS table in UHB (bsc#1227149). * wifi: iwlwifi: fw: Fix debugfs command sending (bsc#1227149). * wifi: iwlwifi: fw: allow vmalloc for PNVM image (bsc#1227149). * wifi: iwlwifi: fw: dbg: ensure correct config name sizes (bsc#1227149). * wifi: iwlwifi: fw: disable firmware debug asserts (bsc#1227149). * wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes). * wifi: iwlwifi: fw: file: clean up kernel-doc (bsc#1227149). * wifi: iwlwifi: fw: file: do not use [0] for variable arrays (bsc#1227149). * wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes). * wifi: iwlwifi: fw: fix compiler warning for NULL string print (bsc#1227149). * wifi: iwlwifi: fw: increase fw_version string size (bsc#1227149). * wifi: iwlwifi: fw: reconstruct the API/CAPA enum number (bsc#1227149). * wifi: iwlwifi: fw: replace deprecated strncpy with strscpy_pad (bsc#1227149). * wifi: iwlwifi: handle per-phy statistics from fw (bsc#1227149). * wifi: iwlwifi: implement GLAI ACPI table loading (bsc#1227149). * wifi: iwlwifi: implement can_activate_links callback (bsc#1227149). * wifi: iwlwifi: implement enable/disable for China 2022 regulatory (bsc#1227149). * wifi: iwlwifi: iwl-fh.h: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: iwl-trans.h: clean up kernel-doc (bsc#1227149). * wifi: iwlwifi: iwlmvm: handle unprotected deauth/disassoc in d3 (bsc#1227149). * wifi: iwlwifi: load b0 version of ucode for HR1/HR2 (bsc#1227149). * wifi: iwlwifi: make TB reallocation a debug message (bsc#1227149). * wifi: iwlwifi: make time_events MLO aware (bsc#1227149). * wifi: iwlwifi: mei: return error from register when not built (bsc#1227149). * wifi: iwlwifi: mvm: Add basic link selection logic (bsc#1227149). * wifi: iwlwifi: mvm: Add support for removing responder TKs (bsc#1227149). * wifi: iwlwifi: mvm: Allow DFS concurrent operation (bsc#1227149). * wifi: iwlwifi: mvm: Configure the link mapping for non-MLD FW (bsc#1227149). * wifi: iwlwifi: mvm: Correctly report TSF data in scan complete (bsc#1227149). * wifi: iwlwifi: mvm: Declare support for secure LTF measurement (bsc#1227149). * wifi: iwlwifi: mvm: Do not warn if valid link pair was not found (bsc#1227149). * wifi: iwlwifi: mvm: Do not warn on invalid link on scan complete (bsc#1227149). * wifi: iwlwifi: mvm: Extend support for P2P service discovery (bsc#1227149). * wifi: iwlwifi: mvm: Fix FTM initiator flags (bsc#1227149). * wifi: iwlwifi: mvm: Fix scan abort handling with HW rfkill (stable-fixes). * wifi: iwlwifi: mvm: Fix unreachable code path (bsc#1227149). * wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes). * wifi: iwlwifi: mvm: Keep connection in case of missed beacons during RX (bsc#1227149). * wifi: iwlwifi: mvm: Return success if link could not be removed (bsc#1227149). * wifi: iwlwifi: mvm: Use the link ID provided in scan request (bsc#1227149). * wifi: iwlwifi: mvm: add US/Canada MCC to API (bsc#1227149). * wifi: iwlwifi: mvm: add a debug print when we get a BAR (bsc#1227149). * wifi: iwlwifi: mvm: add a debugfs hook to clear the monitor data (bsc#1227149). * wifi: iwlwifi: mvm: add a per-link debugfs (bsc#1227149). * wifi: iwlwifi: mvm: add a print when sending RLC command (bsc#1227149). * wifi: iwlwifi: mvm: add start mac ctdp sum calculation debugfs handler (bsc#1227149). * wifi: iwlwifi: mvm: add support for TID to link mapping neg request (bsc#1227149). * wifi: iwlwifi: mvm: add support for new wowlan_info_notif (bsc#1227149). * wifi: iwlwifi: mvm: advertise MLO only if EHT is enabled (bsc#1227149). * wifi: iwlwifi: mvm: advertise support for SCS traffic description (bsc#1227149). * wifi: iwlwifi: mvm: advertise support for protected ranging negotiation (bsc#1227149). * wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes). * wifi: iwlwifi: mvm: always update keys in D3 exit (bsc#1227149). * wifi: iwlwifi: mvm: avoid garbage iPN (bsc#1227149). * wifi: iwlwifi: mvm: calculate EMLSR mode after connection (bsc#1227149). * wifi: iwlwifi: mvm: check AP supports EMLSR (bsc#1227149). * wifi: iwlwifi: mvm: check for iwl_mvm_mld_update_sta() errors (bsc#1227149). * wifi: iwlwifi: mvm: check link more carefully (bsc#1227149). * wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes). * wifi: iwlwifi: mvm: check own capabilities for EMLSR (bsc#1227149). * wifi: iwlwifi: mvm: cleanup MLO and non-MLO unification code (bsc#1227149). * wifi: iwlwifi: mvm: combine condition/warning (bsc#1227149). * wifi: iwlwifi: mvm: consider having one active link (bsc#1227149). * wifi: iwlwifi: mvm: const-ify chandef pointers (bsc#1227149). * wifi: iwlwifi: mvm: cycle FW link on chanctx removal (bsc#1227149). * wifi: iwlwifi: mvm: d3: avoid intermediate/early mutex unlock (bsc#1227149). * wifi: iwlwifi: mvm: d3: disconnect on GTK rekey failure (bsc#1227149). * wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes). * wifi: iwlwifi: mvm: d3: implement suspend with MLO (bsc#1227149). * wifi: iwlwifi: mvm: debugfs for fw system stats (bsc#1227149). * wifi: iwlwifi: mvm: define RX queue sync timeout as a macro (bsc#1227149). * wifi: iwlwifi: mvm: disable MLO for the time being (bsc#1227149). * wifi: iwlwifi: mvm: disallow puncturing in US/Canada (bsc#1227149). * wifi: iwlwifi: mvm: disconnect long CSA only w/o alternative (bsc#1227149). * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (bsc#1227149). * wifi: iwlwifi: mvm: do not abort queue sync in CT-kill (bsc#1227149). * wifi: iwlwifi: mvm: do not add dummy phy context (bsc#1227149). * wifi: iwlwifi: mvm: do not always disable EMLSR due to BT coex (bsc#1227149). * wifi: iwlwifi: mvm: do not do duplicate detection for nullfunc packets (bsc#1227149). * wifi: iwlwifi: mvm: do not initialize csa_work twice (git-fixes). * wifi: iwlwifi: mvm: do not limit VLP/AFC to UATS-enabled (git-fixes). * wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes). * wifi: iwlwifi: mvm: do not send BT_COEX_CI command on new devices (bsc#1227149). * wifi: iwlwifi: mvm: do not send NDPs for new tx devices (bsc#1227149). * wifi: iwlwifi: mvm: do not send STA_DISABLE_TX_CMD for newer firmware (bsc#1227149). * wifi: iwlwifi: mvm: do not send the smart fifo command if not needed (bsc#1227149). * wifi: iwlwifi: mvm: do not set trigger frame padding in AP mode (bsc#1227149). * wifi: iwlwifi: mvm: do not support reduced tx power on ack for new devices (bsc#1227149). * wifi: iwlwifi: mvm: do not wake up rx_sync_waitq upon RFKILL (git-fixes). * wifi: iwlwifi: mvm: enable FILS DF Tx on non-PSC channel (bsc#1227149). * wifi: iwlwifi: mvm: enable HE TX/RX <242 tone RU on new RFs (bsc#1227149). * wifi: iwlwifi: mvm: expand queue sync warning messages (bsc#1227149). * wifi: iwlwifi: mvm: extend alive timeout to 2 seconds (bsc#1227149). * wifi: iwlwifi: mvm: fix ROC version check (bsc#1227149). * wifi: iwlwifi: mvm: fix SB CFG check (bsc#1227149). * wifi: iwlwifi: mvm: fix a battery life regression (bsc#1227149). * wifi: iwlwifi: mvm: fix a crash on 7265 (bsc#1227149). * wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes). * wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes). * wifi: iwlwifi: mvm: fix kernel-doc (bsc#1227149). * wifi: iwlwifi: mvm: fix link ID management (bsc#1227149). * wifi: iwlwifi: mvm: fix recovery flow in CSA (bsc#1227149). * wifi: iwlwifi: mvm: fix regdb initialization (bsc#1227149). * wifi: iwlwifi: mvm: fix the PHY context resolution for p2p device (bsc#1227149). * wifi: iwlwifi: mvm: fix the TXF mapping for BZ devices (bsc#1227149). * wifi: iwlwifi: mvm: fix the key PN index (bsc#1227149). * wifi: iwlwifi: mvm: fix thermal kernel-doc (bsc#1227149). * wifi: iwlwifi: mvm: fold the ref++ into iwl_mvm_phy_ctxt_add (bsc#1227149). * wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes). * wifi: iwlwifi: mvm: handle BA session teardown in RF-kill (stable-fixes). * wifi: iwlwifi: mvm: handle debugfs names more carefully (bsc#1227149). * wifi: iwlwifi: mvm: handle link-STA allocation in restart (bsc#1227149). * wifi: iwlwifi: mvm: implement ROC version 3 (bsc#1227149). * wifi: iwlwifi: mvm: implement new firmware API for statistics (bsc#1227149). * wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes). * wifi: iwlwifi: mvm: increase session protection after CSA (bsc#1227149). * wifi: iwlwifi: mvm: init vif works only once (git-fixes). * wifi: iwlwifi: mvm: introduce PHY_CONTEXT_CMD_API_VER_5 (bsc#1227149). * wifi: iwlwifi: mvm: introduce esr_disable_reason (bsc#1227149). * wifi: iwlwifi: mvm: iterate active links for STA queues (bsc#1227149). * wifi: iwlwifi: mvm: limit EHT 320 MHz MCS for STEP URM (bsc#1227149). * wifi: iwlwifi: mvm: limit pseudo-D3 to 60 seconds (bsc#1227149). * wifi: iwlwifi: mvm: log dropped frames (bsc#1227149). * wifi: iwlwifi: mvm: log dropped packets due to MIC error (bsc#1227149). * wifi: iwlwifi: mvm: make "pldr_sync" mode effective (bsc#1227149). * wifi: iwlwifi: mvm: make functions public (bsc#1227149). * wifi: iwlwifi: mvm: make pldr_sync AX210 specific (bsc#1227149). * wifi: iwlwifi: mvm: move BA notif messages before action (bsc#1227149). * wifi: iwlwifi: mvm: move RU alloc B2 placement (bsc#1227149). * wifi: iwlwifi: mvm: move listen interval to constants (bsc#1227149). * wifi: iwlwifi: mvm: offload IGTK in AP if BIGTK is supported (bsc#1227149). * wifi: iwlwifi: mvm: partially support PHY context version 6 (bsc#1227149). * wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (bsc#1227149). * wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable- fixes). * wifi: iwlwifi: mvm: reduce maximum RX A-MPDU size (bsc#1227149). * wifi: iwlwifi: mvm: refactor TX rate handling (bsc#1227149). * wifi: iwlwifi: mvm: refactor duplicate chanctx condition (bsc#1227149). * wifi: iwlwifi: mvm: remove EHT code from mac80211.c (bsc#1227149). * wifi: iwlwifi: mvm: remove IWL_MVM_STATUS_NEED_FLUSH_P2P (bsc#1227149). * wifi: iwlwifi: mvm: remove flags for enable/disable beacon filter (bsc#1227149). * wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git- fixes). * wifi: iwlwifi: mvm: remove one queue sync on BA session stop (bsc#1227149). * wifi: iwlwifi: mvm: remove set_tim callback for MLD ops (bsc#1227149). * wifi: iwlwifi: mvm: remove stale STA link data during restart (stable- fixes). * wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes). * wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes). * wifi: iwlwifi: mvm: rework debugfs handling (bsc#1227149). * wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes). * wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes). * wifi: iwlwifi: mvm: set properly mac header (git-fixes). * wifi: iwlwifi: mvm: show dump even for pldr_sync (bsc#1227149). * wifi: iwlwifi: mvm: show skb_mac_gso_segment() failure reason (bsc#1227149). * wifi: iwlwifi: mvm: simplify the reorder buffer (bsc#1227149). * wifi: iwlwifi: mvm: skip adding debugfs symlink for reconfig (bsc#1227149). * wifi: iwlwifi: mvm: support CSA with MLD (bsc#1227149). * wifi: iwlwifi: mvm: support SPP A-MSDUs (bsc#1227149). * wifi: iwlwifi: mvm: support flush on AP interfaces (bsc#1227149). * wifi: iwlwifi: mvm: support injection antenna control (bsc#1227149). * wifi: iwlwifi: mvm: support iwl_dev_tx_power_cmd_v8 (bsc#1227149). * wifi: iwlwifi: mvm: support set_antenna() (bsc#1227149). * wifi: iwlwifi: mvm: unlock mvm if there is no primary link (bsc#1227149). * wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes). * wifi: iwlwifi: mvm: use fast balance scan in case of an active P2P GO (bsc#1227149). * wifi: iwlwifi: mvm: use the new command to clear the internal buffer (bsc#1227149). * wifi: iwlwifi: mvm: work around A-MSDU size problem (bsc#1227149). * wifi: iwlwifi: no power save during transition to D3 (bsc#1227149). * wifi: iwlwifi: nvm-parse: advertise common packet padding (bsc#1227149). * wifi: iwlwifi: nvm: parse the VLP/AFC bit from regulatory (bsc#1227149). * wifi: iwlwifi: pcie: (re-)assign BAR0 on driver bind (bsc#1227149). * wifi: iwlwifi: pcie: Add new PCI device id and CNVI (bsc#1227149). * wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes). * wifi: iwlwifi: pcie: clean up WFPM control bits (bsc#1227149). * wifi: iwlwifi: pcie: clean up device removal work (bsc#1227149). * wifi: iwlwifi: pcie: clean up gen1/gen2 TFD unmap (bsc#1227149). * wifi: iwlwifi: pcie: do not allow hw-rfkill to stop device on gen2 (bsc#1227149). * wifi: iwlwifi: pcie: dump CSRs before removal (bsc#1227149). * wifi: iwlwifi: pcie: enable TOP fatal error interrupt (bsc#1227149). * wifi: iwlwifi: pcie: fix RB status reading (stable-fixes). * wifi: iwlwifi: pcie: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: pcie: get_crf_id() can be void (bsc#1227149). * wifi: iwlwifi: pcie: give up mem read if HW is dead (bsc#1227149). * wifi: iwlwifi: pcie: move gen1 TB handling to header (bsc#1227149). * wifi: iwlwifi: pcie: point invalid TFDs to invalid data (bsc#1227149). * wifi: iwlwifi: pcie: propagate iwl_pcie_gen2_apm_init() error (bsc#1227149). * wifi: iwlwifi: pcie: rescan bus if no parent (bsc#1227149). * wifi: iwlwifi: prepare for reading DSM from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading PPAG table from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading SAR tables from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading SPLC from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading TAS table from UEFI (bsc#1227149). * wifi: iwlwifi: properly check if link is active (bsc#1227149). * wifi: iwlwifi: properly set WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK (stable-fixes). * wifi: iwlwifi: queue: fix kernel-doc (bsc#1227149). * wifi: iwlwifi: queue: improve warning for no skb in reclaim (bsc#1227149). * wifi: iwlwifi: queue: move iwl_txq_gen2_set_tb() up (bsc#1227149). * wifi: iwlwifi: read DSM func 2 for specific RF types (bsc#1227149). * wifi: iwlwifi: read DSM functions from UEFI (bsc#1227149). * wifi: iwlwifi: read ECKV table from UEFI (bsc#1227149). * wifi: iwlwifi: read PPAG table from UEFI (bsc#1227149). * wifi: iwlwifi: read SAR tables from UEFI (bsc#1227149). * wifi: iwlwifi: read SPLC from UEFI (bsc#1227149). * wifi: iwlwifi: read WRDD table from UEFI (bsc#1227149). * wifi: iwlwifi: read WTAS table from UEFI (bsc#1227149). * wifi: iwlwifi: read mac step from aux register (bsc#1227149). * wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes). * wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes). * wifi: iwlwifi: refactor RX tracing (bsc#1227149). * wifi: iwlwifi: remove 'def_rx_queue' struct member (bsc#1227149). * wifi: iwlwifi: remove Gl A-step remnants (bsc#1227149). * wifi: iwlwifi: remove WARN from read_mem32() (bsc#1227149). * wifi: iwlwifi: remove async command callback (bsc#1227149). * wifi: iwlwifi: remove dead-code (bsc#1227149). * wifi: iwlwifi: remove extra kernel-doc (bsc#1227149). * wifi: iwlwifi: remove memory check for LMAC error address (bsc#1227149). * wifi: iwlwifi: remove retry loops in start (bsc#1227149). * wifi: iwlwifi: remove unused function prototype (bsc#1227149). * wifi: iwlwifi: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: iwlwifi: return negative -EINVAL instead of positive EINVAL (bsc#1227149). * wifi: iwlwifi: rfi: use a single DSM function for all RFI configurations (bsc#1227149). * wifi: iwlwifi: send EDT table to FW (bsc#1227149). * wifi: iwlwifi: separate TAS 'read-from-BIOS' and 'send-to-FW' flows (bsc#1227149). * wifi: iwlwifi: simplify getting DSM from ACPI (bsc#1227149). * wifi: iwlwifi: skip affinity setting on non-SMP (bsc#1227149). * wifi: iwlwifi: skip opmode start retries on dead transport (bsc#1227149). * wifi: iwlwifi: small cleanups in PPAG table flows (bsc#1227149). * wifi: iwlwifi: support link command version 2 (bsc#1227149). * wifi: iwlwifi: support link id in SESSION_PROTECTION_NOTIF (bsc#1227149). * wifi: iwlwifi: support link_id in SESSION_PROTECTION cmd (bsc#1227149). * wifi: iwlwifi: take SGOM and UATS code out of ACPI ifdef (bsc#1227149). * wifi: iwlwifi: take send-DSM-to-FW flows out of ACPI ifdef (bsc#1227149). * wifi: iwlwifi: trace full frames with TX status request (bsc#1227149). * wifi: iwlwifi: update context info structure definitions (bsc#1227149). * wifi: iwlwifi: use system_unbound_wq for debug dump (bsc#1227149). * wifi: iwlwifi: validate PPAG table when sent to FW (bsc#1227149). * wifi: lib80211: remove unused variables iv32 and iv16 (bsc#1227149). * wifi: libertas: Follow renaming of SPI "master" to "controller" (bsc#1227149). * wifi: libertas: add missing calls to cancel_work_sync() (bsc#1227149). * wifi: libertas: cleanup SDIO reset (bsc#1227149). * wifi: libertas: handle possible spu_write_u16() errors (bsc#1227149). * wifi: libertas: prefer kstrtoX() for simple integer conversions (bsc#1227149). * wifi: libertas: simplify list operations in free_if_spi_card() (bsc#1227149). * wifi: libertas: use convenient lists to manage SDIO packets (bsc#1227149). * wifi: mac80211: Add __counted_by for struct ieee802_11_elems and use struct_size() (bsc#1227149). * wifi: mac80211: Avoid address calculations via out of bounds array indexing (stable-fixes). * wifi: mac80211: Check if we had first beacon with relevant links (bsc#1227149). * wifi: mac80211: Do not force off-channel for management Tx with MLO (bsc#1227149). * wifi: mac80211: Do not include crypto/algapi.h (bsc#1227149). * wifi: mac80211: Extend support for scanning while MLO connected (bsc#1227149). * wifi: mac80211: Fix SMPS handling in the context of MLO (bsc#1227149). * wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git- fixes). * wifi: mac80211: Notify the low level driver on change in MLO valid links (bsc#1227149). * wifi: mac80211: Print local link address during authentication (bsc#1227149). * wifi: mac80211: Recalc offload when monitor stop (git-fixes). * wifi: mac80211: Remove unused function declarations (bsc#1227149). * wifi: mac80211: Rename and update IEEE80211_VIF_DISABLE_SMPS_OVERRIDE (bsc#1227149). * wifi: mac80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: mac80211: Sanity check tx bitrate if not provided by driver (bsc#1227149). * wifi: mac80211: Schedule regulatory channels check on bandwith change (bsc#1227149). * wifi: mac80211: Skip association timeout update after comeback rejection (bsc#1227149). * wifi: mac80211: add a driver callback to add vif debugfs (bsc#1227149). * wifi: mac80211: add a driver callback to check active_links (bsc#1227149). * wifi: mac80211: add a flag to disallow puncturing (bsc#1227149). * wifi: mac80211: add back SPDX identifier (bsc#1227149). * wifi: mac80211: add ieee80211_tdls_sta_link_id() (stable-fixes). * wifi: mac80211: add link id to ieee80211_gtk_rekey_add() (bsc#1227149). * wifi: mac80211: add link id to mgd_prepare_tx() (bsc#1227149). * wifi: mac80211: add more ops assertions (bsc#1227149). * wifi: mac80211: add more warnings about inserting sta info (bsc#1227149). * wifi: mac80211: add support for SPP A-MSDUs (bsc#1227149). * wifi: mac80211: add support for mld in ieee80211_chswitch_done (bsc#1227149). * wifi: mac80211: add support for parsing TID to Link mapping element (bsc#1227149). * wifi: mac80211: add/remove driver debugfs entries as appropriate (bsc#1227149). * wifi: mac80211: additions to change_beacon() (bsc#1227149). * wifi: mac80211: address some kerneldoc warnings (bsc#1227149). * wifi: mac80211: allow 64-bit radiotap timestamps (bsc#1227149). * wifi: mac80211: allow for_each_sta_active_link() under RCU (bsc#1227149). * wifi: mac80211: apply mcast rate only if interface is up (stable-fixes). * wifi: mac80211: cancel multi-link reconf work on disconnect (git-fixes). * wifi: mac80211: chanctx emulation set CHANGE_CHANNEL when in_reconfig (git- fixes). * wifi: mac80211: check EHT/TTLM action frame length (bsc#1227149). * wifi: mac80211: check wiphy mutex in ops (bsc#1227149). * wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable- fixes). * wifi: mac80211: clean up assignments to pointer cache (stable-fixes). * wifi: mac80211: cleanup airtime arithmetic with ieee80211_sta_keep_active() (bsc#1227149). * wifi: mac80211: cleanup auth_data only if association continues (bsc#1227149). * wifi: mac80211: convert A-MPDU work to wiphy work (bsc#1227149). * wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git- fixes). * wifi: mac80211: correctly set active links upon TTLM (bsc#1227149). * wifi: mac80211: correcty limit wider BW TDLS STAs (git-fixes). * wifi: mac80211: debugfs: lock wiphy instead of RTNL (bsc#1227149). * wifi: mac80211: describe return values in kernel-doc (bsc#1227149). * wifi: mac80211: disable softirqs for queued frame handling (git-fixes). * wifi: mac80211: do not connect to an AP while it's in a CSA process (bsc#1227149). * wifi: mac80211: do not re-add debugfs entries during resume (bsc#1227149). * wifi: mac80211: do not select link ID if not provided in scan request (bsc#1227149). * wifi: mac80211: do not set ESS capab bit in assoc request (bsc#1227149). * wifi: mac80211: do not use rate mask for scanning (stable-fixes). * wifi: mac80211: drop robust action frames before assoc (bsc#1227149). * wifi: mac80211: drop spurious WARN_ON() in ieee80211_ibss_csa_beacon() (bsc#1227149). * wifi: mac80211: ensure beacon is non-S1G prior to extracting the beacon timestamp field (stable-fixes). * wifi: mac80211: ethtool: always hold wiphy mutex (bsc#1227149). * wifi: mac80211: ethtool: hold wiphy mutex (bsc#1227149). * wifi: mac80211: expand __ieee80211_data_to_8023() status (bsc#1227149). * wifi: mac80211: extend wiphy lock in interface removal (bsc#1227149). * wifi: mac80211: fix BA session teardown race (bsc#1227149). * wifi: mac80211: fix BSS_CHANGED_UNSOL_BCAST_PROBE_RESP (bsc#1227149). * wifi: mac80211: fix SMPS status handling (bsc#1227149). * wifi: mac80211: fix TXQ error path and cleanup (bsc#1227149). * wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes). * wifi: mac80211: fix a expired vs. cancel race in roc (bsc#1227149). * wifi: mac80211: fix advertised TTLM scheduling (bsc#1227149). * wifi: mac80211: fix another key installation error path (bsc#1227149). * wifi: mac80211: fix change_address deadlock during unregister (bsc#1227149). * wifi: mac80211: fix channel switch link data (bsc#1227149). * wifi: mac80211: fix driver debugfs for vif type change (bsc#1227149). * wifi: mac80211: fix error path key leak (bsc#1227149). * wifi: mac80211: fix header kernel-doc typos (bsc#1227149). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mac80211: fix ieee80211_drop_unencrypted_mgmt return type/value (bsc#1227149). * wifi: mac80211: fix monitor channel with chanctx emulation (bsc#1227149). * wifi: mac80211: fix potential key leak (bsc#1227149). * wifi: mac80211: fix prep_connection error path (stable-fixes). * wifi: mac80211: fix spelling typo in comment (bsc#1227149). * wifi: mac80211: fix unaligned le16 access (git-fixes). * wifi: mac80211: fix unsolicited broadcast probe config (bsc#1227149). * wifi: mac80211: fix various kernel-doc issues (bsc#1227149). * wifi: mac80211: fixes in FILS discovery updates (bsc#1227149). * wifi: mac80211: flush STA queues on unauthorization (bsc#1227149). * wifi: mac80211: flush wiphy work where appropriate (bsc#1227149). * wifi: mac80211: handle debugfs when switching to/from MLO (bsc#1227149). * wifi: mac80211: handle tasklet frames before stopping (stable-fixes). * wifi: mac80211: hold wiphy lock in netdev/link debugfs (bsc#1227149). * wifi: mac80211: hold wiphy_lock around concurrency checks (bsc#1227149). * wifi: mac80211: improve CSA/ECSA connection refusal (bsc#1227149). * wifi: mac80211: initialize SMPS mode correctly (bsc#1227149). * wifi: mac80211: lock wiphy for aggregation debugfs (bsc#1227149). * wifi: mac80211: lock wiphy in IP address notifier (bsc#1227149). * wifi: mac80211: make mgd_protect_tdls_discover MLO-aware (bsc#1227149). * wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes). * wifi: mac80211: mesh: Remove unused function declaration mesh_ids_set_default() (bsc#1227149). * wifi: mac80211: mesh: fix some kdoc warnings (bsc#1227149). * wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes). * wifi: mac80211: move CSA finalize to wiphy work (bsc#1227149). * wifi: mac80211: move DFS CAC work to wiphy work (bsc#1227149). * wifi: mac80211: move TDLS work to wiphy work (bsc#1227149). * wifi: mac80211: move color change finalize to wiphy work (bsc#1227149). * wifi: mac80211: move dynamic PS to wiphy work (bsc#1227149). * wifi: mac80211: move filter reconfig to wiphy work (bsc#1227149). * wifi: mac80211: move key tailroom work to wiphy work (bsc#1227149). * wifi: mac80211: move link activation work to wiphy work (bsc#1227149). * wifi: mac80211: move monitor work to wiphy work (bsc#1227149). * wifi: mac80211: move tspec work to wiphy work (bsc#1227149). * wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable- fixes). * wifi: mac80211: process and save negotiated TID to Link mapping request (bsc#1227149). * wifi: mac80211: purge TX queues in flush_queues flow (bsc#1227149). * wifi: mac80211: reduce iflist_mtx (bsc#1227149). * wifi: mac80211: reject MLO channel configuration if not supported (bsc#1227149). * wifi: mac80211: relax RCU check in for_each_vif_active_link() (bsc#1227149). * wifi: mac80211: remove RX_DROP_UNUSABLE (bsc#1227149). * wifi: mac80211: remove ampdu_mlme.mtx (bsc#1227149). * wifi: mac80211: remove chanctx_mtx (bsc#1227149). * wifi: mac80211: remove key_mtx (bsc#1227149). * wifi: mac80211: remove link before AP (git-fixes). * wifi: mac80211: remove local->mtx (bsc#1227149). * wifi: mac80211: remove redundant ML element check (bsc#1227149). * wifi: mac80211: remove shifted rate support (bsc#1227149). * wifi: mac80211: remove sta_mtx (bsc#1227149). * wifi: mac80211: remove unnecessary struct forward declaration (bsc#1227149). * wifi: mac80211: rename ieee80211_tx_status() to ieee80211_tx_status_skb() (bsc#1227149). * wifi: mac80211: rename struct cfg80211_rx_assoc_resp to cfg80211_rx_assoc_resp_data (bsc#1227149). * wifi: mac80211: report per-link error during association (bsc#1227149). * wifi: mac80211: reset negotiated TTLM on disconnect (git-fixes). * wifi: mac80211: rework RX timestamp flags (bsc#1227149). * wifi: mac80211: rework ack_frame_id handling a bit (bsc#1227149). * wifi: mac80211: rx.c: fix sentence grammar (bsc#1227149). * wifi: mac80211: set wiphy for virtual monitors (bsc#1227149). * wifi: mac80211: simplify non-chanctx drivers (bsc#1227149). * wifi: mac80211: split ieee80211_drop_unencrypted_mgmt() return value (bsc#1227149). * wifi: mac80211: sta_info.c: fix sentence grammar (bsc#1227149). * wifi: mac80211: support antenna control in injection (bsc#1227149). * wifi: mac80211: support handling of advertised TID-to-link mapping (bsc#1227149). * wifi: mac80211: take MBSSID/EHT data also from probe resp (bsc#1227149). * wifi: mac80211: take wiphy lock for MAC addr change (bsc#1227149). * wifi: mac80211: tx: clarify conditions in if statement (bsc#1227149). * wifi: mac80211: update beacon counters per link basis (bsc#1227149). * wifi: mac80211: update some locking documentation (bsc#1227149). * wifi: mac80211: update the rx_chains after set_antenna() (bsc#1227149). * wifi: mac80211: use bandwidth indication element for CSA (bsc#1227149). * wifi: mac80211: use deflink and fix typo in link ID check (bsc#1227149). * wifi: mac80211: use wiphy locked debugfs for sdata/link (bsc#1227149). * wifi: mac80211: use wiphy locked debugfs helpers for agg_status (bsc#1227149). * wifi: mac80211_hwsim: init peer measurement result (git-fixes). * wifi: mt7601u: delete dead code checking debugfs returns (bsc#1227149). * wifi: mt7601u: replace strlcpy() with strscpy() (bsc#1227149). * wifi: mt76: Annotate struct mt76_rx_tid with __counted_by (bsc#1227149). * wifi: mt76: Convert to platform remove callback returning void (bsc#1227149). * wifi: mt76: Remove redundant assignment to variable tidno (bsc#1227149). * wifi: mt76: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: mt76: Replace strlcpy() with strscpy() (bsc#1227149). * wifi: mt76: Use PTR_ERR_OR_ZERO() to simplify code (bsc#1227149). * wifi: mt76: add DMA mapping error check in mt76_alloc_txwi() (bsc#1227149). * wifi: mt76: add ability to explicitly forbid LED registration with DT (bsc#1227149). * wifi: mt76: add support for providing eeprom in nvmem cells (bsc#1227149). * wifi: mt76: add tx_nss histogram to ethtool stats (bsc#1227149). * wifi: mt76: change txpower init to per-phy (bsc#1227149). * wifi: mt76: check sta rx control frame to multibss capability (bsc#1227149). * wifi: mt76: check txs format before getting skb by pid (bsc#1227149). * wifi: mt76: check vif type before reporting cca and csa (bsc#1227149). * wifi: mt76: connac: add MBSSID support for mt7996 (bsc#1227149). * wifi: mt76: connac: add beacon duplicate TX mode support for mt7996 (bsc#1227149). * wifi: mt76: connac: add beacon protection support for mt7996 (bsc#1227149). * wifi: mt76: connac: add connac3 mac library (bsc#1227149). * wifi: mt76: connac: add data field in struct tlv (bsc#1227149). * wifi: mt76: connac: add eht support for phy mode config (bsc#1227149). * wifi: mt76: connac: add eht support for tx power (bsc#1227149). * wifi: mt76: connac: add firmware support for mt7992 (bsc#1227149). * wifi: mt76: connac: add more unified command IDs (bsc#1227149). * wifi: mt76: connac: add more unified event IDs (bsc#1227149). * wifi: mt76: connac: add new definition of tx descriptor (bsc#1227149). * wifi: mt76: connac: add support for dsp firmware download (bsc#1227149). * wifi: mt76: connac: add support to set ifs time by mcu command (bsc#1227149). * wifi: mt76: connac: add thermal protection support for mt7996 (bsc#1227149). * wifi: mt76: connac: check for null before dereferencing (bsc#1227149). * wifi: mt76: connac: export functions for mt7925 (bsc#1227149). * wifi: mt76: connac: introduce helper for mt7925 chipset (bsc#1227149). * wifi: mt76: connac: set correct muar_idx for mt799x chipsets (bsc#1227149). * wifi: mt76: connac: set fixed_bw bit in TX descriptor for fixed rate frames (bsc#1227149). * wifi: mt76: connac: use muar idx 0xe for non-mt799x as well (bsc#1227149). * wifi: mt76: disable HW AMSDU when using fixed rate (bsc#1227149). * wifi: mt76: dma: introduce __mt76_dma_queue_reset utility routine (bsc#1227149). * wifi: mt76: enable UNII-4 channel 177 support (bsc#1227149). * wifi: mt76: fix race condition related to checking tx queue fill status (bsc#1227149). * wifi: mt76: fix the issue of missing txpwr settings from ch153 to ch177 (bsc#1227149). * wifi: mt76: fix typo in mt76_get_of_eeprom_from_nvmem function (bsc#1227149). * wifi: mt76: increase MT_QFLAG_WED_TYPE size (bsc#1227149). * wifi: mt76: introduce mt76_queue_is_wed_tx_free utility routine (bsc#1227149). * wifi: mt76: introduce wed pointer in mt76_queue (bsc#1227149). * wifi: mt76: limit support of precal loading for mt7915 to MTD only (bsc#1227149). * wifi: mt76: make mt76_get_of_eeprom static again (bsc#1227149). * wifi: mt76: mmio: move mt76_mmio_wed_{init,release}_rx_buf in common code (bsc#1227149). * wifi: mt76: move ampdu_state in mt76_wcid (bsc#1227149). * wifi: mt76: move mt76_mmio_wed_offload_{enable,disable} in common code (bsc#1227149). * wifi: mt76: move mt76_net_setup_tc in common code (bsc#1227149). * wifi: mt76: move rate info in mt76_vif (bsc#1227149). * wifi: mt76: move wed reset common code in mt76 module (bsc#1227149). * wifi: mt76: mt7603: add missing register initialization for MT7628 (bsc#1227149). * wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes). * wifi: mt76: mt7603: disable A-MSDU tx support on MT7628 (bsc#1227149). * wifi: mt76: mt7603: fix beacon interval after disabling a single vif (bsc#1227149). * wifi: mt76: mt7603: fix tx filter/flush function (bsc#1227149). * wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes). * wifi: mt76: mt7603: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7603: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7615: add missing chanctx ops (bsc#1227149). * wifi: mt76: mt7615: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149). * wifi: mt76: mt7615: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7615: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt76_connac3: move lmac queue enumeration in mt76_connac3_mac.h (bsc#1227149). * wifi: mt76: mt76x02: fix return value check in mt76x02_mac_process_rx (bsc#1227149). * wifi: mt76: mt76x2u: add netgear wdna3100v3 to device table (bsc#1227149). * wifi: mt76: mt7915 add tc offloading support (bsc#1227149). * wifi: mt76: mt7915: accumulate mu-mimo ofdma muru stats (bsc#1227149). * wifi: mt76: mt7915: add locking for accessing mapped registers (bsc#1227149). * wifi: mt76: mt7915: add missing chanctx ops (bsc#1227149). * wifi: mt76: mt7915: add support for MT7981 (bsc#1227149). * wifi: mt76: mt7915: also MT7981 is 3T3R but nss2 on 5 GHz band (bsc#1227149). * wifi: mt76: mt7915: disable WFDMA Tx/Rx during SER recovery (bsc#1227149). * wifi: mt76: mt7915: drop return in mt7915_sta_statistics (bsc#1227149). * wifi: mt76: mt7915: fix EEPROM offset of TSSI flag on MT7981 (bsc#1227149). * wifi: mt76: mt7915: fix error recovery with WED enabled (bsc#1227149). * wifi: mt76: mt7915: fix monitor mode issues (bsc#1227149). * wifi: mt76: mt7915: move mib_stats structure in mt76.h (bsc#1227149). * wifi: mt76: mt7915: move poll_list in mt76_wcid (bsc#1227149). * wifi: mt76: mt7915: move sta_poll_list and sta_poll_lock in mt76_dev (bsc#1227149). * wifi: mt76: mt7915: report tx retries/failed counts for non-WED path (bsc#1227149). * wifi: mt76: mt7915: update mpdu density capability (bsc#1227149). * wifi: mt76: mt7915: update mt798x_wmac_adie_patch_7976 (bsc#1227149). * wifi: mt76: mt7915: workaround too long expansion sparse warnings (git- fixes). * wifi: mt76: mt7921: Support temp sensor (bsc#1227149). * wifi: mt76: mt7921: add 6GHz power type support for clc (bsc#1227149). * wifi: mt76: mt7921: convert acpisar and clc pointers to void (bsc#1227149). * wifi: mt76: mt7921: enable set txpower for UNII-4 (bsc#1227149). * wifi: mt76: mt7921: fix 6GHz disabled by the missing default CLC config (bsc#1227149). * wifi: mt76: mt7921: fix CLC command timeout when suspend/resume (bsc#1227149). * wifi: mt76: mt7921: fix a potential association failure upon resuming (bsc#1227149). * wifi: mt76: mt7921: fix kernel panic by accessing invalid 6GHz channel info (bsc#1227149). * wifi: mt76: mt7921: fix suspend issue on MediaTek COB platform (bsc#1227149). * wifi: mt76: mt7921: fix the unfinished command of regd_notifier before suspend (bsc#1227149). * wifi: mt76: mt7921: fix wrong 6Ghz power type (bsc#1227149). * wifi: mt76: mt7921: get regulatory information from the clc event (bsc#1227149). * wifi: mt76: mt7921: get rid of MT7921_RESET_TIMEOUT marco (bsc#1227149). * wifi: mt76: mt7921: make mt7921_mac_sta_poll static (bsc#1227149). * wifi: mt76: mt7921: move acpi_sar code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move common register definition in mt792x_regs.h (bsc#1227149). * wifi: mt76: mt7921: move connac nic capability handling to mt7921 (bsc#1227149). * wifi: mt76: mt7921: move debugfs shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move dma shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move hif_ops macro in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move init shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move mac shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move mt7921_dma_init in pci.c (bsc#1227149). * wifi: mt76: mt7921: move mt7921u_disconnect mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: move mt792x_hw_dev in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move mt792x_mutex_{acquire/release} in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move runtime-pm pci code in mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: move shared runtime-pm code on mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: reduce the size of MCU firmware download Rx queue (bsc#1227149). * wifi: mt76: mt7921: rely on mib_stats shared definition (bsc#1227149). * wifi: mt76: mt7921: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7921: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7921: remove macro duplication in regs.h (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_dev in mt792x_dev (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_hif_ops in mt792x_hif_ops (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_phy in mt792x_phy (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_sta in mt792x_sta (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_vif in mt792x_vif (bsc#1227149). * wifi: mt76: mt7921: support 5.9/6GHz channel config in acpi (bsc#1227149). * wifi: mt76: mt7921: update the channel usage when the regd domain changed (bsc#1227149). * wifi: mt76: mt7921e: report tx retries/failed counts in tx free event (bsc#1227149). * wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (stable- fixes). * wifi: mt76: mt7925: add Mediatek Wi-Fi7 driver for mt7925 chips (bsc#1227149). * wifi: mt76: mt7925: add flow to avoid chip bt function fail (bsc#1227149). * wifi: mt76: mt7925: add support to set ifs time by mcu command (bsc#1227149). * wifi: mt76: mt7925: ensure 4-byte alignment for suspend & wow command (bsc#1227149). * wifi: mt76: mt7925: fix SAP no beacon issue in 5Ghz and 6Ghz band (bsc#1227149). * wifi: mt76: mt7925: fix WoW failed in encrypted mode (bsc#1227149). * wifi: mt76: mt7925: fix connect to 80211b mode fail in 2Ghz band (bsc#1227149). * wifi: mt76: mt7925: fix fw download fail (bsc#1227149). * wifi: mt76: mt7925: fix mcu query command fail (bsc#1227149). * wifi: mt76: mt7925: fix the wrong data type for scan command (bsc#1227149). * wifi: mt76: mt7925: fix the wrong header translation config (bsc#1227149). * wifi: mt76: mt7925: fix typo in mt7925_init_he_caps (bsc#1227149). * wifi: mt76: mt7925: fix wmm queue mapping (bsc#1227149). * wifi: mt76: mt7925: remove iftype from mt7925_init_eht_caps signature (bsc#1227149). * wifi: mt76: mt7925: support temperature sensor (bsc#1227149). * wifi: mt76: mt7925: update PCIe DMA settings (bsc#1227149). * wifi: mt76: mt7925e: fix use-after-free in free_irq() (bsc#1227149). * wifi: mt76: mt792x: add the illegal value check for mtcl table of acpi (bsc#1227149). * wifi: mt76: mt792x: fix ethtool warning (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x-lib module (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x-usb module (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x_irq_map (bsc#1227149). * wifi: mt76: mt792x: move MT7921_PM_TIMEOUT and MT7921_HW_SCAN_TIMEOUT in common code (bsc#1227149). * wifi: mt76: mt792x: move more dma shared code in mt792x_dma (bsc#1227149). * wifi: mt76: mt792x: move mt7921_load_firmware in mt792x-lib module (bsc#1227149). * wifi: mt76: mt792x: move mt7921_skb_add_usb_sdio_hdr in mt792x module (bsc#1227149). * wifi: mt76: mt792x: move shared structure definition in mt792x.h (bsc#1227149). * wifi: mt76: mt792x: move some common usb code in mt792x module (bsc#1227149). * wifi: mt76: mt792x: support mt7925 chip init (bsc#1227149). * wifi: mt76: mt792x: update the country list of EU for ACPI SAR (bsc#1227149). * wifi: mt76: mt792xu: enable dmashdl support (bsc#1227149). * wifi: mt76: mt7996: Add mcu commands for getting sta tx statistic (bsc#1227149). * wifi: mt76: mt7996: Use DECLARE_FLEX_ARRAY() and fix -Warray-bounds warnings (bsc#1227149). * wifi: mt76: mt7996: add DMA support for mt7992 (bsc#1227149). * wifi: mt76: mt7996: add TX statistics for EHT mode in debugfs (bsc#1227149). * wifi: mt76: mt7996: add locking for accessing mapped registers (stable- fixes). * wifi: mt76: mt7996: add muru support (bsc#1227149). * wifi: mt76: mt7996: add sanity checks for background radar trigger (stable- fixes). * wifi: mt76: mt7996: add support for variants with auxiliary RX path (bsc#1227149). * wifi: mt76: mt7996: add thermal sensor device support (bsc#1227149). * wifi: mt76: mt7996: add txpower setting support (bsc#1227149). * wifi: mt76: mt7996: adjust WFDMA settings to improve performance (bsc#1227149). * wifi: mt76: mt7996: adjust interface num and wtbl size for mt7992 (bsc#1227149). * wifi: mt76: mt7996: align the format of fixed rate command (bsc#1227149). * wifi: mt76: mt7996: check txs format before getting skb by pid (bsc#1227149). * wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes). * wifi: mt76: mt7996: disable WFDMA Tx/Rx during SER recovery (bsc#1227149). * wifi: mt76: mt7996: drop return in mt7996_sta_statistics (bsc#1227149). * wifi: mt76: mt7996: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149). * wifi: mt76: mt7996: enable PPDU-TxS to host (bsc#1227149). * wifi: mt76: mt7996: enable VHT extended NSS BW feature (bsc#1227149). * wifi: mt76: mt7996: ensure 4-byte alignment for beacon commands (bsc#1227149). * wifi: mt76: mt7996: fix alignment of sta info event (bsc#1227149). * wifi: mt76: mt7996: fix fortify warning (bsc#1227149). * wifi: mt76: mt7996: fix fw loading timeout (bsc#1227149). * wifi: mt76: mt7996: fix mt7996_mcu_all_sta_info_event struct packing (bsc#1227149). * wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature (bsc#1227149). * wifi: mt76: mt7996: fix size of txpower MCU command (bsc#1227149). * wifi: mt76: mt7996: fix uninitialized variable in mt7996_irq_tasklet() (bsc#1227149). * wifi: mt76: mt7996: fix uninitialized variable in parsing txfree (bsc#1227149). * wifi: mt76: mt7996: get tx_retries and tx_failed from txfree (bsc#1227149). * wifi: mt76: mt7996: handle IEEE80211_RC_SMPS_CHANGED (bsc#1227149). * wifi: mt76: mt7996: increase tx token size (bsc#1227149). * wifi: mt76: mt7996: introduce mt7996_band_valid() (bsc#1227149). * wifi: mt76: mt7996: mark GCMP IGTK unsupported (bsc#1227149). * wifi: mt76: mt7996: move radio ctrl commands to proper functions (bsc#1227149). * wifi: mt76: mt7996: only set vif teardown cmds at remove interface (bsc#1227149). * wifi: mt76: mt7996: rely on mib_stats shared definition (bsc#1227149). * wifi: mt76: mt7996: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7996: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7996: remove TXS queue setting (bsc#1227149). * wifi: mt76: mt7996: remove periodic MPDU TXS request (bsc#1227149). * wifi: mt76: mt7996: rework ampdu params setting (bsc#1227149). * wifi: mt76: mt7996: rework register offsets for mt7992 (bsc#1227149). * wifi: mt76: mt7996: set DMA mask to 36 bits for boards with more than 4GB of RAM (bsc#1227149). * wifi: mt76: mt7996: support more options for mt7996_set_bitrate_mask() (bsc#1227149). * wifi: mt76: mt7996: support mt7992 eeprom loading (bsc#1227149). * wifi: mt76: mt7996: support per-band LED control (bsc#1227149). * wifi: mt76: mt7996: switch to mcu command for TX GI report (bsc#1227149). * wifi: mt76: mt7996: use u16 for val field in mt7996_mcu_set_rro signature (bsc#1227149). * wifi: mt76: permit to load precal from NVMEM cell for mt7915 (bsc#1227149). * wifi: mt76: permit to use alternative cell name to eeprom NVMEM load (bsc#1227149). * wifi: mt76: reduce spin_lock_bh held up in mt76_dma_rx_cleanup (bsc#1227149). * wifi: mt76: replace skb_put with skb_put_zero (stable-fixes). * wifi: mt76: report non-binding skb tx rate when WED is active (bsc#1227149). * wifi: mt76: set page_pool napi pointer for mmio devices (bsc#1227149). * wifi: mt76: split get_of_eeprom in subfunction (bsc#1227149). * wifi: mt76: usb: create a dedicated queue for psd traffic (bsc#1227149). * wifi: mt76: usb: store usb endpoint in mt76_queue (bsc#1227149). * wifi: mt76: use atomic iface iteration for pre-TBTT work (bsc#1227149). * wifi: mt76: use chainmask for power delta calculation (bsc#1227149). * wifi: mwifiex: Drop unused headers (bsc#1227149). * wifi: mwifiex: Fix interface type change (git-fixes). * wifi: mwifiex: Refactor 1-element array into flexible array in struct mwifiex_ie_types_chan_list_param_set (bsc#1227149). * wifi: mwifiex: Replace one-element array with flexible-array member in struct mwifiex_ie_types_rxba_sync (bsc#1227149). * wifi: mwifiex: Set WIPHY_FLAG_NETNS_OK flag (bsc#1227149). * wifi: mwifiex: Use default @max_active for workqueues (bsc#1227149). * wifi: mwifiex: Use helpers to check multicast addresses (bsc#1227149). * wifi: mwifiex: Use list_count_nodes() (bsc#1227149). * wifi: mwifiex: cleanup adapter data (bsc#1227149). * wifi: mwifiex: cleanup private data structures (bsc#1227149). * wifi: mwifiex: cleanup struct mwifiex_sdio_mpa_rx (bsc#1227149). * wifi: mwifiex: drop BUG_ON from TX paths (bsc#1227149). * wifi: mwifiex: fix comment typos in SDIO module (bsc#1227149). * wifi: mwifiex: followup PCIE and related cleanups (bsc#1227149). * wifi: mwifiex: handle possible mwifiex_write_reg() errors (bsc#1227149). * wifi: mwifiex: handle possible sscanf() errors (bsc#1227149). * wifi: mwifiex: mwifiex_process_sleep_confirm_resp(): remove unused priv variable (bsc#1227149). * wifi: mwifiex: prefer strscpy() over strlcpy() (bsc#1227149). * wifi: mwifiex: simplify PCIE write operations (bsc#1227149). * wifi: mwifiex: use MODULE_FIRMWARE to add firmware files metadata (bsc#1227149). * wifi: mwifiex: use cfg80211_ssid_eq() instead of mwifiex_ssid_cmp() (bsc#1227149). * wifi: mwifiex: use is_zero_ether_addr() instead of ether_addr_equal() (bsc#1227149). * wifi: mwifiex: use kstrtoX_from_user() in debugfs handlers (bsc#1227149). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * wifi: nl80211: Avoid address calculations via out of bounds array indexing (git-fixes). * wifi: nl80211: Extend del pmksa support for SAE and OWE security (bsc#1227149). * wifi: nl80211: Remove unused declaration nl80211_pmsr_dump_results() (bsc#1227149). * wifi: nl80211: additions to NL80211_CMD_SET_BEACON (bsc#1227149). * wifi: nl80211: allow reporting wakeup for unprot deauth/disassoc (bsc#1227149). * wifi: nl80211: do not free NULL coalescing rule (git-fixes). * wifi: nl80211: fixes to FILS discovery updates (bsc#1227149). * wifi: nl80211: refactor nl80211_send_mlme_event() arguments (bsc#1227149). * wifi: p54: Add missing MODULE_FIRMWARE macro (bsc#1227149). * wifi: p54: Annotate struct p54_cal_database with __counted_by (bsc#1227149). * wifi: p54: fix GCC format truncation warning with wiphy->fw_version (bsc#1227149). * wifi: plfxlc: Drop unused include (bsc#1227149). * wifi: radiotap: add bandwidth definition of EHT U-SIG (bsc#1227149). * wifi: remove unused argument of ieee80211_get_tdls_action() (bsc#1227149). * wifi: rsi: fix restricted __le32 degrades to integer sparse warnings (bsc#1227149). * wifi: rsi: rsi_91x_coex: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_debugfs: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_hal: Remove unnecessary conversions (bsc#1227149). * wifi: rsi: rsi_91x_mac80211: Remove unnecessary conversions (bsc#1227149). * wifi: rsi: rsi_91x_main: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_sdio: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_sdio_ops: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_usb: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_usb_ops: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rt2x00: Simplify bool conversion (bsc#1227149). * wifi: rt2x00: correct MAC_SYS_CTRL register RX mask in R-Calibration (bsc#1227149). * wifi: rt2x00: disable RTS threshold for rt2800 by default (bsc#1227149). * wifi: rt2x00: fix MT7620 low RSSI issue (bsc#1227149). * wifi: rt2x00: fix rt2800 watchdog function (bsc#1227149). * wifi: rt2x00: fix the typo in comments (bsc#1227149). * wifi: rt2x00: improve MT7620 register initialization (bsc#1227149). * wifi: rt2x00: introduce DMA busy check watchdog for rt2800 (bsc#1227149). * wifi: rt2x00: limit MT7620 TX power based on eeprom calibration (bsc#1227149). * wifi: rt2x00: make watchdog param per device (bsc#1227149). * wifi: rt2x00: remove redundant check if u8 array element is less than zero (bsc#1227149). * wifi: rt2x00: remove useless code in rt2x00queue_create_tx_descriptor() (bsc#1227149). * wifi: rt2x00: rework MT7620 PA/LNA RF calibration (bsc#1227149). * wifi: rt2x00: rework MT7620 channel config function (bsc#1227149). * wifi: rt2x00: silence sparse warnings (bsc#1227149). * wifi: rt2x00: simplify rt2x00crypto_rx_insert_iv() (bsc#1227149). * wifi: rtl8xxxu: 8188e: convert usage of priv->vif to priv->vifs[0] (bsc#1227149). * wifi: rtl8xxxu: 8188f: Limit TX power index (git-fixes). * wifi: rtl8xxxu: Actually use macid in rtl8xxxu_gen2_report_connect (bsc#1227149). * wifi: rtl8xxxu: Add TP-Link TL-WN823N V2 (bsc#1227149). * wifi: rtl8xxxu: Add a description about the device ID 0x7392:0xb722 (bsc#1227149). * wifi: rtl8xxxu: Add beacon functions (bsc#1227149). * wifi: rtl8xxxu: Add parameter force to rtl8xxxu_refresh_rate_mask (bsc#1227149). * wifi: rtl8xxxu: Add parameter macid to update_rate_mask (bsc#1227149). * wifi: rtl8xxxu: Add parameter role to report_connect (bsc#1227149). * wifi: rtl8xxxu: Add set_tim() callback (bsc#1227149). * wifi: rtl8xxxu: Add sta_add() and sta_remove() callbacks (bsc#1227149). * wifi: rtl8xxxu: Add start_ap() callback (bsc#1227149). * wifi: rtl8xxxu: Allow creating interface in AP mode (bsc#1227149). * wifi: rtl8xxxu: Allow setting rts threshold to -1 (bsc#1227149). * wifi: rtl8xxxu: Clean up filter configuration (bsc#1227149). * wifi: rtl8xxxu: Declare AP mode support for 8188f (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8192EU (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8710BU (RTL8188GU) (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8723BU (bsc#1227149). * wifi: rtl8xxxu: Enable hw seq for mgmt/non-QoS data frames (bsc#1227149). * wifi: rtl8xxxu: Fix LED control code of RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: Fix off by one initial RTS rate (bsc#1227149). * wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes). * wifi: rtl8xxxu: Put the macid in txdesc (bsc#1227149). * wifi: rtl8xxxu: Remove usage of ieee80211_get_tx_rate() (bsc#1227149). * wifi: rtl8xxxu: Remove usage of tx_info->control.rates[0].flags (bsc#1227149). * wifi: rtl8xxxu: Rename some registers (bsc#1227149). * wifi: rtl8xxxu: Select correct queue for beacon frames (bsc#1227149). * wifi: rtl8xxxu: Set maximum number of supported stations (bsc#1227149). * wifi: rtl8xxxu: Support USB RX aggregation for the newer chips (bsc#1227149). * wifi: rtl8xxxu: Support new chip RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: add hw crypto support for AP mode (bsc#1227149). * wifi: rtl8xxxu: add macids for STA mode (bsc#1227149). * wifi: rtl8xxxu: add missing number of sec cam entries for all variants (bsc#1227149). * wifi: rtl8xxxu: check vif before using in rtl8xxxu_tx() (bsc#1227149). * wifi: rtl8xxxu: convert EN_DESC_ID of TX descriptor to le32 type (bsc#1227149). * wifi: rtl8xxxu: declare concurrent mode support for 8188f (bsc#1227149). * wifi: rtl8xxxu: do not parse CFO, if both interfaces are connected in STA mode (bsc#1227149). * wifi: rtl8xxxu: enable MFP support with security flag of RX descriptor (bsc#1227149). * wifi: rtl8xxxu: enable channel switch support (bsc#1227149). * wifi: rtl8xxxu: extend check for matching bssid to both interfaces (bsc#1227149). * wifi: rtl8xxxu: extend wifi connected check to both interfaces (bsc#1227149). * wifi: rtl8xxxu: fix error messages (bsc#1227149). * wifi: rtl8xxxu: fix mixed declarations in rtl8xxxu_set_aifs() (bsc#1227149). * wifi: rtl8xxxu: make instances of iface limit and combination to be static const (bsc#1227149). * wifi: rtl8xxxu: make supporting AP mode only on port 0 transparent (bsc#1227149). * wifi: rtl8xxxu: mark TOTOLINK N150UA V5/N150UA-B as tested (bsc#1227149). * wifi: rtl8xxxu: prepare supporting two virtual interfaces (bsc#1227149). * wifi: rtl8xxxu: remove assignment of priv->vif in rtl8xxxu_bss_info_changed() (bsc#1227149). * wifi: rtl8xxxu: remove obsolete priv->vif (bsc#1227149). * wifi: rtl8xxxu: rtl8xxxu_rx_complete(): remove unnecessary return (bsc#1227149). * wifi: rtl8xxxu: support multiple interface in start_ap() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in bss_info_changed() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in configure_filter() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in set_aifs() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in update_beacon_work_callback() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in watchdog_callback() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in {add,remove}_interface() (bsc#1227149). * wifi: rtl8xxxu: support setting bssid register for multiple interfaces (bsc#1227149). * wifi: rtl8xxxu: support setting linktype for both interfaces (bsc#1227149). * wifi: rtl8xxxu: support setting mac address register for both interfaces (bsc#1227149). * wifi: rtl8xxxu: update rate mask per sta (bsc#1227149). * wifi: rtlwifi: Convert to use PCIe capability accessors (bsc#1227149). * wifi: rtlwifi: Ignore IEEE80211_CONF_CHANGE_RETRY_LIMITS (bsc#1227149). * wifi: rtlwifi: Remove bridge vendor/device ids (bsc#1227149). * wifi: rtlwifi: Remove rtl_intf_ops.read_efuse_byte (bsc#1227149). * wifi: rtlwifi: Remove unused PCI related defines and struct (bsc#1227149). * wifi: rtlwifi: Speed up firmware loading for USB (bsc#1227149). * wifi: rtlwifi: cleanup USB interface (bsc#1227149). * wifi: rtlwifi: cleanup few rtlxxx_tx_fill_desc() routines (bsc#1227149). * wifi: rtlwifi: cleanup few rtlxxxx_set_hw_reg() routines (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_hal (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_phy (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_ps_ctl (bsc#1227149). * wifi: rtlwifi: drop chk_switch_dmdp() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop fill_fake_txdesc() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop pre_fill_tx_bd_desc() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop unused const_amdpci_aspm (bsc#1227149). * wifi: rtlwifi: remove misused flag from HAL data (bsc#1227149). * wifi: rtlwifi: remove unreachable code in rtl92d_dm_check_edca_turbo() (bsc#1227149). * wifi: rtlwifi: remove unused dualmac control leftovers (bsc#1227149). * wifi: rtlwifi: remove unused timer and related code (bsc#1227149). * wifi: rtlwifi: rtl8192cu: Fix 2T2R chip type detection (bsc#1227149). * wifi: rtlwifi: rtl8192cu: Fix TX aggregation (bsc#1227149). * wifi: rtlwifi: rtl8192de: Do not read register in _rtl92de_query_rxphystatus (bsc#1227149). * wifi: rtlwifi: rtl8192de: Fix 5 GHz TX power (stable-fixes). * wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes). * wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes). * wifi: rtlwifi: rtl8723: Remove unused function rtl8723_cmd_send_packet() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Access full PMCS reg and use pci_regs.h (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Add pdev into _rtl8821ae_clear_pci_pme_status() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Remove unnecessary PME_Status bit set (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Reverse PM Capability exists check (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Use pci_find_capability() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: phy: remove some useless code (bsc#1227149). * wifi: rtlwifi: rtl8821ae: phy: using calculate_bit_shift() (bsc#1227149). * wifi: rtlwifi: rtl92ee_dm_dynamic_primary_cca_check(): fix typo in function name (bsc#1227149). * wifi: rtlwifi: rtl_usb: Store the endpoint addresses (bsc#1227149). * wifi: rtlwifi: rtl_usb: Use sync register writes (bsc#1227149). * wifi: rtlwifi: set initial values for unexpected cases of USB endpoint priority (bsc#1227149). * wifi: rtlwifi: simplify LED management (bsc#1227149). * wifi: rtlwifi: simplify TX command fill callbacks (bsc#1227149). * wifi: rtlwifi: simplify rtl_action_proc() and rtl_tx_agg_start() (bsc#1227149). * wifi: rtlwifi: use convenient list_count_nodes() (bsc#1227149). * wifi: rtlwifi: use eth_broadcast_addr() to assign broadcast address (bsc#1227149). * wifi: rtlwifi: use helper function rtl_get_hdr() (bsc#1227149). * wifi: rtlwifi: use unsigned long for bt_coexist_8723 timestamp (bsc#1227149). * wifi: rtlwifi: use unsigned long for rtl_bssid_entry timestamp (bsc#1227149). * wifi: rtw88: 8821c: tweak CCK TX filter setting for SRRC regulation (bsc#1227149). * wifi: rtw88: 8821c: update TX power limit to V67 (bsc#1227149). * wifi: rtw88: 8821cu: Fix connection failure (stable-fixes). * wifi: rtw88: 8822c: update TX power limit to V70 (bsc#1227149). * wifi: rtw88: 8822ce: refine power parameters for RFE type 5 (bsc#1227149). * wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes). * wifi: rtw88: Add support for the SDIO based RTL8723DS chipset (bsc#1227149). * wifi: rtw88: Fix AP mode incorrect DTIM behavior (bsc#1227149). * wifi: rtw88: Fix action frame transmission fail before association (bsc#1227149). * wifi: rtw88: Skip high queue in hci_flush (bsc#1227149). * wifi: rtw88: Stop high queue during scan (bsc#1227149). * wifi: rtw88: Use random MAC when efuse MAC invalid (bsc#1227149). * wifi: rtw88: add missing unwind goto for __rtw_download_firmware() (bsc#1227149). * wifi: rtw88: debug: add to check if debug mask is enabled (bsc#1227149). * wifi: rtw88: debug: remove wrapper of rtw_dbg() (bsc#1227149). * wifi: rtw88: dump firmware debug information in abnormal state (bsc#1227149). * wifi: rtw88: fix incorrect error codes in rtw_debugfs_copy_from_user (bsc#1227149). * wifi: rtw88: fix incorrect error codes in rtw_debugfs_set_* (bsc#1227149). * wifi: rtw88: fix not entering PS mode after AP stops (bsc#1227149). * wifi: rtw88: fix typo rtw8822cu_probe (bsc#1227149). * wifi: rtw88: process VO packets without workqueue to avoid PTK rekey failed (bsc#1227149). * wifi: rtw88: refine register based H2C command (bsc#1227149). * wifi: rtw88: regd: configure QATAR and UK (bsc#1227149). * wifi: rtw88: regd: update regulatory map to R64-R42 (bsc#1227149). * wifi: rtw88: remove unused USB bulkout size set (bsc#1227149). * wifi: rtw88: remove unused and set but unused leftovers (bsc#1227149). * wifi: rtw88: rtw8723d: Implement RTL8723DS (SDIO) efuse parsing (bsc#1227149). * wifi: rtw88: simplify __rtw_tx_work() (bsc#1227149). * wifi: rtw88: simplify vif iterators (bsc#1227149). * wifi: rtw88: use cfg80211_ssid_eq() instead of rtw_ssid_equal() (bsc#1227149). * wifi: rtw88: use kstrtoX_from_user() in debugfs handlers (bsc#1227149). * wifi: rtw88: use struct instead of macros to set TX desc (bsc#1227149). * wifi: rtw89: 52c: rfk: disable DPK during MCC (bsc#1227149). * wifi: rtw89: 52c: rfk: refine MCC channel info notification (bsc#1227149). * wifi: rtw89: 8851b: add 8851B basic chip_info (bsc#1227149). * wifi: rtw89: 8851b: add 8851be to Makefile and Kconfig (bsc#1227149). * wifi: rtw89: 8851b: add BT coexistence support function (bsc#1227149). * wifi: rtw89: 8851b: add DLE mem and HFC quota (bsc#1227149). * wifi: rtw89: 8851b: add MAC configurations to chip_info (bsc#1227149). * wifi: rtw89: 8851b: add NCTL post table (bsc#1227149). * wifi: rtw89: 8851b: add RF configurations (bsc#1227149). * wifi: rtw89: 8851b: add TX power related functions (bsc#1227149). * wifi: rtw89: 8851b: add basic power on function (bsc#1227149). * wifi: rtw89: 8851b: add set channel function (bsc#1227149). * wifi: rtw89: 8851b: add set_channel_rf() (bsc#1227149). * wifi: rtw89: 8851b: add support WoWLAN to 8851B (bsc#1227149). * wifi: rtw89: 8851b: add to parse efuse content (bsc#1227149). * wifi: rtw89: 8851b: add to read efuse version to recognize hardware version B (bsc#1227149). * wifi: rtw89: 8851b: configure CRASH_TRIGGER feature for 8851B (bsc#1227149). * wifi: rtw89: 8851b: configure GPIO according to RFE type (bsc#1227149). * wifi: rtw89: 8851b: configure to force 1 TX power value (bsc#1227149). * wifi: rtw89: 8851b: enable hw_scan support (bsc#1227149). * wifi: rtw89: 8851b: fill BB related capabilities to chip_info (bsc#1227149). * wifi: rtw89: 8851b: rfk: Fix spelling mistake KIP_RESOTRE -> KIP_RESTORE (bsc#1227149). * wifi: rtw89: 8851b: rfk: add AACK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add DACK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add DPK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add IQK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add LCK track (bsc#1227149). * wifi: rtw89: 8851b: rfk: add RCK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add RX DCK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add TSSI (bsc#1227149). * wifi: rtw89: 8851b: rfk: update IQK to version 0x8 (bsc#1227149). * wifi: rtw89: 8851b: update RF radio A parameters to R28 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R28 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R34 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R37 (bsc#1227149). * wifi: rtw89: 8851be: add 8851BE PCI entry and fill PCI capabilities (bsc#1227149). * wifi: rtw89: 8852b: fix definition of KIP register number (git-fixes). * wifi: rtw89: 8852b: update TX power tables to R35 (bsc#1227149). * wifi: rtw89: 8852b: update TX power tables to R36 (bsc#1227149). * wifi: rtw89: 8852c: Fix TSSI causes transmit power inaccuracy (bsc#1227149). * wifi: rtw89: 8852c: Update bandedge parameters for better performance (bsc#1227149). * wifi: rtw89: 8852c: add quirk to set PCI BER for certain platforms (bsc#1227149). * wifi: rtw89: 8852c: declare to support two chanctx (bsc#1227149). * wifi: rtw89: 8852c: read RX gain offset from efuse for 6GHz channels (bsc#1227149). * wifi: rtw89: 8852c: update RF radio A/B parameters to R63 (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (1 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (2 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (3 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R67 (bsc#1227149). * wifi: rtw89: 8922a: add 8922A basic chip info (bsc#1227149). * wifi: rtw89: 8922a: add BTG functions to assist BT coexistence to control TX/RX (bsc#1227149). * wifi: rtw89: 8922a: add NCTL pre-settings for WiFi 7 chips (bsc#1227149). * wifi: rtw89: 8922a: add RF read/write v2 (bsc#1227149). * wifi: rtw89: 8922a: add SER IMR tables (bsc#1227149). * wifi: rtw89: 8922a: add TX power related ops (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops related to BB init (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops to get thermal value (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::bb_preinit to enable BB before downloading firmware (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::cfg_txrx_path (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::rfk_hw_init (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::rfk_init_late to do initial RF calibrations later (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::{enable,disable}_bb_rf (bsc#1227149). * wifi: rtw89: 8922a: add coexistence helpers of SW grant (bsc#1227149). * wifi: rtw89: 8922a: add helper of set_channel (bsc#1227149). * wifi: rtw89: 8922a: add ieee80211_ops::hw_scan (bsc#1227149). * wifi: rtw89: 8922a: add more fields to beacon H2C command to support multi- links (bsc#1227149). * wifi: rtw89: 8922a: add power on/off functions (bsc#1227149). * wifi: rtw89: 8922a: add register definitions of H2C, C2H, page, RRSR and EDCCA (bsc#1227149). * wifi: rtw89: 8922a: add set_channel BB part (bsc#1227149). * wifi: rtw89: 8922a: add set_channel MAC part (bsc#1227149). * wifi: rtw89: 8922a: add set_channel RF part (bsc#1227149). * wifi: rtw89: 8922a: configure CRASH_TRIGGER FW feature (bsc#1227149). * wifi: rtw89: 8922a: correct register definition and merge IO for ctrl_nbtg_bt_tx() (bsc#1227149). * wifi: rtw89: 8922a: declare to support two chanctx (bsc#1227149). * wifi: rtw89: 8922a: dump MAC registers when SER occurs (bsc#1227149). * wifi: rtw89: 8922a: extend and add quota number (bsc#1227149). * wifi: rtw89: 8922a: hook handlers of TX/RX descriptors to chip_ops (bsc#1227149). * wifi: rtw89: 8922a: implement AP mode related reg for BE generation (bsc#1227149). * wifi: rtw89: 8922a: implement {stop,resume}_sch_tx and cfg_ppdu (bsc#1227149). * wifi: rtw89: 8922a: read efuse content from physical map (bsc#1227149). * wifi: rtw89: 8922a: read efuse content via efuse map struct from logic map (bsc#1227149). * wifi: rtw89: 8922a: rfk: implement chip_ops to call RF calibrations (bsc#1227149). * wifi: rtw89: 8922a: set RX gain along with set_channel operation (bsc#1227149). * wifi: rtw89: 8922a: set chip_ops FEM and GPIO to NULL (bsc#1227149). * wifi: rtw89: 8922a: set memory heap address for secure firmware (bsc#1227149). * wifi: rtw89: 8922a: update BA CAM number to 24 (bsc#1227149). * wifi: rtw89: 8922a: update the register used in DIG and the DIG flow (bsc#1227149). * wifi: rtw89: 8922ae: add 8922AE PCI entry and basic info (bsc#1227149). * wifi: rtw89: 8922ae: add v2 interrupt handlers for 8922AE (bsc#1227149). * wifi: rtw89: Add EHT rate mask as parameters of RA H2C command (bsc#1227149). * wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git- fixes). * wifi: rtw89: Fix clang -Wimplicit-fallthrough in rtw89_query_sar() (bsc#1227149). * wifi: rtw89: Introduce Time Averaged SAR (TAS) feature (bsc#1227149). * wifi: rtw89: Refine active scan behavior in 6 GHz (bsc#1227149). * wifi: rtw89: Set default CQM config if not present (bsc#1227149). * wifi: rtw89: TX power stuffs replace confusing naming of _max with _num (bsc#1227149). * wifi: rtw89: Update EHT PHY beamforming capability (bsc#1227149). * wifi: rtw89: acpi: process 6 GHz band policy from DSM (bsc#1227149). * wifi: rtw89: add C2H RA event V1 to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: add C2H event handlers of RFK log and report (bsc#1227149). * wifi: rtw89: add CFO XTAL registers field to support 8851B (bsc#1227149). * wifi: rtw89: add DBCC H2C to notify firmware the status (bsc#1227149). * wifi: rtw89: add EHT capabilities for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add EHT radiotap in monitor mode (bsc#1227149). * wifi: rtw89: add EVM and SNR statistics to debugfs (bsc#1227149). * wifi: rtw89: add EVM for antenna diversity (bsc#1227149). * wifi: rtw89: add H2C RA command V1 to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: add H2C command to download beacon frame for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add RSSI based antenna diversity (bsc#1227149). * wifi: rtw89: add RSSI statistics for the case of antenna diversity to debugfs (bsc#1227149). * wifi: rtw89: add XTAL SI for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add chip_info::chip_gen to determine chip generation (bsc#1227149). * wifi: rtw89: add chip_info::txwd_info size to generalize TX WD submit (bsc#1227149). * wifi: rtw89: add chip_ops::h2c_ba_cam() to configure BA CAM (bsc#1227149). * wifi: rtw89: add chip_ops::query_rxdesc() and rxd_len as helpers to support newer chips (bsc#1227149). * wifi: rtw89: add chip_ops::update_beacon to abstract update beacon operation (bsc#1227149). * wifi: rtw89: add firmware H2C command of BA CAM V1 (bsc#1227149). * wifi: rtw89: add firmware parser for v1 format (bsc#1227149). * wifi: rtw89: add firmware suit for BB MCU 0/1 (bsc#1227149). * wifi: rtw89: add function prototype for coex request duration (bsc#1227149). * wifi: rtw89: add mac_gen pointer to access mac port registers (bsc#1227149). * wifi: rtw89: add mlo_dbcc_mode for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add new H2C command to pause/sleep transmitting by MAC ID (bsc#1227149). * wifi: rtw89: add new H2C for PS mode in 802.11be chip (bsc#1227149). * wifi: rtw89: add reserved size as factor of DLE used size (bsc#1227149). * wifi: rtw89: add subband index of primary channel to struct rtw89_chan (bsc#1227149). * wifi: rtw89: add to display hardware rates v1 histogram in debugfs (bsc#1227149). * wifi: rtw89: add to fill TX descriptor for firmware command v2 (bsc#1227149). * wifi: rtw89: add to fill TX descriptor v2 (bsc#1227149). * wifi: rtw89: add to parse firmware elements of BB and RF tables (bsc#1227149). * wifi: rtw89: add to query RX descriptor format v2 (bsc#1227149). * wifi: rtw89: add tx_wake notify for 8851B (bsc#1227149). * wifi: rtw89: add wait/completion for abort scan (bsc#1227149). * wifi: rtw89: adjust init_he_cap() to add EHT cap into iftype_data (bsc#1227149). * wifi: rtw89: advertise missing extended scan feature (bsc#1227149). * wifi: rtw89: avoid stringop-overflow warning (bsc#1227149). * wifi: rtw89: call rtw89_chan_get() by vif chanctx if aware of vif (bsc#1227149). * wifi: rtw89: chan: MCC take reconfig into account (bsc#1227149). * wifi: rtw89: chan: add sub-entity swap function to cover replacing (bsc#1227149). * wifi: rtw89: chan: move handling from add/remove to assign/unassign for MLO (bsc#1227149). * wifi: rtw89: chan: support MCC on Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: chan: tweak bitmap recalc ahead before MLO (bsc#1227149). * wifi: rtw89: chan: tweak weight recalc ahead before MLO (bsc#1227149). * wifi: rtw89: change naming of BA CAM from V1 to V0_EXT (bsc#1227149). * wifi: rtw89: change qutoa to DBCC by default for WiFi 7 chips (bsc#1227149). * wifi: rtw89: change supported bandwidths of chip_info to bit mask (bsc#1227149). * wifi: rtw89: cleanup firmware elements parsing (bsc#1227149). * wifi: rtw89: cleanup private data structures (bsc#1227149). * wifi: rtw89: cleanup rtw89_iqk_info and related code (bsc#1227149). * wifi: rtw89: coex: Add Bluetooth RSSI level information (bsc#1227149). * wifi: rtw89: coex: Add Pre-AGC control to enhance Wi-Fi RX performance (bsc#1227149). * wifi: rtw89: coex: Add coexistence policy to decrease WiFi packet CRC-ERR (bsc#1227149). * wifi: rtw89: coex: Fix wrong Wi-Fi role info and FDDT parameter members (bsc#1227149). * wifi: rtw89: coex: Record down Wi-Fi initial mode information (bsc#1227149). * wifi: rtw89: coex: Reorder H2C command index to align with firmware (bsc#1227149). * wifi: rtw89: coex: Set Bluetooth scan low-priority when Wi-Fi link/scan (bsc#1227149). * wifi: rtw89: coex: Still show hardware grant signal info even Wi-Fi is PS (bsc#1227149). * wifi: rtw89: coex: To improve Wi-Fi performance while BT is idle (bsc#1227149). * wifi: rtw89: coex: Translate antenna configuration from ID to string (bsc#1227149). * wifi: rtw89: coex: Update BTG control related logic (bsc#1227149). * wifi: rtw89: coex: Update RF parameter control setting logic (bsc#1227149). * wifi: rtw89: coex: Update coexistence policy for Wi-Fi LPS (bsc#1227149). * wifi: rtw89: coex: When Bluetooth not available do not set power/gain (bsc#1227149). * wifi: rtw89: coex: add BTC ctrl_info version 7 and related logic (bsc#1227149). * wifi: rtw89: coex: add annotation __counted_by() for struct rtw89_btc_btf_set_slot_table (bsc#1227149). * wifi: rtw89: coex: add annotation __counted_by() to struct rtw89_btc_btf_set_mon_reg (bsc#1227149). * wifi: rtw89: coex: add init_info H2C command format version 7 (bsc#1227149). * wifi: rtw89: coex: add return value to ensure H2C command is success or not (bsc#1227149). * wifi: rtw89: coex: fix configuration for shared antenna for 8922A (bsc#1227149). * wifi: rtw89: coex: use struct assignment to replace memcpy() to append TDMA content (bsc#1227149). * wifi: rtw89: configure PPDU max user by chip (bsc#1227149). * wifi: rtw89: consider RX info for WiFi 7 chips (bsc#1227149). * wifi: rtw89: consolidate registers of mac port to struct (bsc#1227149). * wifi: rtw89: correct PHY register offset for PHY-1 (bsc#1227149). * wifi: rtw89: correct aSIFSTime for 6GHz band (stable-fixes). * wifi: rtw89: correct the DCFO tracking flow to improve CFO compensation (bsc#1227149). * wifi: rtw89: debug: add FW log component for scan (bsc#1227149). * wifi: rtw89: debug: add debugfs entry to disable dynamic mechanism (bsc#1227149). * wifi: rtw89: debug: add to check if debug mask is enabled (bsc#1227149). * wifi: rtw89: debug: remove wrapper of rtw89_debug() (bsc#1227149). * wifi: rtw89: debug: show txpwr table according to chip gen (bsc#1227149). * wifi: rtw89: debug: txpwr table access only valid page according to chip (bsc#1227149). * wifi: rtw89: debug: txpwr table supports Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: declare EXT NSS BW of VHT capability (bsc#1227149). * wifi: rtw89: declare MCC in interface combination (bsc#1227149). * wifi: rtw89: define hardware rate v1 for WiFi 7 chips (bsc#1227149). * wifi: rtw89: differentiate narrow_bw_ru_dis setting according to chip gen (bsc#1227149). * wifi: rtw89: disable RTS when broadcast/multicast (bsc#1227149). * wifi: rtw89: download firmware with five times retry (bsc#1227149). * wifi: rtw89: drop TIMING_BEACON_ONLY and sync beacon TSF by self (bsc#1227149). * wifi: rtw89: enlarge supported length of read_reg debugfs entry (bsc#1227149). * wifi: rtw89: extend PHY status parser to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: fix HW scan not aborting properly (git-fixes). * wifi: rtw89: fix HW scan timeout due to TSF sync issue (bsc#1227149). * wifi: rtw89: fix a width vs precision bug (bsc#1227149). * wifi: rtw89: fix disabling concurrent mode TX hang issue (bsc#1227149). * wifi: rtw89: fix misbehavior of TX beacon in concurrent mode (bsc#1227149). * wifi: rtw89: fix not entering PS mode after AP stops (bsc#1227149). * wifi: rtw89: fix null pointer access when abort scan (stable-fixes). * wifi: rtw89: fix spelling typo of IQK debug messages (bsc#1227149). * wifi: rtw89: fix typo of rtw89_fw_h2c_mcc_macid_bitmap() (bsc#1227149). * wifi: rtw89: fw: add H2C command to reset CMAC table for WiFi 7 (bsc#1227149). * wifi: rtw89: fw: add H2C command to reset DMAC table for WiFi 7 (bsc#1227149). * wifi: rtw89: fw: add H2C command to update security CAM v2 (bsc#1227149). * wifi: rtw89: fw: add checking type for variant type of firmware (bsc#1227149). * wifi: rtw89: fw: add chip_ops to update CMAC table to associated station (bsc#1227149). * wifi: rtw89: fw: add definition of H2C command and C2H event for MRC series (bsc#1227149). * wifi: rtw89: fw: add version field to BB MCU firmware element (bsc#1227149). * wifi: rtw89: fw: consider checksum length of security data (bsc#1227149). * wifi: rtw89: fw: download firmware with key data for secure boot (bsc#1227149). * wifi: rtw89: fw: extend JOIN H2C command to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: extend program counter dump for Wi-Fi 7 chip (bsc#1227149). * wifi: rtw89: fw: fill CMAC table to associated station for WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: generalize download firmware flow by mac_gen pointers (bsc#1227149). * wifi: rtw89: fw: implement MRC H2C command functions (bsc#1227149). * wifi: rtw89: fw: implement supported functions of download firmware for WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: load TX power track tables from fw_element (bsc#1227149). * wifi: rtw89: fw: move polling function of firmware path ready to an individual function (bsc#1227149). * wifi: rtw89: fw: parse secure section from firmware file (bsc#1227149). * wifi: rtw89: fw: propagate an argument include_bb for BB MCU firmware (bsc#1227149). * wifi: rtw89: fw: read firmware secure information from efuse (bsc#1227149). * wifi: rtw89: fw: refine download flow to support variant firmware suits (bsc#1227149). * wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (bsc#1227149). * wifi: rtw89: fw: update TX AMPDU parameter to CMAC table (bsc#1227149). * wifi: rtw89: fw: use struct to fill BA CAM H2C commands (bsc#1227149). * wifi: rtw89: fw: use struct to fill JOIN H2C command (bsc#1227149). * wifi: rtw89: get data rate mode/NSS/MCS v1 from RX descriptor (bsc#1227149). * wifi: rtw89: indicate TX power by rate table inside RFE parameter (bsc#1227149). * wifi: rtw89: indicate TX shape table inside RFE parameter (bsc#1227149). * wifi: rtw89: initialize antenna for antenna diversity (bsc#1227149). * wifi: rtw89: initialize multi-channel handling (bsc#1227149). * wifi: rtw89: introduce infrastructure of firmware elements (bsc#1227149). * wifi: rtw89: introduce realtek ACPI DSM method (bsc#1227149). * wifi: rtw89: introduce v1 format of firmware header (bsc#1227149). * wifi: rtw89: load BB parameters to PHY-1 (bsc#1227149). * wifi: rtw89: load RFK log format string from firmware file (bsc#1227149). * wifi: rtw89: load TX power by rate when RFE parms setup (bsc#1227149). * wifi: rtw89: load TX power related tables from FW elements (bsc#1227149). * wifi: rtw89: mac: Fix spelling mistakes "notfify" -> "notify" (bsc#1227149). * wifi: rtw89: mac: add coexistence helpers {cfg/get}_plt (bsc#1227149). * wifi: rtw89: mac: add feature_init to initialize BA CAM V1 (bsc#1227149). * wifi: rtw89: mac: add flags to check if CMAC and DMAC are enabled (bsc#1227149). * wifi: rtw89: mac: add mac_gen_def::band1_offset to map MAC band1 register address (bsc#1227149). * wifi: rtw89: mac: add registers of MU-EDCA parameters for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add suffix _ax to MAC functions (bsc#1227149). * wifi: rtw89: mac: add sys_init and filter option for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add to access efuse for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add to get DLE reserved quota (bsc#1227149). * wifi: rtw89: mac: check queue empty according to chip gen (bsc#1227149). * wifi: rtw89: mac: correct MUEDCA setting for MAC-1 (bsc#1227149). * wifi: rtw89: mac: define internal memory address for WiFi 7 chip (bsc#1227149). * wifi: rtw89: mac: define register address of rx_filter to generalize code (bsc#1227149). * wifi: rtw89: mac: do bf_monitor only if WiFi 6 chips (bsc#1227149). * wifi: rtw89: mac: functions to configure hardware engine and quota for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: generalize code to indirectly access WiFi internal memory (bsc#1227149). * wifi: rtw89: mac: generalize register of MU-EDCA switch according to chip gen (bsc#1227149). * wifi: rtw89: mac: get TX power control register according to chip gen (bsc#1227149). * wifi: rtw89: mac: handle C2H receive/done ACK in interrupt context (bsc#1227149). * wifi: rtw89: mac: implement MRC C2H event handling (bsc#1227149). * wifi: rtw89: mac: implement to configure TX/RX engines for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: move code related to hardware engine to individual functions (bsc#1227149). * wifi: rtw89: mac: refine SER setting during WiFi CPU power on (bsc#1227149). * wifi: rtw89: mac: reset PHY-1 hardware when going to enable/disable (bsc#1227149). * wifi: rtw89: mac: return held quota of DLE when changing MAC-1 (bsc#1227149). * wifi: rtw89: mac: set bf_assoc capabilities according to chip gen (bsc#1227149). * wifi: rtw89: mac: set bfee_ctrl() according to chip gen (bsc#1227149). * wifi: rtw89: mac: update RTS threshold according to chip gen (bsc#1227149). * wifi: rtw89: mac: use mac_gen pointer to access about efuse (bsc#1227149). * wifi: rtw89: mac: use pointer to access functions of hardware engine and quota (bsc#1227149). * wifi: rtw89: mcc: consider and determine BT duration (bsc#1227149). * wifi: rtw89: mcc: deal with BT slot change (bsc#1227149). * wifi: rtw89: mcc: deal with P2P PS change (bsc#1227149). * wifi: rtw89: mcc: deal with beacon NoA if GO exists (bsc#1227149). * wifi: rtw89: mcc: decide pattern and calculate parameters (bsc#1227149). * wifi: rtw89: mcc: fill fundamental configurations (bsc#1227149). * wifi: rtw89: mcc: fix NoA start time when GO is auxiliary (bsc#1227149). * wifi: rtw89: mcc: initialize start flow (bsc#1227149). * wifi: rtw89: mcc: track beacon offset and update when needed (bsc#1227149). * wifi: rtw89: mcc: trigger FW to start/stop MCC (bsc#1227149). * wifi: rtw89: mcc: update role bitmap when changed (bsc#1227149). * wifi: rtw89: modify the register setting and the flow of CFO tracking (bsc#1227149). * wifi: rtw89: move software DCFO compensation setting to proper position (bsc#1227149). * wifi: rtw89: only reset BB/RF for existing WiFi 6 chips while starting up (bsc#1227149). * wifi: rtw89: packet offload wait for FW response (bsc#1227149). * wifi: rtw89: parse EHT information from RX descriptor and PPDU status packet (bsc#1227149). * wifi: rtw89: parse TX EHT rate selected by firmware from RA C2H report (bsc#1227149). * wifi: rtw89: parse and print out RFK log from C2H events (bsc#1227149). * wifi: rtw89: pause/proceed MCC for ROC and HW scan (bsc#1227149). * wifi: rtw89: pci: add LTR v2 for WiFi 7 chip (bsc#1227149). * wifi: rtw89: pci: add PCI generation information to pci_info for each chip (bsc#1227149). * wifi: rtw89: pci: add new RX ring design to determine full RX ring efficiently (bsc#1227149). * wifi: rtw89: pci: add pre_deinit to be called after probe complete (bsc#1227149). * wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes). * wifi: rtw89: pci: correct interrupt mitigation register for 8852CE (bsc#1227149). * wifi: rtw89: pci: define PCI ring address for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor (stable-fixes). * wifi: rtw89: pci: fix interrupt enable mask for HALT C2H of RTL8851B (bsc#1227149). * wifi: rtw89: pci: generalize code of PCI control DMA IO for WiFi 7 (bsc#1227149). * wifi: rtw89: pci: generalize interrupt status bits of interrupt handlers (bsc#1227149). * wifi: rtw89: pci: implement PCI CLK/ASPM/L1SS for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: implement PCI mac_post_init for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: implement PCI mac_pre_init for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: interrupt v2 refine IMR for SER (bsc#1227149). * wifi: rtw89: pci: reset BDRAM according to chip gen (bsc#1227149). * wifi: rtw89: pci: stop/start DMA for level 1 recovery according to chip gen (bsc#1227149). * wifi: rtw89: pci: update SER timer unit and timeout time (bsc#1227149). * wifi: rtw89: pci: update interrupt mitigation register for 8922AE (bsc#1227149). * wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE (bsc#1227149). * wifi: rtw89: pci: use gen_def pointer to configure mac_{pre,post}_init and clear PCI ring index (bsc#1227149). * wifi: rtw89: pci: validate RX tag for RXQ and RPQ (bsc#1227149). * wifi: rtw89: phy: add BB wrapper of TX power for WiFi 7 chips (bsc#1227149). * wifi: rtw89: phy: add parser to support RX gain dynamic setting flow (bsc#1227149). * wifi: rtw89: phy: add phy_gen_def::cr_base to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: phy: change naming related BT coexistence functions (bsc#1227149). * wifi: rtw89: phy: dynamically adjust EDCCA threshold (bsc#1227149). * wifi: rtw89: phy: extend TX power common stuffs for Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: phy: generalize valid bit of BSS color (bsc#1227149). * wifi: rtw89: phy: ignore special data from BB parameter file (bsc#1227149). * wifi: rtw89: phy: modify register setting of ENV_MNTR, PHYSTS and DIG (bsc#1227149). * wifi: rtw89: phy: move bb_gain_info used by WiFi 6 chips to union (bsc#1227149). * wifi: rtw89: phy: print out RFK log with formatted string (bsc#1227149). * wifi: rtw89: phy: rate pattern handles HW rate by chip gen (bsc#1227149). * wifi: rtw89: phy: refine helpers used for raw TX power (bsc#1227149). * wifi: rtw89: phy: set TX power RU limit according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power by rate according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power limit according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power offset according to chip gen (bsc#1227149). * wifi: rtw89: phy: set channel_info for WiFi 7 chips (bsc#1227149). * wifi: rtw89: prepare scan leaf functions for wifi 7 ICs (bsc#1227149). * wifi: rtw89: process regulatory for 6 GHz power type (bsc#1227149). * wifi: rtw89: provide functions to configure NoA for beacon update (bsc#1227149). * wifi: rtw89: recognize log format from firmware file (bsc#1227149). * wifi: rtw89: reference quota mode when setting Tx power (bsc#1227149). * wifi: rtw89: refine H2C command that pause transmitting by MAC ID (bsc#1227149). * wifi: rtw89: refine add_chan H2C command to encode_bits (bsc#1227149). * wifi: rtw89: refine bandwidth 160MHz uplink OFDMA performance (bsc#1227149). * wifi: rtw89: refine clearing supported bands to check 2/5 GHz first (bsc#1227149). * wifi: rtw89: refine element naming used by queue empty check (bsc#1227149). * wifi: rtw89: refine hardware scan C2H events (bsc#1227149). * wifi: rtw89: refine packet offload delete flow of 6 GHz probe (bsc#1227149). * wifi: rtw89: refine packet offload handling under SER (bsc#1227149). * wifi: rtw89: refine remain on channel flow to improve P2P connection (bsc#1227149). * wifi: rtw89: refine rtw89_correct_cck_chan() by rtw89_hw_to_nl80211_band() (bsc#1227149). * wifi: rtw89: refine uplink trigger based control mechanism (bsc#1227149). * wifi: rtw89: regd: configure Thailand in regulation type (bsc#1227149). * wifi: rtw89: regd: handle policy of 6 GHz according to BIOS (bsc#1227149). * wifi: rtw89: regd: judge 6 GHz according to chip and BIOS (bsc#1227149). * wifi: rtw89: regd: judge UNII-4 according to BIOS and chip (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R64-R40 (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R64-R43 (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R65-R44 (bsc#1227149). * wifi: rtw89: release bit in rtw89_fw_h2c_del_pkt_offload() (bsc#1227149). * wifi: rtw89: return failure if needed firmware elements are not recognized (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger DACK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger DPK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger IQK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger RX DCK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger TSSI (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger TXGAPK (bsc#1227149). * wifi: rtw89: rfk: add a completion to wait RF calibration report from C2H event (bsc#1227149). * wifi: rtw89: rfk: disable driver tracking during MCC (bsc#1227149). * wifi: rtw89: rfk: send channel information to firmware for RF calibrations (bsc#1227149). * wifi: rtw89: sar: let caller decide the center frequency to query (bsc#1227149). * wifi: rtw89: scan offload wait for FW done ACK (bsc#1227149). * wifi: rtw89: ser: L1 add pre-M0 and post-M0 states (bsc#1227149). * wifi: rtw89: ser: reset total_sta_assoc and tdls_peer when L2 (bsc#1227149). * wifi: rtw89: set TX power without precondition during setting channel (bsc#1227149). * wifi: rtw89: set capability of TX antenna diversity (bsc#1227149). * wifi: rtw89: set entry size of address CAM to H2C field by chip (bsc#1227149). * wifi: rtw89: show EHT rate in debugfs (bsc#1227149). * wifi: rtw89: support U-NII-4 channels on 5GHz band (bsc#1227149). * wifi: rtw89: support firmware log with formatted text (bsc#1227149). * wifi: rtw89: suppress the log for specific SER called CMDPSR_FRZTO (bsc#1227149). * wifi: rtw89: tweak H2C TX waiting function for SER (bsc#1227149). * wifi: rtw89: update DMA function with different generation (bsc#1227149). * wifi: rtw89: update ps_state register for chips with different generation (bsc#1227149). * wifi: rtw89: update scan C2H messages for wifi 7 IC (bsc#1227149). * wifi: rtw89: update suspend/resume for different generation (bsc#1227149). * wifi: rtw89: use PLCP information to match BSS_COLOR and AID (bsc#1227149). * wifi: rtw89: use chip_info::small_fifo_size to choose debug_mask (bsc#1227149). * wifi: rtw89: use flexible array member in rtw89_btc_btf_tlv (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits to access RX info (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits() to access RX descriptor (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits() to access received PHY status IEs (bsc#1227149). * wifi: rtw89: use struct rtw89_phy_sts_ie0 instead of macro to access PHY IE0 status (bsc#1227149). * wifi: rtw89: use struct to access RA report (bsc#1227149). * wifi: rtw89: use struct to access firmware C2H event header (bsc#1227149). * wifi: rtw89: use struct to access register-based H2C/C2H (bsc#1227149). * wifi: rtw89: use struct to fill H2C command to download beacon frame (bsc#1227149). * wifi: rtw89: use struct to parse firmware header (bsc#1227149). * wifi: rtw89: use struct to set RA H2C command (bsc#1227149). * wifi: rtw89: wow: move release offload packet earlier for WoWLAN mode (bsc#1227149). * wifi: rtw89: wow: refine WoWLAN flows of HCI interrupts and low power mode (bsc#1227149). * wifi: rtw89: wow: set security engine options for 802.11ax chips only (bsc#1227149). * wifi: rtw89: wow: update WoWLAN reason register for different chips (bsc#1227149). * wifi: rtw89: wow: update WoWLAN status register for different generation (bsc#1227149). * wifi: rtw89: wow: update config mac function with different generation (bsc#1227149). * wifi: ti: wlcore: sdio: Drop unused include (bsc#1227149). * wifi: virt_wifi: avoid reporting connection success with wrong SSID (git- fixes). * wifi: virt_wifi: do not use strlen() in const context (git-fixes). * wifi: wcn36xx: Annotate struct wcn36xx_hal_ind_msg with __counted_by (bsc#1227149). * wifi: wcn36xx: Convert to platform remove callback returning void (bsc#1227149). * wifi: wcn36xx: remove unnecessary (void*) conversions (bsc#1227149). * wifi: wext: avoid extra calls to strlen() in ieee80211_bss() (bsc#1227149). * wifi: wfx: Use devm_kmemdup to replace devm_kmalloc + memcpy (bsc#1227149). * wifi: wfx: allow to send frames during ROC (bsc#1227149). * wifi: wfx: fix power_save setting when AP is stopped (bsc#1227149). * wifi: wfx: implement wfx_remain_on_channel() (bsc#1227149). * wifi: wfx: introduce hif_scan_uniq() (bsc#1227149). * wifi: wfx: move wfx_skb_*() out of the header file (bsc#1227149). * wifi: wfx: relocate wfx_rate_mask_to_hw() (bsc#1227149). * wifi: wfx: scan_lock is global to the device (bsc#1227149). * wifi: wfx: simplify exclusion between scan and Rx filters (bsc#1227149). * wifi: wil6210: fw: Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper (bsc#1227149). * wifi: wil6210: wmi: Replace zero-length array with DECLARE_FLEX_ARRAY() helper (bsc#1227149). * wifi: wilc1000: Increase ASSOC response buffer (bsc#1227149). * wifi: wilc1000: Remove unused declarations (bsc#1227149). * wifi: wilc1000: add SPI commands retry mechanism (bsc#1227149). * wifi: wilc1000: add back-off algorithm to balance tx queue packets (bsc#1227149). * wifi: wilc1000: add missing read critical sections around vif list traversal (bsc#1227149). * wifi: wilc1000: always release SDIO host in wilc_sdio_cmd53() (bsc#1227149). * wifi: wilc1000: cleanup struct wilc_conn_info (bsc#1227149). * wifi: wilc1000: correct CRC7 calculation (bsc#1227149). * wifi: wilc1000: fix declarations ordering (bsc#1227149). * wifi: wilc1000: fix driver_handler when committing initial configuration (bsc#1227149). * wifi: wilc1000: fix ies_len type in connect path (git-fixes). * wifi: wilc1000: fix incorrect power down sequence (bsc#1227149). * wifi: wilc1000: remove AKM suite be32 conversion for external auth request (bsc#1227149). * wifi: wilc1000: remove setting msg.spi (bsc#1227149). * wifi: wilc1000: remove use of has_thrpt_enh3 flag (bsc#1227149). * wifi: wilc1000: set preamble size to auto as default in wilc_init_fw_config() (bsc#1227149). * wifi: wilc1000: simplify remain on channel support (bsc#1227149). * wifi: wilc1000: simplify wilc_scan() (bsc#1227149). * wifi: wilc1000: split deeply nested RCU list traversal in dedicated helper (bsc#1227149). * wifi: wilc1000: use SRCU instead of RCU for vif list traversal (bsc#1227149). * wifi: wilc1000: validate chip id during bus probe (bsc#1227149). * wifi: wl1251: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wl18xx: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: boot: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: main: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: sdio: Rate limit wl12xx_sdio_raw_{read,write}() failures warns (bsc#1227149). * wifi: wlcore: sdio: Use module_sdio_driver macro to simplify the code (bsc#1227149). * wifi: zd1211rw: fix typo "tranmits" (bsc#1227149). * wifi: zd1211rw: remove __nocast from zd_addr_t (bsc#1227149). * wifi: zd1211rw: silence sparse warnings (bsc#1227149). * wireguard: netlink: access device through ctx instead of peer (git-fixes). * wireguard: netlink: check for dangling peer via is_dead instead of empty list (git-fixes). * wireguard: receive: annotate data-race around receiving_counter.counter (git-fixes). * wlcore: spi: Remove redundant of_match_ptr() (bsc#1227149). * work around gcc bugs with 'asm goto' with outputs (git-fixes). * x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes). * x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes). * x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes). * x86/amd_nb: Check for invalid SMN reads (git-fixes). * x86/apic: Force native_apic_mem_read() to use the MOV instruction (git- fixes). * x86/asm: Fix build of UML with KASAN (git-fixes). * x86/asm: Remove the __iomem annotation of movdir64b()'s dst argument (git- fixes). * x86/bhi: Avoid warning in #DB handler due to BHI mitigation :(git-fixes). * x86/boot: Ignore NMIs during very early boot (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes). * x86/bugs: Remove default case for fully switched enums (git-fixes). * x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git- fixes). * x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes). * x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes). * x86/cpu: Provide default cache line size if not enumerated (git-fixes). * x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git- fixes). * x86/csum: Fix clang -Wuninitialized in csum_partial() (git-fixes). * x86/csum: Improve performance of `csum_partial` (git-fixes). * x86/csum: Remove unnecessary odd handling (git-fixes). * x86/csum: clean up `csum_partial' further (git-fixes). * x86/efistub: Add missing boot_params for mixed mode compat entry (git- fixes). * x86/efistub: Call mixed mode boot services on the firmware's stack (git- fixes). * x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes). * x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes). * x86/head/64: Move the __head definition to <asm/init.h> (git-fixes). * x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes). * x86/hyperv: Use per cpu initial stack for vtl context (git-fixes). * x86/insn: Add VEX versions of VPDPBUSD, VPDPBUSDS, VPDPWSSD and VPDPWSSDS (git-fixes). * x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git- fixes). * x86/kconfig: Add as-instr64 macro to properly evaluate AS_WRUSS (git-fixes). * x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes). * x86/kexec: Fix bug with call depth tracking (git-fixes). * x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes). * x86/mce: Dynamically size space for machine check records (bsc#1222241). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/mce: Mark fatal MCE's page as poison to avoid panic in the kdump kernel (git-fixes). * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes). * x86/nmi: Fix the inverse "in NMI handler" check (git-fixes). * x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes). * x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes). * x86/purgatory: Switch to the position-independent small code model (git- fixes). * x86/resctrl: Read supported bandwidth sources from CPUID (git-fixes). * x86/resctrl: Remove redundant variable in mbm_config_write_domain() (git- fixes). * x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes). * x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git- fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/sev: Fix position dependent variable references in startup code (git- fixes). * x86/shstk: Make return uprobe work with shadow stack (git-fixes). * x86/speculation, objtool: Use absolute relocations for annotations (git- fixes). * x86/srso: Disentangle rethunk-dependent options (git-fixes). * x86/srso: Fix unret validation dependencies (git-fixes). * x86/srso: Improve i-cache locality for alias mitigation (git-fixes). * x86/srso: Print actual mitigation if requested mitigation isn't possible (git-fixes). * x86/srso: Remove 'pred_cmd' label (git-fixes). * x86/srso: Unexport untraining functions (git-fixes). * x86/tdx: Preserve shared bit on mprotect() (git-fixes). * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962). * x86/uaccess: Fix missed zeroing of ia32 u64 get_user() range checking (git- fixes). * x86/xen: Add some null pointer checking to smp.c (git-fixes). * x86/xen: attempt to inflate the memory balloon on PVH (git-fixes). * x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502) * xdp, bonding: Fix feature flags when there are no slave devs anymore (git- fixes). * xen-netfront: Add missing skb_mark_for_recycle (git-fixes). * xen/events: drop xen_allocate_irqs_dynamic() (git-fixes). * xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes). * xen/events: increment refcnt only if event channel is refcounted (git- fixes). * xen/events: modify internal [un]bind interfaces (git-fixes). * xen/events: reduce externally visible helper functions (git-fixes). * xen/events: remove some simple helpers from events_base.c (git-fixes). * xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes). * xen/x86: add extra pages to unpopulated-alloc if available (git-fixes). * xen: evtchn: Allow shared registration of IRQ handers (git-fixes). * xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228211). * xfs: add lock protection when remove perag from radix tree (git-fixes). * xfs: allow extent free intents to be retried (git-fixes). * xfs: fix perag leak when growfs fails (git-fixes). * xfs: force all buffers to be written during btree bulk load (git-fixes). * xfs: make xchk_iget safer in the presence of corrupt inode btrees (git- fixes). * xfs: pass the xfs_defer_pending object to iop_recover (git-fixes). * xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes). * xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes). * xfs: use roundup_pow_of_two instead of ffs during xlog_find_tail (git- fixes). * xfs: use xfs_defer_pending objects to recover intent items (git-fixes). * xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes). * xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes). * xhci: Handle TD clearing for multiple streams case (git-fixes). * xhci: Set correct transferred length for cancelled bulk transfers (stable- fixes). * xhci: Simplify event ring dequeue pointer update for port change events (git-fixes). * xhci: add helper that checks for unhandled events on a event ring (git- fixes). * xhci: always resume roothubs if xHC was reset during resume (stable-fixes). * xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event() (git-fixes). * xhci: simplify event ring dequeue tracking for transfer events (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-14=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-14=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-6.4.0-18.1 * kernel-macros-6.4.0-18.1 * kernel-source-6.4.0-18.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-18.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-18.1 * kernel-default-debuginfo-6.4.0-18.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-default-livepatch-6.4.0-18.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-18.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debugsource-6.4.0-18.1 * kernel-kvmsmall-debuginfo-6.4.0-18.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-17.1.1.51 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-18.1 * kernel-default-6.4.0-18.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-18.1 * kernel-64kb-devel-6.4.0-18.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-18.1 * kernel-syms-6.4.0-18.1 * kernel-default-devel-6.4.0-18.1 * kernel-obs-build-6.4.0-18.1 * kernel-obs-build-debugsource-6.4.0-18.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-18.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47432.html * https://www.suse.com/security/cve/CVE-2022-48669.html * https://www.suse.com/security/cve/CVE-2022-48772.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-38417.html * https://www.suse.com/security/cve/CVE-2023-47210.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-52434.html * https://www.suse.com/security/cve/CVE-2023-52435.html * https://www.suse.com/security/cve/CVE-2023-52458.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52483.html * https://www.suse.com/security/cve/CVE-2023-52503.html * https://www.suse.com/security/cve/CVE-2023-52616.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52622.html * https://www.suse.com/security/cve/CVE-2023-52631.html * https://www.suse.com/security/cve/CVE-2023-52635.html * https://www.suse.com/security/cve/CVE-2023-52640.html * https://www.suse.com/security/cve/CVE-2023-52641.html * https://www.suse.com/security/cve/CVE-2023-52645.html * https://www.suse.com/security/cve/CVE-2023-52647.html * https://www.suse.com/security/cve/CVE-2023-52648.html * https://www.suse.com/security/cve/CVE-2023-52649.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52652.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52656.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52672.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52699.html * https://www.suse.com/security/cve/CVE-2023-52735.html * https://www.suse.com/security/cve/CVE-2023-52749.html * https://www.suse.com/security/cve/CVE-2023-52750.html * https://www.suse.com/security/cve/CVE-2023-52751.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52757.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52762.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52765.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52767.html * https://www.suse.com/security/cve/CVE-2023-52768.html * https://www.suse.com/security/cve/CVE-2023-52769.html * https://www.suse.com/security/cve/CVE-2023-52771.html * https://www.suse.com/security/cve/CVE-2023-52772.html * https://www.suse.com/security/cve/CVE-2023-52773.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52775.html * https://www.suse.com/security/cve/CVE-2023-52776.html * https://www.suse.com/security/cve/CVE-2023-52777.html * https://www.suse.com/security/cve/CVE-2023-52780.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52782.html * https://www.suse.com/security/cve/CVE-2023-52783.html * https://www.suse.com/security/cve/CVE-2023-52784.html * https://www.suse.com/security/cve/CVE-2023-52786.html * https://www.suse.com/security/cve/CVE-2023-52787.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52792.html * https://www.suse.com/security/cve/CVE-2023-52794.html * https://www.suse.com/security/cve/CVE-2023-52795.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52801.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52807.html * https://www.suse.com/security/cve/CVE-2023-52808.html * https://www.suse.com/security/cve/CVE-2023-52809.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52812.html * https://www.suse.com/security/cve/CVE-2023-52813.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52815.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52827.html * https://www.suse.com/security/cve/CVE-2023-52829.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52835.html * https://www.suse.com/security/cve/CVE-2023-52836.html * https://www.suse.com/security/cve/CVE-2023-52837.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52842.html * https://www.suse.com/security/cve/CVE-2023-52843.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52845.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52849.html * https://www.suse.com/security/cve/CVE-2023-52850.html * https://www.suse.com/security/cve/CVE-2023-52851.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52857.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52861.html * https://www.suse.com/security/cve/CVE-2023-52862.html * https://www.suse.com/security/cve/CVE-2023-52863.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52866.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52869.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52874.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52879.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52883.html * https://www.suse.com/security/cve/CVE-2023-52884.html * https://www.suse.com/security/cve/CVE-2023-6238.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-21823.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-24861.html * https://www.suse.com/security/cve/CVE-2024-25739.html * https://www.suse.com/security/cve/CVE-2024-25741.html * https://www.suse.com/security/cve/CVE-2024-26601.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26615.html * https://www.suse.com/security/cve/CVE-2024-26623.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26632.html * https://www.suse.com/security/cve/CVE-2024-26633.html * https://www.suse.com/security/cve/CVE-2024-26635.html * https://www.suse.com/security/cve/CVE-2024-26636.html * https://www.suse.com/security/cve/CVE-2024-26638.html * https://www.suse.com/security/cve/CVE-2024-26641.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26654.html * https://www.suse.com/security/cve/CVE-2024-26656.html * https://www.suse.com/security/cve/CVE-2024-26657.html * https://www.suse.com/security/cve/CVE-2024-26663.html * https://www.suse.com/security/cve/CVE-2024-26665.html * https://www.suse.com/security/cve/CVE-2024-26671.html * https://www.suse.com/security/cve/CVE-2024-26673.html * https://www.suse.com/security/cve/CVE-2024-26674.html * https://www.suse.com/security/cve/CVE-2024-26676.html * https://www.suse.com/security/cve/CVE-2024-26679.html * https://www.suse.com/security/cve/CVE-2024-26684.html * https://www.suse.com/security/cve/CVE-2024-26685.html * https://www.suse.com/security/cve/CVE-2024-26691.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26714.html * https://www.suse.com/security/cve/CVE-2024-26726.html * https://www.suse.com/security/cve/CVE-2024-26731.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://www.suse.com/security/cve/CVE-2024-26734.html * https://www.suse.com/security/cve/CVE-2024-26737.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26740.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26750.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26760.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26769.html * https://www.suse.com/security/cve/CVE-2024-26772.html * https://www.suse.com/security/cve/CVE-2024-26773.html * https://www.suse.com/security/cve/CVE-2024-26774.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26780.html * https://www.suse.com/security/cve/CVE-2024-26783.html * https://www.suse.com/security/cve/CVE-2024-26785.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26793.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26802.html * https://www.suse.com/security/cve/CVE-2024-26805.html * https://www.suse.com/security/cve/CVE-2024-26807.html * https://www.suse.com/security/cve/CVE-2024-26813.html * https://www.suse.com/security/cve/CVE-2024-26814.html * https://www.suse.com/security/cve/CVE-2024-26815.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26826.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26832.html * https://www.suse.com/security/cve/CVE-2024-26836.html * https://www.suse.com/security/cve/CVE-2024-26844.html * https://www.suse.com/security/cve/CVE-2024-26845.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26860.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26862.html * https://www.suse.com/security/cve/CVE-2024-26863.html * https://www.suse.com/security/cve/CVE-2024-26865.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26878.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26882.html * https://www.suse.com/security/cve/CVE-2024-26883.html * https://www.suse.com/security/cve/CVE-2024-26884.html * https://www.suse.com/security/cve/CVE-2024-26885.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26899.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26901.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26909.html * https://www.suse.com/security/cve/CVE-2024-26919.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26933.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26939.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26944.html * https://www.suse.com/security/cve/CVE-2024-26945.html * https://www.suse.com/security/cve/CVE-2024-26946.html * https://www.suse.com/security/cve/CVE-2024-26948.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26955.html * https://www.suse.com/security/cve/CVE-2024-26956.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26959.html * https://www.suse.com/security/cve/CVE-2024-26960.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26965.html * https://www.suse.com/security/cve/CVE-2024-26966.html * https://www.suse.com/security/cve/CVE-2024-26968.html * https://www.suse.com/security/cve/CVE-2024-26969.html * https://www.suse.com/security/cve/CVE-2024-26970.html * https://www.suse.com/security/cve/CVE-2024-26972.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26974.html * https://www.suse.com/security/cve/CVE-2024-26975.html * https://www.suse.com/security/cve/CVE-2024-26977.html * https://www.suse.com/security/cve/CVE-2024-26978.html * https://www.suse.com/security/cve/CVE-2024-26981.html * https://www.suse.com/security/cve/CVE-2024-26982.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26990.html * https://www.suse.com/security/cve/CVE-2024-26991.html * https://www.suse.com/security/cve/CVE-2024-26992.html * https://www.suse.com/security/cve/CVE-2024-26993.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27009.html * https://www.suse.com/security/cve/CVE-2024-27012.html * https://www.suse.com/security/cve/CVE-2024-27013.html * https://www.suse.com/security/cve/CVE-2024-27014.html * https://www.suse.com/security/cve/CVE-2024-27015.html * https://www.suse.com/security/cve/CVE-2024-27016.html * https://www.suse.com/security/cve/CVE-2024-27019.html * https://www.suse.com/security/cve/CVE-2024-27020.html * https://www.suse.com/security/cve/CVE-2024-27022.html * https://www.suse.com/security/cve/CVE-2024-27023.html * https://www.suse.com/security/cve/CVE-2024-27025.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27036.html * https://www.suse.com/security/cve/CVE-2024-27037.html * https://www.suse.com/security/cve/CVE-2024-27038.html * https://www.suse.com/security/cve/CVE-2024-27039.html * https://www.suse.com/security/cve/CVE-2024-27040.html * https://www.suse.com/security/cve/CVE-2024-27041.html * https://www.suse.com/security/cve/CVE-2024-27042.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27044.html * https://www.suse.com/security/cve/CVE-2024-27045.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27047.html * https://www.suse.com/security/cve/CVE-2024-27048.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-27052.html * https://www.suse.com/security/cve/CVE-2024-27053.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27056.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27060.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27064.html * https://www.suse.com/security/cve/CVE-2024-27065.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27068.html * https://www.suse.com/security/cve/CVE-2024-27071.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27076.html * https://www.suse.com/security/cve/CVE-2024-27077.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27391.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27402.html * https://www.suse.com/security/cve/CVE-2024-27404.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27408.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27414.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27418.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-33619.html * https://www.suse.com/security/cve/CVE-2024-34777.html * https://www.suse.com/security/cve/CVE-2024-35247.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35803.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35805.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35807.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35814.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35827.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35831.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35843.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35848.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35853.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35857.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35880.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35884.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35886.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35890.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35892.html * https://www.suse.com/security/cve/CVE-2024-35893.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35896.html * https://www.suse.com/security/cve/CVE-2024-35898.html * https://www.suse.com/security/cve/CVE-2024-35899.html * https://www.suse.com/security/cve/CVE-2024-35900.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35903.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35908.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35917.html * https://www.suse.com/security/cve/CVE-2024-35921.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35925.html * https://www.suse.com/security/cve/CVE-2024-35926.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35931.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35934.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35942.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35956.html * https://www.suse.com/security/cve/CVE-2024-35957.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35962.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35970.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35976.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35979.html * https://www.suse.com/security/cve/CVE-2024-35981.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35991.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-35998.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36003.html * https://www.suse.com/security/cve/CVE-2024-36004.html * https://www.suse.com/security/cve/CVE-2024-36005.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36008.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36010.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36013.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36017.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36024.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36030.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36281.html * https://www.suse.com/security/cve/CVE-2024-36477.html * https://www.suse.com/security/cve/CVE-2024-36478.html * https://www.suse.com/security/cve/CVE-2024-36479.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36882.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36887.html * https://www.suse.com/security/cve/CVE-2024-36889.html * https://www.suse.com/security/cve/CVE-2024-36890.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36900.html * https://www.suse.com/security/cve/CVE-2024-36901.html * https://www.suse.com/security/cve/CVE-2024-36902.html * https://www.suse.com/security/cve/CVE-2024-36903.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36909.html * https://www.suse.com/security/cve/CVE-2024-36910.html * https://www.suse.com/security/cve/CVE-2024-36911.html * https://www.suse.com/security/cve/CVE-2024-36912.html * https://www.suse.com/security/cve/CVE-2024-36913.html * https://www.suse.com/security/cve/CVE-2024-36914.html * https://www.suse.com/security/cve/CVE-2024-36915.html * https://www.suse.com/security/cve/CVE-2024-36916.html * https://www.suse.com/security/cve/CVE-2024-36917.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36919.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36923.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36934.html * https://www.suse.com/security/cve/CVE-2024-36935.html * https://www.suse.com/security/cve/CVE-2024-36936.html * https://www.suse.com/security/cve/CVE-2024-36937.html * https://www.suse.com/security/cve/CVE-2024-36938.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36945.html * https://www.suse.com/security/cve/CVE-2024-36946.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36957.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-36960.html * https://www.suse.com/security/cve/CVE-2024-36962.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-36965.html * https://www.suse.com/security/cve/CVE-2024-36967.html * https://www.suse.com/security/cve/CVE-2024-36969.html * https://www.suse.com/security/cve/CVE-2024-36971.html * https://www.suse.com/security/cve/CVE-2024-36972.html * https://www.suse.com/security/cve/CVE-2024-36973.html * https://www.suse.com/security/cve/CVE-2024-36974.html * https://www.suse.com/security/cve/CVE-2024-36975.html * https://www.suse.com/security/cve/CVE-2024-36977.html * https://www.suse.com/security/cve/CVE-2024-36978.html * https://www.suse.com/security/cve/CVE-2024-37021.html * https://www.suse.com/security/cve/CVE-2024-37078.html * https://www.suse.com/security/cve/CVE-2024-37353.html * https://www.suse.com/security/cve/CVE-2024-37354.html * https://www.suse.com/security/cve/CVE-2024-38381.html * https://www.suse.com/security/cve/CVE-2024-38384.html * https://www.suse.com/security/cve/CVE-2024-38385.html * https://www.suse.com/security/cve/CVE-2024-38388.html * https://www.suse.com/security/cve/CVE-2024-38390.html * https://www.suse.com/security/cve/CVE-2024-38391.html * https://www.suse.com/security/cve/CVE-2024-38539.html * https://www.suse.com/security/cve/CVE-2024-38540.html * https://www.suse.com/security/cve/CVE-2024-38541.html * https://www.suse.com/security/cve/CVE-2024-38543.html * https://www.suse.com/security/cve/CVE-2024-38544.html * https://www.suse.com/security/cve/CVE-2024-38545.html * https://www.suse.com/security/cve/CVE-2024-38546.html * https://www.suse.com/security/cve/CVE-2024-38547.html * https://www.suse.com/security/cve/CVE-2024-38548.html * https://www.suse.com/security/cve/CVE-2024-38549.html * https://www.suse.com/security/cve/CVE-2024-38550.html * https://www.suse.com/security/cve/CVE-2024-38551.html * https://www.suse.com/security/cve/CVE-2024-38552.html * https://www.suse.com/security/cve/CVE-2024-38553.html * https://www.suse.com/security/cve/CVE-2024-38554.html * https://www.suse.com/security/cve/CVE-2024-38555.html * https://www.suse.com/security/cve/CVE-2024-38556.html * https://www.suse.com/security/cve/CVE-2024-38557.html * https://www.suse.com/security/cve/CVE-2024-38558.html * https://www.suse.com/security/cve/CVE-2024-38559.html * https://www.suse.com/security/cve/CVE-2024-38560.html * https://www.suse.com/security/cve/CVE-2024-38562.html * https://www.suse.com/security/cve/CVE-2024-38564.html * https://www.suse.com/security/cve/CVE-2024-38565.html * https://www.suse.com/security/cve/CVE-2024-38566.html * https://www.suse.com/security/cve/CVE-2024-38567.html * https://www.suse.com/security/cve/CVE-2024-38568.html * https://www.suse.com/security/cve/CVE-2024-38569.html * https://www.suse.com/security/cve/CVE-2024-38570.html * https://www.suse.com/security/cve/CVE-2024-38571.html * https://www.suse.com/security/cve/CVE-2024-38572.html * https://www.suse.com/security/cve/CVE-2024-38573.html * https://www.suse.com/security/cve/CVE-2024-38575.html * https://www.suse.com/security/cve/CVE-2024-38578.html * https://www.suse.com/security/cve/CVE-2024-38579.html * https://www.suse.com/security/cve/CVE-2024-38580.html * https://www.suse.com/security/cve/CVE-2024-38581.html * https://www.suse.com/security/cve/CVE-2024-38582.html * https://www.suse.com/security/cve/CVE-2024-38583.html * https://www.suse.com/security/cve/CVE-2024-38586.html * https://www.suse.com/security/cve/CVE-2024-38587.html * https://www.suse.com/security/cve/CVE-2024-38588.html * https://www.suse.com/security/cve/CVE-2024-38590.html * https://www.suse.com/security/cve/CVE-2024-38591.html * https://www.suse.com/security/cve/CVE-2024-38592.html * https://www.suse.com/security/cve/CVE-2024-38594.html * https://www.suse.com/security/cve/CVE-2024-38595.html * https://www.suse.com/security/cve/CVE-2024-38597.html * https://www.suse.com/security/cve/CVE-2024-38598.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-38600.html * https://www.suse.com/security/cve/CVE-2024-38601.html * https://www.suse.com/security/cve/CVE-2024-38602.html * https://www.suse.com/security/cve/CVE-2024-38603.html * https://www.suse.com/security/cve/CVE-2024-38604.html * https://www.suse.com/security/cve/CVE-2024-38605.html * https://www.suse.com/security/cve/CVE-2024-38608.html * https://www.suse.com/security/cve/CVE-2024-38610.html * https://www.suse.com/security/cve/CVE-2024-38611.html * https://www.suse.com/security/cve/CVE-2024-38615.html * https://www.suse.com/security/cve/CVE-2024-38616.html * https://www.suse.com/security/cve/CVE-2024-38617.html * https://www.suse.com/security/cve/CVE-2024-38618.html * https://www.suse.com/security/cve/CVE-2024-38619.html * https://www.suse.com/security/cve/CVE-2024-38621.html * https://www.suse.com/security/cve/CVE-2024-38622.html * https://www.suse.com/security/cve/CVE-2024-38627.html * https://www.suse.com/security/cve/CVE-2024-38628.html * https://www.suse.com/security/cve/CVE-2024-38629.html * https://www.suse.com/security/cve/CVE-2024-38630.html * https://www.suse.com/security/cve/CVE-2024-38633.html * https://www.suse.com/security/cve/CVE-2024-38634.html * https://www.suse.com/security/cve/CVE-2024-38635.html * https://www.suse.com/security/cve/CVE-2024-38636.html * https://www.suse.com/security/cve/CVE-2024-38659.html * https://www.suse.com/security/cve/CVE-2024-38661.html * https://www.suse.com/security/cve/CVE-2024-38663.html * https://www.suse.com/security/cve/CVE-2024-38664.html * https://www.suse.com/security/cve/CVE-2024-38780.html * https://www.suse.com/security/cve/CVE-2024-39276.html * https://www.suse.com/security/cve/CVE-2024-39277.html * https://www.suse.com/security/cve/CVE-2024-39291.html * https://www.suse.com/security/cve/CVE-2024-39296.html * https://www.suse.com/security/cve/CVE-2024-39301.html * https://www.suse.com/security/cve/CVE-2024-39362.html * https://www.suse.com/security/cve/CVE-2024-39371.html * https://www.suse.com/security/cve/CVE-2024-39463.html * https://www.suse.com/security/cve/CVE-2024-39466.html * https://www.suse.com/security/cve/CVE-2024-39468.html * https://www.suse.com/security/cve/CVE-2024-39469.html * https://www.suse.com/security/cve/CVE-2024-39471.html * https://www.suse.com/security/cve/CVE-2024-39472.html * https://www.suse.com/security/cve/CVE-2024-39473.html * https://www.suse.com/security/cve/CVE-2024-39474.html * https://www.suse.com/security/cve/CVE-2024-39475.html * https://www.suse.com/security/cve/CVE-2024-39479.html * https://www.suse.com/security/cve/CVE-2024-39481.html * https://www.suse.com/security/cve/CVE-2024-39482.html * https://www.suse.com/security/cve/CVE-2024-39487.html * https://www.suse.com/security/cve/CVE-2024-39490.html * https://www.suse.com/security/cve/CVE-2024-39494.html * https://www.suse.com/security/cve/CVE-2024-39496.html * https://www.suse.com/security/cve/CVE-2024-39498.html * https://www.suse.com/security/cve/CVE-2024-39502.html * https://www.suse.com/security/cve/CVE-2024-39504.html * https://www.suse.com/security/cve/CVE-2024-39507.html * https://www.suse.com/security/cve/CVE-2024-40901.html * https://www.suse.com/security/cve/CVE-2024-40906.html * https://www.suse.com/security/cve/CVE-2024-40908.html * https://www.suse.com/security/cve/CVE-2024-40919.html * https://www.suse.com/security/cve/CVE-2024-40923.html * https://www.suse.com/security/cve/CVE-2024-40925.html * https://www.suse.com/security/cve/CVE-2024-40928.html * https://www.suse.com/security/cve/CVE-2024-40931.html * https://www.suse.com/security/cve/CVE-2024-40935.html * https://www.suse.com/security/cve/CVE-2024-40937.html * https://www.suse.com/security/cve/CVE-2024-40940.html * https://www.suse.com/security/cve/CVE-2024-40947.html * https://www.suse.com/security/cve/CVE-2024-40948.html * https://www.suse.com/security/cve/CVE-2024-40953.html * https://www.suse.com/security/cve/CVE-2024-40960.html * https://www.suse.com/security/cve/CVE-2024-40961.html * https://www.suse.com/security/cve/CVE-2024-40966.html * https://www.suse.com/security/cve/CVE-2024-40970.html * https://www.suse.com/security/cve/CVE-2024-40972.html * https://www.suse.com/security/cve/CVE-2024-40975.html * https://www.suse.com/security/cve/CVE-2024-40979.html * https://www.suse.com/security/cve/CVE-2024-40998.html * https://www.suse.com/security/cve/CVE-2024-40999.html * https://www.suse.com/security/cve/CVE-2024-41006.html * https://www.suse.com/security/cve/CVE-2024-41011.html * https://www.suse.com/security/cve/CVE-2024-41013.html * https://www.suse.com/security/cve/CVE-2024-41014.html * https://www.suse.com/security/cve/CVE-2024-41017.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-41091.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1186716 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1193599 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1195775 * https://bugzilla.suse.com/show_bug.cgi?id=1204562 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208593 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1213573 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215587 * https://bugzilla.suse.com/show_bug.cgi?id=1216196 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217384 * https://bugzilla.suse.com/show_bug.cgi?id=1217408 * https://bugzilla.suse.com/show_bug.cgi?id=1217481 * https://bugzilla.suse.com/show_bug.cgi?id=1217489 * https://bugzilla.suse.com/show_bug.cgi?id=1217750 * https://bugzilla.suse.com/show_bug.cgi?id=1217912 * https://bugzilla.suse.com/show_bug.cgi?id=1217959 * https://bugzilla.suse.com/show_bug.cgi?id=1218205 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218442 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218779 * https://bugzilla.suse.com/show_bug.cgi?id=1218820 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219224 * https://bugzilla.suse.com/show_bug.cgi?id=1219451 * https://bugzilla.suse.com/show_bug.cgi?id=1219478 * https://bugzilla.suse.com/show_bug.cgi?id=1219485 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219623 * https://bugzilla.suse.com/show_bug.cgi?id=1219633 * https://bugzilla.suse.com/show_bug.cgi?id=1219832 * https://bugzilla.suse.com/show_bug.cgi?id=1219834 * https://bugzilla.suse.com/show_bug.cgi?id=1219847 * https://bugzilla.suse.com/show_bug.cgi?id=1219953 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220045 * https://bugzilla.suse.com/show_bug.cgi?id=1220120 * https://bugzilla.suse.com/show_bug.cgi?id=1220138 * https://bugzilla.suse.com/show_bug.cgi?id=1220148 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220342 * https://bugzilla.suse.com/show_bug.cgi?id=1220427 * https://bugzilla.suse.com/show_bug.cgi?id=1220428 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220569 * https://bugzilla.suse.com/show_bug.cgi?id=1220587 * https://bugzilla.suse.com/show_bug.cgi?id=1220738 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1220915 * https://bugzilla.suse.com/show_bug.cgi?id=1220942 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221057 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221504 * https://bugzilla.suse.com/show_bug.cgi?id=1221612 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221635 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221647 * https://bugzilla.suse.com/show_bug.cgi?id=1221649 * https://bugzilla.suse.com/show_bug.cgi?id=1221654 * https://bugzilla.suse.com/show_bug.cgi?id=1221656 * https://bugzilla.suse.com/show_bug.cgi?id=1221659 * https://bugzilla.suse.com/show_bug.cgi?id=1221765 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221783 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1221958 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222015 * https://bugzilla.suse.com/show_bug.cgi?id=1222080 * https://bugzilla.suse.com/show_bug.cgi?id=1222173 * https://bugzilla.suse.com/show_bug.cgi?id=1222241 * https://bugzilla.suse.com/show_bug.cgi?id=1222264 * https://bugzilla.suse.com/show_bug.cgi?id=1222273 * https://bugzilla.suse.com/show_bug.cgi?id=1222294 * https://bugzilla.suse.com/show_bug.cgi?id=1222301 * https://bugzilla.suse.com/show_bug.cgi?id=1222303 * https://bugzilla.suse.com/show_bug.cgi?id=1222304 * https://bugzilla.suse.com/show_bug.cgi?id=1222307 * https://bugzilla.suse.com/show_bug.cgi?id=1222326 * https://bugzilla.suse.com/show_bug.cgi?id=1222328 * https://bugzilla.suse.com/show_bug.cgi?id=1222357 * https://bugzilla.suse.com/show_bug.cgi?id=1222366 * https://bugzilla.suse.com/show_bug.cgi?id=1222368 * https://bugzilla.suse.com/show_bug.cgi?id=1222371 * https://bugzilla.suse.com/show_bug.cgi?id=1222378 * https://bugzilla.suse.com/show_bug.cgi?id=1222380 * https://bugzilla.suse.com/show_bug.cgi?id=1222385 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222428 * https://bugzilla.suse.com/show_bug.cgi?id=1222437 * https://bugzilla.suse.com/show_bug.cgi?id=1222438 * https://bugzilla.suse.com/show_bug.cgi?id=1222445 * https://bugzilla.suse.com/show_bug.cgi?id=1222459 * https://bugzilla.suse.com/show_bug.cgi?id=1222463 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222489 * https://bugzilla.suse.com/show_bug.cgi?id=1222522 * https://bugzilla.suse.com/show_bug.cgi?id=1222525 * https://bugzilla.suse.com/show_bug.cgi?id=1222532 * https://bugzilla.suse.com/show_bug.cgi?id=1222557 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222563 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222588 * https://bugzilla.suse.com/show_bug.cgi?id=1222596 * https://bugzilla.suse.com/show_bug.cgi?id=1222606 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222613 * https://bugzilla.suse.com/show_bug.cgi?id=1222615 * https://bugzilla.suse.com/show_bug.cgi?id=1222617 * https://bugzilla.suse.com/show_bug.cgi?id=1222618 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222622 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222630 * https://bugzilla.suse.com/show_bug.cgi?id=1222635 * https://bugzilla.suse.com/show_bug.cgi?id=1222654 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222727 * https://bugzilla.suse.com/show_bug.cgi?id=1222768 * https://bugzilla.suse.com/show_bug.cgi?id=1222769 * https://bugzilla.suse.com/show_bug.cgi?id=1222771 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222777 * https://bugzilla.suse.com/show_bug.cgi?id=1222779 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1222782 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222799 * https://bugzilla.suse.com/show_bug.cgi?id=1222801 * https://bugzilla.suse.com/show_bug.cgi?id=1222809 * https://bugzilla.suse.com/show_bug.cgi?id=1222810 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222968 * https://bugzilla.suse.com/show_bug.cgi?id=1223007 * https://bugzilla.suse.com/show_bug.cgi?id=1223010 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223015 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223018 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223021 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223033 * https://bugzilla.suse.com/show_bug.cgi?id=1223034 * https://bugzilla.suse.com/show_bug.cgi?id=1223035 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223045 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223060 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223062 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223077 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223111 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223143 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223189 * https://bugzilla.suse.com/show_bug.cgi?id=1223190 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223198 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223265 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223338 * https://bugzilla.suse.com/show_bug.cgi?id=1223369 * https://bugzilla.suse.com/show_bug.cgi?id=1223380 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223439 * https://bugzilla.suse.com/show_bug.cgi?id=1223462 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223570 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223590 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223593 * https://bugzilla.suse.com/show_bug.cgi?id=1223625 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223629 * https://bugzilla.suse.com/show_bug.cgi?id=1223631 * https://bugzilla.suse.com/show_bug.cgi?id=1223632 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223634 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223638 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223642 * https://bugzilla.suse.com/show_bug.cgi?id=1223643 * https://bugzilla.suse.com/show_bug.cgi?id=1223644 * https://bugzilla.suse.com/show_bug.cgi?id=1223645 * https://bugzilla.suse.com/show_bug.cgi?id=1223646 * https://bugzilla.suse.com/show_bug.cgi?id=1223648 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223655 * https://bugzilla.suse.com/show_bug.cgi?id=1223657 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223663 * https://bugzilla.suse.com/show_bug.cgi?id=1223664 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223667 * https://bugzilla.suse.com/show_bug.cgi?id=1223668 * https://bugzilla.suse.com/show_bug.cgi?id=1223669 * https://bugzilla.suse.com/show_bug.cgi?id=1223670 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223679 * https://bugzilla.suse.com/show_bug.cgi?id=1223686 * https://bugzilla.suse.com/show_bug.cgi?id=1223692 * https://bugzilla.suse.com/show_bug.cgi?id=1223693 * https://bugzilla.suse.com/show_bug.cgi?id=1223695 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223699 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223709 * https://bugzilla.suse.com/show_bug.cgi?id=1223711 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223714 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223717 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223723 * https://bugzilla.suse.com/show_bug.cgi?id=1223725 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223732 * https://bugzilla.suse.com/show_bug.cgi?id=1223734 * https://bugzilla.suse.com/show_bug.cgi?id=1223735 * https://bugzilla.suse.com/show_bug.cgi?id=1223737 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223740 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223745 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223749 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223756 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223760 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223764 * https://bugzilla.suse.com/show_bug.cgi?id=1223765 * https://bugzilla.suse.com/show_bug.cgi?id=1223768 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223774 * https://bugzilla.suse.com/show_bug.cgi?id=1223776 * https://bugzilla.suse.com/show_bug.cgi?id=1223778 * https://bugzilla.suse.com/show_bug.cgi?id=1223779 * https://bugzilla.suse.com/show_bug.cgi?id=1223780 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223804 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223806 * https://bugzilla.suse.com/show_bug.cgi?id=1223807 * https://bugzilla.suse.com/show_bug.cgi?id=1223808 * https://bugzilla.suse.com/show_bug.cgi?id=1223810 * https://bugzilla.suse.com/show_bug.cgi?id=1223813 * https://bugzilla.suse.com/show_bug.cgi?id=1223815 * https://bugzilla.suse.com/show_bug.cgi?id=1223816 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223821 * https://bugzilla.suse.com/show_bug.cgi?id=1223822 * https://bugzilla.suse.com/show_bug.cgi?id=1223823 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223826 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223828 * https://bugzilla.suse.com/show_bug.cgi?id=1223829 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223836 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223838 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223847 * https://bugzilla.suse.com/show_bug.cgi?id=1223863 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223870 * https://bugzilla.suse.com/show_bug.cgi?id=1223871 * https://bugzilla.suse.com/show_bug.cgi?id=1223872 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1223944 * https://bugzilla.suse.com/show_bug.cgi?id=1223945 * https://bugzilla.suse.com/show_bug.cgi?id=1223946 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224187 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224348 * https://bugzilla.suse.com/show_bug.cgi?id=1224414 * https://bugzilla.suse.com/show_bug.cgi?id=1224422 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224430 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224439 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224477 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224481 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224490 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224493 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224497 * https://bugzilla.suse.com/show_bug.cgi?id=1224498 * https://bugzilla.suse.com/show_bug.cgi?id=1224499 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224512 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224515 * https://bugzilla.suse.com/show_bug.cgi?id=1224516 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224520 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224523 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224539 * https://bugzilla.suse.com/show_bug.cgi?id=1224540 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224544 * https://bugzilla.suse.com/show_bug.cgi?id=1224545 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224549 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224553 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224565 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224572 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224575 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224583 * https://bugzilla.suse.com/show_bug.cgi?id=1224584 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224589 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224602 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224604 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224606 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224612 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224614 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224619 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224641 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224652 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224655 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224659 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224661 * https://bugzilla.suse.com/show_bug.cgi?id=1224662 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224670 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224673 * https://bugzilla.suse.com/show_bug.cgi?id=1224674 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224698 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224720 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224735 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224742 * https://bugzilla.suse.com/show_bug.cgi?id=1224743 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224751 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224767 * https://bugzilla.suse.com/show_bug.cgi?id=1224790 * https://bugzilla.suse.com/show_bug.cgi?id=1224792 * https://bugzilla.suse.com/show_bug.cgi?id=1224793 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1224866 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224933 * https://bugzilla.suse.com/show_bug.cgi?id=1224935 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224939 * https://bugzilla.suse.com/show_bug.cgi?id=1224941 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224946 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224949 * https://bugzilla.suse.com/show_bug.cgi?id=1224951 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1224989 * https://bugzilla.suse.com/show_bug.cgi?id=1224992 * https://bugzilla.suse.com/show_bug.cgi?id=1224998 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225001 * https://bugzilla.suse.com/show_bug.cgi?id=1225004 * https://bugzilla.suse.com/show_bug.cgi?id=1225006 * https://bugzilla.suse.com/show_bug.cgi?id=1225007 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225014 * https://bugzilla.suse.com/show_bug.cgi?id=1225015 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225025 * https://bugzilla.suse.com/show_bug.cgi?id=1225028 * https://bugzilla.suse.com/show_bug.cgi?id=1225029 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225041 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225049 * https://bugzilla.suse.com/show_bug.cgi?id=1225050 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225078 * https://bugzilla.suse.com/show_bug.cgi?id=1225081 * https://bugzilla.suse.com/show_bug.cgi?id=1225085 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225088 * https://bugzilla.suse.com/show_bug.cgi?id=1225090 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225097 * https://bugzilla.suse.com/show_bug.cgi?id=1225098 * https://bugzilla.suse.com/show_bug.cgi?id=1225101 * https://bugzilla.suse.com/show_bug.cgi?id=1225103 * https://bugzilla.suse.com/show_bug.cgi?id=1225104 * https://bugzilla.suse.com/show_bug.cgi?id=1225105 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225120 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225133 * https://bugzilla.suse.com/show_bug.cgi?id=1225134 * https://bugzilla.suse.com/show_bug.cgi?id=1225136 * https://bugzilla.suse.com/show_bug.cgi?id=1225172 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225272 * https://bugzilla.suse.com/show_bug.cgi?id=1225300 * https://bugzilla.suse.com/show_bug.cgi?id=1225391 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225476 * https://bugzilla.suse.com/show_bug.cgi?id=1225477 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225485 * https://bugzilla.suse.com/show_bug.cgi?id=1225489 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225527 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225548 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225555 * https://bugzilla.suse.com/show_bug.cgi?id=1225556 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225564 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225568 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225573 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225578 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225580 * https://bugzilla.suse.com/show_bug.cgi?id=1225581 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225585 * https://bugzilla.suse.com/show_bug.cgi?id=1225586 * https://bugzilla.suse.com/show_bug.cgi?id=1225587 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225594 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://bugzilla.suse.com/show_bug.cgi?id=1225600 * https://bugzilla.suse.com/show_bug.cgi?id=1225601 * https://bugzilla.suse.com/show_bug.cgi?id=1225602 * https://bugzilla.suse.com/show_bug.cgi?id=1225605 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225609 * https://bugzilla.suse.com/show_bug.cgi?id=1225610 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225618 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225681 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225696 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225702 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225711 * https://bugzilla.suse.com/show_bug.cgi?id=1225712 * https://bugzilla.suse.com/show_bug.cgi?id=1225714 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225717 * https://bugzilla.suse.com/show_bug.cgi?id=1225719 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225723 * https://bugzilla.suse.com/show_bug.cgi?id=1225726 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225731 * https://bugzilla.suse.com/show_bug.cgi?id=1225732 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225737 * https://bugzilla.suse.com/show_bug.cgi?id=1225741 * https://bugzilla.suse.com/show_bug.cgi?id=1225744 * https://bugzilla.suse.com/show_bug.cgi?id=1225745 * https://bugzilla.suse.com/show_bug.cgi?id=1225746 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225752 * https://bugzilla.suse.com/show_bug.cgi?id=1225753 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225757 * https://bugzilla.suse.com/show_bug.cgi?id=1225758 * https://bugzilla.suse.com/show_bug.cgi?id=1225759 * https://bugzilla.suse.com/show_bug.cgi?id=1225760 * https://bugzilla.suse.com/show_bug.cgi?id=1225761 * https://bugzilla.suse.com/show_bug.cgi?id=1225762 * https://bugzilla.suse.com/show_bug.cgi?id=1225763 * https://bugzilla.suse.com/show_bug.cgi?id=1225765 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225767 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225773 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225805 * https://bugzilla.suse.com/show_bug.cgi?id=1225810 * https://bugzilla.suse.com/show_bug.cgi?id=1225815 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225823 * https://bugzilla.suse.com/show_bug.cgi?id=1225827 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1225830 * https://bugzilla.suse.com/show_bug.cgi?id=1225834 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225839 * https://bugzilla.suse.com/show_bug.cgi?id=1225840 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://bugzilla.suse.com/show_bug.cgi?id=1225843 * https://bugzilla.suse.com/show_bug.cgi?id=1225847 * https://bugzilla.suse.com/show_bug.cgi?id=1225851 * https://bugzilla.suse.com/show_bug.cgi?id=1225856 * https://bugzilla.suse.com/show_bug.cgi?id=1225866 * https://bugzilla.suse.com/show_bug.cgi?id=1225872 * https://bugzilla.suse.com/show_bug.cgi?id=1225894 * https://bugzilla.suse.com/show_bug.cgi?id=1225895 * https://bugzilla.suse.com/show_bug.cgi?id=1225896 * https://bugzilla.suse.com/show_bug.cgi?id=1225898 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1225945 * https://bugzilla.suse.com/show_bug.cgi?id=1226022 * https://bugzilla.suse.com/show_bug.cgi?id=1226131 * https://bugzilla.suse.com/show_bug.cgi?id=1226145 * https://bugzilla.suse.com/show_bug.cgi?id=1226149 * https://bugzilla.suse.com/show_bug.cgi?id=1226155 * https://bugzilla.suse.com/show_bug.cgi?id=1226158 * https://bugzilla.suse.com/show_bug.cgi?id=1226163 * https://bugzilla.suse.com/show_bug.cgi?id=1226202 * https://bugzilla.suse.com/show_bug.cgi?id=1226211 * https://bugzilla.suse.com/show_bug.cgi?id=1226212 * https://bugzilla.suse.com/show_bug.cgi?id=1226213 * https://bugzilla.suse.com/show_bug.cgi?id=1226226 * https://bugzilla.suse.com/show_bug.cgi?id=1226457 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226503 * https://bugzilla.suse.com/show_bug.cgi?id=1226513 * https://bugzilla.suse.com/show_bug.cgi?id=1226514 * https://bugzilla.suse.com/show_bug.cgi?id=1226519 * https://bugzilla.suse.com/show_bug.cgi?id=1226520 * https://bugzilla.suse.com/show_bug.cgi?id=1226582 * https://bugzilla.suse.com/show_bug.cgi?id=1226587 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226592 * https://bugzilla.suse.com/show_bug.cgi?id=1226593 * https://bugzilla.suse.com/show_bug.cgi?id=1226594 * https://bugzilla.suse.com/show_bug.cgi?id=1226595 * https://bugzilla.suse.com/show_bug.cgi?id=1226597 * https://bugzilla.suse.com/show_bug.cgi?id=1226607 * https://bugzilla.suse.com/show_bug.cgi?id=1226608 * https://bugzilla.suse.com/show_bug.cgi?id=1226610 * https://bugzilla.suse.com/show_bug.cgi?id=1226612 * https://bugzilla.suse.com/show_bug.cgi?id=1226613 * https://bugzilla.suse.com/show_bug.cgi?id=1226630 * https://bugzilla.suse.com/show_bug.cgi?id=1226632 * https://bugzilla.suse.com/show_bug.cgi?id=1226633 * https://bugzilla.suse.com/show_bug.cgi?id=1226634 * https://bugzilla.suse.com/show_bug.cgi?id=1226637 * https://bugzilla.suse.com/show_bug.cgi?id=1226657 * https://bugzilla.suse.com/show_bug.cgi?id=1226658 * https://bugzilla.suse.com/show_bug.cgi?id=1226734 * https://bugzilla.suse.com/show_bug.cgi?id=1226735 * https://bugzilla.suse.com/show_bug.cgi?id=1226737 * https://bugzilla.suse.com/show_bug.cgi?id=1226738 * https://bugzilla.suse.com/show_bug.cgi?id=1226739 * https://bugzilla.suse.com/show_bug.cgi?id=1226740 * https://bugzilla.suse.com/show_bug.cgi?id=1226741 * https://bugzilla.suse.com/show_bug.cgi?id=1226742 * https://bugzilla.suse.com/show_bug.cgi?id=1226744 * https://bugzilla.suse.com/show_bug.cgi?id=1226746 * https://bugzilla.suse.com/show_bug.cgi?id=1226747 * https://bugzilla.suse.com/show_bug.cgi?id=1226749 * https://bugzilla.suse.com/show_bug.cgi?id=1226750 * https://bugzilla.suse.com/show_bug.cgi?id=1226754 * https://bugzilla.suse.com/show_bug.cgi?id=1226757 * https://bugzilla.suse.com/show_bug.cgi?id=1226758 * https://bugzilla.suse.com/show_bug.cgi?id=1226760 * https://bugzilla.suse.com/show_bug.cgi?id=1226761 * https://bugzilla.suse.com/show_bug.cgi?id=1226764 * https://bugzilla.suse.com/show_bug.cgi?id=1226767 * https://bugzilla.suse.com/show_bug.cgi?id=1226768 * https://bugzilla.suse.com/show_bug.cgi?id=1226769 * https://bugzilla.suse.com/show_bug.cgi?id=1226771 * https://bugzilla.suse.com/show_bug.cgi?id=1226772 * https://bugzilla.suse.com/show_bug.cgi?id=1226774 * https://bugzilla.suse.com/show_bug.cgi?id=1226775 * https://bugzilla.suse.com/show_bug.cgi?id=1226776 * https://bugzilla.suse.com/show_bug.cgi?id=1226777 * https://bugzilla.suse.com/show_bug.cgi?id=1226780 * https://bugzilla.suse.com/show_bug.cgi?id=1226781 * https://bugzilla.suse.com/show_bug.cgi?id=1226783 * https://bugzilla.suse.com/show_bug.cgi?id=1226785 * https://bugzilla.suse.com/show_bug.cgi?id=1226786 * https://bugzilla.suse.com/show_bug.cgi?id=1226788 * https://bugzilla.suse.com/show_bug.cgi?id=1226789 * https://bugzilla.suse.com/show_bug.cgi?id=1226790 * https://bugzilla.suse.com/show_bug.cgi?id=1226791 * https://bugzilla.suse.com/show_bug.cgi?id=1226796 * https://bugzilla.suse.com/show_bug.cgi?id=1226799 * https://bugzilla.suse.com/show_bug.cgi?id=1226837 * https://bugzilla.suse.com/show_bug.cgi?id=1226839 * https://bugzilla.suse.com/show_bug.cgi?id=1226840 * https://bugzilla.suse.com/show_bug.cgi?id=1226841 * https://bugzilla.suse.com/show_bug.cgi?id=1226842 * https://bugzilla.suse.com/show_bug.cgi?id=1226844 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226852 * https://bugzilla.suse.com/show_bug.cgi?id=1226856 * https://bugzilla.suse.com/show_bug.cgi?id=1226857 * https://bugzilla.suse.com/show_bug.cgi?id=1226859 * https://bugzilla.suse.com/show_bug.cgi?id=1226861 * https://bugzilla.suse.com/show_bug.cgi?id=1226863 * https://bugzilla.suse.com/show_bug.cgi?id=1226864 * https://bugzilla.suse.com/show_bug.cgi?id=1226866 * https://bugzilla.suse.com/show_bug.cgi?id=1226867 * https://bugzilla.suse.com/show_bug.cgi?id=1226868 * https://bugzilla.suse.com/show_bug.cgi?id=1226875 * https://bugzilla.suse.com/show_bug.cgi?id=1226876 * https://bugzilla.suse.com/show_bug.cgi?id=1226878 * https://bugzilla.suse.com/show_bug.cgi?id=1226879 * https://bugzilla.suse.com/show_bug.cgi?id=1226883 * https://bugzilla.suse.com/show_bug.cgi?id=1226886 * https://bugzilla.suse.com/show_bug.cgi?id=1226890 * https://bugzilla.suse.com/show_bug.cgi?id=1226891 * https://bugzilla.suse.com/show_bug.cgi?id=1226894 * https://bugzilla.suse.com/show_bug.cgi?id=1226895 * https://bugzilla.suse.com/show_bug.cgi?id=1226905 * https://bugzilla.suse.com/show_bug.cgi?id=1226908 * https://bugzilla.suse.com/show_bug.cgi?id=1226909 * https://bugzilla.suse.com/show_bug.cgi?id=1226911 * https://bugzilla.suse.com/show_bug.cgi?id=1226915 * https://bugzilla.suse.com/show_bug.cgi?id=1226928 * https://bugzilla.suse.com/show_bug.cgi?id=1226934 * https://bugzilla.suse.com/show_bug.cgi?id=1226938 * https://bugzilla.suse.com/show_bug.cgi?id=1226939 * https://bugzilla.suse.com/show_bug.cgi?id=1226941 * https://bugzilla.suse.com/show_bug.cgi?id=1226948 * https://bugzilla.suse.com/show_bug.cgi?id=1226949 * https://bugzilla.suse.com/show_bug.cgi?id=1226950 * https://bugzilla.suse.com/show_bug.cgi?id=1226962 * https://bugzilla.suse.com/show_bug.cgi?id=1226976 * https://bugzilla.suse.com/show_bug.cgi?id=1226989 * https://bugzilla.suse.com/show_bug.cgi?id=1226990 * https://bugzilla.suse.com/show_bug.cgi?id=1226992 * https://bugzilla.suse.com/show_bug.cgi?id=1226993 * https://bugzilla.suse.com/show_bug.cgi?id=1226994 * https://bugzilla.suse.com/show_bug.cgi?id=1226995 * https://bugzilla.suse.com/show_bug.cgi?id=1226996 * https://bugzilla.suse.com/show_bug.cgi?id=1227066 * https://bugzilla.suse.com/show_bug.cgi?id=1227072 * https://bugzilla.suse.com/show_bug.cgi?id=1227085 * https://bugzilla.suse.com/show_bug.cgi?id=1227089 * https://bugzilla.suse.com/show_bug.cgi?id=1227090 * https://bugzilla.suse.com/show_bug.cgi?id=1227096 * https://bugzilla.suse.com/show_bug.cgi?id=1227101 * https://bugzilla.suse.com/show_bug.cgi?id=1227103 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227190 * https://bugzilla.suse.com/show_bug.cgi?id=1227282 * https://bugzilla.suse.com/show_bug.cgi?id=1227362 * https://bugzilla.suse.com/show_bug.cgi?id=1227363 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227432 * https://bugzilla.suse.com/show_bug.cgi?id=1227434 * https://bugzilla.suse.com/show_bug.cgi?id=1227435 * https://bugzilla.suse.com/show_bug.cgi?id=1227443 * https://bugzilla.suse.com/show_bug.cgi?id=1227446 * https://bugzilla.suse.com/show_bug.cgi?id=1227447 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227573 * https://bugzilla.suse.com/show_bug.cgi?id=1227626 * https://bugzilla.suse.com/show_bug.cgi?id=1227716 * https://bugzilla.suse.com/show_bug.cgi?id=1227719 * https://bugzilla.suse.com/show_bug.cgi?id=1227723 * https://bugzilla.suse.com/show_bug.cgi?id=1227730 * https://bugzilla.suse.com/show_bug.cgi?id=1227736 * https://bugzilla.suse.com/show_bug.cgi?id=1227755 * https://bugzilla.suse.com/show_bug.cgi?id=1227757 * https://bugzilla.suse.com/show_bug.cgi?id=1227762 * https://bugzilla.suse.com/show_bug.cgi?id=1227763 * https://bugzilla.suse.com/show_bug.cgi?id=1227779 * https://bugzilla.suse.com/show_bug.cgi?id=1227780 * https://bugzilla.suse.com/show_bug.cgi?id=1227783 * https://bugzilla.suse.com/show_bug.cgi?id=1227786 * https://bugzilla.suse.com/show_bug.cgi?id=1227788 * https://bugzilla.suse.com/show_bug.cgi?id=1227789 * https://bugzilla.suse.com/show_bug.cgi?id=1227797 * https://bugzilla.suse.com/show_bug.cgi?id=1227800 * https://bugzilla.suse.com/show_bug.cgi?id=1227801 * https://bugzilla.suse.com/show_bug.cgi?id=1227803 * https://bugzilla.suse.com/show_bug.cgi?id=1227806 * https://bugzilla.suse.com/show_bug.cgi?id=1227813 * https://bugzilla.suse.com/show_bug.cgi?id=1227814 * https://bugzilla.suse.com/show_bug.cgi?id=1227836 * https://bugzilla.suse.com/show_bug.cgi?id=1227855 * https://bugzilla.suse.com/show_bug.cgi?id=1227862 * https://bugzilla.suse.com/show_bug.cgi?id=1227866 * https://bugzilla.suse.com/show_bug.cgi?id=1227886 * https://bugzilla.suse.com/show_bug.cgi?id=1227899 * https://bugzilla.suse.com/show_bug.cgi?id=1227910 * https://bugzilla.suse.com/show_bug.cgi?id=1227913 * https://bugzilla.suse.com/show_bug.cgi?id=1227926 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228193 * https://bugzilla.suse.com/show_bug.cgi?id=1228211 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228289 * https://bugzilla.suse.com/show_bug.cgi?id=1228327 * https://bugzilla.suse.com/show_bug.cgi?id=1228328 * https://bugzilla.suse.com/show_bug.cgi?id=1228403 * https://bugzilla.suse.com/show_bug.cgi?id=1228405 * https://bugzilla.suse.com/show_bug.cgi?id=1228408 * https://bugzilla.suse.com/show_bug.cgi?id=1228417 * https://jira.suse.com/browse/PED-542 * https://jira.suse.com/browse/PED-8111 * https://jira.suse.com/browse/PED-8240 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8570 * https://jira.suse.com/browse/PED-8644 * https://jira.suse.com/browse/PED-8645 * https://jira.suse.com/browse/PED-8649 * https://jira.suse.com/browse/PED-8688 * https://jira.suse.com/browse/PED-8701 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:40 -0000 Subject: SUSE-RU-2025:20004-1: important: Recommended update for cloud-init Message-ID: <174902920000.1737.8909769577117423066@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20004-1 Release Date: 2025-02-03T08:46:09Z Rating: important References: * bsc#1219680 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cloud-init fixes the following issue: * skip renames if the device is already present (bsc#1219680) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-2=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cloud-init-config-suse-23.3-7.1 * cloud-init-23.3-7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:37 -0000 Subject: SUSE-RU-2025:20005-1: important: Recommended update for salt Message-ID: <174902919750.1737.13544289240382297574@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20005-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1211649 * bsc#1211888 * bsc#1216063 * bsc#1219001 * bsc#1222684 Affected Products: * SUSE Linux Micro 6.0 An update that has five fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fix rich rule comparison in firewalld module (bsc#1222684) * test_vultrpy: adjust test expectation to prevent failure after Debian 10 EOL * Make auth.pam more robust with Salt Bundle and fix tests * Fix performance of user.list_groups with many remote groups * Fix "status.diskusage" function and exclude some tests for Salt Bundle * Skip certain tests if necessary for some OSes and set flaky ones * Add a timer to delete old env post update for venv-minion * Several fixes for tests to avoid errors and failures in some OSes * Speed up salt.matcher.confirm_top by using **context** * Do not call the async wrapper calls with the separate thread * Prevent OOM with high amount of batch async calls (bsc#1216063) * Add missing contextvars dependency in salt.version * Skip tests for unsupported algorithm on old OpenSSL version * Remove redundant `_file_find` call to the master * Prevent possible exception in tornado.concurrent.Future._set_done * Make reactor engine less blocking the EventPublisher * Make salt-master self recoverable on killing EventPublisher * Improve broken events catching and reporting * Make logging calls lighter * Remove unused import causing delays on starting salt-master * Mark python3-CherryPy as recommended package for the testsuite * Make "man" a recommended package instead of required * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Provide user(salt)/group(salt) capabilities for RPM 4.19 * Extend dependencies for python3-salt-testsuite and python3-salt packages * Improve Salt and testsuite packages multibuild * Enable multibuilld and create test flavor ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-39=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-3006.0-6.8 * salt-transactional-update-3006.0-6.8 * salt-master-3006.0-6.8 * salt-minion-3006.0-6.8 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216063 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1222684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:26:51 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:26:51 -0000 Subject: SUSE-RU-2025:20001-1: moderate: Recommended update for cockpit Message-ID: <174902921189.1737.10262392552756901126@smelt2.prg2.suse.org> # Recommended update for cockpit Announcement ID: SUSE-RU-2025:20001-1 Release Date: 2025-02-03T08:46:06Z Rating: moderate References: * bsc#1220551 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cockpit fixes the following issues: * Support for watching lastlog2 and wtpmdb. (bsc#1220551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-17=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cockpit-309-6.1 * cockpit-ws-309-6.1 * cockpit-ws-debuginfo-309-6.1 * cockpit-bridge-debuginfo-309-6.1 * cockpit-debuginfo-309-6.1 * cockpit-bridge-309-6.1 * cockpit-debugsource-309-6.1 * SUSE Linux Micro 6.0 (noarch) * cockpit-system-309-6.1 * cockpit-selinux-309-6.1 * cockpit-networkmanager-309-6.1 * cockpit-storaged-309-6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:20 -0000 Subject: SUSE-RU-2025:20001-1: moderate: Recommended update for cockpit Message-ID: <174902948070.651.12845507625717204236@smelt2.prg2.suse.org> # Recommended update for cockpit Announcement ID: SUSE-RU-2025:20001-1 Release Date: 2025-02-03T08:46:06Z Rating: moderate References: * bsc#1220551 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cockpit fixes the following issues: * Support for watching lastlog2 and wtpmdb. (bsc#1220551) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-17=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cockpit-debuginfo-309-6.1 * cockpit-bridge-debuginfo-309-6.1 * cockpit-ws-debuginfo-309-6.1 * cockpit-ws-309-6.1 * cockpit-309-6.1 * cockpit-bridge-309-6.1 * cockpit-debugsource-309-6.1 * SUSE Linux Micro 6.0 (noarch) * cockpit-storaged-309-6.1 * cockpit-selinux-309-6.1 * cockpit-system-309-6.1 * cockpit-networkmanager-309-6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:09 -0000 Subject: SUSE-RU-2025:20005-1: important: Recommended update for salt Message-ID: <174902946930.651.9580476089478655337@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2025:20005-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1211649 * bsc#1211888 * bsc#1216063 * bsc#1219001 * bsc#1222684 Affected Products: * SUSE Linux Micro 6.0 An update that has five fixes can now be installed. ## Description: This update for salt fixes the following issues: * Fix rich rule comparison in firewalld module (bsc#1222684) * test_vultrpy: adjust test expectation to prevent failure after Debian 10 EOL * Make auth.pam more robust with Salt Bundle and fix tests * Fix performance of user.list_groups with many remote groups * Fix "status.diskusage" function and exclude some tests for Salt Bundle * Skip certain tests if necessary for some OSes and set flaky ones * Add a timer to delete old env post update for venv-minion * Several fixes for tests to avoid errors and failures in some OSes * Speed up salt.matcher.confirm_top by using **context** * Do not call the async wrapper calls with the separate thread * Prevent OOM with high amount of batch async calls (bsc#1216063) * Add missing contextvars dependency in salt.version * Skip tests for unsupported algorithm on old OpenSSL version * Remove redundant `_file_find` call to the master * Prevent possible exception in tornado.concurrent.Future._set_done * Make reactor engine less blocking the EventPublisher * Make salt-master self recoverable on killing EventPublisher * Improve broken events catching and reporting * Make logging calls lighter * Remove unused import causing delays on starting salt-master * Mark python3-CherryPy as recommended package for the testsuite * Make "man" a recommended package instead of required * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Provide user(salt)/group(salt) capabilities for RPM 4.19 * Extend dependencies for python3-salt-testsuite and python3-salt packages * Improve Salt and testsuite packages multibuild * Enable multibuilld and create test flavor ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-39=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * salt-minion-3006.0-6.8 * salt-3006.0-6.8 * salt-master-3006.0-6.8 * salt-transactional-update-3006.0-6.8 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216063 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1222684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:12 -0000 Subject: SUSE-RU-2025:20004-1: important: Recommended update for cloud-init Message-ID: <174902947237.651.3955459678027488130@smelt2.prg2.suse.org> # Recommended update for cloud-init Announcement ID: SUSE-RU-2025:20004-1 Release Date: 2025-02-03T08:46:09Z Rating: important References: * bsc#1219680 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cloud-init fixes the following issue: * skip renames if the device is already present (bsc#1219680) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-2=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * cloud-init-23.3-7.1 * cloud-init-config-suse-23.3-7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:06 -0000 Subject: SUSE-RU-2025:20006-1: important: Recommended update for gcc13 Message-ID: <174902946611.651.13687741460906405771@smelt2.prg2.suse.org> # Recommended update for gcc13 Announcement ID: SUSE-RU-2025:20006-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1188441 * bsc#1220724 * bsc#1221239 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that has three fixes can now be installed. ## Description: This update for gcc13 fixes the following issues: * Update to GCC 13.3 release * Removed Fiji support from the GCN offload compiler as that is requiring Code Object version 3 which is no longer supported by llvm18. * Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441] * Make requirement to lld version specific to avoid requiring the meta- package. * Fix unwinding for JIT code. [bsc#1221239] * Revert libgccjit dependency change. [bsc#1220724] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-29=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-29=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libstdc++6-debuginfo-13.3.0+git8781-1.1 * libatomic1-13.3.0+git8781-1.1 * libgomp1-13.3.0+git8781-1.1 * libgcc_s1-debuginfo-13.3.0+git8781-1.1 * gcc13-debugsource-13.3.0+git8781-1.1 * libgomp1-debuginfo-13.3.0+git8781-1.1 * libatomic1-debuginfo-13.3.0+git8781-1.1 * libgcc_s1-13.3.0+git8781-1.1 * libstdc++6-13.3.0+git8781-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * libitm1-debuginfo-13.3.0+git8781-1.1 * cpp13-debuginfo-13.3.0+git8781-1.1 * libtsan2-13.3.0+git8781-1.1 * gcc13-c++-13.3.0+git8781-1.1 * liblsan0-13.3.0+git8781-1.1 * liblsan0-debuginfo-13.3.0+git8781-1.1 * libasan8-debuginfo-13.3.0+git8781-1.1 * libubsan1-13.3.0+git8781-1.1 * libasan8-13.3.0+git8781-1.1 * libtsan2-debuginfo-13.3.0+git8781-1.1 * gcc13-debuginfo-13.3.0+git8781-1.1 * gcc13-debugsource-13.3.0+git8781-1.1 * libitm1-13.3.0+git8781-1.1 * libstdc++6-devel-gcc13-13.3.0+git8781-1.1 * libubsan1-debuginfo-13.3.0+git8781-1.1 * cpp13-13.3.0+git8781-1.1 * gcc13-c++-debuginfo-13.3.0+git8781-1.1 * gcc13-PIE-13.3.0+git8781-1.1 * gcc13-13.3.0+git8781-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 x86_64) * libhwasan0-debuginfo-13.3.0+git8781-1.1 * libhwasan0-13.3.0+git8781-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1188441 * https://bugzilla.suse.com/show_bug.cgi?id=1220724 * https://bugzilla.suse.com/show_bug.cgi?id=1221239 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:02 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:02 -0000 Subject: SUSE-SU-2025:20007-1: important: Security update for less Message-ID: <174902946233.651.7273431868613774927@smelt2.prg2.suse.org> # Security update for less Announcement ID: SUSE-SU-2025:20007-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1222849 Cross-References: * CVE-2024-32487 CVSS scores: * CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for less fixes the following issues: * CVE-2024-32487: Fix a bug where mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-7=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * less-debugsource-633-3.1 * less-633-3.1 * less-debuginfo-633-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32487.html * https://bugzilla.suse.com/show_bug.cgi?id=1222849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:16 -0000 Subject: SUSE-SU-2025:20003-1: important: Security update for util-linux Message-ID: <174902947644.651.8309710611434261269@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2025:20003-1 Release Date: 2025-02-03T08:46:06Z Rating: important References: * bsc#1218609 * bsc#1220117 * bsc#1221831 * bsc#1223605 * bsc#1225598 Cross-References: * CVE-2024-28085 CVSS scores: * CVE-2024-28085 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N * CVE-2024-28085 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has four fixes can now be installed. ## Description: This update for util-linux fixes the following issues: Security issue fixed: * CVE-2024-28085: Properly neutralize escape sequences in wall to avoid potential account takeover. (bsc#1221831) Non-security issues fixed: * Fix hang of lscpu -e (bsc#1225598) * lscpu: Add more ARM cores (bsc#1223605) * Document that chcpu -g is not supported on IBM z/VM (bsc#1218609) * Processes not cleaned up after failed SSH session are using up 100% CPU (bsc#1220117) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-117=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * util-linux-systemd-debuginfo-2.39.3-3.1 * libblkid1-debuginfo-2.39.3-3.1 * libuuid1-2.39.3-3.1 * util-linux-debuginfo-2.39.3-3.1 * libuuid1-debuginfo-2.39.3-3.1 * util-linux-debugsource-2.39.3-3.1 * libsmartcols1-2.39.3-3.1 * util-linux-systemd-debugsource-2.39.3-3.1 * util-linux-systemd-2.39.3-3.1 * libfdisk1-debuginfo-2.39.3-3.1 * libmount1-debuginfo-2.39.3-3.1 * libmount1-2.39.3-3.1 * util-linux-2.39.3-3.1 * libfdisk1-2.39.3-3.1 * libblkid1-2.39.3-3.1 * libsmartcols1-debuginfo-2.39.3-3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28085.html * https://bugzilla.suse.com/show_bug.cgi?id=1218609 * https://bugzilla.suse.com/show_bug.cgi?id=1220117 * https://bugzilla.suse.com/show_bug.cgi?id=1221831 * https://bugzilla.suse.com/show_bug.cgi?id=1223605 * https://bugzilla.suse.com/show_bug.cgi?id=1225598 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:31:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:31:18 -0000 Subject: SUSE-SU-2025:20002-1: important: Security update for nghttp2 Message-ID: <174902947855.651.9048033430744768766@smelt2.prg2.suse.org> # Security update for nghttp2 Announcement ID: SUSE-SU-2025:20002-1 Release Date: 2025-02-03T08:46:06Z Rating: important References: * bsc#1221399 Cross-References: * CVE-2024-28182 CVSS scores: * CVE-2024-28182 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for nghttp2 fixes the following issues: * CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-18=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * nghttp2-debugsource-1.52.0-5.1 * libnghttp2-14-debuginfo-1.52.0-5.1 * libnghttp2-14-1.52.0-5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28182.html * https://bugzilla.suse.com/show_bug.cgi?id=1221399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 09:30:55 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 09:30:55 -0000 Subject: SUSE-SU-2025:20008-1: important: Security update for the Linux Kernel Message-ID: <174902945511.651.1009929255156109789@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20008-1 Release Date: 2025-02-03T08:47:39Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1141539 * bsc#1181674 * bsc#1186716 * bsc#1187716 * bsc#1193599 * bsc#1194869 * bsc#1195775 * bsc#1204562 * bsc#1207948 * bsc#1208593 * bsc#1209657 * bsc#1209834 * bsc#1213573 * bsc#1214852 * bsc#1215199 * bsc#1215587 * bsc#1216196 * bsc#1216358 * bsc#1216702 * bsc#1217169 * bsc#1217384 * bsc#1217408 * bsc#1217481 * bsc#1217489 * bsc#1217750 * bsc#1217912 * bsc#1217959 * bsc#1218205 * bsc#1218336 * bsc#1218442 * bsc#1218447 * bsc#1218562 * bsc#1218730 * bsc#1218779 * bsc#1218820 * bsc#1218917 * bsc#1219104 * bsc#1219170 * bsc#1219224 * bsc#1219451 * bsc#1219478 * bsc#1219485 * bsc#1219596 * bsc#1219623 * bsc#1219633 * bsc#1219832 * bsc#1219834 * bsc#1219847 * bsc#1219953 * bsc#1220021 * bsc#1220045 * bsc#1220120 * bsc#1220138 * bsc#1220148 * bsc#1220328 * bsc#1220342 * bsc#1220427 * bsc#1220428 * bsc#1220430 * bsc#1220569 * bsc#1220587 * bsc#1220738 * bsc#1220783 * bsc#1220915 * bsc#1220942 * bsc#1221044 * bsc#1221057 * bsc#1221086 * bsc#1221293 * bsc#1221303 * bsc#1221504 * bsc#1221612 * bsc#1221615 * bsc#1221635 * bsc#1221645 * bsc#1221647 * bsc#1221649 * bsc#1221654 * bsc#1221656 * bsc#1221659 * bsc#1221765 * bsc#1221777 * bsc#1221783 * bsc#1221816 * bsc#1221829 * bsc#1221830 * bsc#1221858 * bsc#1221958 * bsc#1222011 * bsc#1222015 * bsc#1222080 * bsc#1222173 * bsc#1222241 * bsc#1222264 * bsc#1222273 * bsc#1222294 * bsc#1222301 * bsc#1222303 * bsc#1222304 * bsc#1222307 * bsc#1222326 * bsc#1222328 * bsc#1222357 * bsc#1222366 * bsc#1222368 * bsc#1222371 * bsc#1222378 * bsc#1222380 * bsc#1222385 * bsc#1222422 * bsc#1222426 * bsc#1222428 * bsc#1222437 * bsc#1222438 * bsc#1222445 * bsc#1222459 * bsc#1222463 * bsc#1222464 * bsc#1222489 * bsc#1222522 * bsc#1222525 * bsc#1222532 * bsc#1222557 * bsc#1222559 * bsc#1222563 * bsc#1222585 * bsc#1222588 * bsc#1222596 * bsc#1222606 * bsc#1222608 * bsc#1222613 * bsc#1222615 * bsc#1222617 * bsc#1222618 * bsc#1222619 * bsc#1222622 * bsc#1222624 * bsc#1222627 * bsc#1222630 * bsc#1222635 * bsc#1222654 * bsc#1222721 * bsc#1222727 * bsc#1222768 * bsc#1222769 * bsc#1222771 * bsc#1222775 * bsc#1222777 * bsc#1222779 * bsc#1222780 * bsc#1222782 * bsc#1222793 * bsc#1222799 * bsc#1222801 * bsc#1222809 * bsc#1222810 * bsc#1222893 * bsc#1222968 * bsc#1223007 * bsc#1223010 * bsc#1223011 * bsc#1223015 * bsc#1223016 * bsc#1223018 * bsc#1223020 * bsc#1223021 * bsc#1223023 * bsc#1223024 * bsc#1223033 * bsc#1223034 * bsc#1223035 * bsc#1223038 * bsc#1223039 * bsc#1223041 * bsc#1223045 * bsc#1223046 * bsc#1223051 * bsc#1223052 * bsc#1223058 * bsc#1223060 * bsc#1223061 * bsc#1223062 * bsc#1223076 * bsc#1223077 * bsc#1223084 * bsc#1223111 * bsc#1223113 * bsc#1223138 * bsc#1223143 * bsc#1223187 * bsc#1223189 * bsc#1223190 * bsc#1223191 * bsc#1223198 * bsc#1223202 * bsc#1223265 * bsc#1223285 * bsc#1223315 * bsc#1223338 * bsc#1223369 * bsc#1223380 * bsc#1223384 * bsc#1223390 * bsc#1223439 * bsc#1223462 * bsc#1223532 * bsc#1223539 * bsc#1223570 * bsc#1223575 * bsc#1223590 * bsc#1223591 * bsc#1223592 * bsc#1223593 * bsc#1223625 * bsc#1223626 * bsc#1223627 * bsc#1223629 * bsc#1223631 * bsc#1223632 * bsc#1223633 * bsc#1223634 * bsc#1223637 * bsc#1223638 * bsc#1223641 * bsc#1223642 * bsc#1223643 * bsc#1223644 * bsc#1223645 * bsc#1223646 * bsc#1223648 * bsc#1223649 * bsc#1223650 * bsc#1223651 * bsc#1223652 * bsc#1223653 * bsc#1223654 * bsc#1223655 * bsc#1223657 * bsc#1223660 * bsc#1223661 * bsc#1223663 * bsc#1223664 * bsc#1223665 * bsc#1223666 * bsc#1223667 * bsc#1223668 * bsc#1223669 * bsc#1223670 * bsc#1223671 * bsc#1223675 * bsc#1223677 * bsc#1223678 * bsc#1223679 * bsc#1223686 * bsc#1223692 * bsc#1223693 * bsc#1223695 * bsc#1223696 * bsc#1223698 * bsc#1223699 * bsc#1223705 * bsc#1223709 * bsc#1223711 * bsc#1223712 * bsc#1223714 * bsc#1223715 * bsc#1223717 * bsc#1223718 * bsc#1223723 * bsc#1223725 * bsc#1223728 * bsc#1223731 * bsc#1223732 * bsc#1223734 * bsc#1223735 * bsc#1223737 * bsc#1223738 * bsc#1223739 * bsc#1223740 * bsc#1223741 * bsc#1223744 * bsc#1223745 * bsc#1223747 * bsc#1223748 * bsc#1223749 * bsc#1223750 * bsc#1223752 * bsc#1223754 * bsc#1223756 * bsc#1223757 * bsc#1223759 * bsc#1223760 * bsc#1223761 * bsc#1223762 * bsc#1223764 * bsc#1223765 * bsc#1223768 * bsc#1223769 * bsc#1223770 * bsc#1223774 * bsc#1223776 * bsc#1223778 * bsc#1223779 * bsc#1223780 * bsc#1223781 * bsc#1223782 * bsc#1223787 * bsc#1223788 * bsc#1223789 * bsc#1223790 * bsc#1223802 * bsc#1223804 * bsc#1223805 * bsc#1223806 * bsc#1223807 * bsc#1223808 * bsc#1223810 * bsc#1223813 * bsc#1223815 * bsc#1223816 * bsc#1223819 * bsc#1223821 * bsc#1223822 * bsc#1223823 * bsc#1223824 * bsc#1223826 * bsc#1223827 * bsc#1223828 * bsc#1223829 * bsc#1223831 * bsc#1223834 * bsc#1223836 * bsc#1223837 * bsc#1223838 * bsc#1223842 * bsc#1223843 * bsc#1223844 * bsc#1223847 * bsc#1223863 * bsc#1223869 * bsc#1223870 * bsc#1223871 * bsc#1223872 * bsc#1223874 * bsc#1223944 * bsc#1223945 * bsc#1223946 * bsc#1223991 * bsc#1224049 * bsc#1224076 * bsc#1224096 * bsc#1224098 * bsc#1224099 * bsc#1224137 * bsc#1224166 * bsc#1224174 * bsc#1224177 * bsc#1224180 * bsc#1224181 * bsc#1224187 * bsc#1224331 * bsc#1224348 * bsc#1224414 * bsc#1224422 * bsc#1224423 * bsc#1224429 * bsc#1224430 * bsc#1224432 * bsc#1224433 * bsc#1224437 * bsc#1224438 * bsc#1224439 * bsc#1224442 * bsc#1224443 * bsc#1224445 * bsc#1224449 * bsc#1224477 * bsc#1224479 * bsc#1224480 * bsc#1224481 * bsc#1224482 * bsc#1224486 * bsc#1224487 * bsc#1224488 * bsc#1224490 * bsc#1224491 * bsc#1224492 * bsc#1224493 * bsc#1224494 * bsc#1224495 * bsc#1224497 * bsc#1224498 * bsc#1224499 * bsc#1224500 * bsc#1224501 * bsc#1224502 * bsc#1224504 * bsc#1224505 * bsc#1224506 * bsc#1224507 * bsc#1224508 * bsc#1224509 * bsc#1224511 * bsc#1224512 * bsc#1224513 * bsc#1224515 * bsc#1224516 * bsc#1224517 * bsc#1224519 * bsc#1224520 * bsc#1224521 * bsc#1224523 * bsc#1224524 * bsc#1224525 * bsc#1224526 * bsc#1224530 * bsc#1224531 * bsc#1224534 * bsc#1224537 * bsc#1224539 * bsc#1224540 * bsc#1224541 * bsc#1224542 * bsc#1224543 * bsc#1224544 * bsc#1224545 * bsc#1224546 * bsc#1224549 * bsc#1224550 * bsc#1224552 * bsc#1224553 * bsc#1224555 * bsc#1224557 * bsc#1224558 * bsc#1224559 * bsc#1224562 * bsc#1224565 * bsc#1224566 * bsc#1224567 * bsc#1224568 * bsc#1224569 * bsc#1224571 * bsc#1224572 * bsc#1224573 * bsc#1224575 * bsc#1224576 * bsc#1224577 * bsc#1224578 * bsc#1224579 * bsc#1224580 * bsc#1224581 * bsc#1224582 * bsc#1224583 * bsc#1224584 * bsc#1224585 * bsc#1224586 * bsc#1224587 * bsc#1224588 * bsc#1224589 * bsc#1224592 * bsc#1224596 * bsc#1224598 * bsc#1224600 * bsc#1224601 * bsc#1224602 * bsc#1224603 * bsc#1224604 * bsc#1224605 * bsc#1224606 * bsc#1224607 * bsc#1224608 * bsc#1224609 * bsc#1224611 * bsc#1224612 * bsc#1224613 * bsc#1224614 * bsc#1224615 * bsc#1224617 * bsc#1224618 * bsc#1224619 * bsc#1224620 * bsc#1224621 * bsc#1224622 * bsc#1224623 * bsc#1224624 * bsc#1224626 * bsc#1224627 * bsc#1224628 * bsc#1224629 * bsc#1224630 * bsc#1224632 * bsc#1224633 * bsc#1224634 * bsc#1224636 * bsc#1224637 * bsc#1224638 * bsc#1224639 * bsc#1224640 * bsc#1224641 * bsc#1224643 * bsc#1224644 * bsc#1224645 * bsc#1224646 * bsc#1224647 * bsc#1224648 * bsc#1224649 * bsc#1224650 * bsc#1224651 * bsc#1224652 * bsc#1224653 * bsc#1224654 * bsc#1224655 * bsc#1224657 * bsc#1224659 * bsc#1224660 * bsc#1224661 * bsc#1224662 * bsc#1224663 * bsc#1224664 * bsc#1224665 * bsc#1224666 * bsc#1224667 * bsc#1224668 * bsc#1224670 * bsc#1224671 * bsc#1224672 * bsc#1224673 * bsc#1224674 * bsc#1224675 * bsc#1224676 * bsc#1224677 * bsc#1224678 * bsc#1224679 * bsc#1224680 * bsc#1224681 * bsc#1224682 * bsc#1224683 * bsc#1224685 * bsc#1224686 * bsc#1224687 * bsc#1224688 * bsc#1224692 * bsc#1224696 * bsc#1224697 * bsc#1224698 * bsc#1224699 * bsc#1224701 * bsc#1224703 * bsc#1224704 * bsc#1224705 * bsc#1224706 * bsc#1224707 * bsc#1224709 * bsc#1224710 * bsc#1224712 * bsc#1224714 * bsc#1224716 * bsc#1224717 * bsc#1224718 * bsc#1224719 * bsc#1224720 * bsc#1224721 * bsc#1224722 * bsc#1224723 * bsc#1224725 * bsc#1224727 * bsc#1224729 * bsc#1224730 * bsc#1224731 * bsc#1224732 * bsc#1224733 * bsc#1224735 * bsc#1224736 * bsc#1224738 * bsc#1224739 * bsc#1224740 * bsc#1224741 * bsc#1224742 * bsc#1224743 * bsc#1224747 * bsc#1224749 * bsc#1224751 * bsc#1224759 * bsc#1224763 * bsc#1224764 * bsc#1224765 * bsc#1224766 * bsc#1224767 * bsc#1224790 * bsc#1224792 * bsc#1224793 * bsc#1224803 * bsc#1224804 * bsc#1224866 * bsc#1224928 * bsc#1224930 * bsc#1224932 * bsc#1224933 * bsc#1224935 * bsc#1224936 * bsc#1224937 * bsc#1224939 * bsc#1224941 * bsc#1224944 * bsc#1224946 * bsc#1224947 * bsc#1224949 * bsc#1224951 * bsc#1224988 * bsc#1224989 * bsc#1224992 * bsc#1224998 * bsc#1225000 * bsc#1225001 * bsc#1225004 * bsc#1225006 * bsc#1225007 * bsc#1225008 * bsc#1225009 * bsc#1225014 * bsc#1225015 * bsc#1225022 * bsc#1225025 * bsc#1225028 * bsc#1225029 * bsc#1225031 * bsc#1225036 * bsc#1225041 * bsc#1225044 * bsc#1225049 * bsc#1225050 * bsc#1225053 * bsc#1225076 * bsc#1225077 * bsc#1225078 * bsc#1225081 * bsc#1225085 * bsc#1225086 * bsc#1225088 * bsc#1225090 * bsc#1225092 * bsc#1225096 * bsc#1225097 * bsc#1225098 * bsc#1225101 * bsc#1225103 * bsc#1225104 * bsc#1225105 * bsc#1225106 * bsc#1225108 * bsc#1225120 * bsc#1225132 * bsc#1225133 * bsc#1225134 * bsc#1225136 * bsc#1225172 * bsc#1225180 * bsc#1225272 * bsc#1225300 * bsc#1225391 * bsc#1225472 * bsc#1225475 * bsc#1225476 * bsc#1225477 * bsc#1225478 * bsc#1225485 * bsc#1225489 * bsc#1225490 * bsc#1225502 * bsc#1225527 * bsc#1225529 * bsc#1225530 * bsc#1225532 * bsc#1225534 * bsc#1225548 * bsc#1225550 * bsc#1225553 * bsc#1225554 * bsc#1225555 * bsc#1225556 * bsc#1225557 * bsc#1225559 * bsc#1225560 * bsc#1225564 * bsc#1225565 * bsc#1225566 * bsc#1225568 * bsc#1225569 * bsc#1225570 * bsc#1225571 * bsc#1225572 * bsc#1225573 * bsc#1225577 * bsc#1225578 * bsc#1225579 * bsc#1225580 * bsc#1225581 * bsc#1225583 * bsc#1225584 * bsc#1225585 * bsc#1225586 * bsc#1225587 * bsc#1225588 * bsc#1225589 * bsc#1225590 * bsc#1225591 * bsc#1225592 * bsc#1225593 * bsc#1225594 * bsc#1225595 * bsc#1225599 * bsc#1225600 * bsc#1225601 * bsc#1225602 * bsc#1225605 * bsc#1225607 * bsc#1225609 * bsc#1225610 * bsc#1225611 * bsc#1225616 * bsc#1225618 * bsc#1225640 * bsc#1225642 * bsc#1225681 * bsc#1225692 * bsc#1225694 * bsc#1225695 * bsc#1225696 * bsc#1225698 * bsc#1225699 * bsc#1225702 * bsc#1225704 * bsc#1225705 * bsc#1225708 * bsc#1225710 * bsc#1225711 * bsc#1225712 * bsc#1225714 * bsc#1225715 * bsc#1225717 * bsc#1225719 * bsc#1225720 * bsc#1225722 * bsc#1225723 * bsc#1225726 * bsc#1225728 * bsc#1225731 * bsc#1225732 * bsc#1225734 * bsc#1225735 * bsc#1225736 * bsc#1225737 * bsc#1225741 * bsc#1225744 * bsc#1225745 * bsc#1225746 * bsc#1225747 * bsc#1225748 * bsc#1225749 * bsc#1225750 * bsc#1225752 * bsc#1225753 * bsc#1225756 * bsc#1225757 * bsc#1225758 * bsc#1225759 * bsc#1225760 * bsc#1225761 * bsc#1225762 * bsc#1225763 * bsc#1225765 * bsc#1225766 * bsc#1225767 * bsc#1225769 * bsc#1225770 * bsc#1225773 * bsc#1225775 * bsc#1225805 * bsc#1225810 * bsc#1225815 * bsc#1225820 * bsc#1225823 * bsc#1225827 * bsc#1225829 * bsc#1225830 * bsc#1225834 * bsc#1225835 * bsc#1225839 * bsc#1225840 * bsc#1225842 * bsc#1225843 * bsc#1225847 * bsc#1225851 * bsc#1225856 * bsc#1225866 * bsc#1225872 * bsc#1225894 * bsc#1225895 * bsc#1225896 * bsc#1225898 * bsc#1225903 * bsc#1225945 * bsc#1226022 * bsc#1226131 * bsc#1226145 * bsc#1226149 * bsc#1226155 * bsc#1226158 * bsc#1226163 * bsc#1226202 * bsc#1226211 * bsc#1226212 * bsc#1226213 * bsc#1226226 * bsc#1226457 * bsc#1226502 * bsc#1226503 * bsc#1226513 * bsc#1226514 * bsc#1226519 * bsc#1226520 * bsc#1226582 * bsc#1226587 * bsc#1226588 * bsc#1226592 * bsc#1226593 * bsc#1226594 * bsc#1226595 * bsc#1226597 * bsc#1226607 * bsc#1226608 * bsc#1226610 * bsc#1226612 * bsc#1226613 * bsc#1226630 * bsc#1226632 * bsc#1226633 * bsc#1226634 * bsc#1226637 * bsc#1226657 * bsc#1226658 * bsc#1226734 * bsc#1226735 * bsc#1226737 * bsc#1226738 * bsc#1226739 * bsc#1226740 * bsc#1226741 * bsc#1226742 * bsc#1226744 * bsc#1226746 * bsc#1226747 * bsc#1226749 * bsc#1226750 * bsc#1226754 * bsc#1226757 * bsc#1226758 * bsc#1226760 * bsc#1226761 * bsc#1226764 * bsc#1226767 * bsc#1226768 * bsc#1226769 * bsc#1226771 * bsc#1226772 * bsc#1226774 * bsc#1226775 * bsc#1226776 * bsc#1226777 * bsc#1226780 * bsc#1226781 * bsc#1226783 * bsc#1226785 * bsc#1226786 * bsc#1226788 * bsc#1226789 * bsc#1226790 * bsc#1226791 * bsc#1226796 * bsc#1226799 * bsc#1226837 * bsc#1226839 * bsc#1226840 * bsc#1226841 * bsc#1226842 * bsc#1226844 * bsc#1226848 * bsc#1226852 * bsc#1226856 * bsc#1226857 * bsc#1226859 * bsc#1226861 * bsc#1226863 * bsc#1226864 * bsc#1226866 * bsc#1226867 * bsc#1226868 * bsc#1226875 * bsc#1226876 * bsc#1226878 * bsc#1226879 * bsc#1226883 * bsc#1226886 * bsc#1226890 * bsc#1226891 * bsc#1226894 * bsc#1226895 * bsc#1226905 * bsc#1226908 * bsc#1226909 * bsc#1226911 * bsc#1226915 * bsc#1226928 * bsc#1226934 * bsc#1226938 * bsc#1226939 * bsc#1226941 * bsc#1226948 * bsc#1226949 * bsc#1226950 * bsc#1226962 * bsc#1226976 * bsc#1226989 * bsc#1226990 * bsc#1226992 * bsc#1226993 * bsc#1226994 * bsc#1226995 * bsc#1226996 * bsc#1227066 * bsc#1227072 * bsc#1227085 * bsc#1227089 * bsc#1227090 * bsc#1227096 * bsc#1227101 * bsc#1227103 * bsc#1227149 * bsc#1227190 * bsc#1227282 * bsc#1227362 * bsc#1227363 * bsc#1227383 * bsc#1227432 * bsc#1227434 * bsc#1227435 * bsc#1227443 * bsc#1227446 * bsc#1227447 * bsc#1227487 * bsc#1227573 * bsc#1227626 * bsc#1227716 * bsc#1227719 * bsc#1227723 * bsc#1227730 * bsc#1227736 * bsc#1227755 * bsc#1227757 * bsc#1227762 * bsc#1227763 * bsc#1227779 * bsc#1227780 * bsc#1227783 * bsc#1227786 * bsc#1227788 * bsc#1227789 * bsc#1227797 * bsc#1227800 * bsc#1227801 * bsc#1227803 * bsc#1227806 * bsc#1227813 * bsc#1227814 * bsc#1227836 * bsc#1227855 * bsc#1227862 * bsc#1227866 * bsc#1227886 * bsc#1227899 * bsc#1227910 * bsc#1227913 * bsc#1227926 * bsc#1228090 * bsc#1228192 * bsc#1228193 * bsc#1228211 * bsc#1228269 * bsc#1228289 * bsc#1228327 * bsc#1228328 * bsc#1228403 * bsc#1228405 * bsc#1228408 * bsc#1228417 * jsc#PED-542 * jsc#PED-8111 * jsc#PED-8240 * jsc#PED-8491 * jsc#PED-8570 * jsc#PED-8644 * jsc#PED-8645 * jsc#PED-8649 * jsc#PED-8688 * jsc#PED-8701 * jsc#PED-8954 Cross-References: * CVE-2021-47432 * CVE-2022-48669 * CVE-2022-48772 * CVE-2023-0160 * CVE-2023-38417 * CVE-2023-47210 * CVE-2023-51780 * CVE-2023-52434 * CVE-2023-52435 * CVE-2023-52458 * CVE-2023-52472 * CVE-2023-52483 * CVE-2023-52503 * CVE-2023-52616 * CVE-2023-52618 * CVE-2023-52622 * CVE-2023-52631 * CVE-2023-52635 * CVE-2023-52640 * CVE-2023-52641 * CVE-2023-52645 * CVE-2023-52647 * CVE-2023-52648 * CVE-2023-52649 * CVE-2023-52650 * CVE-2023-52652 * CVE-2023-52653 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52656 * CVE-2023-52657 * CVE-2023-52658 * CVE-2023-52659 * CVE-2023-52660 * CVE-2023-52661 * CVE-2023-52662 * CVE-2023-52663 * CVE-2023-52664 * CVE-2023-52667 * CVE-2023-52669 * CVE-2023-52670 * CVE-2023-52671 * CVE-2023-52672 * CVE-2023-52673 * CVE-2023-52674 * CVE-2023-52675 * CVE-2023-52676 * CVE-2023-52678 * CVE-2023-52679 * CVE-2023-52680 * CVE-2023-52681 * CVE-2023-52683 * CVE-2023-52686 * CVE-2023-52687 * CVE-2023-52690 * CVE-2023-52691 * CVE-2023-52692 * CVE-2023-52693 * CVE-2023-52694 * CVE-2023-52695 * CVE-2023-52696 * CVE-2023-52697 * CVE-2023-52698 * CVE-2023-52699 * CVE-2023-52735 * CVE-2023-52749 * CVE-2023-52750 * CVE-2023-52751 * CVE-2023-52753 * CVE-2023-52754 * CVE-2023-52757 * CVE-2023-52759 * CVE-2023-52762 * CVE-2023-52763 * CVE-2023-52764 * CVE-2023-52765 * CVE-2023-52766 * CVE-2023-52767 * CVE-2023-52768 * CVE-2023-52769 * CVE-2023-52771 * CVE-2023-52772 * CVE-2023-52773 * CVE-2023-52774 * CVE-2023-52775 * CVE-2023-52776 * CVE-2023-52777 * CVE-2023-52780 * CVE-2023-52781 * CVE-2023-52782 * CVE-2023-52783 * CVE-2023-52784 * CVE-2023-52786 * CVE-2023-52787 * CVE-2023-52788 * CVE-2023-52789 * CVE-2023-52791 * CVE-2023-52792 * CVE-2023-52794 * CVE-2023-52795 * CVE-2023-52796 * CVE-2023-52798 * CVE-2023-52799 * CVE-2023-52800 * CVE-2023-52801 * CVE-2023-52803 * CVE-2023-52804 * CVE-2023-52805 * CVE-2023-52806 * CVE-2023-52807 * CVE-2023-52808 * CVE-2023-52809 * CVE-2023-52810 * CVE-2023-52811 * CVE-2023-52812 * CVE-2023-52813 * CVE-2023-52814 * CVE-2023-52815 * CVE-2023-52816 * CVE-2023-52817 * CVE-2023-52818 * CVE-2023-52819 * CVE-2023-52821 * CVE-2023-52825 * CVE-2023-52826 * CVE-2023-52827 * CVE-2023-52829 * CVE-2023-52832 * CVE-2023-52833 * CVE-2023-52834 * CVE-2023-52835 * CVE-2023-52836 * CVE-2023-52837 * CVE-2023-52838 * CVE-2023-52840 * CVE-2023-52841 * CVE-2023-52842 * CVE-2023-52843 * CVE-2023-52844 * CVE-2023-52845 * CVE-2023-52846 * CVE-2023-52847 * CVE-2023-52849 * CVE-2023-52850 * CVE-2023-52851 * CVE-2023-52853 * CVE-2023-52854 * CVE-2023-52855 * CVE-2023-52856 * CVE-2023-52857 * CVE-2023-52858 * CVE-2023-52860 * CVE-2023-52861 * CVE-2023-52862 * CVE-2023-52863 * CVE-2023-52864 * CVE-2023-52865 * CVE-2023-52866 * CVE-2023-52867 * CVE-2023-52868 * CVE-2023-52869 * CVE-2023-52870 * CVE-2023-52871 * CVE-2023-52872 * CVE-2023-52873 * CVE-2023-52874 * CVE-2023-52875 * CVE-2023-52876 * CVE-2023-52877 * CVE-2023-52878 * CVE-2023-52879 * CVE-2023-52880 * CVE-2023-52881 * CVE-2023-52882 * CVE-2023-52883 * CVE-2023-52884 * CVE-2023-6238 * CVE-2023-6270 * CVE-2023-7042 * CVE-2024-0639 * CVE-2024-21823 * CVE-2024-22099 * CVE-2024-23848 * CVE-2024-24861 * CVE-2024-25739 * CVE-2024-25741 * CVE-2024-26601 * CVE-2024-26611 * CVE-2024-26614 * CVE-2024-26615 * CVE-2024-26623 * CVE-2024-26625 * CVE-2024-26632 * CVE-2024-26633 * CVE-2024-26635 * CVE-2024-26636 * CVE-2024-26638 * CVE-2024-26641 * CVE-2024-26642 * CVE-2024-26643 * CVE-2024-26654 * CVE-2024-26656 * CVE-2024-26657 * CVE-2024-26663 * CVE-2024-26665 * CVE-2024-26671 * CVE-2024-26673 * CVE-2024-26674 * CVE-2024-26676 * CVE-2024-26679 * CVE-2024-26684 * CVE-2024-26685 * CVE-2024-26691 * CVE-2024-26692 * CVE-2024-26704 * CVE-2024-26714 * CVE-2024-26726 * CVE-2024-26731 * CVE-2024-26733 * CVE-2024-26734 * CVE-2024-26737 * CVE-2024-26739 * CVE-2024-26740 * CVE-2024-26742 * CVE-2024-26750 * CVE-2024-26758 * CVE-2024-26760 * CVE-2024-26761 * CVE-2024-26764 * CVE-2024-26767 * CVE-2024-26769 * CVE-2024-26772 * CVE-2024-26773 * CVE-2024-26774 * CVE-2024-26775 * CVE-2024-26780 * CVE-2024-26783 * CVE-2024-26785 * CVE-2024-26786 * CVE-2024-26791 * CVE-2024-26793 * CVE-2024-26794 * CVE-2024-26802 * CVE-2024-26805 * CVE-2024-26807 * CVE-2024-26813 * CVE-2024-26814 * CVE-2024-26815 * CVE-2024-26816 * CVE-2024-26822 * CVE-2024-26826 * CVE-2024-26828 * CVE-2024-26832 * CVE-2024-26836 * CVE-2024-26844 * CVE-2024-26845 * CVE-2024-26846 * CVE-2024-26853 * CVE-2024-26854 * CVE-2024-26855 * CVE-2024-26856 * CVE-2024-26857 * CVE-2024-26858 * CVE-2024-26860 * CVE-2024-26861 * CVE-2024-26862 * CVE-2024-26863 * CVE-2024-26865 * CVE-2024-26866 * CVE-2024-26868 * CVE-2024-26870 * CVE-2024-26878 * CVE-2024-26881 * CVE-2024-26882 * CVE-2024-26883 * CVE-2024-26884 * CVE-2024-26885 * CVE-2024-26889 * CVE-2024-26898 * CVE-2024-26899 * CVE-2024-26900 * CVE-2024-26901 * CVE-2024-26903 * CVE-2024-26906 * CVE-2024-26909 * CVE-2024-26919 * CVE-2024-26920 * CVE-2024-26921 * CVE-2024-26922 * CVE-2024-26923 * CVE-2024-26925 * CVE-2024-26928 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-26931 * CVE-2024-26932 * CVE-2024-26933 * CVE-2024-26934 * CVE-2024-26935 * CVE-2024-26937 * CVE-2024-26938 * CVE-2024-26939 * CVE-2024-26940 * CVE-2024-26943 * CVE-2024-26944 * CVE-2024-26945 * CVE-2024-26946 * CVE-2024-26948 * CVE-2024-26949 * CVE-2024-26950 * CVE-2024-26951 * CVE-2024-26955 * CVE-2024-26956 * CVE-2024-26957 * CVE-2024-26958 * CVE-2024-26959 * CVE-2024-26960 * CVE-2024-26961 * CVE-2024-26962 * CVE-2024-26963 * CVE-2024-26964 * CVE-2024-26965 * CVE-2024-26966 * CVE-2024-26968 * CVE-2024-26969 * CVE-2024-26970 * CVE-2024-26972 * CVE-2024-26973 * CVE-2024-26974 * CVE-2024-26975 * CVE-2024-26977 * CVE-2024-26978 * CVE-2024-26981 * CVE-2024-26982 * CVE-2024-26983 * CVE-2024-26984 * CVE-2024-26986 * CVE-2024-26988 * CVE-2024-26989 * CVE-2024-26990 * CVE-2024-26991 * CVE-2024-26992 * CVE-2024-26993 * CVE-2024-26994 * CVE-2024-26995 * CVE-2024-26996 * CVE-2024-26997 * CVE-2024-26999 * CVE-2024-27000 * CVE-2024-27001 * CVE-2024-27002 * CVE-2024-27003 * CVE-2024-27004 * CVE-2024-27008 * CVE-2024-27009 * CVE-2024-27012 * CVE-2024-27013 * CVE-2024-27014 * CVE-2024-27015 * CVE-2024-27016 * CVE-2024-27019 * CVE-2024-27020 * CVE-2024-27022 * CVE-2024-27023 * CVE-2024-27025 * CVE-2024-27027 * CVE-2024-27028 * CVE-2024-27029 * CVE-2024-27030 * CVE-2024-27031 * CVE-2024-27036 * CVE-2024-27037 * CVE-2024-27038 * CVE-2024-27039 * CVE-2024-27040 * CVE-2024-27041 * CVE-2024-27042 * CVE-2024-27043 * CVE-2024-27044 * CVE-2024-27045 * CVE-2024-27046 * CVE-2024-27047 * CVE-2024-27048 * CVE-2024-27051 * CVE-2024-27052 * CVE-2024-27053 * CVE-2024-27054 * CVE-2024-27056 * CVE-2024-27057 * CVE-2024-27059 * CVE-2024-27060 * CVE-2024-27062 * CVE-2024-27064 * CVE-2024-27065 * CVE-2024-27067 * CVE-2024-27068 * CVE-2024-27071 * CVE-2024-27072 * CVE-2024-27073 * CVE-2024-27074 * CVE-2024-27075 * CVE-2024-27076 * CVE-2024-27077 * CVE-2024-27078 * CVE-2024-27080 * CVE-2024-27388 * CVE-2024-27389 * CVE-2024-27391 * CVE-2024-27393 * CVE-2024-27395 * CVE-2024-27396 * CVE-2024-27398 * CVE-2024-27399 * CVE-2024-27400 * CVE-2024-27401 * CVE-2024-27402 * CVE-2024-27404 * CVE-2024-27405 * CVE-2024-27408 * CVE-2024-27410 * CVE-2024-27411 * CVE-2024-27412 * CVE-2024-27413 * CVE-2024-27414 * CVE-2024-27416 * CVE-2024-27417 * CVE-2024-27418 * CVE-2024-27419 * CVE-2024-27431 * CVE-2024-27432 * CVE-2024-27434 * CVE-2024-27435 * CVE-2024-27436 * CVE-2024-33619 * CVE-2024-34777 * CVE-2024-35247 * CVE-2024-35784 * CVE-2024-35786 * CVE-2024-35788 * CVE-2024-35789 * CVE-2024-35790 * CVE-2024-35791 * CVE-2024-35794 * CVE-2024-35795 * CVE-2024-35796 * CVE-2024-35799 * CVE-2024-35800 * CVE-2024-35801 * CVE-2024-35803 * CVE-2024-35804 * CVE-2024-35805 * CVE-2024-35806 * CVE-2024-35807 * CVE-2024-35808 * CVE-2024-35809 * CVE-2024-35810 * CVE-2024-35811 * CVE-2024-35812 * CVE-2024-35813 * CVE-2024-35814 * CVE-2024-35815 * CVE-2024-35817 * CVE-2024-35819 * CVE-2024-35821 * CVE-2024-35822 * CVE-2024-35823 * CVE-2024-35824 * CVE-2024-35825 * CVE-2024-35827 * CVE-2024-35828 * CVE-2024-35829 * CVE-2024-35830 * CVE-2024-35831 * CVE-2024-35833 * CVE-2024-35834 * CVE-2024-35835 * CVE-2024-35836 * CVE-2024-35837 * CVE-2024-35838 * CVE-2024-35841 * CVE-2024-35842 * CVE-2024-35843 * CVE-2024-35845 * CVE-2024-35847 * CVE-2024-35848 * CVE-2024-35849 * CVE-2024-35850 * CVE-2024-35851 * CVE-2024-35852 * CVE-2024-35853 * CVE-2024-35854 * CVE-2024-35857 * CVE-2024-35860 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35865 * CVE-2024-35866 * CVE-2024-35867 * CVE-2024-35868 * CVE-2024-35869 * CVE-2024-35870 * CVE-2024-35872 * CVE-2024-35875 * CVE-2024-35877 * CVE-2024-35878 * CVE-2024-35879 * CVE-2024-35880 * CVE-2024-35883 * CVE-2024-35884 * CVE-2024-35885 * CVE-2024-35886 * CVE-2024-35887 * CVE-2024-35889 * CVE-2024-35890 * CVE-2024-35891 * CVE-2024-35892 * CVE-2024-35893 * CVE-2024-35895 * CVE-2024-35896 * CVE-2024-35898 * CVE-2024-35899 * CVE-2024-35900 * CVE-2024-35901 * CVE-2024-35903 * CVE-2024-35904 * CVE-2024-35905 * CVE-2024-35907 * CVE-2024-35908 * CVE-2024-35909 * CVE-2024-35911 * CVE-2024-35912 * CVE-2024-35914 * CVE-2024-35915 * CVE-2024-35916 * CVE-2024-35917 * CVE-2024-35921 * CVE-2024-35922 * CVE-2024-35924 * CVE-2024-35925 * CVE-2024-35926 * CVE-2024-35927 * CVE-2024-35928 * CVE-2024-35930 * CVE-2024-35931 * CVE-2024-35932 * CVE-2024-35933 * CVE-2024-35934 * CVE-2024-35935 * CVE-2024-35936 * CVE-2024-35937 * CVE-2024-35938 * CVE-2024-35940 * CVE-2024-35942 * CVE-2024-35943 * CVE-2024-35944 * CVE-2024-35945 * CVE-2024-35946 * CVE-2024-35947 * CVE-2024-35950 * CVE-2024-35951 * CVE-2024-35952 * CVE-2024-35953 * CVE-2024-35954 * CVE-2024-35955 * CVE-2024-35956 * CVE-2024-35957 * CVE-2024-35958 * CVE-2024-35959 * CVE-2024-35960 * CVE-2024-35961 * CVE-2024-35962 * CVE-2024-35963 * CVE-2024-35964 * CVE-2024-35965 * CVE-2024-35966 * CVE-2024-35967 * CVE-2024-35969 * CVE-2024-35970 * CVE-2024-35971 * CVE-2024-35972 * CVE-2024-35973 * CVE-2024-35974 * CVE-2024-35975 * CVE-2024-35976 * CVE-2024-35977 * CVE-2024-35978 * CVE-2024-35979 * CVE-2024-35981 * CVE-2024-35982 * CVE-2024-35984 * CVE-2024-35986 * CVE-2024-35989 * CVE-2024-35990 * CVE-2024-35991 * CVE-2024-35992 * CVE-2024-35995 * CVE-2024-35997 * CVE-2024-35998 * CVE-2024-35999 * CVE-2024-36002 * CVE-2024-36003 * CVE-2024-36004 * CVE-2024-36005 * CVE-2024-36006 * CVE-2024-36007 * CVE-2024-36008 * CVE-2024-36009 * CVE-2024-36010 * CVE-2024-36011 * CVE-2024-36012 * CVE-2024-36013 * CVE-2024-36014 * CVE-2024-36015 * CVE-2024-36016 * CVE-2024-36017 * CVE-2024-36018 * CVE-2024-36019 * CVE-2024-36020 * CVE-2024-36021 * CVE-2024-36024 * CVE-2024-36025 * CVE-2024-36026 * CVE-2024-36029 * CVE-2024-36030 * CVE-2024-36032 * CVE-2024-36281 * CVE-2024-36477 * CVE-2024-36478 * CVE-2024-36479 * CVE-2024-36880 * CVE-2024-36882 * CVE-2024-36885 * CVE-2024-36887 * CVE-2024-36889 * CVE-2024-36890 * CVE-2024-36891 * CVE-2024-36893 * CVE-2024-36894 * CVE-2024-36895 * CVE-2024-36896 * CVE-2024-36897 * CVE-2024-36898 * CVE-2024-36899 * CVE-2024-36900 * CVE-2024-36901 * CVE-2024-36902 * CVE-2024-36903 * CVE-2024-36904 * CVE-2024-36906 * CVE-2024-36909 * CVE-2024-36910 * CVE-2024-36911 * CVE-2024-36912 * CVE-2024-36913 * CVE-2024-36914 * CVE-2024-36915 * CVE-2024-36916 * CVE-2024-36917 * CVE-2024-36918 * CVE-2024-36919 * CVE-2024-36921 * CVE-2024-36922 * CVE-2024-36923 * CVE-2024-36924 * CVE-2024-36926 * CVE-2024-36928 * CVE-2024-36930 * CVE-2024-36931 * CVE-2024-36934 * CVE-2024-36935 * CVE-2024-36936 * CVE-2024-36937 * CVE-2024-36938 * CVE-2024-36940 * CVE-2024-36941 * CVE-2024-36942 * CVE-2024-36944 * CVE-2024-36945 * CVE-2024-36946 * CVE-2024-36947 * CVE-2024-36949 * CVE-2024-36950 * CVE-2024-36951 * CVE-2024-36952 * CVE-2024-36955 * CVE-2024-36957 * CVE-2024-36959 * CVE-2024-36960 * CVE-2024-36962 * CVE-2024-36964 * CVE-2024-36965 * CVE-2024-36967 * CVE-2024-36969 * CVE-2024-36971 * CVE-2024-36972 * CVE-2024-36973 * CVE-2024-36974 * CVE-2024-36975 * CVE-2024-36977 * CVE-2024-36978 * CVE-2024-37021 * CVE-2024-37078 * CVE-2024-37353 * CVE-2024-37354 * CVE-2024-38381 * CVE-2024-38384 * CVE-2024-38385 * CVE-2024-38388 * CVE-2024-38390 * CVE-2024-38391 * CVE-2024-38539 * CVE-2024-38540 * CVE-2024-38541 * CVE-2024-38543 * CVE-2024-38544 * CVE-2024-38545 * CVE-2024-38546 * CVE-2024-38547 * CVE-2024-38548 * CVE-2024-38549 * CVE-2024-38550 * CVE-2024-38551 * CVE-2024-38552 * CVE-2024-38553 * CVE-2024-38554 * CVE-2024-38555 * CVE-2024-38556 * CVE-2024-38557 * CVE-2024-38558 * CVE-2024-38559 * CVE-2024-38560 * CVE-2024-38562 * CVE-2024-38564 * CVE-2024-38565 * CVE-2024-38566 * CVE-2024-38567 * CVE-2024-38568 * CVE-2024-38569 * CVE-2024-38570 * CVE-2024-38571 * CVE-2024-38572 * CVE-2024-38573 * CVE-2024-38575 * CVE-2024-38578 * CVE-2024-38579 * CVE-2024-38580 * CVE-2024-38581 * CVE-2024-38582 * CVE-2024-38583 * CVE-2024-38586 * CVE-2024-38587 * CVE-2024-38588 * CVE-2024-38590 * CVE-2024-38591 * CVE-2024-38592 * CVE-2024-38594 * CVE-2024-38595 * CVE-2024-38597 * CVE-2024-38598 * CVE-2024-38599 * CVE-2024-38600 * CVE-2024-38601 * CVE-2024-38602 * CVE-2024-38603 * CVE-2024-38604 * CVE-2024-38605 * CVE-2024-38608 * CVE-2024-38610 * CVE-2024-38611 * CVE-2024-38615 * CVE-2024-38616 * CVE-2024-38617 * CVE-2024-38618 * CVE-2024-38619 * CVE-2024-38621 * CVE-2024-38622 * CVE-2024-38627 * CVE-2024-38628 * CVE-2024-38629 * CVE-2024-38630 * CVE-2024-38633 * CVE-2024-38634 * CVE-2024-38635 * CVE-2024-38636 * CVE-2024-38659 * CVE-2024-38661 * CVE-2024-38663 * CVE-2024-38664 * CVE-2024-38780 * CVE-2024-39276 * CVE-2024-39277 * CVE-2024-39291 * CVE-2024-39296 * CVE-2024-39301 * CVE-2024-39362 * CVE-2024-39371 * CVE-2024-39463 * CVE-2024-39466 * CVE-2024-39468 * CVE-2024-39469 * CVE-2024-39471 * CVE-2024-39472 * CVE-2024-39473 * CVE-2024-39474 * CVE-2024-39475 * CVE-2024-39479 * CVE-2024-39481 * CVE-2024-39482 * CVE-2024-39487 * CVE-2024-39490 * CVE-2024-39494 * CVE-2024-39496 * CVE-2024-39498 * CVE-2024-39502 * CVE-2024-39504 * CVE-2024-39507 * CVE-2024-40901 * CVE-2024-40906 * CVE-2024-40908 * CVE-2024-40919 * CVE-2024-40923 * CVE-2024-40925 * CVE-2024-40928 * CVE-2024-40931 * CVE-2024-40935 * CVE-2024-40937 * CVE-2024-40940 * CVE-2024-40947 * CVE-2024-40948 * CVE-2024-40953 * CVE-2024-40960 * CVE-2024-40961 * CVE-2024-40966 * CVE-2024-40970 * CVE-2024-40972 * CVE-2024-40975 * CVE-2024-40979 * CVE-2024-40998 * CVE-2024-40999 * CVE-2024-41006 * CVE-2024-41011 * CVE-2024-41013 * CVE-2024-41014 * CVE-2024-41017 * CVE-2024-41090 * CVE-2024-41091 CVSS scores: * CVE-2021-47432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47432 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-38417 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-47210 ( SUSE ): 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52483 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52503 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52503 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52616 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52622 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52640 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52649 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52650 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52655 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52656 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52670 ( NVD ): 6.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52696 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52698 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L * CVE-2023-52698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52699 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52735 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52749 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52765 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52765 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52766 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52768 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52768 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52769 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52769 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52771 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52771 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52772 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52772 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52773 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52775 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52776 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52777 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52780 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52782 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52783 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52786 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52795 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52798 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52798 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52799 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52801 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52801 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52804 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52805 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52807 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52807 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52810 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52811 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52818 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52819 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52819 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52825 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52827 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52827 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52829 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-52829 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52832 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52834 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52836 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52837 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52838 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52838 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52840 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52842 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52844 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52847 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-52849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52858 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52861 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52862 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52862 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52866 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52870 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52874 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52876 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52879 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52883 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52883 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52884 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52884 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6238 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6238 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-21823 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-24861 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25741 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2024-25741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26614 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26623 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26625 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26632 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26635 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26638 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26638 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26641 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26654 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26665 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26731 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26734 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26737 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26764 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26769 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26785 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26791 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26793 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26815 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26846 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26854 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26861 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26865 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26865 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26878 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26882 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26901 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26921 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26939 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26945 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26956 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26961 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26966 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26974 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26982 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-26991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26992 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-26993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26994 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-27009 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27022 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27029 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27030 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27040 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27044 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27045 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27047 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27052 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27052 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27053 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27053 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27054 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27059 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27393 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27395 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27396 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27402 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27402 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27404 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27405 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27408 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27414 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27431 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27436 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-33619 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-34777 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35803 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35821 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35823 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35835 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35843 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35843 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35845 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35849 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35853 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35857 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35866 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35868 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35869 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35878 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35884 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35896 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35899 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-35900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-35937 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35942 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35955 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35957 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35960 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35970 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35976 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35998 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-35999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36012 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36013 ( NVD ): 6.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36016 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36017 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36024 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36030 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36030 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36032 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36281 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36477 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36478 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36478 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36479 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L * CVE-2024-36882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36889 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-36890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36894 ( NVD ): 5.6 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36900 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36903 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-36910 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36912 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36913 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36916 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36916 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-36917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-36921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36923 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36928 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36931 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36934 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36935 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2024-36935 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36937 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-36940 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-36942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36947 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36950 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36955 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36960 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36960 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36962 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36965 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36971 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36971 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36972 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36973 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36977 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36977 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-36978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-37021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-37354 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38384 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38385 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38388 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38388 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38390 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38391 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38539 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38540 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38541 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38543 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-38545 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38546 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38547 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38548 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38550 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38550 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38552 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-38552 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38553 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38553 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38555 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38556 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38557 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38559 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38560 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38562 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38562 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38564 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38565 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-38565 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-38566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38568 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38569 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38569 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38570 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38571 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38571 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38572 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-38573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38573 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38578 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38579 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-38580 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38582 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38583 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38587 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-38587 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38588 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38588 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38591 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38594 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38595 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38597 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38598 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-38600 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38601 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38603 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38604 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38605 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38608 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38611 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38616 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-38617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38618 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38627 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38628 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38630 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38633 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38636 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38659 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H * CVE-2024-38661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38664 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39276 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39277 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39291 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39362 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39371 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39463 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39466 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39466 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39468 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39468 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39469 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39471 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39472 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-39472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39473 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39474 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39479 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39481 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39482 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39482 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39487 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39490 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39496 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39496 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39498 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39502 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39504 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39504 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-40906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40906 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40928 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40931 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-40931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40947 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40975 ( SUSE ): 2.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-41006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 848 vulnerabilities, contains 11 features and has 149 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408). * CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405). * CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403). * CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910). * CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993). * CVE-2024-40925: block: fix request.queuelist usage in flush (bsc#1227789). * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866). * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716). * CVE-2024-39496: btrfs: zoned: fix use-after-free due to race with dev replace (bsc#1227719). * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328). * CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913). * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886). * CVE-2024-40975: platform/x86: x86-android-tablets: Unregister devices in reverse order (bsc#1227926). * CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899). * CVE-2024-40947: ima: Avoid blocking in RCU read-side critical section (bsc#1227803). * CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783). * CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813). * CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797). * CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814). * CVE-2024-39504: netfilter: nft_inner: validate mandatory meta and payload (bsc#1227757). * CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836). * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730). * CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800). * CVE-2024-40928: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (bsc#1227788). * CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731). * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786). * CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780). * CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779). * CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573) * CVE-2024-35908: tls: get psock ref after taking rxlock to avoid leak (bsc#1224490) * CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499) * CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641) * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512) * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non- allocated memory (bsc#1227762). * CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432). * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806). * CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422) * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815) * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813) * CVE-2024-40948: mm/page_table_check: fix crash on ZONE_DEVICE (bsc#1227801). * CVE-2024-35890: gro: fix ownership transfer (bsc#1224516). * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719). * CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851). * CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750). * CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103. * CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763). * CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804). * CVE-2024-39498: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (bsc#1227723) * CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755). * CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807). * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711) * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545) * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778) * CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604). * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). * CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414). * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). * CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836). * CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806). * CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740). * CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326). * CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600). * CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088). * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783). * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626). * CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010). * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). * CVE-2024-35942: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (bsc#1224589). * CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463). * CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744). * CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717). * CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745). * CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752). * CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753). * CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328). * CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883). * CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489). * CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447). * CVE-2024-39474: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (bsc#1227434). * CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659). * CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656). * CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757). * CVE-2024-36003: ice: fix LAG and VF lock dependency in ice_reset_vf() (bsc#1224544). * CVE-2024-38604: block: refine the EOF check in blkdev_iomap_begin (bsc#1226866). * CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654). * CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021). * CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647). * CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057). * CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779). * CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438). * CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743). * CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098). * CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758). * CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101). * CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767). * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). * CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732). * CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611). * CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875). * CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994). * CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751). * CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066). * CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948). * CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949). * CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950). * CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799). * CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610). * CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841). * CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879). * CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996). * CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789). * CVE-2024-38566: bpf: Fix verifier assumptions about socket->sk (bsc#1226790). * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514). * CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770). * CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519). * CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857). * CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842). * CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744). * CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607). * CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774). * CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781). * CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746). * CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749). * CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734). * CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772). * CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771). * CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810). * CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809). * CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823). * CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815). * CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145). * CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439). * CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497). * CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670). * CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702). * CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741). * CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737). * CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572). * CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735). * CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080). * CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951). * CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498). * CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). * CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681). * CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723). * CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759). * CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726). * CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105). * CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661). * CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935). * CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939). * CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760). * CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763). * CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834). * CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614). * CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585). * CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539). * CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018). * CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515). * CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612). * CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520). * CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619). * CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674) * CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655). * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575). * CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761). * CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540). * CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549). * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548). * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759) * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762). * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390). * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) * CVE-2024-36030: Fixed the double free in rvu_npc_freemem() (bsc#1225712) * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (CVE-2023-52698 bsc#1224621) * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011). * CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148). * CVE-2024-26860: Fixed a memory leak when rechecking the data (bsc#1223077). * CVE-2023-52772: Fixed use-after-free in unix_stream_read_actor() (bsc#1224989). * CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718). * CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531). * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2024-35895: Fixed lock inversion deadlock in map delete elem (bsc#1224511). * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532). * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763). * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664). * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678). * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667). * CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679). * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672). * CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464). * CVE-2024-27036: Fixed writeback data corruption (bsc#1223810). * CVE-2024-35903: Fixed IP after emitting call depth accounting (bsc#1224493). * CVE-2024-35931: Fixed PCI error slot reset during RAS recovery (bsc#1224652). * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525). * CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523). * CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698). * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580). * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502). * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541). * CVE-2024-36007: Fixed warning during rehash (bsc#1224543). * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530). * CVE-2023-52771: Fixed delete_endpoint() vs parent unregistration race (bsc#1225007). * CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606). * CVE-2024-27408: Fixed race condition in dmaengine w-edma/eDMA (bsc#1224430). * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649). * CVE-2024-35921: Fixed oops when HEVC init fails (bsc#1224477). * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936). * CVE-2024-35991: Fixed kABI workaround for struct idxd_evl (bsc#1224553). * CVE-2024-27418: Fixed memory leak in mctp_local_output (bsc#1224720) * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721) * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187). * CVE-2024-35917: Fixed Fix bpf_plt pointer arithmetic (bsc#1224481). * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727). * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608). * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628). * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2023-52659: Fixed to pfn_to_kaddr() not treated as a 64-bit type (bsc#1224442). * CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659). * CVE-2024-21823: Fixed safety flag to struct ends (bsc#1223625). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084). * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098). * CVE-2023-52483: mctp: perform route lookups under a RCU read-side lock (bsc#1220738). * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096). * CVE-2024-26632: Fixed iterating over an empty bio with bio_for_each_folio_all (bsc#1221635). * CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181). * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627). * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653). * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829). * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615). * CVE-2023-6238: Fixed kcalloc() arguments order (bsc#1217384). * CVE-2024-26946: Fixed copy_from_kernel_nofault() to read from unsafe address (bsc#1223669). * CVE-2024-26945: Fixed nr_cpus < nr_iaa case (bsc#1223732). * CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385). * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793) * CVE-2023-52641: Fixed NULL ptr dereference checking at the end of attr_allocate_frame() (bsc#1222303) * CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679). * CVE-2024-26865: rds: tcp: Fix use-after-free of net in reqsk_timer_handler() (bsc#1223062). * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). * CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368). * CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693). * CVE-2024-26726: Fixed invalid drop extent_map for free space inode on write error (bsc#1222532) * CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745). * CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735). * CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664). * CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822). * CVE-2024-26991: Fixed overflow lpage_info when checking attributes (bsc#1223695). * CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655). * CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686). * CVE-2024-27022: Fixed linking file vma until vma is fully initialized (bsc#1223774). * CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104). * CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634). * CVE-2024-26899: Fixed deadlock between bd_link_disk_holder and partition scan (bsc#1223045). * CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060). * CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198). * CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357). * CVE-2024-26638: Fixed uninitialize struct msghdr completely (bsc#1221649 CVE-2024-26638). * CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613). * CVE-2024-26909: Fixed drm bridge use-after-free (bsc#1223143). * CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (bsc#1222378). * CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624). * CVE-2024-26832: Fixed missing folio cleanup in writeback race path (bsc#1223007). * CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615). * CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294). * CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035). * CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189). * CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190). * CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034). * CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033). * CVE-2024-26844: Fixed WARNING in _copy_from_iter (bsc#1223015). * CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968). * CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342). * CVE-2024-26774: Fixed dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (bsc#1222622). * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). * CVE-2024-26815: Fixed improper TCA_TAPRIO_TC_ENTRY_INDEX check (bsc#1222635). * CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801). * CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557). * CVE-2024-26731: Fixed NULL pointer dereference in sk_psock_verdict_data_ready() (bsc#1222371). * CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585). * CVE-2024-26740: Fixed use the backlog for mirred ingress (bsc#1222563). * CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445). * CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2023-52640: Fixed out-of-bounds in ntfs_listxattr (bsc#1222301). * CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915). * CVE-2023-52631: Fixed an NULL dereference bug (bsc#1222264 CVE-2023-52631). * CVE-2024-24861: Fixed an overflow due to race condition in media/xc4000 device driver in xc4000 xc4000_get_frequency() function (bsc#1219623). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2023-52458: Fixed check that partition length needs to be aligned with block size (bsc#1220428). * CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336). * CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). The following non-security bugs were fixed: * 9p: add missing locking around taking dentry fid list (git-fixes) * ACPI: CPPC: Fix access width used for PCC registers (git-fixes). * ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes). * ACPI: CPPC: Use access_width over bit_width for system memory accesses (stable-fixes). * ACPI: EC: Abort address space access upon error (stable-fixes). * ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable- fixes). * ACPI: EC: Evaluate orphan _REG under EC device (git-fixes). * ACPI: EC: Install address space handler at the namespace root (stable- fixes). * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes). * ACPI: LPSS: Advertise number of chip selects via property (git-fixes). * ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes). * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes). * ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git- fixes). * ACPI: disable -Wstringop-truncation (git-fixes). * ACPI: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes). * ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes). * ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes). * ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable- fixes). * ACPI: scan: Do not increase dep_unmet for already met dependencies (git- fixes). * ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (bsc#1217750). * ACPI: x86: Add PNP_UART1_SKIP quirk for Lenovo Blade2 tablets (stable- fixes). * ACPI: x86: Force StorageD3Enable on more products (stable-fixes). * ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes). * ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (git-fixes). * ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes). * ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes). * ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes). * ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes). * ALSA: PCM: Allow resume only for suspended streams (stable-fixes). * ALSA: aoa: avoid false-positive format truncation warning (git-fixes). * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes). * ALSA: core: Remove debugfs at disconnection (git-fixes). * ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes). * ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes). * ALSA: emux: improve patch ioctl data validation (stable-fixes). * ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes). * ALSA: hda/conexant: Mute speakers at suspend / shutdown (bsc#1228269). * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes). * ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (bsc#1228269). * ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes). * ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes). * ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with ALC1318 (stable-fixes). * ALSA: hda/realtek - fixed headset Mic not show (stable-fixes). * ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes). * ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14AHP9 (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ARP8 (stable-fixes). * ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes). * ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable- fixes). * ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable- fixes). * ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes). * ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes). * ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes). * ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes). * ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes). * ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes). * ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes). * ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes). * ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes). * ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes). * ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion models (bsc#1223462). * ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes). * ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7 (stable-fixes). * ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes). * ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes). * ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes). * ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes). * ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes). * ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes). * ALSA: hda/realtek: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes). * ALSA: hda/realtek: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes). * ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes). * ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes). * ALSA: hda/realtek: cs35l41: Fixup remaining asus strix models (git-fixes). * ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes). * ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable- fixes). * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Hera2 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 (stable-fixes). * ALSA: hda/tas2781: add locks to kcontrols (git-fixes). * ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes). * ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes). * ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes). * ALSA: hda: clarify Copyright information (stable-fixes). * ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes). * ALSA: hda: cs35l41: Component should be unbound before deconstruction (git- fixes). * ALSA: hda: cs35l41: Fix swapped l/r audio channels for Lenovo ThinBook 13x Gen4 (git-fixes). * ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes). * ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind() (git-fixes). * ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git- fixes). * ALSA: hda: cs35l41: Remove redundant argument to cs35l41_request_firmware_file() (stable-fixes). * ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable- fixes). * ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo Thinkbook 13x Gen 4 (stable-fixes). * ALSA: hda: cs35l41: Support Lenovo Thinkbook 16P Gen 5 (stable-fixes). * ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes). * ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes). * ALSA: hda: cs35l56: Component should be unbound before deconstruction (git- fixes). * ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot() (stable-fixes). * ALSA: hda: cs35l56: Fix lifecycle of codec pointer (stable-fixes). * ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes). * ALSA: hda: cs35l56: Set the init_done flag before component_add() (git- fixes). * ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable- fixes). * ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes). * ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git- fixes). * ALSA: hda: tas2781: Component should be unbound before deconstruction (git- fixes). * ALSA: line6: Zero-initialize message buffers (stable-fixes). * ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git- fixes). * ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable- fixes). * ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable- fixes). * ALSA: scarlett2: Add correct product series name to messages (stable-fixes). * ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git- fixes). * ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes). * ALSA: scarlett2: Default mixer driver to enabled (stable-fixes). * ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes). * ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion (git-fixes). * ALSA: seq: Fix incorrect UMP type for system messages (git-fixes). * ALSA: seq: Fix missing MSB in MIDI2 SPP conversion (git-fixes). * ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git- fixes). * ALSA: seq: Fix missing channel at encoding RPN/NRPN MIDI2 messages (git- fixes). * ALSA: seq: Fix yet another spot for system message conversion (git-fixes). * ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes). * ALSA: seq: ump: Fix missing System Reset message handling (git-fixes). * ALSA: seq: ump: Fix swapped song position pointer data (git-fixes). * ALSA: seq: ump: Skip useless ports for static blocks (git-fixes). * ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes). * ALSA: timer: Set lower bound of start tick time (stable-fixes). * ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes). * ALSA: ump: Do not clear bank selection after sending a program change (git- fixes). * ALSA: ump: Do not update FB name for static blocks (git-fixes). * ALSA: ump: Force 1 Group for MIDI1 FBs (git-fixes). * ALSA: ump: Set default protocol when not given explicitly (git-fixes). * ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes). * ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes). * ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes). * ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes). * ARM: 9381/1: kasan: clear stale stack poison (git-fixes). * ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes). * ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes). * ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git- fixes). * ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes). * ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes). * ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes). * ASoC: Intel: Disable route checks for Skylake boards (git-fixes). * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes). * ASoC: Intel: avs: Fix potential integer overflow (git-fixes). * ASoC: Intel: avs: Populate board selection with new I2S entries (stable- fixes). * ASoC: Intel: avs: Set name of control as in topology (git-fixes). * ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes). * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes). * ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git- fixes). * ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops (stable-fixes). * ASoC: Intel: common: add ACPI matching tables for Arrow Lake (stable-fixes). * ASoC: Intel: sof-sdw: really remove FOUR_SPEAKER quirk (git-fixes). * ASoC: Intel: sof_sdw: add JD2 quirk for HP Omen 14 (stable-fixes). * ASoC: Intel: sof_sdw: add quirk for Dell SKU 0C0F (stable-fixes). * ASoC: Intel: use soc_intel_is_byt_cr() only when IOSF_MBI is reachable (git- fixes). * ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes). * ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3 suspend (stable-fixes). * ASoC: SOF: Intel: hda-pcm: Limit the maximum number of periods by MAX_BDL_ENTRIES (stable-fixes). * ASoC: SOF: Intel: hda: fix null deref on system suspend entry (git-fixes). * ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes). * ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git- fixes). * ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes). * ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes). * ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes). * ASoC: SOF: imx8m: Fix DSP control regmap retrieval (git-fixes). * ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (stable-fixes). * ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (git-fixes). * ASoC: SOF: ipc4-topology: Preserve the DMA Link ID for ChainDMA on unprepare (git-fixes). * ASoC: SOF: ipc4-topology: Use correct queue_id for requesting input pin format (stable-fixes). * ASoC: SOF: pcm: Restrict DSP D0i3 during S0ix to IPC3 (stable-fixes). * ASoC: SOF: sof-audio: Skip unprepare for in-use widgets on error rollback (stable-fixes). * ASoC: TAS2781: Fix tasdev_load_calibrated_data() (git-fixes). * ASoC: acp: Support microphone from device Acer 315-24p (git-fixes). * ASoC: amd: Adjust error handling in case of absent codec device (git-fixes). * ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes). * ASoC: amd: acp: fix for acp_init function error handling (git-fixes). * ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git- fixes). * ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable- fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M5602RA (stable-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes). * ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes). * ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable- fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E16 Gen 2 (bsc#1228269). * ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes). * ASoC: cs35l41: Update DSP1RX5/6 Sources for DSP config (git-fixes). * ASoC: cs35l56: Accept values greater than 0 as IRQ numbers (git-fixes). * ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes). * ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes). * ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes). * ASoC: fsl-asoc-card: set priv->pdev before using it (git-fixes). * ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value (git-fixes). * ASoC: kirkwood: Fix potential NULL dereference (git-fixes). * ASoC: max98088: Check for clk_prepare_enable() error (git-fixes). * ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git- fixes). * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes). * ASoC: meson: axg-card: make links nonatomic (git-fixes). * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes). * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes). * ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes). * ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes). * ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes). * ASoC: q6apm-lpass-dai: close graph on prepare errors (git-fixes). * ASoC: qcom: Adjust issues in case of DT error in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes). * ASoC: rockchip: i2s-tdm: Fix trcm mode by setting clock on right mclk (git- fixes). * ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git- fixes). * ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes). * ASoC: rt5682-sdw: fix locking sequence (git-fixes). * ASoC: rt711-sdca: fix locking sequence (git-fixes). * ASoC: rt711-sdw: add missing readable registers (stable-fixes). * ASoC: rt711-sdw: fix locking sequence (git-fixes). * ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt715-sdca: volume step modification (git-fixes). * ASoC: rt715: add vendor clear control register (git-fixes). * ASoC: rt722-sdca-sdw: add debounce time for type detection (stable-fixes). * ASoC: rt722-sdca-sdw: add silence detection register as volatile (stable- fixes). * ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes). * ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes). * ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes). * ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes). * ASoC: sof: amd: fix for firmware reload failure in Vangogh platform (git- fixes). * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes). * ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes). * ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes). * ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes). * ASoC: tegra: Fix DSPK 16-bit playback (git-fixes). * ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes). * ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes). * ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable- fixes). * ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes). * ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin (git-fixes). * ASoC: topology: Do not assign fields that are already set (stable-fixes). * ASoC: topology: Fix references to freed memory (stable-fixes). * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes). * ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes). * ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes). * ASoc: tas2781: Enable RCA-based playback without DSP firmware download (git- fixes). * Bluetooth: Add new quirk for broken read key length on ATS2851 (stable- fixes). * Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes). * Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes). * Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable- fixes). * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes). * Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes). * Bluetooth: ISO: Align broadcast sync_timeout with connection timeout (stable-fixes). * Bluetooth: ISO: Check socket flag instead of hcon (git-fixes). * Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git- fixes). * Bluetooth: ISO: Fix BIS cleanup (stable-fixes). * Bluetooth: Ignore too large handle values in BIG (git-fixes). * Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes). * Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes). * Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes). * Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (bsc#1221504). * Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes). * Bluetooth: Remove usage of the deprecated ida_simple_xx() API (stable- fixes). * Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes). * Bluetooth: add quirk for broken address properties (git-fixes). * Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable- fixes). * Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable- fixes). * Bluetooth: btintel: Fixe build regression (git-fixes). * Bluetooth: btintel: Refactor btintel_set_ppag() (git-fixes). * Bluetooth: btnxpuart: Add handling for boot-signature timeout errors (git- fixes). * Bluetooth: btnxpuart: Enable Power Save feature on startup (stable-fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable- fixes). * Bluetooth: btusb: Fix triggering coredump implementation for QCA (git- fixes). * Bluetooth: hci_bcm4377: Fix msgid release (git-fixes). * Bluetooth: hci_bcm4377: Use correct unit for timeouts (git-fixes). * Bluetooth: hci_core: Cancel request on command timeout (stable-fixes). * Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable- fixes). * Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes). * Bluetooth: hci_event: Fix setting of unicast qos interval (git-fixes). * Bluetooth: hci_event: Remove code to removed CONFIG_BT_HS (stable-fixes). * Bluetooth: hci_event: Set QoS encryption from BIGInfo report (git-fixes). * Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes). * Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes). * Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync (git-fixes). * Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY (git-fixes). * Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes). * Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git- fixes). * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes). * Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes). * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes). * Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes). * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes). * Bluetooth: qca: add missing firmware sanity checks (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes). * Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes). * Bluetooth: qca: fix NVM configuration parsing (git-fixes). * Bluetooth: qca: fix device-address endianness (git-fixes). * Bluetooth: qca: fix firmware check error path (git-fixes). * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes). * Bluetooth: qca: set power_ctrl_enabled on NULL returned by gpiod_get_optional() (git-fixes). * EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes). * Edit "amdkfd: use calloc instead of kzalloc to avoid integer overflow" Reference CVE and bug numbers. * Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771) * Enable CONFIG_SCHED_CLUSTER=y on arm64 (jsc#PED-8701). * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA. * Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA. * Fix a potential infinite loop in extract_user_to_sg() (git-fixes). * Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes). * HID: Add quirk for Logitech Casa touchpad (stable-fixes). * HID: Ignore battery for ELAN touchscreens 2F2C and 4116 (stable-fixes). * HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes). * HID: core: remove unnecessary WARN_ON() in implement() (git-fixes). * HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git- fixes). * HID: input: avoid polling stylus battery on Chromebook Pompom (stable- fixes). * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes). * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes). * HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git- fixes). * HID: logitech-dj: allow mice to use all types of reports (git-fixes). * HID: mcp-2221: cancel delayed_work only when CONFIG_IIO is enabled (stable- fixes). * HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable- fixes). * HID: wacom: Modify pen IDs (git-fixes). * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes) * Input: ads7846 - use spi_device_id table (stable-fixes). * Input: allocate keycode for Display refresh rate toggle (stable-fixes). * Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes). * Input: elan_i2c - do not leave interrupt disabled on suspend failure (git- fixes). * Input: elantech - fix touchpad state on resume for Lenovo N24 (stable- fixes). * Input: ff-core - prefer struct_size over open coded arithmetic (stable- fixes). * Input: gpio_keys_polled - suppress deferred probe error for gpio (stable- fixes). * Input: i8042 - add Ayaneo Kun to i8042 quirk table (stable-fixes). * Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes). * Input: imagis - use FIELD_GET where applicable (stable-fixes). * Input: ims-pcu - fix printf string overflow (git-fixes). * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes). * Input: qt1050 - handle CHIP_ID reading error (git-fixes). * Input: silead - Always support 10 fingers (stable-fixes). * Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes). * Input: xpad - add additional HyperX Controller Identifiers (stable-fixes). * Input: xpad - add support for ASUS ROG RAIKIRI (git-fixes). * Input: xpad - add support for ASUS ROG RAIKIRI PRO (stable-fixes). * Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes). * KEYS: trusted: Do not use WARN when encode fails (git-fixes). * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes). * KVM: SEV-ES: Delegate LBR virtualization to the processor (git-fixes). * KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent (git- fixes). * KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes). * KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (git-fixes). * KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes). * KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (git- fixes). * KVM: VMX: Disable LBR virtualization if the CPU does not support LBR callstacks (git-fixes). * KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes). * KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478). * KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git- fixes). * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224790). * KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal slots (git-fixes). * KVM: x86/mmu: Move private vs. shared check above slot validity checks (git- fixes). * KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes). * KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (git-fixes). * KVM: x86/pmu: Allow programming events that match unsupported arch events (git-fixes). * KVM: x86/pmu: Always treat Fixed counters as available when supported (git- fixes). * KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes). * KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes). * KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git- fixes). * KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes). * KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git- fixes). * KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives (git-fixes). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158). * KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (git-fixes). * KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" (git-fixes). * KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes). * KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes). * KVM: x86/xen: improve accuracy of Xen timers (git-fixes). * KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git- fixes). * KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery (git-fixes). * KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git- fixes). * KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git- fixes). * KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes). * KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes). * KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git- fixes). * KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes). * KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git- fixes). * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git- fixes). * KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP (git-fixes). * KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git- fixes). * NFC: trf7970a: disable all regulators on removal (git-fixes). * NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes). * NFS: Fix an off by one in root_nfs_cat() (git-fixes). * NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git- fixes). * NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes). * NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847). * NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847). * NFS: add barriers when testing for NFS_FSDATA_BLOCKED (git-fixes). * NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226). * NFSD: Convert the callback workqueue to use delayed_work (git-fixes). * NFSD: Fix checksum mismatches in the duplicate reply cache (git-fixes). * NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes). * NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git- fixes). * NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes). * NFSD: Retransmit callbacks after client reconnects (git-fixes). * NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes). * NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes). * NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes). * NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes). * NFSv4.1 enforce rootpath check in fs_location query (git-fixes). * NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes). * NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes). * NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes). * NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362). * NFSv4: Fixup smatch warning for ambiguous return (git-fixes). * Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes). * PCI/AER: Block runtime suspend when handling errors (stable-fixes). * PCI/ASPM: Update save_state when configuration changes (bsc#1226915) * PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes). * PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes). * PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes). * PCI/DPC: Use FIELD_GET() (stable-fixes). * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes). * PCI/MSI: Fix UAF in msi_capability_init (git-fixes). * PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes). * PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes). * PCI: Clear Secondary Status errors after enumeration (bsc#1226928) * PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes). * PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes). * PCI: Do not wait for disconnected devices when resuming (git-fixes). * PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes). * PCI: Extend ACS configurability (bsc#1228090). * PCI: Fix resource double counting on remove & rescan (git-fixes). * PCI: Fix typos in docs and comments (stable-fixes). * PCI: Introduce cleanup helpers for device reference counts and locks (stable-fixes). * PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes). * PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() (stable-fixes). * PCI: dw-rockchip: Fix initial PERST# GPIO value (git-fixes). * PCI: dwc: Fix index 0 incorrectly being interpreted as a free ATU slot (git- fixes). * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes). * PCI: endpoint: Clean up error handling in vpci_scan_bus() (git-fixes). * PCI: endpoint: Fix error handling in epf_ntb_epc_cleanup() (git-fixes). * PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init() (git-fixes). * PCI: hv: Fix ring buffer size calculation (git-fixes). * PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes). * PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes). * PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes). * PCI: qcom-ep: Disable resources unconditionally during PERST# assert (git- fixes). * PCI: qcom: Add support for sa8775p SoC (git-fixes). * PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes). * PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup() (git-fixes). * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes). * PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes). * PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888). * PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes). * PCI: switchtec: Use normal comment style (stable-fixes). * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes). * PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes). * PCI: vmd: Create domain symlink before pci_bus_add_devices() (bsc#1227363). * PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes). * PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes). * Port "certs: Add ECDSA signature verification self-test". * Port "certs: Move RSA self-test data to separate file". * RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300). * RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300). * RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619). * RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619). * RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619). * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes) * RDMA/bnxt_re: Fix the max msix vectors macro (git-fixes) * RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes) * RDMA/cm: add timeout to cm_destroy_id wait (git-fixes) * RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw (git-fixes) * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git- fixes) * RDMA/hns: Fix GMV table pagesize (git-fixes) * RDMA/hns: Fix UAF for cq async event (git-fixes) * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes) * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes) * RDMA/hns: Modify the print level of CQE error (git-fixes) * RDMA/hns: Use complete parentheses in macros (git-fixes) * RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes). * RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes). * RDMA/mlx5: Add check for srq max_sge attribute (git-fixes) * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes) * RDMA/mlx5: Change check for cacheable mkeys (git-fixes) * RDMA/mlx5: Ensure created mkeys always have a populated rb_key (git-fixes) * RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes) * RDMA/mlx5: Fix unwind flow as part of mlx5_ib_stage_init_init (git-fixes) * RDMA/mlx5: Follow rb_key.ats when creating new mkeys (git-fixes) * RDMA/mlx5: Remove extra unlock on error path (git-fixes) * RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes) * RDMA/restrack: Fix potential invalid address access (git-fixes) * RDMA/rxe: Allow good work requests to be executed (git-fixes) * RDMA/rxe: Fix data copy for IB_SEND_INLINE (git-fixes) * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes) * RDMA/rxe: Fix responder length checking for UD request packets (git-fixes) * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes) * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes) * Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes). * Refresh kabi workaround ath updates (bsc#1227149#) * Refresh the previous ASoC patch, landed in subsystem tree (bsc#1228269) * Remove NTFSv3 from configs (bsc#1224429) * SEV: disable SEV-ES DebugSwap by default (git-fixes). * SUNRPC: Fix gss_free_in_token_pages() (git-fixes). * SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git- fixes). * SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272). * SUNRPC: fix a memleak in gss_import_v2_context (git-fixes). * SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes). * SUNRPC: return proper error from gss_wrap_req_priv (git-fixes). * Temporarily drop KVM patch that caused a regression (bsc#1226158) * USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes). * USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes). * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git- fixes). * USB: core: Add hub_get() and hub_put() routines (stable-fixes). * USB: core: Fix access violation during port device removal (git-fixes). * USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes). * USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes). * USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes). * USB: serial: add device ID for VeriFone adapter (stable-fixes). * USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes). * USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable- fixes). * USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable- fixes). * USB: serial: mos7840: fix crash on resume (git-fixes). * USB: serial: option: add Fibocom FM135-GL variants (stable-fixes). * USB: serial: option: add Fibocom FM350-GL (stable-fixes). * USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes). * USB: serial: option: add MeiG Smart SLM320 product (stable-fixes). * USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes). * USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable- fixes). * USB: serial: option: add Rolling RW350-GL variants (stable-fixes). * USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes). * USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes). * USB: serial: option: add Telit generic core-dump composition (stable-fixes). * USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes). * USB: serial: option: add support for Foxconn T99W651 (stable-fixes). * USB: serial: option: support Quectel EM060K sub-models (stable-fixes). * USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git- fixes). * Update ath11k suspend patches from the latest subsystem tree (bsc#1207948). * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes). * VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes). * Workaround broken chacha crypto fallback (bsc#1218205). * X.509: Fix the parser of extended key usage for length (bsc#1218820). * accel/ivpu: Fix deadlock in context_xa (git-fixes). * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes). * ahci: asm1064: asm1166: do not limit reported ports (git-fixes). * ahci: asm1064: correct count of reported ports (stable-fixes). * amd/amdkfd: sync all devices to wait all processes being evicted (stable- fixes). * amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable- fixes). * arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes). * arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502) * arm64/io: add constant-argument check (bsc#1226502 git-fixes) * arm64/ptrace: Use saved floating point state type to determine SVE (git- fixes) * arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git- fixes) * arm64: Add the arm64.no32bit_el0 command line option (jsc#PED-3184). * arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes). * arm64: bpf: fix 32bit unconditional bswap (git-fixes). * arm64: dts: Fix dtc interrupt_provider warnings (git-fixes) * arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes) * arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes) * arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes) * arm64: dts: freescale: imx8mm-verdin: enable hysteresis on slow input (git- fixes) * arm64: dts: hi3798cv200: fix the size of GICR (git-fixes) * arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes) * arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes) * arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes) * arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes) * arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes) * arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes) * arm64: dts: imx93-11x11-evk: Remove the 'no-sdio' property (git-fixes) * arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes) * arm64: dts: microchip: sparx5: fix mdio reg (git-fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git- fixes) * arm64: dts: rockchip: Add mdio and ethernet-phy nodes to (git-fixes) * arm64: dts: rockchip: Add missing power-domains for rk356x vop_mmu (git- fixes) * arm64: dts: rockchip: Add pinctrl for UART0 to rk3308-rock-pi-s (git-fixes) * arm64: dts: rockchip: Add sdmmc related properties on (git-fixes) * arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes) * arm64: dts: rockchip: Drop invalid mic-in-differential on (git-fixes) * arm64: dts: rockchip: Fix SD NAND and eMMC init on rk3308-rock-pi-s (git- fixes) * arm64: dts: rockchip: Fix mic-in-differential usage on (git-fixes) * arm64: dts: rockchip: Fix mic-in-differential usage on rk3566-roc-pc (git- fixes) * arm64: dts: rockchip: Fix the DCDC_REG2 minimum voltage on Quartz64 (git- fixes) * arm64: dts: rockchip: Fix the value of `dlg,jack-det-rate` mismatch (git- fixes) * arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes) * arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git- fixes) * arm64: dts: rockchip: Rename LED related pinctrl nodes on (git-fixes) * arm64: dts: rockchip: Update WIFi/BT related nodes on (git-fixes) * arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git- fixes) * arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes) * arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git- fixes) * arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes) * arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes) * arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes) * arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes) * arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes) * arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes). * arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688). * arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688). * arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688). * arm64: tegra: Correct Tegra132 I2C alias (git-fixes) * arm64: tegra: Set the correct PHY mode for MGBE (git-fixes) * arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587) * arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587) * asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable- fixes). * ata,scsi: libata-core: Do not leak memory for ata_port struct members (git- fixes). * ata: ahci: Clean up sysfs file on error (git-fixes). * ata: libata-core: Allow command duration limits detection for ACS-4 drives (git-fixes). * ata: libata-core: Fix double free on error (git-fixes). * ata: libata-core: Fix null pointer dereference on error (git-fixes). * ata: libata-scsi: Fix offsets for the fixed format sense data (git-fixes). * ata: pata_legacy: make legacy_exit() work again (git-fixes). * ata: sata_gemini: Check clk_enable() result (stable-fixes). * ata: sata_mv: Fix PCI device ID table declaration compilation warning (git- fixes). * ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes). * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166). * auxdisplay: ht16k33: Drop reference after LED registration (git-fixes). * ax25: Fix netdev refcount issue (git-fixes). * ax25: Fix refcount imbalance on inbound connections (git-fixes). * ax25: Fix reference count leak issue of net_device (git-fixes). * ax25: Fix reference count leak issues of ax25_dev (git-fixes). * ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes). * batman-adv: Avoid infinite loop trying to resize local TT (git-fixes). * batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes). * batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes). * bitops: add missing prototype check (git-fixes). * blk-cgroup: fix list corruption from reorder of WRITE ->lqueued (bsc#1225605). * blk-cgroup: fix list corruption from resetting io stat (bsc#1225605). * block: Move checking GENHD_FL_NO_PART to bdev_add_partition() (bsc#1226213). * block: fix q->blkg_list corruption during disk rebind (bsc#1223591). * bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (git- fixes). * bnx2x: Fix firmware version string character counts (git-fixes). * bnxt_en: Fix error recovery for RoCE ulp client (git-fixes). * bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git- fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git- fixes) * bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes). * bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes). * bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes). * bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes). * bpf, arm64: Fix incorrect runtime stats (git-fixes) * bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes) * bpf, scripts: Correct GPL license name (git-fixes). * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes). * bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903). * bpf: correct loop detection for iterators convergence (bsc#1225903). * bpf: exact states comparison for iterator convergence checks (bsc#1225903). * bpf: extract __check_reg_arg() utility function (bsc#1225903). * bpf: extract same_callsites() as utility function (bsc#1225903). * bpf: extract setup_func_entry() utility function (bsc#1225903). * bpf: fix precision backtracking instruction iteration (bsc#1225756). * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756). * bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903). * bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903). * bpf: print full verifier states on infinite loop detection (bsc#1225903). * bpf: verify callbacks as if they are called unknown number of times (bsc#1225903). * bpf: widening for callback iterators (bsc#1225903). * btrfs: add a helper to read the superblock metadata_uuid (git-fixes) * btrfs: add and use helper to check if block group is used (bsc#1220120). * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes) * btrfs: add new unused block groups to the list of unused block groups (bsc#1220120). * btrfs: allow to run delayed refs by bytes to be released instead of count (bsc#1220120). * btrfs: always clear PERTRANS metadata during commit (git-fixes) * btrfs: always print transaction aborted messages with an error level (git- fixes) * btrfs: always reserve space for delayed refs when starting transaction (bsc#1220120). * btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120). * btrfs: assert delayed node locked when removing delayed item (git-fixes) * btrfs: avoid start and commit empty transaction when flushing qgroups (bsc#1220120). * btrfs: avoid start and commit empty transaction when starting qgroup rescan (bsc#1220120). * btrfs: avoid starting and committing empty transaction when flushing space (bsc#1220120). * btrfs: avoid starting new transaction when flushing delayed items and refs (bsc#1220120). * btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes) * btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git- fixes) * btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size (git-fixes) * btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git- fixes) * btrfs: do not allow non subvolume root targets for snapshot (git-fixes) * btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes) * btrfs: do not delete unused block group if it may be used soon (bsc#1220120). * btrfs: do not refill whole delayed refs block reserve when starting transaction (bsc#1220120). * btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git- fixes) * btrfs: do not steal space from global rsv after a transaction abort (bsc#1220120). * btrfs: do not warn if discard range is not aligned to sector (git-fixes) * btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is given (bsc#1223285). * btrfs: error out when COWing block using a stale transaction (git-fixes) * btrfs: error out when reallocating block for defrag using a stale transaction (git-fixes) * btrfs: error when COWing block from a root that is being deleted (git-fixes) * btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes) * btrfs: fail priority metadata ticket with real fs error (bsc#1220120). * btrfs: file_remove_privs needs an exclusive lock in direct io write (git- fixes) * btrfs: fix 64bit compat send ioctl arguments not initializing version member (git-fixes) * btrfs: fix deadlock with fiemap and extent locking (bsc#1223285). * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes) * btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes) * btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes) * btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes) * btrfs: fix off-by-one when checking chunk map includes logical address (git- fixes) * btrfs: fix race between ordered extent completion and fiemap (bsc#1223285). * btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285). * btrfs: fix race when refilling delayed refs block reserve (git-fixes) * btrfs: fix start transaction qgroup rsv double free (git-fixes) * btrfs: fix stripe length calculation for non-zoned data chunk allocation (bsc#1217489). * btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() (git-fixes) * btrfs: free qgroup rsv on io failure (git-fixes) * btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git- fixes) * btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120). * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git- fixes) * btrfs: handle errors properly in update_inline_extent_backref() (git-fixes) * btrfs: initialize key where it's used when running delayed data ref (bsc#1220120). * btrfs: log message if extent item not found when running delayed extent op (bsc#1220120). * btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120). * btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120). * btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120). * btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120). * btrfs: make error messages more clear when getting a chunk map (git-fixes) * btrfs: make find_first_extent_bit() return a boolean (bsc#1220120). * btrfs: make find_free_dev_extent() static (bsc#1220120). * btrfs: make insert_delayed_ref() return a bool instead of an int (bsc#1220120). * btrfs: merge find_free_dev_extent() and find_free_dev_extent_start() (bsc#1220120). * btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120). * btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120). * btrfs: output extra debug info if we failed to find an inline backref (git- fixes) * btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes() (bsc#1220120). * btrfs: prevent transaction block reserve underflow when starting transaction (git-fixes) * btrfs: print available space across all block groups when dumping space info (bsc#1220120). * btrfs: print available space for a block group when dumping a space info (bsc#1220120). * btrfs: print block group super and delalloc bytes when dumping space info (bsc#1220120). * btrfs: print target number of bytes when dumping free space (bsc#1220120). * btrfs: qgroup: always free reserved space for extent records (bsc#1216196). * btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git- fixes) * btrfs: record delayed inode root in transaction (git-fixes) * btrfs: reject encoded write if inode has nodatasum flag set (git-fixes) * btrfs: release path before inode lookup during the ino lookup ioctl (git- fixes) * btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref() (bsc#1220120). * btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release() (bsc#1220120). * btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref() (bsc#1220120). * btrfs: remove refs_to_drop argument from __btrfs_free_extent() (bsc#1220120). * btrfs: remove the refcount warning/check at btrfs_put_delayed_ref() (bsc#1220120). * btrfs: remove unnecessary logic when running new delayed references (bsc#1220120). * btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120). * btrfs: remove unused is_head field from struct btrfs_delayed_ref_node (bsc#1220120). * btrfs: rename add_new_free_space() to btrfs_add_new_free_space() (bsc#1220120). * btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120). * btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120). * btrfs: reset destination buffer when read_extent_buffer() gets invalid range (git-fixes) * btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1 (git-fixes) * btrfs: return -EUCLEAN if extent item is missing when searching inline backref (bsc#1220120). * btrfs: return real error when orphan cleanup fails due to a transaction abort (bsc#1220120). * btrfs: send: do not issue unnecessary zero writes for trailing hole (bsc#1222459). * btrfs: send: ensure send_fd is writable (git-fixes) * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git- fixes) * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes) * btrfs: set page extent mapped after read_folio in relocate_one_page (git- fixes) * btrfs: simplify check for extent item overrun at lookup_inline_extent_backref() (bsc#1220120). * btrfs: stop doing excessive space reservation for csum deletion (bsc#1220120). * btrfs: store the error that turned the fs into error state (bsc#1220120). * btrfs: sysfs: validate scrub_speed_max value (git-fixes) * btrfs: tree-checker: fix inline ref size in error messages (git-fixes) * btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120). * btrfs: update documentation for add_new_free_space() (bsc#1220120). * btrfs: use a bool to track qgroup record insertion when adding ref head (bsc#1220120). * btrfs: use a single switch statement when initializing delayed ref head (bsc#1220120). * btrfs: use a single variable for return value at lookup_inline_extent_backref() (bsc#1220120). * btrfs: use a single variable for return value at run_delayed_extent_op() (bsc#1220120). * btrfs: use bool type for delayed ref head fields that are used as booleans (bsc#1220120). * btrfs: use the correct superblock to compare fsid in btrfs_validate_super (git-fixes) * btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes) * btrfs: zoned: do not skip block groups with 100% zone unusable (bsc#1220120). * bus: mhi: ep: check the correct variable in mhi_ep_register_controller() (git-fixes). * bus: mhi: host: allow MHI client drivers to provide the firmware via a pointer (bsc#1227149). * bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes). * cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git- fixes). * cachefiles: remove requests from xarray during flushing requests (bsc#1226588). * can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes). * can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes). * can: mcp251xfd: fix infinite loop when xmit fails (git-fixes). * cdrom: rearrange last_media_change check to avoid unintentional overflow (stable-fixes). * ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022). * ceph: always check dir caps asynchronously (bsc#1226022). * ceph: always queue a writeback when revoking the Fb caps (bsc#1226022). * ceph: break the check delayed cap loop every 5s (bsc#1226022). * ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228417). * ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866). * ceph: stop copying to iter at EOF on sync reads (bsc#1222606). * ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022). * certs: Add ECDSA signature verification self-test (bsc#1222777). * certs: Move RSA self-test data to separate file (bsc#1222777). * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git- fixes). * checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes). * cifs: Add a laundromat thread for cached directories (git-fixes, bsc#1225172). * cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172). * cifs: account for primary channel in the interface list (bsc#1225172). * cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1225172). * cifs: distribute channels across interfaces based on speed (bsc#1225172). * cifs: do not pass cifs_sb when trying to add channels (bsc#1225172). * cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1225172). * cifs: fix charset issue in reconnection (bsc#1225172). * cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172). * cifs: handle cases where a channel is closed (bsc#1225172). * cifs: handle cases where multiple sessions share connection (bsc#1225172). * cifs: reconnect work should have reference on server struct (bsc#1225172). * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes). * clk: Get runtime PM before walking tree during disable_unused (git-fixes). * clk: Get runtime PM before walking tree for clk_summary (git-fixes). * clk: Initialize struct clk_core kref earlier (stable-fixes). * clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes). * clk: Show active consumers of clocks in debugfs (stable-fixes). * clk: davinci: da8xx-cfgchip: Initialize clk_init_data before use (git- fixes). * clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes). * clk: mediatek: mt8183: Only enable runtime PM on mt8183-mfgcfg (git-fixes). * clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes). * clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes). * clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes). * clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git- fixes). * clk: qcom: clk-alpha-pll: set ALPHA_EN bit for Stromer Plus PLLs (git- fixes). * clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes). * clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes). * clk: qcom: gcc-sm6350: Fix gpll6* & gpll7 parents (git-fixes). * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes). * clk: qcom: reset: Commonize the de/assert functions (stable-fixes). * clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes). * clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes). * clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes). * clk: rs9: fix wrong default value for clock amplitude (git-fixes). * clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes). * clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes). * clkdev: Update clkdev id usage to allow for longer names (stable-fixes). * clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git- fixes). * clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes). * comedi: vmk80xx: fix incomplete endpoint checking (git-fixes). * config/arm64: Enable CoreSight PMU drivers (bsc#1228289 jsc#PED-7859) * coresight: trbe: Add a representative coresight_platform_data for (bsc#1220587) * coresight: trbe: Allocate platform data per device (bsc#1220587) * coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587) * counter: linux/counter.h: fix Excess kernel-doc description warning (git- fixes). * counter: ti-eqep: enable clock at probe (git-fixes). * cppc_cpufreq: Fix possible null pointer dereference (git-fixes). * cpufreq/amd-pstate: Fix the scaling_max_freq setting on shared memory CPPC systems (git-fixes). * cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git- fixes). * cpufreq: amd-pstate: fix memory leak on CPU EPP exit (stable-fixes). * cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git- fixes). * cpufreq: exit() callback is optional (git-fixes). * cpufreq: ti-cpufreq: Handle deferred probe with dev_err_probe() (git-fixes). * cpumask: Add for_each_cpu_from() (bsc#1225053). * crypto/ecdh: make ecdh_compute_value() to zeroize the public key (bsc#1222768). * crypto/ecdsa: make ecdsa_ecc_ctx_deinit() to zeroize the public key (bsc#1222768). * crypto: aead,cipher - zeroize key buffer after use (stable-fixes). * crypto: bcm - Fix pointer arithmetic (git-fixes). * crypto: ccp - Add support for PCI device 0x156E (bsc#1223338). * crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338). * crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked (git-fixes). * crypto: ccp - drop platform ifdef checks (git-fixes). * crypto: deflate - Add aliases to deflate (bsc#1227190). * crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782). * crypto: ecdh - explicitly zeroize private_key (stable-fixes). * crypto: ecdsa - Fix module auto-load on add-key (git-fixes). * crypto: ecdsa - Fix the public key format description (git-fixes). * crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes). * crypto: hisilicon/debugfs - Fix debugfs uninit process issue (stable-fixes). * crypto: hisilicon/qm - Add the err memory release process to qm uninit (stable-fixes). * crypto: hisilicon/sec - Fix memory leak for sec resource release (stable- fixes). * crypto: iaa - Account for cpu-less numa nodes (bsc#1227190). * crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes). * crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes). * crypto: qat - extend scope of lock in adf_cfg_add_key_value_param() (git- fixes). * crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes). * crypto: qat - improve error logging to be consistent across features (git- fixes). * crypto: qat - relocate and rename get_service_enabled() (stable-fixes). * crypto: qat - specify firmware files for 402xx (git-fixes). * crypto: rsa - add a check for allocation failure (bsc#1222775). * crypto: rsa - allow only odd e and restrict value in FIPS mode (bsc#1222775). * crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c (bsc#1222769). * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes). * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes). * cxl/acpi: Fix load failures due to single window creation failure (git- fixes). * cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (git-fixes). * cxl/region: Fix cxlr_pmem leaks (git-fixes). * cxl/region: Fix memregion leaks in devm_cxl_add_region() (git-fixes). * cxl/test: Add missing vmalloc.h for tools/testing/cxl/test/mem.c (git- fixes). * cxl/trace: Correct DPA field masks for general_media & dram events (git- fixes). * cxl/trace: Properly initialize cxl_poison region name (git-fixes). * dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853). * dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853). * dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n (jsc#PED-5853). * decompress_bunzip2: fix rare decompression failure (git-fixes). * device-dax: make dax_bus_type const (jsc#PED-5853). * devres: Fix devm_krealloc() wasting memory (git-fixes). * devres: Fix memory leakage caused by driver API devm_free_percpu() (git- fixes). * dlm: fix user space lkb refcounting (git-fixes). * dlm: fix user space lock decision to copy lvb (git-fixes). * dm crypt: remove redundant state settings after waking up (jsc#PED-7542). * dm thin: add braces around conditional code that spans lines (jsc#PED-7542). * dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542). * dm-integrity: set max_integrity_segments in dm_integrity_io_hints (jsc#PED-7542). * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575). * dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (bsc#1219596) * dm-raid: add a new helper prepare_suspend() in md_personality (jsc#PED-7542). * dm-raid: really frozen sync_thread during suspend (jsc#PED-7542). * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes). * dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list (jsc#PED-7542). * dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes). * dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes). * dma-mapping: benchmark: fix node id validation (git-fixes). * dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes). * dma: fix call order in dmam_free_coherent (git-fixes). * dma: xilinx_dpdma: Fix locking (git-fixes). * dmaengine: axi-dmac: fix possible race in remove() (git-fixes). * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes). * dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes). * dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes). * dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git- fixes). * dmaengine: ioatdma: Fix error path in ioat3_dma_probe() (git-fixes). * dmaengine: ioatdma: Fix kmemleak in ioat_pci_probe() (git-fixes). * dmaengine: ioatdma: Fix leaking on version mismatch (git-fixes). * dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes). * dmaengine: owl: fix register access functions (git-fixes). * dmaengine: tegra186: Fix residual calculation (git-fixes). * dmaengine: ti: k3-udma: Fix BCHAN count with UHC and HC channels (git- fixes). * docs: Restore "smart quotes" for quotes (stable-fixes). * docs: crypto: async-tx-api: fix broken code example (git-fixes). * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes). * docs: netdev: Fix typo in Signed-off-by tag (git-fixes). * dpll: spec: use proper enum for pin capabilities attribute (git-fixes). * driver core: Introduce device_link_wait_removal() (stable-fixes). * drivers/nvme: Add quirks for device 126f:2262 (git-fixes). * drivers/xen: Improve the late XenStore init protocol (git-fixes). * drivers: core: synchronize really_probe() and dev_uevent() (git-fixes). * drivers: soc: xilinx: check return status of get_api_version() (git-fixes). * drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (stable-fixes). * drm/amd/amdgpu: Fix uninitialized variable warnings (git-fixes). * drm/amd/display: ASSERT when failing to find index by plane/stream id (stable-fixes). * drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes). * drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes). * drm/amd/display: Add dml2 copy functions (stable-fixes). * drm/amd/display: Add dtbclk access to dcn315 (stable-fixes). * drm/amd/display: Add refresh rate range check (stable-fixes). * drm/amd/display: Allocate zero bw after bw alloc enable (stable-fixes). * drm/amd/display: Allow dirty rects to be sent to dmub when abm is active (stable-fixes). * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes). * drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes). * drm/amd/display: Check index msg_id before read or write (stable-fixes). * drm/amd/display: Check pipe offset before setting vblank (stable-fixes). * drm/amd/display: Disable seamless boot on 128b/132b encoding (stable-fixes). * drm/amd/display: Do not recursively call manual trigger programming (stable- fixes). * drm/amd/display: Enable colorspace property for MST connectors (git-fixes). * drm/amd/display: Exit idle optimizations before HDCP execution (stable- fixes). * drm/amd/display: Fix DC mode screen flickering on DCN321 (stable-fixes). * drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport (stable-fixes). * drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes). * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes). * drm/amd/display: Fix idle check for shared firmware state (stable-fixes). * drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes). * drm/amd/display: Fix nanosec stat overflow (stable-fixes). * drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes). * drm/amd/display: Fix overlapping copy within dml_core_mode_programming (stable-fixes). * drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes). * drm/amd/display: Fix refresh rate range for some panel (stable-fixes). * drm/amd/display: Fix uninitialized variables in DM (stable-fixes). * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes). * drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes). * drm/amd/display: Move 'struct scaler_data' off stack (git-fixes). * drm/amd/display: Override min required DCFCLK in dml1_validate (stable- fixes). * drm/amd/display: Prevent crash when disable stream (stable-fixes). * drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 (stable-fixes). * drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable- fixes). * drm/amd/display: Remove pixle rate limit for subvp (stable-fixes). * drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate() (git-fixes). * drm/amd/display: Return the correct HDCP error code (stable-fixes). * drm/amd/display: Revert Remove pixle rate limit for subvp (stable-fixes). * drm/amd/display: Send DP_TOTAL_LTTPR_CNT during detection if LTTPR is present (stable-fixes). * drm/amd/display: Send DTBCLK disable message on first commit (git-fixes). * drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes). * drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable- fixes). * drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes). * drm/amd/display: Skip finding free audio for unknown engine_id (stable- fixes). * drm/amd/display: Skip pipe if the pipe idx not set properly (stable-fixes). * drm/amd/display: Update efficiency bandwidth for dcn351 (stable-fixes). * drm/amd/display: Update odm when ODM combine is changed on an otg master pipe with no plane (stable-fixes). * drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found (stable-fixes). * drm/amd/display: Workaround register access in idle race with cursor (stable-fixes). * drm/amd/display: change dram_clock_latency to 34us for dcn35 (stable-fixes). * drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes). * drm/amd/display: fix input states translation error for dcn35 & dcn351 (stable-fixes). * drm/amd/display: handle range offsets in VRR ranges (stable-fixes). * drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes). * drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes). * drm/amd/pm: Restore config space after reset (stable-fixes). * drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes). * drm/amd/pm: remove logically dead code for renoir (git-fixes). * drm/amd/swsmu: modify the gfx activity scaling (stable-fixes). * drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes). * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes). * drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes). * drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes). * drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes). * drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects' (git-fixes). * drm/amdgpu/mes: fix use-after-free issue (stable-fixes). * drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes). * drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git- fixes). * drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes). * drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes). * drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes). * drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git- fixes). * drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable- fixes). * drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes). * drm/amdgpu: Fix VRAM memory accounting (stable-fixes). * drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (git-fixes). * drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes). * drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes). * drm/amdgpu: Fix memory range calculation (git-fixes). * drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes). * drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes). * drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes). * drm/amdgpu: Fix uninitialized variable warnings (stable-fixes). * drm/amdgpu: Indicate CU havest info to CP (stable-fixes). * drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes). * drm/amdgpu: Refine IB schedule error logging (stable-fixes). * drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes). * drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes). * drm/amdgpu: Update BO eviction priorities (stable-fixes). * drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (stable-fixes). * drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes). * drm/amdgpu: always force full reset for SOC21 (stable-fixes). * drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes). * drm/amdgpu: avoid using null object of framebuffer (stable-fixes). * drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes). * drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes). * drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes). * drm/amdgpu: fix doorbell regression (git-fixes). * drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes). * drm/amdgpu: fix locking scope when flushing tlb (stable-fixes). * drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes). * drm/amdgpu: fix the warning about the expression (int)size - len (stable- fixes). * drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes). * drm/amdgpu: fix use-after-free bug (stable-fixes). * drm/amdgpu: fix visible VRAM handling during faults (git-fixes). * drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes). * drm/amdgpu: init microcode chip name from ip versions (stable-fixes). * drm/amdgpu: make damage clips support configurable (stable-fixes). * drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes). * drm/amdgpu: remove invalid resource->start check v2 (git-fixes). * drm/amdgpu: silence UBSAN warning (stable-fixes). * drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes). * drm/amdkfd: Add VRAM accounting for SVM migration (stable-fixes). * drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes). * drm/amdkfd: Fix CU Masking for GFX 9.4.3 (git-fixes). * drm/amdkfd: Fix memory leak in create_process failure (git-fixes). * drm/amdkfd: Flush the process wq before creating a kfd_process (stable- fixes). * drm/amdkfd: Let VRAM allocations go to GTT domain on small APUs (stable- fixes). * drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes). * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git- fixes). * drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes). * drm/amdkfd: range check cp bad op exception interrupts (stable-fixes). * drm/arm/komeda: Fix komeda probe failing if there are no links in the secondary pipeline (git-fixes). * drm/arm/malidp: fix a possible null pointer dereference (git-fixes). * drm/ast: Fix soft lockup (git-fixes). * drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes). * drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git- fixes). * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: anx7625: Update audio status while detecting (git-fixes). * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: it6505: fix hibernate to resume no display issue (git-fixes). * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found (git-fixes). * drm/bridge: samsung-dsim: Set P divider based on min/max of fin pll (git- fixes). * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git- fixes). * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes). * drm/buddy: check range allocation matches alignment (stable-fixes). * drm/ci: update device type for volteer devices (git-fixes). * drm/client: Fully protect modes[] with dev->mode_config.mutex (stable- fixes). * drm/connector: Add \n to message about demoting connector force-probes (git- fixes). * drm/display: fix typo (git-fixes). * drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git- fixes). * drm/drm_file: Fix pid refcounting race (git-fixes). * drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes). * drm/etnaviv: fix tx clock gating on some GC7000 variants (stable-fixes). * drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes). * drm/exynos: do not return negative values from .get_modes() (stable-fixes). * drm/exynos: dp: drop driver owner initialization (stable-fixes). * drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes). * drm/fbdev-dma: Fix framebuffer mode for big endian devices (git-fixes). * drm/fbdev-dma: Only set smem_start is enable per module option (git-fixes). * drm/fbdev-generic: Do not set physical framebuffer address (git-fixes). * drm/fbdev-generic: Fix framebuffer on big endian devices (git-fixes). * drm/gma500: Remove lid code (git-fixes). * drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git- fixes). * drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git- fixes). * drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes). * drm/i915/bios: Fix parsing backlight BDB data (git-fixes). * drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes). * drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git- fixes). * drm/i915/display: Use i915_gem_object_get_dma_address to get dma address (stable-fixes). * drm/i915/dp: Do not switch the LTTPR mode on an active link (git-fixes). * drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13 (git-fixes). * drm/i915/dp: Remove support for UHBR13.5 (git-fixes). * drm/i915/dpt: Make DPT object unshrinkable (git-fixes). * drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes). * drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly (git-fixes). * drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes). * drm/i915/gt: Disable HW load balancing for CCS (git-fixes). * drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes). * drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes). * drm/i915/gt: Do not generate the command streamer for all the CCS (git- fixes). * drm/i915/gt: Enable only one CCS for compute workload (git-fixes). * drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes). * drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes). * drm/i915/gt: Reset queue_priority_hint on parking (git-fixes). * drm/i915/guc: avoid FIELD_PREP warning (git-fixes). * drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes). * drm/i915/hwmon: Get rid of devm (stable-fixes). * drm/i915/lspcon: Separate function to set expected mode (bsc#1193599). * drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599). * drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes). * drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes). * drm/i915/mst: Reject FEC+MST on ICL (git-fixes). * drm/i915/mtl: Update workaround 14018575942 (git-fixes). * drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes). * drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes). * drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes). * drm/i915: Disable port sync when bigjoiner is used (stable-fixes). * drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git- fixes). * drm/i915: Fix audio component initialization (git-fixes). * drm/i915: Include the PLL name in the debug messages (stable-fixes). * drm/i915: Pre-populate the cursor physical dma address (git-fixes). * drm/i915: Replace a memset() with zero initialization (stable-fixes). * drm/i915: Stop printing pipe name as hex (stable-fixes). * drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable- fixes). * drm/i915: Try to preserve the current shared_dpll for fastset on type-c ports (stable-fixes). * drm/i915: Use named initializers for DPLL info (stable-fixes). * drm/imx/ipuv3: do not return negative values from .get_modes() (stable- fixes). * drm/komeda: check for error-valued pointer (git-fixes). * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes). * drm/lima: Mark simple_ondemand governor as softdep (git-fixes). * drm/lima: add mask irq callback to gp and pp (stable-fixes). * drm/lima: fix shared irq handling on driver remove (stable-fixes). * drm/lima: mask irqs in timeout path before hard reset (stable-fixes). * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes). * drm/mediatek: Add DRM_MODE_ROTATE_0 to rotation property (git-fixes). * drm/mediatek: Add OVL compatible name for MT8195 (git-fixes). * drm/mediatek: Add missing plane settings when async update (git-fixes). * drm/mediatek: Call drm_atomic_helper_shutdown() at shutdown time (stable- fixes). * drm/mediatek: Fix XRGB setting error in Mixer (git-fixes). * drm/mediatek: Fix XRGB setting error in OVL (git-fixes). * drm/mediatek: Fix bit depth overwritten for mtk_ovl_set bit_depth() (git- fixes). * drm/mediatek: Fix destination alpha error in OVL (git-fixes). * drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes). * drm/mediatek: Remove less-than-zero comparison of an unsigned value (git- fixes). * drm/mediatek: Set DRM mode configs accordingly (git-fixes). * drm/mediatek: Support DRM plane alpha in Mixer (git-fixes). * drm/mediatek: Support DRM plane alpha in OVL (git-fixes). * drm/mediatek: Support RGBA8888 and RGBX8888 in OVL on MT8195 (git-fixes). * drm/mediatek: Turn off the layers with zero width or height (git-fixes). * drm/mediatek: Use 8-bit alpha in ETHDR (git-fixes). * drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes). * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes). * drm/meson: dw-hdmi: power up phy on device init (git-fixes). * drm/meson: fix canvas release in bind function (git-fixes). * drm/meson: gate px_clk when setting rate (git-fixes). * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes). * drm/mgag200: Bind I2C lifetime to DRM device (git-fixes). * drm/mgag200: Set DDC timeout in milliseconds (git-fixes). * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git- fixes). * drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_generic_write_seq() (git-fixes). * drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git- fixes). * drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes). * drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git- fixes). * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes). * drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes). * drm/msm/dpu: Add callback function pointer check before its call (git- fixes). * drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes). * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes). * drm/msm/dpu: do not allow overriding data from catalog (git-fixes). * drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git- fixes). * drm/msm/dpu: fix encoder irq wait skip (git-fixes). * drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible (git-fixes). * drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes). * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes). * drm/msm/dsi: set VIDEO_COMPRESSION_MODE_CTRL_WC (git-fixes). * drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes). * drm/msm: Add newlines to some debug prints (git-fixes). * drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1 (bsc#1223838). * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes). * drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes). * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes). * drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes). * drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable- fixes). * drm/nouveau: do not attempt to schedule hpd_work on headless cards (git- fixes). * drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes). * drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git- fixes). * drm/omapdrm: Fix console by implementing fb_dirty (git-fixes). * drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git- fixes). * drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes). * drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes). * drm/panel: himax-hx8394: Handle errors from mipi_dsi_dcs_set_display_on() better (git-fixes). * drm/panel: ili9341: Respect deferred probe (git-fixes). * drm/panel: ili9341: Use predefined error codes (git-fixes). * drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes). * drm/panel: ilitek-ili9882t: Check for errors on the NOP in prepare() (git- fixes). * drm/panel: ilitek-ili9882t: If prepare fails, disable GPIO before regulators (git-fixes). * drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git- fixes). * drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init (git-fixes). * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes). * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes). * drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes). * drm/panel: sitronix-st7789v: Add check for of_drm_get_panel_orientation (git-fixes). * drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git- fixes). * drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel (git-fixes). * drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes). * drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git- fixes). * drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes). * drm/panfrost: fix power transition timeout warnings (git-fixes). * drm/prime: Unbreak virtgpu dma-buf export (git-fixes). * drm/probe-helper: warn about negative .get_modes() (stable-fixes). * drm/qxl: Add check for drm_cvt_mode (git-fixes). * drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git- fixes). * drm/qxl: remove unused variable from `qxl_process_single_command()` (git- fixes). * drm/radeon/radeon_display: Decrease the size of allocated memory (stable- fixes). * drm/radeon: check bo_va->bo is non-NULL before using it (stable-fixes). * drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes). * drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes). * drm/radeon: silence UBSAN warning (v3) (stable-fixes). * drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes). * drm/rockchip: vop2: Fix the port mux of VP2 (git-fixes). * drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes). * drm/sched: fix null-ptr-deref in init entity (git-fixes). * drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes). * drm/sun4i: hdmi: Convert encoder to atomic (stable-fixes). * drm/sun4i: hdmi: Move mode_set into enable (stable-fixes). * drm/ttm: Always take the bo delayed cleanup path for imported bos (git- fixes). * drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes). * drm/ttm: stop pooling cached NUMA pages v2 (git-fixes). * drm/udl: Remove DRM_CONNECTOR_POLL_HPD (git-fixes). * drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes). * drm/vc4: hdmi: do not return negative values from .get_modes() (stable- fixes). * drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes). * drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git- fixes). * drm/vmwgfx: Do not memcmp equivalent pointers (git-fixes). * drm/vmwgfx: Enable DMA mappings with SEV (git-fixes). * drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes). * drm/vmwgfx: Fix Legacy Display Unit (git-fixes). * drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes). * drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes). * drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes). * drm/vmwgfx: Fix prime import/export (git-fixes). * drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes). * drm: Check output polling initialized before disabling (stable-fixes). * drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes (stable-fixes). * drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes). * drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes). * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git- fixes). * drm: nv04: Fix out of bounds access (git-fixes). * drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes). * drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes). * drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes). * drm: vc4: Fix possible null pointer dereference (git-fixes). * drm: zynqmp_dpsub: Always register bridge (git-fixes). * drm: zynqmp_dpsub: Fix an error handling path in zynqmp_dpsub_probe() (git- fixes). * drm: zynqmp_kms: Fix AUX bus not getting unregistered (git-fixes). * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes) * dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607). * dyndbg: fix old BUG_ON in >control parser (stable-fixes). * e1000e: Minor flow correction in e1000_shutdown function (git-fixes). * e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git- fixes). * e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue (git-fixes). * ecryptfs: Fix buffer size for tag 66 packet (git-fixes) * ecryptfs: Reject casefold directory inodes (git-fixes) * eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (stable-fixes). * eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes). * efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory (git-fixes). * efi/unaccepted: touch soft lockup during memory accept (git-fixes). * efi/x86: Free EFI memory map only when installing a new one (git-fixes). * efi: disable mirror feature during crashkernel (stable-fixes). * efi: fix panic in kdump kernel (git-fixes). * efi: libstub: only free priv.runtime_map when allocated (git-fixes). * erofs: ensure m_llen is reset to 0 if metadata is invalid (git-fixes). * exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes). * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes). * f2fs: fix error path of __f2fs_build_free_nids (git-fixes). * fast_dput(): handle underflows gracefully (git-fixes) * fat: fix uninitialized field in nostale filehandles (git-fixes) * fbdev: fix incorrect address computation in deferred IO (git-fixes). * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes). * fbdev: sh7760fb: allow modular build (git-fixes). * fbdev: shmobile: fix snprintf truncation (git-fixes). * fbdev: sisfb: hide unused variables (git-fixes). * fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes). * fbmon: prevent division by zero in fb_videomode_from_videomode() (stable- fixes). * filelock: fix potential use-after-free in posix_lock_inode (git-fixes). * firewire: core: use long bus reset on gap count error (stable-fixes). * firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes). * firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes). * firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes). * firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes). * firmware: cs_dsp: Return error if block header overflows file (git-fixes). * firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes). * firmware: cs_dsp: Validate payload length before processing block (git- fixes). * firmware: dmi-id: add a release callback function (git-fixes). * firmware: dmi: Stop decoding on broken entry (stable-fixes). * firmware: psci: Fix return value from psci_system_suspend() (git-fixes). * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes). * firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() (stable-fixes). * firmware: turris-mox-rwtm: Do not complete if there are no waiters (git- fixes). * firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes). * firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes). * fpga: dfl-pci: add PCI subdevice ID for Intel D5005 card (stable-fixes). * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes) * fs/9p: translate O_TRUNC into OTRUNC (git-fixes) * fs/file: fix the check in find_next_fd() (git-fixes). * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes) * fs: indicate request originates from old mount API (git-fixes) * fs: relax mount_setattr() permission checks (git-fixes) * fsverity: skip PKCS#7 parser when keyring is empty (git-fixes) * ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes). * fuse: do not unhash root (bsc#1223946). * fuse: fix root lookup with nonzero generation (bsc#1223945). * fuse: verify {g,u}id mount options correctly (bsc#1228193). * geneve: fix header validation in geneve[6]_xmit_skb (git-fixes). * geneve: make sure to pull inner header in geneve_rx() (git-fixes). * genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after() (git- fixes). * gfs2: Do not forget to complete delayed withdraw (git-fixes). * gfs2: Fix "ignore unlock failures after withdraw" (git-fixes). * gfs2: Fix invalid metadata access in punch_hole (git-fixes). * gfs2: Get rid of gfs2_alloc_blocks generation parameter (git-fixes). * gfs2: Rename gfs2_lookup_{ simple => meta } (git-fixes). * gfs2: Use mapping->gfp_mask for metadata inodes (git-fixes). * gfs2: convert to ctime accessor functions (git-fixes). * gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes). * gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes). * gpio: cdev: sanitize the label before requesting the interrupt (stable- fixes). * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes). * gpio: davinci: Validate the obtained number of IRQs (git-fixes). * gpio: lpc32xx: fix module autoloading (stable-fixes). * gpio: mc33880: Convert comma to semicolon (git-fixes). * gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (stable-fixes). * gpio: tangier: Use correct type for the IRQ chip data (git-fixes). * gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes). * gpio: tqmx86: fix broken IRQ_TYPE_EDGE_BOTH interrupt type (git-fixes). * gpio: tqmx86: fix typo in Kconfig label (git-fixes). * gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes). * gpio: tqmx86: store IRQ trigger type and unmask status separately (git- fixes). * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes). * gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git- fixes). * gpiolib: cdev: fix uninitialised kfifo (git-fixes). * gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable- fixes). * gpiolib: swnode: Remove wrong header inclusion (git-fixes). * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes). * gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes). * hfsplus: fix to avoid false alarm of circular locking (git-fixes). * hfsplus: fix uninit-value in copy_name (git-fixes). * hpet: Support 32-bit userspace (git-fixes). * hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes). * hwmon: (amc6821) add of_match table (stable-fixes). * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git- fixes). * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git- fixes). * hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes). * hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor (git-fixes). * hwmon: (lm70) fix links in doc and comments (git-fixes). * hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes). * hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes). * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes). * hwmon: (shtc1) Fix property misspelling (git-fixes). * hwrng: amd - Convert PCIBIOS_* return codes to errnos (git-fixes). * hwrng: core - Fix wrong quality calculation at hw rng registration (git- fixes). * hwtracing: hisi_ptt: Move type check to the beginning of hisi_ptt_pmu_event_init() (git-fixes). * i2c: acpi: Unbind mux adapters before delete (git-fixes). * i2c: at91: Fix the functionality flags of the slave-only interface (git- fixes). * i2c: cadence: Avoid fifo clear after start (git-fixes). * i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes). * i2c: i801: Annotate apanel_addr as __ro_after_init (stable-fixes). * i2c: mark HostNotify target address as used (git-fixes). * i2c: ocores: set IACK bit after core is enabled (git-fixes). * i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr (git-fixes). * i2c: pxa: hide unused icr_bits[] variable (git-fixes). * i2c: rcar: bring hardware to known state when probing (git-fixes). * i2c: smbus: fix NULL function pointer dereference (git-fixes). * i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git- fixes). * i2c: testunit: avoid re-issued work after read message (git-fixes). * i2c: testunit: correct Kconfig description (git-fixes). * i2c: testunit: discard write requests while old command is running (git- fixes). * i2c: testunit: do not erase registers after STOP (git-fixes). * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes). * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes). * i40e: Enforce software interrupt during busy-poll exit (git-fixes). * i40e: Fix VF MAC filter removal (git-fixes). * i40e: Fix firmware version comparison function (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: fix i40e_count_filters() to count only active/new filters (git-fixes). * i40e: fix vf may be used uninitialized in this function warning (git-fixes). * i40e: fix: remove needless retries of NVM update (bsc#1227736). * i915: make inject_virtual_interrupt() void (stable-fixes). * ice: Refactor FW data type and fix bitmap casting issue (git-fixes). * ice: fix enabling RX VLAN filtering (git-fixes). * ice: fix memory corruption bug with suspend and rebuild (git-fixes). * ice: fix stats being updated by way too large values (git-fixes). * ice: fix typo in assignment (git-fixes). * ice: fix uninitialized dplls mutex usage (git-fixes). * ice: reconfig host after changing MSI-X on VF (git-fixes). * ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes). * ice: use relative VSI index for VFs instead of PF VSI number (git-fixes). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * ida: make 'ida_dump' static (git-fixes). * idma64: Do not try to serve interrupts when device is powered off (git- fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: extend tx watchdog timeout (bsc#1224137). * idpf: fix kernel panic on unknown packet types (git-fixes). * igb: Fix missing time sync events (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove stale comment about Tx timestamping (git-fixes). * igc: avoid returning frame twice in XDP_REDIRECT (git-fixes). * iio: Fix the sorting functionality in iio_gts_build_avail_time_table (git- fixes). * iio: accel: fxls8962af: select IIO_BUFFER & IIO_KFIFO_BUF (git-fixes). * iio: accel: mxc4005: Interrupt handling fixes (git-fixes). * iio: accel: mxc4005: Reset chip on probe() and resume() (stable-fixes). * iio: accel: mxc4005: allow module autoloading via OF compatible (stable- fixes). * iio: adc: ad7266: Fix variable checking bug (git-fixes). * iio: adc: ad9467: fix scan type sign (git-fixes). * iio: adc: ad9467: use chip_info variables instead of array (stable-fixes). * iio: adc: ad9467: use spi_get_device_match_data() (stable-fixes). * iio: adc: stm32: Fixing err code to not indicate success (git-fixes). * iio: chemical: bme680: Fix calibration data variable (git-fixes). * iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes). * iio: chemical: bme680: Fix pressure value output (git-fixes). * iio: chemical: bme680: Fix sensor data read operation (git-fixes). * iio: core: Leave private pointer NULL when no private data supplied (git- fixes). * iio: dac: ad5592r: fix temperature channel scaling value (git-fixes). * iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes). * iio: frequency: adrf6780: rm clk provider include (git-fixes). * iio: gts-helper: Fix division loop (git-fixes). * iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes). * iio: pressure: Fixes BME280 SPI driver data (git-fixes). * iio: pressure: bmp280: Fix BMP580 temperature reading (stable-fixes). * iio: pressure: dps310: support negative temperature values (git-fixes). * iio: pressure: fix some word spelling errors (stable-fixes). * iio: xilinx-ams: Do not include ams_ctrl_channels in scan_mask (git-fixes). * iio:imu: adis16475: Fix sync mode setting (git-fixes). * inet: frags: eliminate kernel-doc warning (git-fixes). * inet_diag: annotate data-races around inet_diag_table[] (git-fixes). * init/main.c: Fix potential static_command_line memory overflow (git-fixes). * init: open /initrd.image with O_LARGEFILE (stable-fixes). * input/touchscreen: imagis: Correct the maximum touch area value (stable- fixes). * input: Add event code for accessibility key (stable-fixes). * input: Add support for "Do Not Disturb" (stable-fixes). * intel: legacy: Partial revert of field get conversion (git-fixes). * intel_th: pci: Add Granite Rapids SOC support (stable-fixes). * intel_th: pci: Add Granite Rapids support (stable-fixes). * intel_th: pci: Add Lunar Lake support (stable-fixes). * intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes). * intel_th: pci: Add Meteor Lake-S support (stable-fixes). * intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes). * interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS() (git-fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git- fixes). * interconnect: qcom: qcm2290: Fix mas_snoc_bimc RPM master ID (git-fixes). * interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes). * interconnect: qcom: sm8550: Enable sync_state (git-fixes). * io-wq: write next_work before dropping acct_lock (git-fixes). * io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (git-fixes). * io_uring/io-wq: avoid garbage value of 'match' in io_wq_enqueue() (git- fixes). * io_uring/kbuf: get rid of bl->is_ready (git-fixes). * io_uring/kbuf: get rid of lower BGID lists (git-fixes). * io_uring/kbuf: protect io_buffer_list teardown with a reference (git-fixes). * io_uring/kbuf: rename is_mapped (git-fixes). * io_uring/net: correct the type of variable (git-fixes). * io_uring/net: correctly handle multishot recvmsg retry setup (git-fixes). * io_uring/net: fix sendzc lazy wake polling (git-fixes). * io_uring/net: move receive multishot out of the generic msghdr path (git- fixes). * io_uring/net: restore msg_control on sendzc retry (git-fixes). * io_uring/net: unify how recvmsg and sendmsg copy in the msghdr (git-fixes). * io_uring/rsrc: do not lock while !TASK_RUNNING (git-fixes). * io_uring/rsrc: fix incorrect assignment of iter->nr_segs in io_import_fixed (git-fixes). * io_uring/rw: do not allow multishot reads without NOWAIT support (git- fixes). * io_uring/rw: return IOU_ISSUE_SKIP_COMPLETE for multishot retry (git-fixes). * io_uring/sqpoll: work around a potential audit memory leak (git-fixes). * io_uring/unix: drop usage of io_uring socket (git-fixes). * io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64() failure (git-fixes). * io_uring: clean rings on NO_MMAP alloc fail (git-fixes). * io_uring: clear opcode specific data for an early failure (git-fixes). * io_uring: do not save/restore iowait state (git-fixes). * io_uring: fail NOP if non-zero op flags is passed in (git-fixes). * io_uring: fix io_queue_proc modifying req->flags (git-fixes). * io_uring: fix mshot io-wq checks (git-fixes). * io_uring: fix mshot read defer taskrun cqe posting (git-fixes). * io_uring: fix poll_remove stalled req completion (git-fixes). * io_uring: kabi cookie remove (bsc#1217384). * io_uring: remove looping around handling traditional task_work (git-fixes). * io_uring: remove unconditional looping in local task_work handling (git- fixes). * io_uring: use private workqueue for exit work (git-fixes). * io_uring: use the right type for work_llist empty check (git-fixes). * iomap: clear the per-folio dirty bits on all writeback failures (git-fixes) * iommu/amd: Enhance def_domain_type to handle untrusted device (git-fixes). * iommu/amd: Fix panic accessing amd_iommu_enable_faulting (bsc#1224767). * iommu/amd: Fix sysfs leak in iommu init (git-fixes). * iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes). * iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes). * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331) * iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes). * iommu/vt-d: Allocate DMAR fault interrupts locally (bsc#1224767). * iommu/vt-d: Allocate local memory for page request queue (git-fixes). * iommu/vt-d: Fix WARN_ON in iommu probe path (git-fixes). * iommu/vt-d: Fix wrong use of pasid config (git-fixes). * iommu/vt-d: Improve ITE fault handling if target device isn't present (git- fixes). * iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git- fixes). * iommu/vt-d: Update iotlb in nested domain attach (git-fixes). * iommu/vt-d: Use rbtree to track iommu probed devices (git-fixes). * iommu: Fix compilation without CONFIG_IOMMU_INTEL (git-fixes). * iommu: Map reserved memory as cacheable if device is coherent (git-fixes). * iommu: Return right value in iommu_sva_bind_device() (git-fixes). * iommu: Undo pasid attachment only for the devices that have succeeded (git- fixes). * iommu: mtk: fix module autoloading (git-fixes). * iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes). * iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git- fixes). * iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes). * iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes). * iommufd: Fix iopt_access_list_id overwrite bug (git-fixes). * iommufd: Reject non-zero data_type if no data_len is provided (git-fixes). * ionic: set adminq irq affinity (git-fixes). * ipmi: ssif_bmc: prevent integer overflow on 32bit systems (git-fixes). * ipv4: annotate data-races around fi->fib_dead (git-fixes). * ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) * irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes). * irqchip/armada-370-xp: Suppress unused-function warning (git-fixes). * irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * irqchip/gic-v3-its: Prevent double free on error (git-fixes). * irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git- fixes). * irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git- fixes). * irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index (stable-fixes). * irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes). * irqchip/renesas-rzg2l: Implement restriction when writing ISCR register (stable-fixes). * irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type (git-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes). * irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes). * iwlwifi: fw: fix more kernel-doc warnings (bsc#1227149). * iwlwifi: mvm: Drop unused fw_trips_index[] from iwl_mvm_thermal_device (bsc#1227149). * iwlwifi: mvm: Populate trip table before registering thermal zone (bsc#1227149). * iwlwifi: mvm: Use for_each_thermal_trip() for walking trip points (bsc#1227149). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes). * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes). * jfs: Fix array-index-out-of-bounds in diFree (git-fixes). * jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383). * kABI fix of KVM: x86/pmu: Allow programming events that match unsupported arch events (bsc#1225696). * kABI fix of KVM: x86/pmu: Prioritize VMX interception over * kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible (git-fixes). * kABI workaround for cs35l56 (git-fixes). * kABI workaround for of driver changes (git-fixes). * kABI workaround for sof_ipc_pcm_ops (git-fixes). * kABI workaround for wireless updates (bsc#1227149). * kABI: Adjust trace_iterator.wait_index (git-fixes). * kABI: bpf: verifier kABI workaround (bsc#1225903). * kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git fixes). * kabi/severities: Ignore io_uring internal symbols * kabi/severities: Remove mitigation-related symbols * kabi/severities: cleanup and update for WiFi driver entries (bsc#1227149) * kabi/severities: cover all ath/* drivers (bsc#1227149) * kabi/severities: cover all mt76 modules (bsc#1227149) * kabi/severities: ignore IMS functions * kabi/severities: ignore TAS2781 symbol drop, it's only locally used * kabi/severities: ignore Wangxun ethernet driver local symbols * kabi/severities: ignore amd pds internal symbols * kabi/severities: ignore brcmfmac-specific local symbols * kabi/severities: ignore kABI changes Realtek WiFi drivers (bsc#1227149) * kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502) * kasan, fortify: properly rename memintrinsics (git-fixes). * kasan/test: avoid gcc warning for intentional overflow (git-fixes). * kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes). * kasan: print the original fault addr when access invalid shadow (git-fixes). * kbuild: Fix build target deb-pkg: ln: failed to create hard link (git- fixes). * kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes). * kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 (stable- fixes). * kbuild: avoid build error when single DTB is turned into composite DTB (git- fixes). * kconfig: doc: fix a typo in the note about 'imply' (git-fixes). * kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes). * kconfig: fix infinite loop when expanding a macro at the end of file (git- fixes). * kconfig: gconf: give a proper initial state to the Save button (stable- fixes). * kconfig: remove wrong expr_trans_bool() (stable-fixes). * kcov: do not lose track of remote references during softirqs (git-fixes). * kernel-binary: vdso: Own module_dir * kernel-doc: fix struct_group_tagged() parsing (git-fixes). * kexec: do syscore_shutdown() in kernel_kexec (git-fixes). * kheaders: explicitly define file modes for archived headers (stable-fixes). * knfsd: LOOKUP can return an illegal error value (git-fixes). * kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes). * kprobe/ftrace: bail out if ftrace was killed (git-fixes). * kprobe/ftrace: fix build error due to bad function definition (git-fixes). * kprobes: Fix possible use-after-free issue on kprobe registration (git- fixes). * kselftest: Add a ksft_perror() helper (stable-fixes). * kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes). * kunit: Fix checksum tests on big endian CPUs (git-fixed). * leds: flash: leds-qcom-flash: Test the correct variable in init (git-fixes). * leds: mt6360: Fix memory leak in mt6360_init_isnk_properties() (git-fixes). * leds: pwm: Disable PWM when going to suspend (git-fixes). * leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes). * leds: trigger: Unregister sysfs attributes before calling deactivate() (git- fixes). * leds: triggers: Flush pending brightness before activating trigger (git- fixes). * lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes). * lib: objagg: Fix general protection fault (git-fixes). * lib: objagg: Fix spelling (git-fixes). * lib: test_objagg: Fix spelling (git-fixes). * libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228192). * libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853). * libperf evlist: Avoid out-of-bounds access (git-fixes). * libsubcmd: Fix parse-options memory leak (git-fixes). * livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes) * lsm: fix the logic in security_inode_getsecctx() (git-fixes). * mISDN: Fix a use after free in hfcmulti_tx() (git-fixes). * mISDN: fix MISDN_TIME_STAMP handling (git-fixes). * mac802154: fix llsec key resources release in mac802154_llsec_key_del (git- fixes). * mac802154: fix time calculation in ieee802154_configure_durations() (git- fixes). * mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (git-fixes). * maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes). * md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542). * md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542). * md/raid1-10: factor out a new helper raid1_should_read_first() (jsc#PED-7542). * md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542). * md/raid1: factor out helpers to choose the best rdev from read_balance() (jsc#PED-7542). * md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542). * md/raid1: factor out the code to manage sequential IO (jsc#PED-7542). * md/raid1: fix choose next idle in read_balance() (jsc#PED-7542). * md/raid1: record nonrot rdevs while adding/removing rdevs to conf (jsc#PED-7542). * md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542). * md: add a new helper rdev_has_badblock() (jsc#PED-7542). * md: add a new helper reshape_interrupted() (jsc#PED-7542). * md: changed the switch of RAID_VERSION to if (jsc#PED-7542). * md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542). * md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542). * md: clean up openers check in do_md_stop() and md_set_readonly() (jsc#PED-7542). * md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (jsc#PED-7542). * md: export helper md_is_rdwr() (jsc#PED-7542). * md: export helpers to stop sync_thread (jsc#PED-7542). * md: factor out a helper to sync mddev (jsc#PED-7542). * md: fix kmemleak of rdev->serial (jsc#PED-7542). * md: get rdev->mddev with READ_ONCE() (jsc#PED-7542). * md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542). * md: preserve KABI in struct md_personality (jsc#PED-7542). * md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542). * md: remove redundant md_wakeup_thread() (jsc#PED-7542). * md: return directly before setting did_set_md_closing (jsc#PED-7542). * md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542). * md: use RCU lock to protect traversal in md_spares_need_change() (jsc#PED-7542). * media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes). * media: cadence: csi2rx: use match fwnode for media link (git-fixes). * media: cec: core: remove length check of Timer Status (stable-fixes). * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes). * media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes). * media: dvb-frontends: tda18271c2dd: Remove casting during div (stable- fixes). * media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes). * media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable- fixes). * media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes). * media: dvbdev: Initialize sbuf (stable-fixes). * media: dw2102: Do not translate i2c read into write (stable-fixes). * media: dw2102: fix a potential buffer overflow (git-fixes). * media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes). * media: i2c: Fix imx412 exposure control (git-fixes). * media: i2c: et8ek8: Do not strip remove function when driver is builtin (git-fixes). * media: imon: Fix race getting ictx->lock (git-fixes). * media: imx-jpeg: Drop initial source change event if capture has been setup (git-fixes). * media: imx-jpeg: Remove some redundant error logs (git-fixes). * media: imx-pxp: Fix ERR_PTR dereference in pxp_probe() (git-fixes). * media: ipu3-cio2: Request IRQ earlier (git-fixes). * media: lgdt3306a: Add a check against null-pointer-def (stable-fixes). * media: mc: Fix flags handling when creating pad links (stable-fixes). * media: mc: Fix graph walk in media_pipeline_start (git-fixes). * media: mc: Rename pad variable to clarify intent (stable-fixes). * media: mc: mark the media devnode as registered from the, start (git-fixes). * media: mxl5xx: Move xpt structures off stack (stable-fixes). * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes). * media: pci: ivtv: Add check for DMA map result (git-fixes). * media: radio-shark2: Avoid led_names truncations (git-fixes). * media: rcar-vin: Fix YUYV8_1X16 handling for CSI-2 (git-fixes). * media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes). * media: renesas: vsp1: Fix _irqsave and _irq mix (git-fixes). * media: renesas: vsp1: Store RPF partition configuration per RPF instance (git-fixes). * media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes). * media: s2255: Use refcount_t instead of atomic_t for num_channels (stable- fixes). * media: sta2x11: fix irq handler cast (stable-fixes). * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes). * media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes). * media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes). * media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes). * media: uvcvideo: Override default flags (git-fixes). * media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes). * media: v4l2-subdev: Fix stream handling for crop API (git-fixes). * media: v4l: Do not turn on privacy LED if streamon fails (git-fixes). * media: v4l: async: Fix NULL pointer dereference in adding ancillary links (git-fixes). * media: v4l: subdev: Fix typo in documentation (git-fixes). * media: venus: fix use after free in vdec_close (git-fixes). * media: venus: flush all buffers in output plane streamoff (git-fixes). * mei: demote client disconnect warning on suspend to debug (stable-fixes). * mei: me: add arrow lake point H DID (stable-fixes). * mei: me: add arrow lake point S DID (stable-fixes). * mei: me: add lunar lake point M DID (stable-fixes). * mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes). * mei: me: release irq in mei_me_pci_resume error path (git-fixes). * mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes). * mfd: pm8008: Fix regmap irq chip initialisation (git-fixes). * misc: fastrpc: Avoid updating PD type for capability request (git-fixes). * misc: fastrpc: Copy the complete capability structure to user (git-fixes). * misc: fastrpc: Fix DSP capabilities request (git-fixes). * misc: fastrpc: Fix memory leak in audio daemon attach operation (git-fixes). * misc: fastrpc: Fix ownership reassignment of remote heap (git-fixes). * misc: fastrpc: Restrict untrusted app to attach to privileged PD (git- fixes). * misc: microchip: pci1xxxx: Fix a memory leak in the error handling of gp_aux_bus_probe() (git-fixes). * misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe() (git-fixes). * mlxbf_gige: call request_irq() after NAPI initialized (git-fixes). * mlxbf_gige: stop PHY during open() error paths (git-fixes). * mlxbf_gige: stop interface during shutdown (git-fixes). * mlxsw: Use refcount_t for reference counting (git-fixes). * mm,page_owner: Defer enablement of static branch (bsc#1222366). * mm,page_owner: Fix accounting of pages when migrating (bsc#1222366). * mm,page_owner: Fix printing of stack records (bsc#1222366). * mm,page_owner: Fix refcount imbalance (bsc#1222366). * mm,page_owner: Update metadata for tail pages (bsc#1222366). * mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366). * mm,page_owner: drop unnecessary check (bsc#1222366). * mm,page_owner: fix recursion (bsc#1222366). * mm/slab: make __free(kfree) accept error pointers (git-fixes). * mm: memcg: do not periodically flush stats when memcg is disabled (bsc#1222525). * mm: memcg: use larger batches for proactive reclaim (bsc#1222522). * mm: page_owner: fix wrong information in dump_page_owner (git-fixes). * mm_init kABI workaround (git-fixes). * mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes). * mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes). * mmc: core: Avoid negative index with array access (git-fixes). * mmc: core: Do not force a retune before RPMB switch (stable-fixes). * mmc: core: Initialize mmc_blk_ioc_data (git-fixes). * mmc: davinci: Do not strip remove function when driver is builtin (git- fixes). * mmc: omap: fix broken slot switch lookup (git-fixes). * mmc: omap: fix deferred probe (git-fixes). * mmc: omap: restore original power up/down steps (git-fixes). * mmc: sdhci-acpi: Add quirk to enable pull-up on the card-detect GPIO on Asus T100TA (git-fixes). * mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable- fixes). * mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes). * mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes). * mmc: sdhci-brcmstb: check R1_STATUS for erase/trim/discard (git-fixes). * mmc: sdhci-msm: pervent access to suspended controller (git-fixes). * mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode (git-fixes). * mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes). * mmc: sdhci: Add support for "Tuning Error" interrupts (stable-fixes). * mmc: sdhci: Do not invert write-protect twice (git-fixes). * mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes). * mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes). * mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes). * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes). * mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes). * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes). * modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes). * module: do not ignore sysfs_create_link() failures (git-fixes). * mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes). * mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes). * mptcp: fix bogus receive window shrinkage with multiple subflows (git- fixes). * mptcp: move __mptcp_error_report in protocol.c (git-fixes). * mptcp: process pending subflow error on close (git-fixes). * mt76: connac: move more mt7921/mt7915 mac shared code in connac lib (bsc#1227149). * mt76: mt7996: rely on mt76_sta_stats in mt76_wcid (bsc#1227149). * mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes). * mtd: diskonchip: work around ubsan link failure (stable-fixes). * mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes). * mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes). * mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git- fixes). * mtd: rawnand: Fix the nand_read_data_op() early check (git-fixes). * mtd: rawnand: hynix: fixed typo (git-fixes). * mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes). * mtd: spinand: Add support for 5-byte IDs (stable-fixes). * net/dcb: check for detached device before executing callbacks (bsc#1215587). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: E-switch, Change flow rule destination checking (git-fixes). * net/mlx5: E-switch, store eswitch pointer before registering devlink_param (git-fixes). * net/mlx5: Fix MTMP register capability offset in MCAM register (git-fixes). * net/mlx5: Fix fw reporter diagnose output (git-fixes). * net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Properly link new fs rules into the tree (git-fixes). * net/mlx5: Register devlink first under devlink lock (git-fixes). * net/mlx5: Restore mistakenly dropped parts in register devlink flow (git- fixes). * net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes). * net/mlx5: offset comp irq index in name by one (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit (git-fixes). * net/mlx5e: Fix MACsec state loss upon state update in offload path (git- fixes). * net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes). * net/mlx5e: RSS, Block changing channels number when RXFH is configured (git- fixes). * net/mlx5e: Switch to using _bh variant of of spinlock API in port timestamping NAPI poll context (git-fixes). * net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (git-fixes). * net/smc: bugfix for smcr v2 server connect success statistic (git-fixes). * net/smc: fix documentation of buffer sizes (git-fixes). * net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add (git-fixes). * net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes). * net: NSH: fix kernel-doc notation warning (git-fixes). * net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes). * net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes). * net: annotate data-races around sk->sk_bind_phc (git-fixes). * net: annotate data-races around sk->sk_forward_alloc (git-fixes). * net: annotate data-races around sk->sk_lingertime (git-fixes). * net: annotate data-races around sk->sk_tsflags (git-fixes). * net: bonding: remove kernel-doc comment marker (git-fixes). * net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes). * net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes). * net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes). * net: cfg802154: fix kernel-doc notation warnings (git-fixes). * net: dsa: microchip: fix register write order in ksz8_ind_write8() (git- fixes). * net: dsa: mt7530: fix handling of all link-local frames (git-fixes). * net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports (git-fixes). * net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git- fixes). * net: dsa: mt7530: trap link-local frames regardless of ST Port State (git- fixes). * net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() (git-fixes). * net: ena: Fix incorrect descriptor free behavior (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Fix redundant device NUMA node override (jsc#PED-8688). * net: ena: Move XDP code to its new files (git-fixes). * net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git- fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Set tx_info->xdpf value to NULL (git-fixes). * net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes). * net: ethernet: mtk_wed: introduce mtk_wed_buf structure (bsc#1227149). * net: ethernet: mtk_wed: rename mtk_rxbm_desc in mtk_wed_bm_desc (bsc#1227149). * net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes). * net: fec: Set mac_managed_pm during probe (git-fixes). * net: fill in MODULE_DESCRIPTION()s in kuba@'s modules (bsc#1227149). * net: hns3: Remove io_stop_wc() calls after __iowrite64_copy() (bsc#1226502) * net: hns3: fix index limit to support all queue stats (git-fixes). * net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git- fixes). * net: hns3: fix kernel crash when devlink reload during pf initialization (git-fixes). * net: hns3: fix port duplex configure error in IMP reset (git-fixes). * net: hns3: fix wrong judgment condition issue (git-fixes). * net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes). * net: hns3: tracing: fix hclgevf trace event strings (git-fixes). * net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() (git-fixes). * net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git- fixes). * net: ks8851: Inline ks8851_rx_skb() (git-fixes). * net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git- fixes). * net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes). * net: lan743x: Support WOL at both the PHY and MAC appropriately (git-fixes). * net: lan743x: disable WOL upon resume to restore full data path operation (git-fixes). * net: libwx: fix memory leak on free page (git-fixes). * net: ll_temac: platform_get_resource replaced by wrong function (git-fixes). * net: llc: fix kernel-doc notation warnings (git-fixes). * net: mac802154: Fix racy device stats updates by DEV_STATS_INC() and DEV_STATS_ADD() (stable-fixes). * net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491). * net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes). * net: mana: Fix possible double free in error handling path (git-fixes). * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes). * net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up (git-fixes). * net: nfc: remove inappropriate attrs check (stable-fixes). * net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes). * net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes). * net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git- fixes). * net: phy: micrel: Fix potential null pointer dereference (git-fixes). * net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes). * net: phy: micrel: fix KSZ9477 PHY issues after suspend/resume (git-fixes). * net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping (git-fixes). * net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061 (git-fixes). * net: phy: microchip: lan87xx: reinit PHY after cable test (git-fixes). * net: phy: mxl-gpy: Remove interrupt mask clearing from config_init (git- fixes). * net: phy: phy_device: Fix PHY LED blinking code comment (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes). * net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes). * net: ravb: Always process TX descriptor ring (git-fixes). * net: ravb: Always update error counters (git-fixes). * net: ravb: Let IP-specific receive function to interrogate descriptors (git- fixes). * net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes). * net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes). * net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes). * net: sparx5: flower: fix fragment flags handling (git-fixes). * net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes). * net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes). * net: stmmac: fix rx queue priority assignment (git-fixes). * net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes). * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes). * net: tls, fix WARNIING in __sk_msg_free (bsc#1221858). * net: tls: fix returned read length with async decrypt (bsc#1221858). * net: tls: fix use-after-free with partial reads and async (bsc#1221858). * net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes). * net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes). * net: usb: ax88179_178a: fix link status when link is set to down/up (git- fixes). * net: usb: ax88179_178a: improve link status logs (git-fixes). * net: usb: ax88179_178a: improve reset check (git-fixes). * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes). * net: usb: qmi_wwan: add Telit FN912 compositions (stable-fixes). * net: usb: qmi_wwan: add Telit FN920C04 compositions (git-fixes). * net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes). * net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git- fixes). * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes). * net: usb: sr9700: stop lying about skb->truesize (git-fixes). * net: veth: do not manipulate GRO when using XDP (git-fixes). * net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes). * net:usb:qmi_wwan: support Rolling modules (stable-fixes). * netfilter: nf_tables: disable toggling dormant table state more than once (git-fixes). * netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes). * netfilter: nft_ct: fix l3num expectations with inet pseudo family (git- fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * nf_conntrack: fix -Wunused-const-variable= (git-fixes). * nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes). * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git- fixes). * nfc: nci: Fix kcov check in nci_rx_work() (git-fixes). * nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes). * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes). * nfp: flower: handle acti_netdevs allocation failure (git-fixes). * nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442). * nfs: Block on write congestion (bsc#1218442). * nfs: Bump default write congestion size (bsc#1218442). * nfs: Drop pointless check from nfs_commit_release_pages() (bsc#1218442). * nfs: Fix up kabi after adding write_congestion_wait (bsc#1218442). * nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes). * nfs: Properly initialize server->writeback (bsc#1218442). * nfs: drop the incorrect assertion in nfs_swap_rw() (git-fixes). * nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes). * nfs: fix undefined behavior in nfs_block_bits() (git-fixes). * nfs: keep server info for remounts (git-fixes). * nfsd: Fix a regression in nfsd_setattr() (git-fixes). * nfsd: do not call locks_release_private() twice concurrently (git-fixes). * nfsd: hold a lighter-weight client reference over CB_RECALL_ANY (git-fixes). * nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912). * nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408). * nilfs2: add missing check for inode numbers on directory entries (stable- fixes). * nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes). * nilfs2: convert persistent object allocator to use kmap_local (git-fixes). * nilfs2: fix OOB in nilfs_set_de_type (git-fixes). * nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes). * nilfs2: fix inode number range checks (stable-fixes). * nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (git- fixes). * nilfs2: fix out-of-range warning (git-fixes). * nilfs2: fix potential bug in end_buffer_async_write (git-fixes). * nilfs2: fix potential hang in nilfs_detach_log_writer() (git-fixes). * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes). * nilfs2: fix use-after-free of timer for log writer thread (git-fixes). * nilfs2: make superblock data array index computation sparse friendly (git- fixes). * nilfs2: return the mapped address from nilfs_get_page() (stable-fixes). * nouveau/dmem: handle kcalloc() allocation failure (git-fixes). * nouveau/gsp: do not check devinit disable on GSP (git-fixes). * nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes). * nouveau: add an ioctl to report vram usage (stable-fixes). * nouveau: add an ioctl to return vram bar size (stable-fixes). * nouveau: fix devinit paths to only handle display on GSP (git-fixes). * nouveau: fix function cast warning (git-fixes). * nouveau: fix instmem race condition around ptr stores (git-fixes). * nouveau: lock the client object tree (stable-fixes). * nouveau: report byte usage in VRAM usage (git-fixes). * nouveau: reset the bo resource bus info after an eviction (git-fixes). * nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal (jsc#PED-5853). * nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853). * nvdimm: make nvdimm_bus_type const (jsc#PED-5853). * nvme-fabrics: short-circuit reconnect retries (bsc#1186716). * nvme-fc: do not wait in vain when unloading module (git-fixes). * nvme-multipath: fix io accounting on failover (git-fixes). * nvme-pci: Add quirk for broken MSIs (git-fixes). * nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049). * nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858). * nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049). * nvme: cancel pending I/O if nvme controller is in terminal state (bsc#1226503). * nvme: do not retry authentication failures (bsc#1186716). * nvme: find numa distance only if controller has valid numa id (git-fixes). * nvme: fix multipath batched completion accounting (git-fixes). * nvme: fix nvme_pr_* status code parsing (git-fixes). * nvme: fix reconnection fail due to reserved tag allocation (git-fixes). * nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH (git-fixes). * nvme: return kernel error codes for admin queue connect (bsc#1186716). * nvmet-auth: replace pr_debug() with pr_err() to report an error (git-fixes). * nvmet-auth: return the error code to the nvmet_auth_host_hash() callers (git-fixes). * nvmet-fc: abort command when there is no binding (git-fixes). * nvmet-fc: avoid deadlock on delete association path (git-fixes). * nvmet-fc: defer cleanup using RCU properly (git-fixes). * nvmet-fc: hold reference on hostport match (git-fixes). * nvmet-fc: release reference on target port (git-fixes). * nvmet-fc: take ref count on tgtport before delete assoc (git-fixes). * nvmet-fcloop: swap the list_add_tail arguments (git-fixes). * nvmet-passthru: propagate status from id override functions (git-fixes). * nvmet-tcp: fix nvme tcp ida memory leak (git-fixes). * nvmet-tcp: fix possible memory leak when tearing down a controller (git- fixes). * nvmet: fix ns enable/disable possible hang (git-fixes). * nvmet: fix nvme status code when namespace is disabled (git-fixes). * nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716). * nvmet: prevent sprintf() overflow in nvmet_subsys_nsid_exists() (git-fixes). * nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716). * ocfs2: adjust enabling place for la window (bsc#1219224). * ocfs2: fix DIO failure due to insufficient transaction credits (git-fixes). * ocfs2: fix races between hole punching and AIO+DIO (git-fixes). * ocfs2: fix sparse warnings (bsc#1219224). * ocfs2: improve write IO performance when fragmentation is high (bsc#1219224). * ocfs2: speed up chain-list searching (bsc#1219224). * ocfs2: use coarse time for new created files (git-fixes). * octeontx2-af: Add array index check (git-fixes). * octeontx2-af: Fix NIX SQ mode and BP config (git-fixes). * octeontx2-af: Fix devlink params (git-fixes). * octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes). * octeontx2-af: Use matching wake_up API variant in CGX command interface (git-fixes). * octeontx2-af: Use separate handlers for interrupts (git-fixes). * octeontx2-pf: Fix transmit scheduler resource leak (git-fixes). * octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes). * octeontx2-pf: Use default max_active works instead of one (git-fixes). * octeontx2-pf: Wait till detach_resources msg is complete (git-fixes). * octeontx2-pf: check negative error code in otx2_open() (git-fixes). * octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes). * octeontx2: Detect the mbox up or down message via register (git-fixes). * of: dynamic: Synchronize of_changeset_destroy() with the devlink removals (git-fixes). * of: module: add buffer overflow check in of_modalias() (git-fixes). * of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes). * of: property: Add in-ports/out-ports support to of_graph_get_port_parent() (stable-fixes). * of: property: Improve finding the consumer of a remote-endpoint property (git-fixes). * of: property: Improve finding the supplier of a remote-endpoint property (git-fixes). * of: property: fix typo in io-channels (git-fixes). * of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git- fixes). * of: unittest: Fix compile in the non-dynamic case (git-fixes). * orangefs: fix out-of-bounds fsid access (git-fixes). * overflow: Allow non-type arg to type_max() and type_min() (stable-fixes). * pNFS/filelayout: fixup pNfs allocation modes (git-fixes). * peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes). * perf annotate: Fix annotation_calc_lines() to pass correct address to get_srcline() (git-fixes). * perf annotate: Get rid of duplicate --group option item (git-fixes). * perf auxtrace: Fix multiple use of --itrace option (git-fixes). * perf bench internals inject-build-id: Fix trap divide when collecting just one DSO (git-fixes). * perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes). * perf bpf: Clean up the generated/copied vmlinux.h (git-fixes). * perf daemon: Fix file leak in daemon_session__control (git-fixes). * perf docs: Document bpf event modifier (git-fixes). * perf evsel: Fix duplicate initialization of data->id in evsel__parse_sample() (git-fixes). * perf expr: Fix "has_event" function for metric style events (git-fixes). * perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer) (git-fixes). * perf jevents: Drop or simplify small integer values (git-fixes). * perf list: fix short description for some cache events (git-fixes). * perf lock contention: Add a missing NULL check (git-fixes). * perf metric: Do not remove scale from counts (git-fixes). * perf pmu: Count sys and cpuid JSON events separately (git fixes). * perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes). * perf pmu: Treat the msr pmu as software (git-fixes). * perf print-events: make is_event_supported() more robust (git-fixes). * perf probe: Add missing libgen.h header needed for using basename() (git- fixes). * perf record: Check conflict between '\--timestamp-filename' option and pipe mode before recording (git-fixes). * perf record: Delete session after stopping sideband thread (git-fixes). * perf record: Fix debug message placement for test consumption (git-fixes). * perf record: Fix possible incorrect free in record__switch_output() (git- fixes). * perf report: Avoid SEGV in report__setup_sample_type() (git-fixes). * perf sched timehist: Fix -g/--call-graph option failure (git-fixes). * perf script: Show also errors for --insn-trace option (git-fixes). * perf srcline: Add missed addr2line closes (git-fixes). * perf stat: Avoid metric-only segv (git-fixes). * perf stat: Do not display metric header for non-leader uncore events (git- fixes). * perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes). * perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes). * perf test shell arm_coresight: Increase buffer size for Coresight basic tests (git-fixes). * perf tests: Apply attributes to all events in object code reading test (git- fixes). * perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes). * perf tests: Make data symbol test wait for perf to start (bsc#1220045). * perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045). * perf thread: Fixes to thread__new() related to initializing comm (git- fixes). * perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str() (git-fixes). * perf top: Uniform the event name for the hybrid machine (git-fixes). * perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes). * perf ui browser: Avoid SEGV on title (git fixes). * perf ui browser: Do not save pointer to stack memory (git-fixes). * perf vendor events amd: Add Zen 4 memory controller events (git-fixes). * perf vendor events amd: Fix Zen 4 cache latency events (git-fixes). * perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes). * perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later (git-fixes). * perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes). * perf/x86/amd/lbr: Use freeze based on availability (git-fixes). * perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event (git-fixes). * perf/x86/intel: Expose existence of callback support to KVM (git-fixes). * perf/x86: Fix out of range data (git-fixes). * phy: cadence-torrent: Check return value on register read (git-fixes). * phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes). * phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes). * phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes). * phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes). * phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes). * phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes). * phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered (git-fixes). * pinctrl/meson: fix typo in PDM's pin name (git-fixes). * pinctrl: armada-37xx: remove an unused variable (git-fixes). * pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes). * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes). * pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git- fixes). * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes). * pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git- fixes). * pinctrl: freescale: mxs: Fix refcount of child (git-fixes). * pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git- fixes). * pinctrl: mediatek: paris: Rework support for PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes). * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git- fixes). * pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git- fixes). * pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes). * pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes). * pinctrl: renesas: r8a779g0: FIX PWM suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix (H)SCIF1 suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix (H)SCIF3 suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix CANFD5 suffix (git-fixes). * pinctrl: renesas: r8a779g0: Fix FXR_TXEN[AB] suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix IRQ suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix TCLK suffixes (git-fixes). * pinctrl: renesas: r8a779g0: Fix TPU suffixes (git-fixes). * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes). * pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes). * pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes). * pinctrl: rockchip: update rk3308 iomux routes (git-fixes). * pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes). * pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git- fixes). * pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes). * platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes). * platform/chrome: cros_ec_uart: properly fix race condition (git-fixes). * platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable- fixes). * platform/x86/intel-uncore-freq: Do not present root domain on error (git- fixes). * platform/x86/intel/tpmi: Handle error from tpmi_process_info() (stable- fixes). * platform/x86: ISST: Add Grand Ridge to HPM CPU list (stable-fixes). * platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes). * platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes). * platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git- fixes). * platform/x86: lg-laptop: Change ACPI device id (stable-fixes). * platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes). * platform/x86: lg-laptop: Use ACPI device handle when evaluating WMAB/WMBB (stable-fixes). * platform/x86: thinkpad_acpi: Take hotkey_mutex during hotkey_exit() (git- fixes). * platform/x86: toshiba_acpi: Add quirk for buttons on Z830 (stable-fixes). * platform/x86: toshiba_acpi: Fix array out-of-bounds access (git-fixes). * platform/x86: toshiba_acpi: Fix quickstart quirk handling (git-fixes). * platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes). * platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6" tablet (stable-fixes). * platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes). * platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable- fixes). * platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name (stable-fixes). * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git- fixes). * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes). * power: supply: ab8500: Fix error handling when calling iio_read_channel_processed() (git-fixes). * power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes). * power: supply: ingenic: Fix some error handling paths in ingenic_battery_get_property() (git-fixes). * power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git- fixes). * powerpc/64s/radix/kfence: map __kfence_pool at page granularity (bsc#1223570 ltc#205770). * powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205). * powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740). * powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks (git-fixes). * powerpc/prom: Add CPU info to hardware description string later (bsc#1215199). * powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes). * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783). * powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869). * powerpc/pseries: make max polling consistent for longer H_CALLs (bsc#1215199). * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487). * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869). * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869). * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191). * ppdev: Add an error check in register_device (git-fixes). * prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610). * printk: Add this_cpu_in_panic() (bsc#1225607). * printk: Adjust mapping for 32bit seq macros (bsc#1225607). * printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607). * printk: Consolidate console deferred printing (bsc#1225607). * printk: Disable passing console lock owner completely during panic() (bsc#1225607). * printk: Do not take console lock for console_flush_on_panic() (bsc#1225607). * printk: For @suppress_panic_printk check for other CPU in panic (bsc#1225607). * printk: Keep non-panic-CPUs out of console lock (bsc#1225607). * printk: Let no_printk() use _printk() (bsc#1225618). * printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607). * printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1225607). * printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616). * printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607). * printk: Wait for all reserved records with pr_flush() (bsc#1225607). * printk: nbcon: Relocate 32bit seq macros (bsc#1225607). * printk: ringbuffer: Clarify special lpos values (bsc#1225607). * printk: ringbuffer: Cleanup reader terminology (bsc#1225607). * printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1225607). * printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607). * proc/kcore: do not try to access unaccepted memory (git-fixes). * pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes). * pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes). * pstore: inode: Only d_invalidate() is needed (git-fixes). * pwm: img: fix pwm clock lookup (git-fixes). * pwm: sti: Prepare removing pwm_chip from driver data (stable-fixes). * pwm: sti: Simplify probe function using devm functions (git-fixes). * pwm: stm32: Always do lazy disabling (git-fixes). * qibfs: fix dentry leak (git-fixes) * r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git- fixes). * r8169: skip DASH fw status checks when DASH is disabled (git-fixes). * random: handle creditable entropy from atomic process context (git-fixes). * regmap-i2c: Subtract reg size from max_write (stable-fixes). * regmap: Add regmap_read_bypassed() (git-fixes). * regmap: kunit: Ensure that changed bytes are actually different (stable- fixes). * regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes). * regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes). * regulator: bd71815: fix ramp values (git-fixes). * regulator: bd71828: Do not overwrite runtime voltages (git-fixes). * regulator: change devm_regulator_get_enable_optional() stub to return Ok (git-fixes). * regulator: change stubbed devm_regulator_get_enable to return Ok (git- fixes). * regulator: core: Fix modpost error "regulator_get_regmap" undefined (git- fixes). * regulator: core: fix debugfs creation regression (git-fixes). * regulator: irq_helpers: duplicate IRQ name (stable-fixes). * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes). * regulator: tps65132: Add of_match table (stable-fixes). * regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes). * remoteproc: imx_rproc: Fix refcount mistake in imx_rproc_addr_init (git- fixes). * remoteproc: imx_rproc: Skip over memory region when node value is NULL (git- fixes). * remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs (git-fixes). * remoteproc: k3-r5: Fix IPC-only mode detection (git-fixes). * remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git- fixes). * remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git- fixes). * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes). * remoteproc: stm32: Fix incorrect type assignment returned by stm32_rproc_get_loaded_rsc_tablef (git-fixes). * remoteproc: stm32_rproc: Fix mailbox interrupts queuing (git-fixes). * remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes). * ring-buffer: Do not set shortest_full when full target is hit (git-fixes). * ring-buffer: Fix a race between readers and resize checks (git-fixes). * ring-buffer: Fix full_waiters_pending in poll (git-fixes). * ring-buffer: Fix resetting of shortest_full (git-fixes). * ring-buffer: Fix waking up ring buffer readers (git-fixes). * ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes). * ring-buffer: Only update pages_touched when a new page is touched (git- fixes). * ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git- fixes). * ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes). * rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes). * rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build. * rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter. * rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable. * rtc: abx80x: Fix return value of nvmem callback on read (git-fixes). * rtc: cmos: Fix return value of nvmem callbacks (git-fixes). * rtc: interface: Add RTC offset to alarm after fix-up (git-fixes). * rtc: isl1208: Fix return value of nvmem callbacks (git-fixes). * rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes). * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792). * s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869). * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793). * s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227072). * s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133). * s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224348). * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225136). * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225134). * s390/ism: Properly fix receive message buffer allocation (git-fixes bsc#1223590). * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871). * s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223872). * s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874). * s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223870). * s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593). * s390/vtime: fix average steal time calculation (git-fixes bsc#1221783). * s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223592). * s390: Implement __iowrite32_copy() (bsc#1226502) * s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502) * saa7134: Unchecked i2c_transfer function result fixed (git-fixes). * sched/balancing: Rename newidle_balance() => sched_balance_newidle() (bsc#1222173). * sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791). * sched/fair: Check root_domain::overload value before update (bsc#1222173). * sched/fair: Use helper functions to access root_domain::overload (bsc#1222173). * sched/psi: Select KERNFS as needed (git-fixes). * sched/topology: Optimize topology_span_sane() (bsc#1225053). * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes). * scsi: core: Consult supported VPD page list prior to fetching page (git- fixes). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: csiostor: Avoid function pointer casts (git-fixes). * scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes). * scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes). * scsi: libsas: Fix disk not being scanned in after being removed (git-fixes). * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842). * scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842). * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842). * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842). * scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777). * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842). * scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777). * scsi: lpfc: Correct size for wqe for memset() (bsc#1221777). * scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777). * scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777). * scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777). * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842). * scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777). * scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777). * scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959). * scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777). * scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777). * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842). * scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777). * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842). * scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777). * scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777). * scsi: mpi3mr: Reduce stack usage in mpi3mr_refresh_sas_ports() (git-fixes). * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git- fixes). * scsi: mylex: Fix sysfs buffer lengths (git-fixes). * scsi: qla2xxx: Change debug message during driver unload (bsc1221816). * scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816). * scsi: qla2xxx: Fix N2N stuck connection (bsc1221816). * scsi: qla2xxx: Fix command flush on cable pull (bsc1221816). * scsi: qla2xxx: Fix double free of fcport (bsc1221816). * scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816). * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes). * scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816). * scsi: qla2xxx: Prevent command send on chip reset (bsc1221816). * scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816). * scsi: qla2xxx: Update manufacturer detail (bsc1221816). * scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816). * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git- fixes). * scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes). * scsi: sg: Avoid sg device teardown race (git-fixes). * scsi: smartpqi: Fix disable_managed_interrupts (git-fixes). * sctp: annotate data-races around sk->sk_wmem_queued (git-fixes). * sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes). * selftests/binderfs: use the Makefile's rules, not Make's implicit rules (git-fixes). * selftests/bpf: add edge case backtracking logic test (bsc#1225756). * selftests/bpf: precision tracking test for BPF_NEG and BPF_END (bsc#1225756). * selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903). * selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903). * selftests/bpf: test widening for iterating callbacks (bsc#1225903). * selftests/bpf: tests for iterating callbacks (bsc#1225903). * selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903). * selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903). * selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903). * selftests/ftrace: Fix event filter target_func selection (stable-fixes). * selftests/ftrace: Limit length in subsystem-enable tests (git-fixes). * selftests/kcmp: remove unused open mode (git-fixes). * selftests/mm: compaction_test: fix incorrect write of zero to nr_hugepages (git-fixes). * selftests/mm: fix build warnings on ppc64 (stable-fixes). * selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique namespace (stable-fixes). * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes). * selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes). * selftests/powerpc/papr-vpd: Fix missing variable initialization (jsc#PED-4486 git-fixes). * selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes). * selftests/sigaltstack: Fix ppc64 GCC build (git-fixes). * selftests/timers/posix_timers: Reimplement check_timer_distribution() (git- fixes). * selftests: default to host arch for LLVM builds (git-fixes). * selftests: fix OOM in msg_zerocopy selftest (git-fixes). * selftests: forwarding: Fix ping failure due to short timeout (git-fixes). * selftests: kselftest: Fix build failure with NOLIBC (git-fixes). * selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn (git-fixes). * selftests: make order checking verbose in msg_zerocopy selftest (git-fixes). * selftests: mptcp: add ms units for tc-netem delay (stable-fixes). * selftests: net: bridge: increase IGMP/MLD exclude timeout membership interval (git-fixes). * selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes). * selftests: net: move amt to socat for better compatibility (git-fixes). * selftests: sud_test: return correct emulated syscall value on RISC-V (stable-fixes). * selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC (git-fixes). * selftests: timers: Convert posix_timers test to generate KTAP output (stable-fixes). * selftests: timers: Fix abs() warning in posix_timers test (git-fixes). * selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes). * selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior (stable-fixes). * selftests: vxlan_mdb: Fix failures with old libnet (git-fixes). * selinux: avoid dereference of garbage after mount failure (git-fixes). * selinux: introduce an initial SID for early boot processes (bsc#1208593). * serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes). * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes). * serial: 8250_dw: Revert: Do not reclock if already at correct rate (git- fixes). * serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes). * serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes). * serial: Lock console when calling into driver before registration (git- fixes). * serial: bcm63xx-uart: fix tx after conversion to uart_port_tx_limited() (git-fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: core: introduce uart_port_tx_limited_flags() (git-fixes). * serial: core: only stop transmit when HW fifo is empty (git-fixes). * serial: exar: adding missing CTI and Exar PCI ids (stable-fixes). * serial: imx: Introduce timeout when waiting on transmitter empty (stable- fixes). * serial: imx: Raise TX trigger level to 8 (stable-fixes). * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable- fixes). * serial: max3100: Fix bitwise types (git-fixes). * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git- fixes). * serial: max3100: Update uart_driver_registered on driver removal (git- fixes). * serial: max310x: fix NULL pointer dereference in I2C instantiation (git- fixes). * serial: max310x: fix syntax error in IRQ error message (git-fixes). * serial: mxs-auart: add spinlock around changing cts state (git-fixes). * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git- fixes). * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes). * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes). * serial: stm32: Reset .throttled state in .startup() (git-fixes). * series.conf: cleanup Fix subsection header to silence series_insert error. * slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git- fixes). * slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes). * smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes, bsc#1225172). * smb3: allow controlling maximum number of cached directories (git-fixes, bsc#1225172). * smb3: do not start laundromat thread when dir leases disabled (git-fixes, bsc#1225172). * smb3: show beginning time for per share stats (bsc#1225172). * smb: client: do not start laundromat thread on nohandlecache (git-fixes, bsc#1225172). * smb: client: ensure to try all targets when finding nested links (bsc#1225172). * smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1225172). * smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes, bsc#1225172). * smb: client: get rid of dfs code dep in namespace.c (bsc#1225172). * smb: client: get rid of dfs naming in automount code (bsc#1225172). * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172). * smb: client: make laundromat a delayed worker (git-fixes, bsc#1225172). * smb: client: prevent new fids from being removed by laundromat (git-fixes, bsc#1225172). * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172). * smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1225172). * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172). * soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes). * soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes). * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes). * soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes). * soc: qcom: pdr: fix parsing of domains lists (git-fixes). * soc: qcom: pdr: protect locator_addr with the main mutex (git-fixes). * soc: qcom: pmic_glink: Handle the return value of pmic_glink_init (git- fixes). * soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes). * soc: qcom: pmic_glink: do not traverse clients list without a lock (git- fixes). * soc: qcom: pmic_glink: notify clients about the current state (git-fixes). * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes). * soc: qcom: rpmh-rsc: Ensure irqs are not disabled by rpmh_rsc_send_data() callers (git-fixes). * soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes). * soc: xilinx: rename cpu_number1 to dummy_cpu_number (git-fixes). * sock_diag: annotate data-races around sock_diag_handlers[family] (git- fixes). * soundwire: amd: fix for wake interrupt handling for clockstop mode (git- fixes). * soundwire: cadence: fix invalid PDI offset (stable-fixes). * speakup: Avoid crash on very long word (git-fixes). * speakup: Fix 8bit characters from direct synth (git-fixes). * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes). * spi: Do not mark message DMA mapped when no transfer in it is (git-fixes). * spi: atmel-quadspi: Add missing check for clk_prepare (git-fixes). * spi: cadence: Ensure data lines set to low during dummy-cycle period (stable-fixes). * spi: fix null pointer dereference within spi_sync (git-fixes). * spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes). * spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable- fixes). * spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable- fixes). * spi: lm70llp: fix links in doc and comments (git-fixes). * spi: lpspi: Avoid potential use-after-free in probe() (git-fixes). * spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe (git-fixes). * spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes). * spi: microchip-core: defer asserting chip select until just before write to TX FIFO (git-fixes). * spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer (git-fixes). * spi: microchip-core: fix the issues in the isr (git-fixes). * spi: microchip-core: only disable SPI controller when register value change requires it (git-fixes). * spi: mux: set ctlr->bits_per_word_mask (stable-fixes). * spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes). * spi: spi-microchip-core: Fix the number of chip selects supported (git- fixes). * spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes). * spi: spidev: add correct compatible for Rohm BH2228FV (git-fixes). * spi: stm32: Do not warn about spurious interrupts (git-fixes). * spi: stm32: qspi: Clamp stm32_qspi_get_mode() output to CCR_BUSWIDTH_4 (git- fixes). * spi: stm32: qspi: Fix dual flash mode sanity test in stm32_qspi_setup() (git-fixes). * spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes). * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes). * ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (stable- fixes). * staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes). * staging: vc04_services: fix information leak in create_component() (git- fixes). * staging: vt6655: Remove unused declaration of RFbAL7230SelectChannelPostProcess() (git-fixes). * stmmac: Clear variable when destroying workqueue (git-fixes). * struct acpi_ec kABI workaround (git-fixes). * sunrpc: fix NFSACL RPC retry on soft mount (git-fixes). * supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570) * supported.conf: Add APM X-Gene SoC hardware monitoring driver (jsc#PED-8649) Module is marked supported because of merge from SP6, but lets add reference to SLM6.0 maintenance task. * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8644) * supported.conf: Add support for v4l2-dv-timings (jsc#PED-8645) * supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional. * supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems. * supported.conf: mark vdpa modules supported (jsc#PED-8954) * supported.conf: support tcp_dctcp module (jsc#PED-8111) * supported.conf: update for mt76 stuff (bsc#1227149) * swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331) * swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331) * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331) * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331) * swiotlb: use the calculated number of areas (git-fixes). * tcp: Dump bound-only sockets in inet_diag (bsc#1204562). * thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Return error in case of invalid efuse data (git-fixes). * thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes). * thermal/drivers/tsens: Fix null pointer dereference (git-fixes). * thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes). * thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git- fixes). * thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes). * thunderbolt: Do not create DisplayPort tunnels on adapters of the same router (git-fixes). * thunderbolt: Fix wake configurations after device unplug (stable-fixes). * thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes). * thunderbolt: Introduce tb_port_reset() (stable-fixes). * thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers (stable-fixes). * thunderbolt: Reset only non-USB4 host routers in resume (git-fixes). * thunderbolt: debugfs: Fix margin debugfs node creation condition (git- fixes). * tls: break out of main loop when PEEK gets a non-data record (bsc#1221858). * tls: do not skip over different type records from the rx_list (bsc#1221858). * tls: fix peeking with sync+async decryption (bsc#1221858). * tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858). * tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes). * tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes). * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes). * tools/memory-model: Fix bug in lock.cat (git-fixes). * tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765). * tools/power turbostat: Remember global max_die_id (stable-fixes). * tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah CPUs (stable-fixes). * tools/power/turbostat: Fix uncore frequency file string (bsc#1221765). * tools: ynl: do not leak mcast_groups on init error (git-fixes). * tools: ynl: fix handling of multiple mcast groups (git-fixes). * tools: ynl: make sure we always pass yarg to mnl_cb_run (git-fixes). * tpm_tis: Do _not_ flush uninitialized work (git-fixes). * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes). * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes). * tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git- fixes). * tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes). * tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes). * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes). * tracing: Build event generation tests only as modules (git-fixes). * tracing: Have saved_cmdlines arrays all in one allocation (git-fixes). * tracing: Remove precision vsnprintf() check from print event (git-fixes). * tracing: Use .flush() call to wake up readers (git-fixes). * tracing: hide unused ftrace_event_id_fops (git-fixes). * tty: mcf: MCF54418 has 10 UARTS (git-fixes). * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes). * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes). * tty: n_tty: Fix buffer offsets when lookahead is used (git-fixes). * tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes). * tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes). * ubifs: Queue up space reservation tasks if retrying many times (git-fixes). * ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes). * ubifs: Set page uptodate in the correct place (git-fixes). * ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes). * ubifs: fix sort function prototype (git-fixes). * usb-storage: alauda: Check whether the media is initialized (git-fixes). * usb: Disable USB3 LPM at shutdown (stable-fixes). * usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (bsc#1220569). * usb: aqc111: stop lying about skb->truesize (git-fixes). * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes). * usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes). * usb: cdc-wdm: close race between read and workqueue (git-fixes). * usb: dwc2: gadget: Fix exiting from clock gating (git-fixes). * usb: dwc2: gadget: LPM flow fix (git-fixes). * usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes). * usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes). * usb: dwc2: host: Fix hibernation flow (git-fixes). * usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes). * usb: dwc3-am62: Disable wakeup at remove (git-fixes). * usb: dwc3-am62: Rename private data (git-fixes). * usb: dwc3-am62: fix module unload/reload behavior (git-fixes). * usb: dwc3: Properly set system wakeup (git-fixes). * usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes). * usb: dwc3: core: Add DWC31 version 2.00a controller (stable-fixes). * usb: dwc3: core: Prevent phy suspend during init (Git-fixes). * usb: dwc3: core: Workaround for CSR read timeout (stable-fixes). * usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes). * usb: dwc3: pci: Do not set "linux,phy_charger_detect" property on Lenovo Yoga Tab2 1380 (stable-fixes). * usb: dwc3: pci: Drop duplicate ID (git-fixes). * usb: dwc3: pci: add support for the Intel Panther Lake (stable-fixes). * usb: fotg210: Add missing kernel doc description (git-fixes). * usb: gadget: aspeed_udc: fix device address configuration (git-fixes). * usb: gadget: composite: fix OS descriptors w_value logic (git-fixes). * usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable- fixes). * usb: gadget: f_fs: Fix a race condition when processing setup packets (git- fixes). * usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (git-fixes). * usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes). * usb: gadget: function: Remove usage of the deprecated ida_simple_xx() API (stable-fixes). * usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git- fixes). * usb: gadget: printer: SS+ support (stable-fixes). * usb: gadget: printer: fix races against disable (git-fixes). * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes). * usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (git-fixes). * usb: gadget: uvc: configfs: ensure guid to be valid before set (stable- fixes). * usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes). * usb: gadget: uvc: use correct buffer size when parsing configfs lists (git- fixes). * usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes). * usb: musb: da8xx: fix a resource leak in probe() (git-fixes). * usb: ohci: Prevent missed ohci interrupts (git-fixes). * usb: phy: generic: Get the vbus supply (git-fixes). * usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes). * usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes). * usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes). * usb: typec: tcpm: Check for port partner validity before consuming it (git- fixes). * usb: typec: tcpm: Correct port source pdo array in pd_set callback (git- fixes). * usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes). * usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes). * usb: typec: tcpm: Update PD of Type-C port upon pd_set (git-fixes). * usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes). * usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git- fixes). * usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git- fixes). * usb: typec: tcpm: unregister existing source caps before re-registration (git-fixes). * usb: typec: tipd: fix event checking for tps6598x (git-fixes). * usb: typec: ucsi: Ack also failed Get Error commands (git-fixes). * usb: typec: ucsi: Ack unsupported commands (stable-fixes). * usb: typec: ucsi: Check for notifications after init (git-fixes). * usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes). * usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes). * usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes). * usb: typec: ucsi: Fix connector check on init (git-fixes). * usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes). * usb: typec: ucsi: Limit read size on v1.2 (stable-fixes). * usb: typec: ucsi: Never send a lone connector change ack (stable-fixes). * usb: typec: ucsi: always register a link to USB PD device (git-fixes). * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes). * usb: typec: ucsi: glink: fix child node release in probe function (git- fixes). * usb: typec: ucsi: simplify partner's PD caps registration (git-fixes). * usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes). * usb: typec: ucsi_glink: drop special handling for CCI_BUSY (stable-fixes). * usb: ucsi: stm32: fix command completion handling (git-fixes). * usb: udc: remove warning when queue disabled ep (stable-fixes). * usb: xhci-plat: Do not include xhci.h (stable-fixes). * usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes). * usb: xhci: Implement xhci_handshake_check_state() helper. * usb: xhci: correct return value in case of STS_HCE (git-fixes). * usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (stable-fixes). * vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes). * vboxsf: explicitly deny setlease attempts (stable-fixes). * vdpa/mlx5: Allow CVQ size changes (git-fixes). * vdpa_sim: reset must not run (git-fixes). * veth: try harder when allocating queue memory (git-fixes). * vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes). * vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes). * virtio-blk: Ensure no requests in virtqueues before deleting vqs (git- fixes). * virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944). * virtio_net: Do not send RSS key if it is not supported (git-fixes). * virtio_net: avoid data-races on dev->stats fields (git-fixes). * virtio_net: checksum offloading handling fix (git-fixes). * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git- fixes). * vmlinux.lds.h: catch .bss..L* sections into BSS") (git-fixes). * vsock/virtio: fix packet delivery to tap device (git-fixes). * watchdog: bd9576: Drop "always-running" property (git-fixes). * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git- fixes). * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes). * watchdog: rzg2l_wdt: Check return status of pm_runtime_put() (git-fixes). * watchdog: rzg2l_wdt: Use pm_runtime_resume_and_get() (git-fixes). * watchdog: rzn1: Convert comma to semicolon (git-fixes). * watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe() (git-fixes). * wifi: add HAS_IOPORT dependencies (bsc#1227149). * wifi: ar5523: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ar5523: enable proper endpoint verification (git-fixes). * wifi: ath10/11/12k: Use alloc_ordered_workqueue() to create ordered workqueues (bsc#1227149). * wifi: ath10k: Annotate struct ath10k_ce_ring with __counted_by (bsc#1227149). * wifi: ath10k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath10k: Drop checks that are always false (bsc#1227149). * wifi: ath10k: Drop cleaning of driver data from probe error path and remove (bsc#1227149). * wifi: ath10k: Fix a few spelling errors (bsc#1227149). * wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes). * wifi: ath10k: Fix enum ath10k_fw_crash_dump_type kernel-doc (bsc#1227149). * wifi: ath10k: Fix htt_data_tx_completion kernel-doc warning (bsc#1227149). * wifi: ath10k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath10k: Remove unused struct ath10k_htc_frame (bsc#1227149). * wifi: ath10k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149). * wifi: ath10k: Use DECLARE_FLEX_ARRAY() for ath10k_htc_record (bsc#1227149). * wifi: ath10k: Use list_count_nodes() (bsc#1227149). * wifi: ath10k: add missing wmi_10_4_feature_mask documentation (bsc#1227149). * wifi: ath10k: add support to allow broadcast action frame RX (bsc#1227149). * wifi: ath10k: consistently use kstrtoX_from_user() functions (bsc#1227149). * wifi: ath10k: correctly document enum wmi_tlv_tx_pause_id (bsc#1227149). * wifi: ath10k: drop HTT_DATA_TX_STATUS_DOWNLOAD_FAIL (bsc#1227149). * wifi: ath10k: fix QCOM_RPROC_COMMON dependency (git-fixes). * wifi: ath10k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149). * wifi: ath10k: fix htt_q_state_conf & htt_q_state kernel-doc (bsc#1227149). * wifi: ath10k: improve structure padding (bsc#1227149). * wifi: ath10k: indicate to mac80211 scan complete with aborted flag for ATH10K_SCAN_STARTING state (bsc#1227149). * wifi: ath10k: poll service ready message before failing (git-fixes). * wifi: ath10k: populate board data for WCN3990 (git-fixes). * wifi: ath10k: remove ath10k_htc_record::pauload[] (bsc#1227149). * wifi: ath10k: remove duplicate memset() in 10.4 TDLS peer update (bsc#1227149). * wifi: ath10k: remove struct wmi_pdev_chanlist_update_event (bsc#1227149). * wifi: ath10k: remove unused template structs (bsc#1227149). * wifi: ath10k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath10k: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: ath10k: simplify __ath10k_htt_tx_txq_recalc() (bsc#1227149). * wifi: ath10k: simplify ath10k_peer_create() (bsc#1227149). * wifi: ath10k: use flexible array in struct wmi_host_mem_chunks (bsc#1227149). * wifi: ath10k: use flexible array in struct wmi_tdls_peer_capabilities (bsc#1227149). * wifi: ath10k: use flexible arrays for WMI start scan TLVs (bsc#1227149). * wifi: ath11k: Add HTT stats for PHY reset case (bsc#1227149). * wifi: ath11k: Add coldboot calibration support for QCN9074 (bsc#1227149). * wifi: ath11k: Allow ath11k to boot without caldata in ftm mode (bsc#1227149). * wifi: ath11k: Consistently use ath11k_vif_to_arvif() (bsc#1227149). * wifi: ath11k: Consolidate WMI peer flags (bsc#1227149). * wifi: ath11k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath11k: Do not directly use scan_flags in struct scan_req_params (bsc#1227149). * wifi: ath11k: EMA beacon support (bsc#1227149). * wifi: ath11k: Fix a few spelling errors (bsc#1227149). * wifi: ath11k: Fix ath11k_htc_record flexible record (bsc#1227149). * wifi: ath11k: Introduce and use ath11k_sta_to_arsta() (bsc#1227149). * wifi: ath11k: MBSSID beacon support (bsc#1227149). * wifi: ath11k: MBSSID configuration during vdev create/start (bsc#1227149). * wifi: ath11k: MBSSID parameter configuration in AP mode (bsc#1227149). * wifi: ath11k: Really consistently use ath11k_vif_to_arvif() (bsc#1227149). * wifi: ath11k: Relocate the func ath11k_mac_bitrate_mask_num_ht_rates() and change hweight16 to hweight8 (bsc#1227149). * wifi: ath11k: Remove ath11k_base::bd_api (bsc#1227149). * wifi: ath11k: Remove cal_done check during probe (bsc#1227149). * wifi: ath11k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149). * wifi: ath11k: Remove scan_flags union from struct scan_req_params (bsc#1227149). * wifi: ath11k: Remove struct ath11k::ops (bsc#1227149). * wifi: ath11k: Remove unneeded semicolon (bsc#1227149). * wifi: ath11k: Remove unused declarations (bsc#1227149). * wifi: ath11k: Remove unused struct ath11k_htc_frame (bsc#1227149). * wifi: ath11k: Send HT fixed rate in WMI peer fixed param (bsc#1227149). * wifi: ath11k: Split coldboot calibration hw_param (bsc#1227149). * wifi: ath11k: Update Qualcomm Innovation Center, Inc. copyrights (bsc#1227149). * wifi: ath11k: Use device_get_match_data() (bsc#1227149). * wifi: ath11k: Use list_count_nodes() (bsc#1227149). * wifi: ath11k: add WMI event debug messages (bsc#1227149). * wifi: ath11k: add WMI_TLV_SERVICE_EXT_TPC_REG_SUPPORT service bit (bsc#1227149). * wifi: ath11k: add chip id board name while searching board-2.bin for WCN6855 (bsc#1227149). * wifi: ath11k: add firmware-2.bin support (bsc#1227149). * wifi: ath11k: add handler for WMI_VDEV_SET_TPC_POWER_CMDID (bsc#1227149). * wifi: ath11k: add parse of transmit power envelope element (bsc#1227149). * wifi: ath11k: add parsing of phy bitmap for reg rules (bsc#1227149). * wifi: ath11k: add support for QCA2066 (bsc#1227149). * wifi: ath11k: add support to select 6 GHz regulatory type (bsc#1227149). * wifi: ath11k: ath11k_debugfs_register(): fix format-truncation warning (bsc#1227149). * wifi: ath11k: avoid forward declaration of ath11k_mac_start_vdev_delay() (bsc#1227149). * wifi: ath11k: call ath11k_mac_fils_discovery() without condition (bsc#1227149). * wifi: ath11k: constify MHI channel and controller configs (bsc#1227149). * wifi: ath11k: debug: add ATH11K_DBG_CE (bsc#1227149). * wifi: ath11k: debug: remove unused ATH11K_DBG_ANY (bsc#1227149). * wifi: ath11k: debug: use all upper case in ATH11k_DBG_HAL (bsc#1227149). * wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948). * wifi: ath11k: do not force enable power save on non-running vdevs (git- fixes). * wifi: ath11k: do not use %pK (bsc#1227149). * wifi: ath11k: document HAL_RX_BUF_RBM_SW4_BM (bsc#1227149). * wifi: ath11k: dp: cleanup debug message (bsc#1227149). * wifi: ath11k: driver settings for MBSSID and EMA (bsc#1227149). * wifi: ath11k: drop NULL pointer check in ath11k_update_per_peer_tx_stats() (bsc#1227149). * wifi: ath11k: drop redundant check in ath11k_dp_rx_mon_dest_process() (bsc#1227149). * wifi: ath11k: enable 36 bit mask for stream DMA (bsc#1227149). * wifi: ath11k: factory test mode support (bsc#1227149). * wifi: ath11k: fill parameters for vdev set tpc power WMI command (bsc#1227149). * wifi: ath11k: fix CAC running state during virtual interface start (bsc#1227149). * wifi: ath11k: fix IOMMU errors on buffer rings (bsc#1227149). * wifi: ath11k: fix RCU documentation in ath11k_mac_op_ipv6_changed() (git- fixes). * wifi: ath11k: fix WCN6750 firmware crash caused by 17 num_vdevs (bsc#1227149). * wifi: ath11k: fix Wvoid-pointer-to-enum-cast warning (bsc#1227149). * wifi: ath11k: fix a possible dead lock caused by ab->base_lock (bsc#1227149). * wifi: ath11k: fix ath11k_mac_op_remain_on_channel() stack usage (bsc#1227149). * wifi: ath11k: fix connection failure due to unexpected peer delete (bsc#1227149). * wifi: ath11k: fix tid bitmap is 0 in peer rx mu stats (bsc#1227149). * wifi: ath11k: fix wrong definition of CE ring's base address (git-fixes). * wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath11k: hal: cleanup debug message (bsc#1227149). * wifi: ath11k: htc: cleanup debug messages (bsc#1227149). * wifi: ath11k: initialize eirp_power before use (bsc#1227149). * wifi: ath11k: mac: fix struct ieee80211_sband_iftype_data handling (bsc#1227149). * wifi: ath11k: mhi: add a warning message for MHI_CB_EE_RDDM crash (bsc#1227149). * wifi: ath11k: move pci.ops registration ahead (bsc#1227149). * wifi: ath11k: move power type check to ASSOC stage when connecting to 6 GHz AP (bsc#1227149). * wifi: ath11k: move references from rsvd2 to info fields (bsc#1227149). * wifi: ath11k: pci: cleanup debug logging (bsc#1227149). * wifi: ath11k: print debug level in debug messages (bsc#1227149). * wifi: ath11k: provide address list if chip supports 2 stations (bsc#1227149). * wifi: ath11k: qmi: refactor ath11k_qmi_m3_load() (bsc#1227149). * wifi: ath11k: refactor ath11k_wmi_tlv_parse_alloc() (bsc#1227149). * wifi: ath11k: refactor setting country code logic (stable-fixes). * wifi: ath11k: refactor vif parameter configurations (bsc#1227149). * wifi: ath11k: rely on mac80211 debugfs handling for vif (bsc#1227149). * wifi: ath11k: remove ath11k_htc_record::pauload[] (bsc#1227149). * wifi: ath11k: remove invalid peer create logic (bsc#1227149). * wifi: ath11k: remove manual mask names from debug messages (bsc#1227149). * wifi: ath11k: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath11k: remove unsupported event handlers (bsc#1227149). * wifi: ath11k: remove unused function ath11k_tm_event_wmi() (bsc#1227149). * wifi: ath11k: remove unused members of 'struct ath11k_base' (bsc#1227149). * wifi: ath11k: remove unused scan_events from struct scan_req_params (bsc#1227149). * wifi: ath11k: rename MBSSID fields in wmi_vdev_up_cmd (bsc#1227149). * wifi: ath11k: rename ath11k_start_vdev_delay() (bsc#1227149). * wifi: ath11k: rename the sc naming convention to ab (bsc#1227149). * wifi: ath11k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149). * wifi: ath11k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath11k: restore country code during resume (git-fixes). * wifi: ath11k: save max transmit power in vdev start response event from firmware (bsc#1227149). * wifi: ath11k: save power spectral density(PSD) of regulatory rule (bsc#1227149). * wifi: ath11k: simplify ath11k_mac_validate_vht_he_fixed_rate_settings() (bsc#1227149). * wifi: ath11k: simplify the code with module_platform_driver (bsc#1227149). * wifi: ath11k: store cur_regulatory_info for each radio (bsc#1227149). * wifi: ath11k: support 2 station interfaces (bsc#1227149). * wifi: ath11k: update proper pdev/vdev id for testmode command (bsc#1227149). * wifi: ath11k: update regulatory rules when connect to AP on 6 GHz band for station (bsc#1227149). * wifi: ath11k: update regulatory rules when interface added (bsc#1227149). * wifi: ath11k: use RCU when accessing struct inet6_dev::ac_list (bsc#1227149). * wifi: ath11k: use WMI_VDEV_SET_TPC_POWER_CMDID when EXT_TPC_REG_SUPPORT for 6 GHz (bsc#1227149). * wifi: ath11k: use kstrtoul_from_user() where appropriate (bsc#1227149). * wifi: ath11k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149). * wifi: ath11k: wmi: add unified command debug messages (bsc#1227149). * wifi: ath11k: wmi: cleanup error handling in ath11k_wmi_send_init_country_cmd() (bsc#1227149). * wifi: ath11k: wmi: use common error handling style (bsc#1227149). * wifi: ath11k: workaround too long expansion sparse warnings (bsc#1227149). * wifi: ath12k: Add logic to write QRTR node id to scratch (bsc#1227149). * wifi: ath12k: Add missing qmi_txn_cancel() calls (bsc#1227149). * wifi: ath12k: Add support to parse new WMI event for 6 GHz regulatory (bsc#1227149). * wifi: ath12k: Consistently use ath12k_vif_to_arvif() (bsc#1227149). * wifi: ath12k: Consolidate WMI peer flags (bsc#1227149). * wifi: ath12k: Correct 6 GHz frequency value in rx status (git-fixes). * wifi: ath12k: Do not drop tx_status in failure case (git-fixes). * wifi: ath12k: Do not use scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: Enable Mesh support for QCN9274 (bsc#1227149). * wifi: ath12k: Fix a few spelling errors (bsc#1227149). * wifi: ath12k: Fix tx completion ring (WBM2SW) setup failure (git-fixes). * wifi: ath12k: Fix uninitialized use of ret in ath12k_mac_allocate() (bsc#1227149). * wifi: ath12k: Introduce and use ath12k_sta_to_arsta() (bsc#1227149). * wifi: ath12k: Introduce the container for mac80211 hw (bsc#1227149). * wifi: ath12k: Make QMI message rules const (bsc#1227149). * wifi: ath12k: Optimize the mac80211 hw data access (bsc#1227149). * wifi: ath12k: Read board id to support split-PHY QCN9274 (bsc#1227149). * wifi: ath12k: Refactor the mac80211 hw access from link/radio (bsc#1227149). * wifi: ath12k: Remove ath12k_base::bd_api (bsc#1227149). * wifi: ath12k: Remove obsolete struct wmi_peer_flags_map *peer_flags (bsc#1227149). * wifi: ath12k: Remove some dead code (bsc#1227149). * wifi: ath12k: Remove struct ath12k::ops (bsc#1227149). * wifi: ath12k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath12k: Remove unnecessary struct qmi_txn initializers (bsc#1227149). * wifi: ath12k: Remove unused declarations (bsc#1227149). * wifi: ath12k: Remove unused scan_flags from struct ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: Set default beacon mode to burst mode (bsc#1227149). * wifi: ath12k: Update Qualcomm Innovation Center, Inc. copyrights (stable- fixes). * wifi: ath12k: Use initializers for QMI message buffers (bsc#1227149). * wifi: ath12k: Use msdu_end to check MCBC (bsc#1227149). * wifi: ath12k: Use pdev_id rather than mac_id to get pdev (bsc#1227149). * wifi: ath12k: WMI support to process EHT capabilities (bsc#1227149). * wifi: ath12k: add 320 MHz bandwidth enums (bsc#1227149). * wifi: ath12k: add CE and ext IRQ flag to indicate irq_handler (bsc#1227149). * wifi: ath12k: add EHT PHY modes (bsc#1227149). * wifi: ath12k: add MAC id support in WBM error path (bsc#1227149). * wifi: ath12k: add MLO header in peer association (bsc#1227149). * wifi: ath12k: add P2P IE in beacon template (bsc#1227149). * wifi: ath12k: add QMI PHY capability learn support (bsc#1227149). * wifi: ath12k: add WMI support for EHT peer (bsc#1227149). * wifi: ath12k: add ath12k_qmi_free_resource() for recovery (bsc#1227149). * wifi: ath12k: add fallback board name without variant while searching board-2.bin (bsc#1227149). * wifi: ath12k: add firmware-2.bin support (bsc#1227149). * wifi: ath12k: add handler for scan event WMI_SCAN_EVENT_DEQUEUED (bsc#1227149). * wifi: ath12k: add keep backward compatibility of PHY mode to avoid firmware crash (bsc#1227149). * wifi: ath12k: add msdu_end structure for WCN7850 (bsc#1227149). * wifi: ath12k: add parsing of phy bitmap for reg rules (bsc#1227149). * wifi: ath12k: add processing for TWT disable event (bsc#1227149). * wifi: ath12k: add processing for TWT enable event (bsc#1227149). * wifi: ath12k: add qmi_cnss_feature_bitmap field to hardware parameters (bsc#1227149). * wifi: ath12k: add rcu lock for ath12k_wmi_p2p_noa_event() (bsc#1227149). * wifi: ath12k: add read variant from SMBIOS for download board data (bsc#1227149). * wifi: ath12k: add string type to search board data in board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: add support for BA1024 (bsc#1227149). * wifi: ath12k: add support for collecting firmware log (bsc#1227149). * wifi: ath12k: add support for hardware rfkill for WCN7850 (bsc#1227149). * wifi: ath12k: add support for peer meta data version (bsc#1227149). * wifi: ath12k: add support one MSI vector (bsc#1227149). * wifi: ath12k: add support to search regdb data in board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: add wait operation for tx management packets for flush from mac80211 (bsc#1227149). * wifi: ath12k: advertise P2P dev support for WCN7850 (bsc#1227149). * wifi: ath12k: allow specific mgmt frame tx while vdev is not up (bsc#1227149). * wifi: ath12k: ath12k_start_vdev_delay(): convert to use ar (bsc#1227149). * wifi: ath12k: avoid deadlock by change ieee80211_queue_work for regd_update_work (bsc#1227149). * wifi: ath12k: avoid duplicated vdev stop (git-fixes). * wifi: ath12k: avoid explicit HW conversion argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid explicit RBM id argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid explicit mac id argument in Rxdma replenish (bsc#1227149). * wifi: ath12k: avoid repeated hw access from ar (bsc#1227149). * wifi: ath12k: avoid repeated wiphy access from hw (bsc#1227149). * wifi: ath12k: call ath12k_mac_fils_discovery() without condition (bsc#1227149). * wifi: ath12k: change DMA direction while mapping reinjected packets (git- fixes). * wifi: ath12k: change MAC buffer ring size to 2048 (bsc#1227149). * wifi: ath12k: change WLAN_SCAN_PARAMS_MAX_IE_LEN from 256 to 512 (bsc#1227149). * wifi: ath12k: change interface combination for P2P mode (bsc#1227149). * wifi: ath12k: change to initialize recovery variables earlier in ath12k_core_reset() (bsc#1227149). * wifi: ath12k: change to treat alpha code na as world wide regdomain (bsc#1227149). * wifi: ath12k: change to use dynamic memory for channel list of scan (bsc#1227149). * wifi: ath12k: check M3 buffer size as well whey trying to reuse it (bsc#1227149). * wifi: ath12k: check hardware major version for WCN7850 (bsc#1227149). * wifi: ath12k: configure RDDM size to MHI for device recovery (bsc#1227149). * wifi: ath12k: configure puncturing bitmap (bsc#1227149). * wifi: ath12k: correct the data_type from QMI_OPT_FLAG to QMI_UNSIGNED_1_BYTE for mlo_capable (bsc#1227149). * wifi: ath12k: delete the timer rx_replenish_retry during rmmod (bsc#1227149). * wifi: ath12k: designating channel frequency for ROC scan (bsc#1227149). * wifi: ath12k: disable QMI PHY capability learn in split-phy QCN9274 (bsc#1227149). * wifi: ath12k: do not drop data frames from unassociated stations (bsc#1227149). * wifi: ath12k: do not restore ASPM in case of single MSI vector (bsc#1227149). * wifi: ath12k: drop NULL pointer check in ath12k_update_per_peer_tx_stats() (bsc#1227149). * wifi: ath12k: drop failed transmitted frames from metric calculation (git- fixes). * wifi: ath12k: enable 320 MHz bandwidth for 6 GHz band in EHT PHY capability for WCN7850 (bsc#1227149). * wifi: ath12k: enable 802.11 power save mode in station mode (bsc#1227149). * wifi: ath12k: enable IEEE80211_HW_SINGLE_SCAN_ON_ALL_BANDS for WCN7850 (bsc#1227149). * wifi: ath12k: fetch correct pdev id from WMI_SERVICE_READY_EXT_EVENTID (bsc#1227149). * wifi: ath12k: fix PCI read and write (bsc#1227149). * wifi: ath12k: fix WARN_ON during ath12k_mac_update_vif_chan (bsc#1227149). * wifi: ath12k: fix broken structure wmi_vdev_create_cmd (bsc#1227149). * wifi: ath12k: fix conf_mutex in ath12k_mac_op_unassign_vif_chanctx() (bsc#1227149). * wifi: ath12k: fix debug messages (bsc#1227149). * wifi: ath12k: fix fetching MCBC flag for QCN9274 (bsc#1227149). * wifi: ath12k: fix firmware assert during insmod in memory segment mode (bsc#1227149). * wifi: ath12k: fix firmware crash during reo reinject (git-fixes). * wifi: ath12k: fix invalid m3 buffer address (bsc#1227149). * wifi: ath12k: fix invalid memory access while processing fragmented packets (git-fixes). * wifi: ath12k: fix kernel crash during resume (bsc#1227149). * wifi: ath12k: fix license in p2p.c and p2p.h (bsc#1227149). * wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes). * wifi: ath12k: fix peer metadata parsing (git-fixes). * wifi: ath12k: fix potential wmi_mgmt_tx_queue race condition (bsc#1227149). * wifi: ath12k: fix radar detection in 160 MHz (bsc#1227149). * wifi: ath12k: fix recovery fail while firmware crash when doing channel switch (bsc#1227149). * wifi: ath12k: fix the error handler of rfkill config (bsc#1227149). * wifi: ath12k: fix the issue that the multicast/broadcast indicator is not read correctly for WCN7850 (bsc#1227149). * wifi: ath12k: fix the problem that down grade phy mode operation (bsc#1227149). * wifi: ath12k: fix wrong definition of CE ring's base address (git-fixes). * wifi: ath12k: fix wrong definitions of hal_reo_update_rx_queue (bsc#1227149). * wifi: ath12k: get msi_data again after request_irq is called (bsc#1227149). * wifi: ath12k: implement handling of P2P NoA event (bsc#1227149). * wifi: ath12k: implement remain on channel for P2P mode (bsc#1227149). * wifi: ath12k: increase vdev setup timeout (bsc#1227149). * wifi: ath12k: indicate NON MBSSID vdev by default during vdev start (bsc#1227149). * wifi: ath12k: indicate scan complete for scan canceled when scan running (bsc#1227149). * wifi: ath12k: indicate to mac80211 scan complete with aborted flag for ATH12K_SCAN_STARTING state (bsc#1227149). * wifi: ath12k: move HE capabilities processing to a new function (bsc#1227149). * wifi: ath12k: move peer delete after vdev stop of station for WCN7850 (bsc#1227149). * wifi: ath12k: parse WMI service ready ext2 event (bsc#1227149). * wifi: ath12k: peer assoc for 320 MHz (bsc#1227149). * wifi: ath12k: prepare EHT peer assoc parameters (bsc#1227149). * wifi: ath12k: propagate EHT capabilities to userspace (bsc#1227149). * wifi: ath12k: refactor DP Rxdma ring structure (bsc#1227149). * wifi: ath12k: refactor QMI MLO host capability helper function (bsc#1227149). * wifi: ath12k: refactor ath12k_bss_assoc() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_allocate() and ath12k_mac_destroy() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_ampdu_action() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_conf_tx() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_config() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_configure_filter() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_flush() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_start() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_stop() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_op_update_vif_offload() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_register() and ath12k_mac_unregister() (bsc#1227149). * wifi: ath12k: refactor ath12k_mac_setup_channels_rates() (bsc#1227149). * wifi: ath12k: refactor ath12k_wmi_tlv_parse_alloc() (bsc#1227149). * wifi: ath12k: refactor multiple MSI vector implementation (bsc#1227149). * wifi: ath12k: refactor the rfkill worker (bsc#1227149). * wifi: ath12k: register EHT mesh capabilities (bsc#1227149). * wifi: ath12k: relax list iteration in ath12k_mac_vif_unref() (bsc#1227149). * wifi: ath12k: relocate ath12k_dp_pdev_pre_alloc() call (bsc#1227149). * wifi: ath12k: remove hal_desc_sz from hw params (bsc#1227149). * wifi: ath12k: remove redundant memset() in ath12k_hal_reo_qdesc_setup() (bsc#1227149). * wifi: ath12k: remove the unused scan_events from ath12k_wmi_scan_req_arg (bsc#1227149). * wifi: ath12k: remove unused ATH12K_BD_IE_BOARD_EXT (bsc#1227149). * wifi: ath12k: rename HE capabilities setup/copy functions (bsc#1227149). * wifi: ath12k: rename the sc naming convention to ab (bsc#1227149). * wifi: ath12k: rename the wmi_sc naming convention to wmi_ab (bsc#1227149). * wifi: ath12k: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: ath12k: send WMI_PEER_REORDER_QUEUE_SETUP_CMDID when ADDBA session starts (bsc#1227149). * wifi: ath12k: set IRQ affinity to CPU0 in case of one MSI vector (bsc#1227149). * wifi: ath12k: set PERST pin no pull request for WCN7850 (bsc#1227149). * wifi: ath12k: split hal_ops to support RX TLVs word mask compaction (bsc#1227149). * wifi: ath12k: subscribe required word mask from rx tlv (bsc#1227149). * wifi: ath12k: support default regdb while searching board-2.bin for WCN7850 (bsc#1227149). * wifi: ath12k: trigger station disconnect on hardware restart (bsc#1227149). * wifi: ath12k: use ATH12K_PCI_IRQ_DP_OFFSET for DP IRQ (bsc#1227149). * wifi: ath12k: use correct flag field for 320 MHz channels (bsc#1227149). * wifi: ath12k: use select for CRYPTO_MICHAEL_MIC (bsc#1227149). * wifi: ath5k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath5k: Remove redundant dev_err() (bsc#1227149). * wifi: ath5k: ath5k_hw_get_median_noise_floor(): use swap() (bsc#1227149). * wifi: ath5k: remove phydir check from ath5k_debug_init_device() (bsc#1227149). * wifi: ath5k: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath5k: remove unused ath5k_eeprom_info::ee_antenna (bsc#1227149). * wifi: ath5k: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: ath6kl: Remove error checking for debugfs_create_dir() (bsc#1227149). * wifi: ath6kl: remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath6kl: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: ath9k: Convert to platform remove callback returning void (bsc#1227149). * wifi: ath9k: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: ath9k: Remove unnecessary ternary operators (bsc#1227149). * wifi: ath9k: Remove unused declarations (bsc#1227149). * wifi: ath9k: avoid using uninitialized array (bsc#1227149). * wifi: ath9k: clean up function ath9k_hif_usb_resume (bsc#1227149). * wifi: ath9k: consistently use kstrtoX_from_user() functions (bsc#1227149). * wifi: ath9k: delete some unused/duplicate macros (bsc#1227149). * wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes). * wifi: ath9k: fix parameter check in ath9k_init_debug() (bsc#1227149). * wifi: ath9k: remove redundant assignment to variable ret (bsc#1227149). * wifi: ath9k: reset survey of current channel after a scan started (bsc#1227149). * wifi: ath9k: simplify ar9003_hw_process_ini() (bsc#1227149). * wifi: ath9k: use u32 for txgain indexes (bsc#1227149). * wifi: ath9k: work around memset overflow warning (bsc#1227149). * wifi: ath9k_htc: fix format-truncation warning (bsc#1227149). * wifi: ath: Use is_multicast_ether_addr() to check multicast Ether address (bsc#1227149). * wifi: ath: dfs_pattern_detector: Use flex array to simplify code (bsc#1227149). * wifi: ath: remove unused-but-set parameter (bsc#1227149). * wifi: ath: work around false-positive stringop-overread warning (bsc#1227149). * wifi: atk10k: Do not opencode ath10k_pci_priv() in ath10k_ahb_priv() (bsc#1227149). * wifi: atmel: remove unused ioctl function (bsc#1227149). * wifi: b43: silence sparse warnings (bsc#1227149). * wifi: brcm80211: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable- fixes). * wifi: brcmfmac: Annotate struct brcmf_gscan_config with __counted_by (bsc#1227149). * wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git- fixes). * wifi: brcmfmac: Detect corner error case earlier with log (bsc#1227149). * wifi: brcmfmac: add linefeed at end of file (bsc#1227149). * wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes). * wifi: brcmfmac: allow per-vendor event handling (bsc#1227149). * wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes). * wifi: brcmfmac: do not cast hidden SSID attribute value to boolean (bsc#1227149). * wifi: brcmfmac: do not pass hidden SSID attribute as value directly (bsc#1227149). * wifi: brcmfmac: export firmware interface functions (bsc#1227149). * wifi: brcmfmac: firmware: Annotate struct brcmf_fw_request with __counted_by (bsc#1227149). * wifi: brcmfmac: fix format-truncation warnings (bsc#1227149). * wifi: brcmfmac: fix gnu_printf warnings (bsc#1227149). * wifi: brcmfmac: fweh: Add __counted_by for struct brcmf_fweh_queue_item and use struct_size() (bsc#1227149). * wifi: brcmfmac: fweh: Fix boot crash on Raspberry Pi 4 (bsc#1227149). * wifi: brcmfmac: move feature overrides before feature_disable (bsc#1227149). * wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes). * wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes). * wifi: brcmsmac: cleanup SCB-related data types (bsc#1227149). * wifi: brcmsmac: fix gnu_printf warnings (bsc#1227149). * wifi: brcmsmac: phy: Remove unreachable code (bsc#1227149). * wifi: brcmsmac: remove more unused data types (bsc#1227149). * wifi: brcmsmac: remove unused data type (bsc#1227149). * wifi: brcmsmac: replace deprecated strncpy with memcpy (bsc#1227149). * wifi: brcmsmac: silence sparse warnings (bsc#1227149). * wifi: brcmutil: use helper function pktq_empty() instead of open code (bsc#1227149). * wifi: carl9170: Remove redundant assignment to pointer super (bsc#1227149). * wifi: carl9170: add a proper sanity check for endpoints (git-fixes). * wifi: carl9170: re-fix fortified-memset warning (git-fixes). * wifi: carl9170: remove unnecessary (void*) conversions (bsc#1227149). * wifi: cfg80211: Add support for setting TID to link mapping (bsc#1227149). * wifi: cfg80211: Allow AP/P2PGO to indicate port authorization to peer STA/P2PClient (bsc#1227149). * wifi: cfg80211: Extend support for scanning while MLO connected (bsc#1227149). * wifi: cfg80211: Fix typo in documentation (bsc#1227149). * wifi: cfg80211: Handle specific BSSID in 6GHz scanning (bsc#1227149). * wifi: cfg80211: Include operating class 137 in 6GHz band (bsc#1227149). * wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes). * wifi: cfg80211: OWE DH IE handling offload (bsc#1227149). * wifi: cfg80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: cfg80211: Schedule regulatory check on BSS STA channel change (bsc#1227149). * wifi: cfg80211: Update the default DSCP-to-UP mapping (bsc#1227149). * wifi: cfg80211: add BSS usage reporting (bsc#1227149). * wifi: cfg80211: add RNR with reporting AP information (bsc#1227149). * wifi: cfg80211: add a flag to disable wireless extensions (bsc#1227149). * wifi: cfg80211: add local_state_change to deauth trace (bsc#1227149). * wifi: cfg80211: add locked debugfs wrappers (bsc#1227149). * wifi: cfg80211: add support for SPP A-MSDUs (bsc#1227149). * wifi: cfg80211: address several kerneldoc warnings (bsc#1227149). * wifi: cfg80211: allow reg update by driver even if wiphy->regd is set (bsc#1227149). * wifi: cfg80211: annotate iftype_data pointer with sparse (bsc#1227149). * wifi: cfg80211: avoid double free if updating BSS fails (bsc#1227149). * wifi: cfg80211: call reg_call_notifier on beacon hints (bsc#1227149). * wifi: cfg80211: check A-MSDU format more carefully (stable-fixes). * wifi: cfg80211: check RTNL when iterating devices (bsc#1227149). * wifi: cfg80211: check wiphy mutex is held for wdev mutex (bsc#1227149). * wifi: cfg80211: consume both probe response and beacon IEs (bsc#1227149). * wifi: cfg80211: detect stuck ECSA element in probe resp (bsc#1227149). * wifi: cfg80211: ensure cfg80211_bss_update frees IEs on error (bsc#1227149). * wifi: cfg80211: export DFS CAC time and usable state helper functions (bsc#1227149). * wifi: cfg80211: expose nl80211_chan_width_to_mhz for wide sharing (bsc#1227149). * wifi: cfg80211: fix 6 GHz scan request building (stable-fixes). * wifi: cfg80211: fix CQM for non-range use (bsc#1227149). * wifi: cfg80211: fix header kernel-doc typos (bsc#1227149). * wifi: cfg80211: fix kernel-doc for wiphy_delayed_work_flush() (bsc#1227149). * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes). * wifi: cfg80211: fix spelling & punctutation (bsc#1227149). * wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes). * wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes). * wifi: cfg80211: fully move wiphy work to unbound workqueue (git-fixes). * wifi: cfg80211: generate an ML element for per-STA profiles (bsc#1227149). * wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes). * wifi: cfg80211: handle UHB AP and STA power type (bsc#1227149). * wifi: cfg80211: hold wiphy lock in cfg80211_any_wiphy_oper_chan() (bsc#1227149). * wifi: cfg80211: hold wiphy mutex for send_interface (bsc#1227149). * wifi: cfg80211: improve documentation for flag fields (bsc#1227149). * wifi: cfg80211: introduce cfg80211_ssid_eq() (bsc#1227149). * wifi: cfg80211: make RX assoc data const (bsc#1227149). * wifi: cfg80211: make read-only array centers_80mhz static const (bsc#1227149). * wifi: cfg80211: modify prototype for change_beacon (bsc#1227149). * wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes). * wifi: cfg80211: reg: Support P2P operation on DFS channels (bsc#1227149). * wifi: cfg80211: reg: describe return values in kernel-doc (bsc#1227149). * wifi: cfg80211: reg: fix various kernel-doc issues (bsc#1227149). * wifi: cfg80211: reg: hold wiphy mutex for wdev iteration (bsc#1227149). * wifi: cfg80211: remove scan_width support (bsc#1227149). * wifi: cfg80211: remove wdev mutex (bsc#1227149). * wifi: cfg80211: rename UHB to 6 GHz (bsc#1227149). * wifi: cfg80211: report per-link errors during association (bsc#1227149). * wifi: cfg80211: report unprotected deauth/disassoc in wowlan (bsc#1227149). * wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes). * wifi: cfg80211: save power spectral density(psd) of regulatory rule (bsc#1227149). * wifi: cfg80211: set correct param change count in ML element (bsc#1227149). * wifi: cfg80211: sme: hold wiphy lock for wdev iteration (bsc#1227149). * wifi: cfg80211: sort certificates in build (bsc#1227149). * wifi: cfg80211: split struct cfg80211_ap_settings (bsc#1227149). * wifi: cfg80211: validate HE operation element parsing (bsc#1227149). * wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes). * wifi: cfg80211: wext: convert return value to kernel-doc (bsc#1227149). * wifi: cfg80211: wext: set ssids=NULL for passive scans (git-fixes). * wifi: cw1200: Avoid processing an invalid TIM IE (bsc#1227149). * wifi: cw1200: Convert to GPIO descriptors (bsc#1227149). * wifi: cw1200: fix __le16 sparse warnings (bsc#1227149). * wifi: cw1200: restore endian swapping (bsc#1227149). * wifi: drivers: Explicitly include correct DT includes (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for Broadcom WLAN (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for ar5523 (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for mt76 drivers (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for p54spi (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wcn36xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wilc1000 (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wl1251 and wl12xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wl18xx (bsc#1227149). * wifi: fill in MODULE_DESCRIPTION()s for wlcore (bsc#1227149). * wifi: hostap: Add __counted_by for struct prism2_download_data and use struct_size() (bsc#1227149). * wifi: hostap: fix stringop-truncations GCC warning (bsc#1227149). * wifi: hostap: remove unused ioctl function (bsc#1227149). * wifi: ieee80211: add UL-bandwidth definition of trigger frame (bsc#1227149). * wifi: ieee80211: add definitions for negotiated TID to Link map (bsc#1227149). * wifi: ieee80211: check for NULL in ieee80211_mle_size_ok() (stable-fixes). * wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes). * wifi: iwlmei: do not send SAP messages if AMT is disabled (bsc#1227149). * wifi: iwlmei: do not send nic info with invalid mac address (bsc#1227149). * wifi: iwlmei: send HOST_GOES_DOWN message even if wiamt is disabled (bsc#1227149). * wifi: iwlmei: send driver down SAP message only if wiamt is enabled (bsc#1227149). * wifi: iwlmvm: fw: Add new OEM vendor to tas approved list (bsc#1227149). * wifi: iwlwifi: Add rf_mapping of new wifi7 devices (bsc#1227149). * wifi: iwlwifi: Add support for PPAG cmd v5 and PPAG revision 3 (bsc#1227149). * wifi: iwlwifi: Add support for new 802.11be device (bsc#1227149). * wifi: iwlwifi: Do not mark DFS channels as NO-IR (bsc#1227149). * wifi: iwlwifi: Extract common prph mac/phy regions data dump logic (bsc#1227149). * wifi: iwlwifi: Fix spelling mistake "SESION" -> "SESSION" (bsc#1227149). * wifi: iwlwifi: Use request_module_nowait (bsc#1227149). * wifi: iwlwifi: abort scan when rfkill on but device enabled (bsc#1227149). * wifi: iwlwifi: add HONOR to PPAG approved list (bsc#1227149). * wifi: iwlwifi: add Razer to ppag approved list (bsc#1227149). * wifi: iwlwifi: add mapping of a periphery register crf for WH RF (bsc#1227149). * wifi: iwlwifi: add new RF support for wifi7 (bsc#1227149). * wifi: iwlwifi: add support for SNPS DPHYIP region type (bsc#1227149). * wifi: iwlwifi: add support for a wiphy_work rx handler (bsc#1227149). * wifi: iwlwifi: add support for activating UNII-1 in WW via BIOS (bsc#1227149). * wifi: iwlwifi: add support for new ini region types (bsc#1227149). * wifi: iwlwifi: adjust rx_phyinfo debugfs to MLO (bsc#1227149). * wifi: iwlwifi: always have 'uats_enabled' (bsc#1227149). * wifi: iwlwifi: api: clean up some kernel-doc/typos (bsc#1227149). * wifi: iwlwifi: api: dbg-tlv: fix up kernel-doc (bsc#1227149). * wifi: iwlwifi: api: fix a small upper/lower-case typo (bsc#1227149). * wifi: iwlwifi: api: fix center_freq label in PHY diagram (bsc#1227149). * wifi: iwlwifi: api: fix constant version to match FW (bsc#1227149). * wifi: iwlwifi: api: fix kernel-doc reference (bsc#1227149). * wifi: iwlwifi: bump FW API to 84 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 86 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 87 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: bump FW API to 88 for AX/BZ/SC devices (bsc#1227149). * wifi: iwlwifi: cancel session protection only if there is one (bsc#1227149). * wifi: iwlwifi: change link id in time event to s8 (bsc#1227149). * wifi: iwlwifi: check for kmemdup() return value in iwl_parse_tlv_firmware() (bsc#1227149). * wifi: iwlwifi: cleanup BT Shared Single Antenna code (bsc#1227149). * wifi: iwlwifi: cleanup sending PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1227149). * wifi: iwlwifi: cleanup uefi variables loading (bsc#1227149). * wifi: iwlwifi: clear link_id in time_event (bsc#1227149). * wifi: iwlwifi: dbg-tlv: avoid extra allocation/copy (bsc#1227149). * wifi: iwlwifi: dbg-tlv: use struct_size() for allocation (bsc#1227149). * wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git- fixes). * wifi: iwlwifi: disable 160 MHz based on subsystem device ID (bsc#1227149). * wifi: iwlwifi: disable eSR when BT is active (bsc#1227149). * wifi: iwlwifi: disable multi rx queue for 9000 (bsc#1227149). * wifi: iwlwifi: do not check TAS block list size twice (bsc#1227149). * wifi: iwlwifi: do not use TRUE/FALSE with bool (bsc#1227149). * wifi: iwlwifi: drop NULL pointer check in iwl_mvm_tzone_set_trip_temp() (bsc#1227149). * wifi: iwlwifi: dvm: remove kernel-doc warnings (bsc#1227149). * wifi: iwlwifi: error-dump: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fail NIC access fast on dead NIC (bsc#1227149). * wifi: iwlwifi: fix #ifdef CONFIG_ACPI check (bsc#1227149). * wifi: iwlwifi: fix iwl_mvm_get_valid_rx_ant() (git-fixes). * wifi: iwlwifi: fix opmode start/stop race (bsc#1227149). * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fix some kernel-doc issues (bsc#1227149). * wifi: iwlwifi: fix system commands group ordering (bsc#1227149). * wifi: iwlwifi: fix the rf step and flavor bits range (bsc#1227149). * wifi: iwlwifi: fw: Add support for UATS table in UHB (bsc#1227149). * wifi: iwlwifi: fw: Fix debugfs command sending (bsc#1227149). * wifi: iwlwifi: fw: allow vmalloc for PNVM image (bsc#1227149). * wifi: iwlwifi: fw: dbg: ensure correct config name sizes (bsc#1227149). * wifi: iwlwifi: fw: disable firmware debug asserts (bsc#1227149). * wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes). * wifi: iwlwifi: fw: file: clean up kernel-doc (bsc#1227149). * wifi: iwlwifi: fw: file: do not use [0] for variable arrays (bsc#1227149). * wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes). * wifi: iwlwifi: fw: fix compiler warning for NULL string print (bsc#1227149). * wifi: iwlwifi: fw: increase fw_version string size (bsc#1227149). * wifi: iwlwifi: fw: reconstruct the API/CAPA enum number (bsc#1227149). * wifi: iwlwifi: fw: replace deprecated strncpy with strscpy_pad (bsc#1227149). * wifi: iwlwifi: handle per-phy statistics from fw (bsc#1227149). * wifi: iwlwifi: implement GLAI ACPI table loading (bsc#1227149). * wifi: iwlwifi: implement can_activate_links callback (bsc#1227149). * wifi: iwlwifi: implement enable/disable for China 2022 regulatory (bsc#1227149). * wifi: iwlwifi: iwl-fh.h: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: iwl-trans.h: clean up kernel-doc (bsc#1227149). * wifi: iwlwifi: iwlmvm: handle unprotected deauth/disassoc in d3 (bsc#1227149). * wifi: iwlwifi: load b0 version of ucode for HR1/HR2 (bsc#1227149). * wifi: iwlwifi: make TB reallocation a debug message (bsc#1227149). * wifi: iwlwifi: make time_events MLO aware (bsc#1227149). * wifi: iwlwifi: mei: return error from register when not built (bsc#1227149). * wifi: iwlwifi: mvm: Add basic link selection logic (bsc#1227149). * wifi: iwlwifi: mvm: Add support for removing responder TKs (bsc#1227149). * wifi: iwlwifi: mvm: Allow DFS concurrent operation (bsc#1227149). * wifi: iwlwifi: mvm: Configure the link mapping for non-MLD FW (bsc#1227149). * wifi: iwlwifi: mvm: Correctly report TSF data in scan complete (bsc#1227149). * wifi: iwlwifi: mvm: Declare support for secure LTF measurement (bsc#1227149). * wifi: iwlwifi: mvm: Do not warn if valid link pair was not found (bsc#1227149). * wifi: iwlwifi: mvm: Do not warn on invalid link on scan complete (bsc#1227149). * wifi: iwlwifi: mvm: Extend support for P2P service discovery (bsc#1227149). * wifi: iwlwifi: mvm: Fix FTM initiator flags (bsc#1227149). * wifi: iwlwifi: mvm: Fix scan abort handling with HW rfkill (stable-fixes). * wifi: iwlwifi: mvm: Fix unreachable code path (bsc#1227149). * wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes). * wifi: iwlwifi: mvm: Keep connection in case of missed beacons during RX (bsc#1227149). * wifi: iwlwifi: mvm: Return success if link could not be removed (bsc#1227149). * wifi: iwlwifi: mvm: Use the link ID provided in scan request (bsc#1227149). * wifi: iwlwifi: mvm: add US/Canada MCC to API (bsc#1227149). * wifi: iwlwifi: mvm: add a debug print when we get a BAR (bsc#1227149). * wifi: iwlwifi: mvm: add a debugfs hook to clear the monitor data (bsc#1227149). * wifi: iwlwifi: mvm: add a per-link debugfs (bsc#1227149). * wifi: iwlwifi: mvm: add a print when sending RLC command (bsc#1227149). * wifi: iwlwifi: mvm: add start mac ctdp sum calculation debugfs handler (bsc#1227149). * wifi: iwlwifi: mvm: add support for TID to link mapping neg request (bsc#1227149). * wifi: iwlwifi: mvm: add support for new wowlan_info_notif (bsc#1227149). * wifi: iwlwifi: mvm: advertise MLO only if EHT is enabled (bsc#1227149). * wifi: iwlwifi: mvm: advertise support for SCS traffic description (bsc#1227149). * wifi: iwlwifi: mvm: advertise support for protected ranging negotiation (bsc#1227149). * wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes). * wifi: iwlwifi: mvm: always update keys in D3 exit (bsc#1227149). * wifi: iwlwifi: mvm: avoid garbage iPN (bsc#1227149). * wifi: iwlwifi: mvm: calculate EMLSR mode after connection (bsc#1227149). * wifi: iwlwifi: mvm: check AP supports EMLSR (bsc#1227149). * wifi: iwlwifi: mvm: check for iwl_mvm_mld_update_sta() errors (bsc#1227149). * wifi: iwlwifi: mvm: check link more carefully (bsc#1227149). * wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes). * wifi: iwlwifi: mvm: check own capabilities for EMLSR (bsc#1227149). * wifi: iwlwifi: mvm: cleanup MLO and non-MLO unification code (bsc#1227149). * wifi: iwlwifi: mvm: combine condition/warning (bsc#1227149). * wifi: iwlwifi: mvm: consider having one active link (bsc#1227149). * wifi: iwlwifi: mvm: const-ify chandef pointers (bsc#1227149). * wifi: iwlwifi: mvm: cycle FW link on chanctx removal (bsc#1227149). * wifi: iwlwifi: mvm: d3: avoid intermediate/early mutex unlock (bsc#1227149). * wifi: iwlwifi: mvm: d3: disconnect on GTK rekey failure (bsc#1227149). * wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes). * wifi: iwlwifi: mvm: d3: implement suspend with MLO (bsc#1227149). * wifi: iwlwifi: mvm: debugfs for fw system stats (bsc#1227149). * wifi: iwlwifi: mvm: define RX queue sync timeout as a macro (bsc#1227149). * wifi: iwlwifi: mvm: disable MLO for the time being (bsc#1227149). * wifi: iwlwifi: mvm: disallow puncturing in US/Canada (bsc#1227149). * wifi: iwlwifi: mvm: disconnect long CSA only w/o alternative (bsc#1227149). * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (bsc#1227149). * wifi: iwlwifi: mvm: do not abort queue sync in CT-kill (bsc#1227149). * wifi: iwlwifi: mvm: do not add dummy phy context (bsc#1227149). * wifi: iwlwifi: mvm: do not always disable EMLSR due to BT coex (bsc#1227149). * wifi: iwlwifi: mvm: do not do duplicate detection for nullfunc packets (bsc#1227149). * wifi: iwlwifi: mvm: do not initialize csa_work twice (git-fixes). * wifi: iwlwifi: mvm: do not limit VLP/AFC to UATS-enabled (git-fixes). * wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes). * wifi: iwlwifi: mvm: do not send BT_COEX_CI command on new devices (bsc#1227149). * wifi: iwlwifi: mvm: do not send NDPs for new tx devices (bsc#1227149). * wifi: iwlwifi: mvm: do not send STA_DISABLE_TX_CMD for newer firmware (bsc#1227149). * wifi: iwlwifi: mvm: do not send the smart fifo command if not needed (bsc#1227149). * wifi: iwlwifi: mvm: do not set trigger frame padding in AP mode (bsc#1227149). * wifi: iwlwifi: mvm: do not support reduced tx power on ack for new devices (bsc#1227149). * wifi: iwlwifi: mvm: do not wake up rx_sync_waitq upon RFKILL (git-fixes). * wifi: iwlwifi: mvm: enable FILS DF Tx on non-PSC channel (bsc#1227149). * wifi: iwlwifi: mvm: enable HE TX/RX <242 tone RU on new RFs (bsc#1227149). * wifi: iwlwifi: mvm: expand queue sync warning messages (bsc#1227149). * wifi: iwlwifi: mvm: extend alive timeout to 2 seconds (bsc#1227149). * wifi: iwlwifi: mvm: fix ROC version check (bsc#1227149). * wifi: iwlwifi: mvm: fix SB CFG check (bsc#1227149). * wifi: iwlwifi: mvm: fix a battery life regression (bsc#1227149). * wifi: iwlwifi: mvm: fix a crash on 7265 (bsc#1227149). * wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes). * wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes). * wifi: iwlwifi: mvm: fix kernel-doc (bsc#1227149). * wifi: iwlwifi: mvm: fix link ID management (bsc#1227149). * wifi: iwlwifi: mvm: fix recovery flow in CSA (bsc#1227149). * wifi: iwlwifi: mvm: fix regdb initialization (bsc#1227149). * wifi: iwlwifi: mvm: fix the PHY context resolution for p2p device (bsc#1227149). * wifi: iwlwifi: mvm: fix the TXF mapping for BZ devices (bsc#1227149). * wifi: iwlwifi: mvm: fix the key PN index (bsc#1227149). * wifi: iwlwifi: mvm: fix thermal kernel-doc (bsc#1227149). * wifi: iwlwifi: mvm: fold the ref++ into iwl_mvm_phy_ctxt_add (bsc#1227149). * wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes). * wifi: iwlwifi: mvm: handle BA session teardown in RF-kill (stable-fixes). * wifi: iwlwifi: mvm: handle debugfs names more carefully (bsc#1227149). * wifi: iwlwifi: mvm: handle link-STA allocation in restart (bsc#1227149). * wifi: iwlwifi: mvm: implement ROC version 3 (bsc#1227149). * wifi: iwlwifi: mvm: implement new firmware API for statistics (bsc#1227149). * wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes). * wifi: iwlwifi: mvm: increase session protection after CSA (bsc#1227149). * wifi: iwlwifi: mvm: init vif works only once (git-fixes). * wifi: iwlwifi: mvm: introduce PHY_CONTEXT_CMD_API_VER_5 (bsc#1227149). * wifi: iwlwifi: mvm: introduce esr_disable_reason (bsc#1227149). * wifi: iwlwifi: mvm: iterate active links for STA queues (bsc#1227149). * wifi: iwlwifi: mvm: limit EHT 320 MHz MCS for STEP URM (bsc#1227149). * wifi: iwlwifi: mvm: limit pseudo-D3 to 60 seconds (bsc#1227149). * wifi: iwlwifi: mvm: log dropped frames (bsc#1227149). * wifi: iwlwifi: mvm: log dropped packets due to MIC error (bsc#1227149). * wifi: iwlwifi: mvm: make "pldr_sync" mode effective (bsc#1227149). * wifi: iwlwifi: mvm: make functions public (bsc#1227149). * wifi: iwlwifi: mvm: make pldr_sync AX210 specific (bsc#1227149). * wifi: iwlwifi: mvm: move BA notif messages before action (bsc#1227149). * wifi: iwlwifi: mvm: move RU alloc B2 placement (bsc#1227149). * wifi: iwlwifi: mvm: move listen interval to constants (bsc#1227149). * wifi: iwlwifi: mvm: offload IGTK in AP if BIGTK is supported (bsc#1227149). * wifi: iwlwifi: mvm: partially support PHY context version 6 (bsc#1227149). * wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (bsc#1227149). * wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable- fixes). * wifi: iwlwifi: mvm: reduce maximum RX A-MPDU size (bsc#1227149). * wifi: iwlwifi: mvm: refactor TX rate handling (bsc#1227149). * wifi: iwlwifi: mvm: refactor duplicate chanctx condition (bsc#1227149). * wifi: iwlwifi: mvm: remove EHT code from mac80211.c (bsc#1227149). * wifi: iwlwifi: mvm: remove IWL_MVM_STATUS_NEED_FLUSH_P2P (bsc#1227149). * wifi: iwlwifi: mvm: remove flags for enable/disable beacon filter (bsc#1227149). * wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git- fixes). * wifi: iwlwifi: mvm: remove one queue sync on BA session stop (bsc#1227149). * wifi: iwlwifi: mvm: remove set_tim callback for MLD ops (bsc#1227149). * wifi: iwlwifi: mvm: remove stale STA link data during restart (stable- fixes). * wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes). * wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes). * wifi: iwlwifi: mvm: rework debugfs handling (bsc#1227149). * wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes). * wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes). * wifi: iwlwifi: mvm: set properly mac header (git-fixes). * wifi: iwlwifi: mvm: show dump even for pldr_sync (bsc#1227149). * wifi: iwlwifi: mvm: show skb_mac_gso_segment() failure reason (bsc#1227149). * wifi: iwlwifi: mvm: simplify the reorder buffer (bsc#1227149). * wifi: iwlwifi: mvm: skip adding debugfs symlink for reconfig (bsc#1227149). * wifi: iwlwifi: mvm: support CSA with MLD (bsc#1227149). * wifi: iwlwifi: mvm: support SPP A-MSDUs (bsc#1227149). * wifi: iwlwifi: mvm: support flush on AP interfaces (bsc#1227149). * wifi: iwlwifi: mvm: support injection antenna control (bsc#1227149). * wifi: iwlwifi: mvm: support iwl_dev_tx_power_cmd_v8 (bsc#1227149). * wifi: iwlwifi: mvm: support set_antenna() (bsc#1227149). * wifi: iwlwifi: mvm: unlock mvm if there is no primary link (bsc#1227149). * wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes). * wifi: iwlwifi: mvm: use fast balance scan in case of an active P2P GO (bsc#1227149). * wifi: iwlwifi: mvm: use the new command to clear the internal buffer (bsc#1227149). * wifi: iwlwifi: mvm: work around A-MSDU size problem (bsc#1227149). * wifi: iwlwifi: no power save during transition to D3 (bsc#1227149). * wifi: iwlwifi: nvm-parse: advertise common packet padding (bsc#1227149). * wifi: iwlwifi: nvm: parse the VLP/AFC bit from regulatory (bsc#1227149). * wifi: iwlwifi: pcie: (re-)assign BAR0 on driver bind (bsc#1227149). * wifi: iwlwifi: pcie: Add new PCI device id and CNVI (bsc#1227149). * wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes). * wifi: iwlwifi: pcie: clean up WFPM control bits (bsc#1227149). * wifi: iwlwifi: pcie: clean up device removal work (bsc#1227149). * wifi: iwlwifi: pcie: clean up gen1/gen2 TFD unmap (bsc#1227149). * wifi: iwlwifi: pcie: do not allow hw-rfkill to stop device on gen2 (bsc#1227149). * wifi: iwlwifi: pcie: dump CSRs before removal (bsc#1227149). * wifi: iwlwifi: pcie: enable TOP fatal error interrupt (bsc#1227149). * wifi: iwlwifi: pcie: fix RB status reading (stable-fixes). * wifi: iwlwifi: pcie: fix kernel-doc issues (bsc#1227149). * wifi: iwlwifi: pcie: get_crf_id() can be void (bsc#1227149). * wifi: iwlwifi: pcie: give up mem read if HW is dead (bsc#1227149). * wifi: iwlwifi: pcie: move gen1 TB handling to header (bsc#1227149). * wifi: iwlwifi: pcie: point invalid TFDs to invalid data (bsc#1227149). * wifi: iwlwifi: pcie: propagate iwl_pcie_gen2_apm_init() error (bsc#1227149). * wifi: iwlwifi: pcie: rescan bus if no parent (bsc#1227149). * wifi: iwlwifi: prepare for reading DSM from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading PPAG table from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading SAR tables from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading SPLC from UEFI (bsc#1227149). * wifi: iwlwifi: prepare for reading TAS table from UEFI (bsc#1227149). * wifi: iwlwifi: properly check if link is active (bsc#1227149). * wifi: iwlwifi: properly set WIPHY_FLAG_SUPPORTS_EXT_KEK_KCK (stable-fixes). * wifi: iwlwifi: queue: fix kernel-doc (bsc#1227149). * wifi: iwlwifi: queue: improve warning for no skb in reclaim (bsc#1227149). * wifi: iwlwifi: queue: move iwl_txq_gen2_set_tb() up (bsc#1227149). * wifi: iwlwifi: read DSM func 2 for specific RF types (bsc#1227149). * wifi: iwlwifi: read DSM functions from UEFI (bsc#1227149). * wifi: iwlwifi: read ECKV table from UEFI (bsc#1227149). * wifi: iwlwifi: read PPAG table from UEFI (bsc#1227149). * wifi: iwlwifi: read SAR tables from UEFI (bsc#1227149). * wifi: iwlwifi: read SPLC from UEFI (bsc#1227149). * wifi: iwlwifi: read WRDD table from UEFI (bsc#1227149). * wifi: iwlwifi: read WTAS table from UEFI (bsc#1227149). * wifi: iwlwifi: read mac step from aux register (bsc#1227149). * wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes). * wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes). * wifi: iwlwifi: refactor RX tracing (bsc#1227149). * wifi: iwlwifi: remove 'def_rx_queue' struct member (bsc#1227149). * wifi: iwlwifi: remove Gl A-step remnants (bsc#1227149). * wifi: iwlwifi: remove WARN from read_mem32() (bsc#1227149). * wifi: iwlwifi: remove async command callback (bsc#1227149). * wifi: iwlwifi: remove dead-code (bsc#1227149). * wifi: iwlwifi: remove extra kernel-doc (bsc#1227149). * wifi: iwlwifi: remove memory check for LMAC error address (bsc#1227149). * wifi: iwlwifi: remove retry loops in start (bsc#1227149). * wifi: iwlwifi: remove unused function prototype (bsc#1227149). * wifi: iwlwifi: replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: iwlwifi: return negative -EINVAL instead of positive EINVAL (bsc#1227149). * wifi: iwlwifi: rfi: use a single DSM function for all RFI configurations (bsc#1227149). * wifi: iwlwifi: send EDT table to FW (bsc#1227149). * wifi: iwlwifi: separate TAS 'read-from-BIOS' and 'send-to-FW' flows (bsc#1227149). * wifi: iwlwifi: simplify getting DSM from ACPI (bsc#1227149). * wifi: iwlwifi: skip affinity setting on non-SMP (bsc#1227149). * wifi: iwlwifi: skip opmode start retries on dead transport (bsc#1227149). * wifi: iwlwifi: small cleanups in PPAG table flows (bsc#1227149). * wifi: iwlwifi: support link command version 2 (bsc#1227149). * wifi: iwlwifi: support link id in SESSION_PROTECTION_NOTIF (bsc#1227149). * wifi: iwlwifi: support link_id in SESSION_PROTECTION cmd (bsc#1227149). * wifi: iwlwifi: take SGOM and UATS code out of ACPI ifdef (bsc#1227149). * wifi: iwlwifi: take send-DSM-to-FW flows out of ACPI ifdef (bsc#1227149). * wifi: iwlwifi: trace full frames with TX status request (bsc#1227149). * wifi: iwlwifi: update context info structure definitions (bsc#1227149). * wifi: iwlwifi: use system_unbound_wq for debug dump (bsc#1227149). * wifi: iwlwifi: validate PPAG table when sent to FW (bsc#1227149). * wifi: lib80211: remove unused variables iv32 and iv16 (bsc#1227149). * wifi: libertas: Follow renaming of SPI "master" to "controller" (bsc#1227149). * wifi: libertas: add missing calls to cancel_work_sync() (bsc#1227149). * wifi: libertas: cleanup SDIO reset (bsc#1227149). * wifi: libertas: handle possible spu_write_u16() errors (bsc#1227149). * wifi: libertas: prefer kstrtoX() for simple integer conversions (bsc#1227149). * wifi: libertas: simplify list operations in free_if_spi_card() (bsc#1227149). * wifi: libertas: use convenient lists to manage SDIO packets (bsc#1227149). * wifi: mac80211: Add __counted_by for struct ieee802_11_elems and use struct_size() (bsc#1227149). * wifi: mac80211: Avoid address calculations via out of bounds array indexing (stable-fixes). * wifi: mac80211: Check if we had first beacon with relevant links (bsc#1227149). * wifi: mac80211: Do not force off-channel for management Tx with MLO (bsc#1227149). * wifi: mac80211: Do not include crypto/algapi.h (bsc#1227149). * wifi: mac80211: Extend support for scanning while MLO connected (bsc#1227149). * wifi: mac80211: Fix SMPS handling in the context of MLO (bsc#1227149). * wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git- fixes). * wifi: mac80211: Notify the low level driver on change in MLO valid links (bsc#1227149). * wifi: mac80211: Print local link address during authentication (bsc#1227149). * wifi: mac80211: Recalc offload when monitor stop (git-fixes). * wifi: mac80211: Remove unused function declarations (bsc#1227149). * wifi: mac80211: Rename and update IEEE80211_VIF_DISABLE_SMPS_OVERRIDE (bsc#1227149). * wifi: mac80211: Replace ENOTSUPP with EOPNOTSUPP (bsc#1227149). * wifi: mac80211: Sanity check tx bitrate if not provided by driver (bsc#1227149). * wifi: mac80211: Schedule regulatory channels check on bandwith change (bsc#1227149). * wifi: mac80211: Skip association timeout update after comeback rejection (bsc#1227149). * wifi: mac80211: add a driver callback to add vif debugfs (bsc#1227149). * wifi: mac80211: add a driver callback to check active_links (bsc#1227149). * wifi: mac80211: add a flag to disallow puncturing (bsc#1227149). * wifi: mac80211: add back SPDX identifier (bsc#1227149). * wifi: mac80211: add ieee80211_tdls_sta_link_id() (stable-fixes). * wifi: mac80211: add link id to ieee80211_gtk_rekey_add() (bsc#1227149). * wifi: mac80211: add link id to mgd_prepare_tx() (bsc#1227149). * wifi: mac80211: add more ops assertions (bsc#1227149). * wifi: mac80211: add more warnings about inserting sta info (bsc#1227149). * wifi: mac80211: add support for SPP A-MSDUs (bsc#1227149). * wifi: mac80211: add support for mld in ieee80211_chswitch_done (bsc#1227149). * wifi: mac80211: add support for parsing TID to Link mapping element (bsc#1227149). * wifi: mac80211: add/remove driver debugfs entries as appropriate (bsc#1227149). * wifi: mac80211: additions to change_beacon() (bsc#1227149). * wifi: mac80211: address some kerneldoc warnings (bsc#1227149). * wifi: mac80211: allow 64-bit radiotap timestamps (bsc#1227149). * wifi: mac80211: allow for_each_sta_active_link() under RCU (bsc#1227149). * wifi: mac80211: apply mcast rate only if interface is up (stable-fixes). * wifi: mac80211: cancel multi-link reconf work on disconnect (git-fixes). * wifi: mac80211: chanctx emulation set CHANGE_CHANNEL when in_reconfig (git- fixes). * wifi: mac80211: check EHT/TTLM action frame length (bsc#1227149). * wifi: mac80211: check wiphy mutex in ops (bsc#1227149). * wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable- fixes). * wifi: mac80211: clean up assignments to pointer cache (stable-fixes). * wifi: mac80211: cleanup airtime arithmetic with ieee80211_sta_keep_active() (bsc#1227149). * wifi: mac80211: cleanup auth_data only if association continues (bsc#1227149). * wifi: mac80211: convert A-MPDU work to wiphy work (bsc#1227149). * wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git- fixes). * wifi: mac80211: correctly set active links upon TTLM (bsc#1227149). * wifi: mac80211: correcty limit wider BW TDLS STAs (git-fixes). * wifi: mac80211: debugfs: lock wiphy instead of RTNL (bsc#1227149). * wifi: mac80211: describe return values in kernel-doc (bsc#1227149). * wifi: mac80211: disable softirqs for queued frame handling (git-fixes). * wifi: mac80211: do not connect to an AP while it's in a CSA process (bsc#1227149). * wifi: mac80211: do not re-add debugfs entries during resume (bsc#1227149). * wifi: mac80211: do not select link ID if not provided in scan request (bsc#1227149). * wifi: mac80211: do not set ESS capab bit in assoc request (bsc#1227149). * wifi: mac80211: do not use rate mask for scanning (stable-fixes). * wifi: mac80211: drop robust action frames before assoc (bsc#1227149). * wifi: mac80211: drop spurious WARN_ON() in ieee80211_ibss_csa_beacon() (bsc#1227149). * wifi: mac80211: ensure beacon is non-S1G prior to extracting the beacon timestamp field (stable-fixes). * wifi: mac80211: ethtool: always hold wiphy mutex (bsc#1227149). * wifi: mac80211: ethtool: hold wiphy mutex (bsc#1227149). * wifi: mac80211: expand __ieee80211_data_to_8023() status (bsc#1227149). * wifi: mac80211: extend wiphy lock in interface removal (bsc#1227149). * wifi: mac80211: fix BA session teardown race (bsc#1227149). * wifi: mac80211: fix BSS_CHANGED_UNSOL_BCAST_PROBE_RESP (bsc#1227149). * wifi: mac80211: fix SMPS status handling (bsc#1227149). * wifi: mac80211: fix TXQ error path and cleanup (bsc#1227149). * wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes). * wifi: mac80211: fix a expired vs. cancel race in roc (bsc#1227149). * wifi: mac80211: fix advertised TTLM scheduling (bsc#1227149). * wifi: mac80211: fix another key installation error path (bsc#1227149). * wifi: mac80211: fix change_address deadlock during unregister (bsc#1227149). * wifi: mac80211: fix channel switch link data (bsc#1227149). * wifi: mac80211: fix driver debugfs for vif type change (bsc#1227149). * wifi: mac80211: fix error path key leak (bsc#1227149). * wifi: mac80211: fix header kernel-doc typos (bsc#1227149). * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes). * wifi: mac80211: fix ieee80211_drop_unencrypted_mgmt return type/value (bsc#1227149). * wifi: mac80211: fix monitor channel with chanctx emulation (bsc#1227149). * wifi: mac80211: fix potential key leak (bsc#1227149). * wifi: mac80211: fix prep_connection error path (stable-fixes). * wifi: mac80211: fix spelling typo in comment (bsc#1227149). * wifi: mac80211: fix unaligned le16 access (git-fixes). * wifi: mac80211: fix unsolicited broadcast probe config (bsc#1227149). * wifi: mac80211: fix various kernel-doc issues (bsc#1227149). * wifi: mac80211: fixes in FILS discovery updates (bsc#1227149). * wifi: mac80211: flush STA queues on unauthorization (bsc#1227149). * wifi: mac80211: flush wiphy work where appropriate (bsc#1227149). * wifi: mac80211: handle debugfs when switching to/from MLO (bsc#1227149). * wifi: mac80211: handle tasklet frames before stopping (stable-fixes). * wifi: mac80211: hold wiphy lock in netdev/link debugfs (bsc#1227149). * wifi: mac80211: hold wiphy_lock around concurrency checks (bsc#1227149). * wifi: mac80211: improve CSA/ECSA connection refusal (bsc#1227149). * wifi: mac80211: initialize SMPS mode correctly (bsc#1227149). * wifi: mac80211: lock wiphy for aggregation debugfs (bsc#1227149). * wifi: mac80211: lock wiphy in IP address notifier (bsc#1227149). * wifi: mac80211: make mgd_protect_tdls_discover MLO-aware (bsc#1227149). * wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes). * wifi: mac80211: mesh: Remove unused function declaration mesh_ids_set_default() (bsc#1227149). * wifi: mac80211: mesh: fix some kdoc warnings (bsc#1227149). * wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes). * wifi: mac80211: move CSA finalize to wiphy work (bsc#1227149). * wifi: mac80211: move DFS CAC work to wiphy work (bsc#1227149). * wifi: mac80211: move TDLS work to wiphy work (bsc#1227149). * wifi: mac80211: move color change finalize to wiphy work (bsc#1227149). * wifi: mac80211: move dynamic PS to wiphy work (bsc#1227149). * wifi: mac80211: move filter reconfig to wiphy work (bsc#1227149). * wifi: mac80211: move key tailroom work to wiphy work (bsc#1227149). * wifi: mac80211: move link activation work to wiphy work (bsc#1227149). * wifi: mac80211: move monitor work to wiphy work (bsc#1227149). * wifi: mac80211: move tspec work to wiphy work (bsc#1227149). * wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable- fixes). * wifi: mac80211: process and save negotiated TID to Link mapping request (bsc#1227149). * wifi: mac80211: purge TX queues in flush_queues flow (bsc#1227149). * wifi: mac80211: reduce iflist_mtx (bsc#1227149). * wifi: mac80211: reject MLO channel configuration if not supported (bsc#1227149). * wifi: mac80211: relax RCU check in for_each_vif_active_link() (bsc#1227149). * wifi: mac80211: remove RX_DROP_UNUSABLE (bsc#1227149). * wifi: mac80211: remove ampdu_mlme.mtx (bsc#1227149). * wifi: mac80211: remove chanctx_mtx (bsc#1227149). * wifi: mac80211: remove key_mtx (bsc#1227149). * wifi: mac80211: remove link before AP (git-fixes). * wifi: mac80211: remove local->mtx (bsc#1227149). * wifi: mac80211: remove redundant ML element check (bsc#1227149). * wifi: mac80211: remove shifted rate support (bsc#1227149). * wifi: mac80211: remove sta_mtx (bsc#1227149). * wifi: mac80211: remove unnecessary struct forward declaration (bsc#1227149). * wifi: mac80211: rename ieee80211_tx_status() to ieee80211_tx_status_skb() (bsc#1227149). * wifi: mac80211: rename struct cfg80211_rx_assoc_resp to cfg80211_rx_assoc_resp_data (bsc#1227149). * wifi: mac80211: report per-link error during association (bsc#1227149). * wifi: mac80211: reset negotiated TTLM on disconnect (git-fixes). * wifi: mac80211: rework RX timestamp flags (bsc#1227149). * wifi: mac80211: rework ack_frame_id handling a bit (bsc#1227149). * wifi: mac80211: rx.c: fix sentence grammar (bsc#1227149). * wifi: mac80211: set wiphy for virtual monitors (bsc#1227149). * wifi: mac80211: simplify non-chanctx drivers (bsc#1227149). * wifi: mac80211: split ieee80211_drop_unencrypted_mgmt() return value (bsc#1227149). * wifi: mac80211: sta_info.c: fix sentence grammar (bsc#1227149). * wifi: mac80211: support antenna control in injection (bsc#1227149). * wifi: mac80211: support handling of advertised TID-to-link mapping (bsc#1227149). * wifi: mac80211: take MBSSID/EHT data also from probe resp (bsc#1227149). * wifi: mac80211: take wiphy lock for MAC addr change (bsc#1227149). * wifi: mac80211: tx: clarify conditions in if statement (bsc#1227149). * wifi: mac80211: update beacon counters per link basis (bsc#1227149). * wifi: mac80211: update some locking documentation (bsc#1227149). * wifi: mac80211: update the rx_chains after set_antenna() (bsc#1227149). * wifi: mac80211: use bandwidth indication element for CSA (bsc#1227149). * wifi: mac80211: use deflink and fix typo in link ID check (bsc#1227149). * wifi: mac80211: use wiphy locked debugfs for sdata/link (bsc#1227149). * wifi: mac80211: use wiphy locked debugfs helpers for agg_status (bsc#1227149). * wifi: mac80211_hwsim: init peer measurement result (git-fixes). * wifi: mt7601u: delete dead code checking debugfs returns (bsc#1227149). * wifi: mt7601u: replace strlcpy() with strscpy() (bsc#1227149). * wifi: mt76: Annotate struct mt76_rx_tid with __counted_by (bsc#1227149). * wifi: mt76: Convert to platform remove callback returning void (bsc#1227149). * wifi: mt76: Remove redundant assignment to variable tidno (bsc#1227149). * wifi: mt76: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: mt76: Replace strlcpy() with strscpy() (bsc#1227149). * wifi: mt76: Use PTR_ERR_OR_ZERO() to simplify code (bsc#1227149). * wifi: mt76: add DMA mapping error check in mt76_alloc_txwi() (bsc#1227149). * wifi: mt76: add ability to explicitly forbid LED registration with DT (bsc#1227149). * wifi: mt76: add support for providing eeprom in nvmem cells (bsc#1227149). * wifi: mt76: add tx_nss histogram to ethtool stats (bsc#1227149). * wifi: mt76: change txpower init to per-phy (bsc#1227149). * wifi: mt76: check sta rx control frame to multibss capability (bsc#1227149). * wifi: mt76: check txs format before getting skb by pid (bsc#1227149). * wifi: mt76: check vif type before reporting cca and csa (bsc#1227149). * wifi: mt76: connac: add MBSSID support for mt7996 (bsc#1227149). * wifi: mt76: connac: add beacon duplicate TX mode support for mt7996 (bsc#1227149). * wifi: mt76: connac: add beacon protection support for mt7996 (bsc#1227149). * wifi: mt76: connac: add connac3 mac library (bsc#1227149). * wifi: mt76: connac: add data field in struct tlv (bsc#1227149). * wifi: mt76: connac: add eht support for phy mode config (bsc#1227149). * wifi: mt76: connac: add eht support for tx power (bsc#1227149). * wifi: mt76: connac: add firmware support for mt7992 (bsc#1227149). * wifi: mt76: connac: add more unified command IDs (bsc#1227149). * wifi: mt76: connac: add more unified event IDs (bsc#1227149). * wifi: mt76: connac: add new definition of tx descriptor (bsc#1227149). * wifi: mt76: connac: add support for dsp firmware download (bsc#1227149). * wifi: mt76: connac: add support to set ifs time by mcu command (bsc#1227149). * wifi: mt76: connac: add thermal protection support for mt7996 (bsc#1227149). * wifi: mt76: connac: check for null before dereferencing (bsc#1227149). * wifi: mt76: connac: export functions for mt7925 (bsc#1227149). * wifi: mt76: connac: introduce helper for mt7925 chipset (bsc#1227149). * wifi: mt76: connac: set correct muar_idx for mt799x chipsets (bsc#1227149). * wifi: mt76: connac: set fixed_bw bit in TX descriptor for fixed rate frames (bsc#1227149). * wifi: mt76: connac: use muar idx 0xe for non-mt799x as well (bsc#1227149). * wifi: mt76: disable HW AMSDU when using fixed rate (bsc#1227149). * wifi: mt76: dma: introduce __mt76_dma_queue_reset utility routine (bsc#1227149). * wifi: mt76: enable UNII-4 channel 177 support (bsc#1227149). * wifi: mt76: fix race condition related to checking tx queue fill status (bsc#1227149). * wifi: mt76: fix the issue of missing txpwr settings from ch153 to ch177 (bsc#1227149). * wifi: mt76: fix typo in mt76_get_of_eeprom_from_nvmem function (bsc#1227149). * wifi: mt76: increase MT_QFLAG_WED_TYPE size (bsc#1227149). * wifi: mt76: introduce mt76_queue_is_wed_tx_free utility routine (bsc#1227149). * wifi: mt76: introduce wed pointer in mt76_queue (bsc#1227149). * wifi: mt76: limit support of precal loading for mt7915 to MTD only (bsc#1227149). * wifi: mt76: make mt76_get_of_eeprom static again (bsc#1227149). * wifi: mt76: mmio: move mt76_mmio_wed_{init,release}_rx_buf in common code (bsc#1227149). * wifi: mt76: move ampdu_state in mt76_wcid (bsc#1227149). * wifi: mt76: move mt76_mmio_wed_offload_{enable,disable} in common code (bsc#1227149). * wifi: mt76: move mt76_net_setup_tc in common code (bsc#1227149). * wifi: mt76: move rate info in mt76_vif (bsc#1227149). * wifi: mt76: move wed reset common code in mt76 module (bsc#1227149). * wifi: mt76: mt7603: add missing register initialization for MT7628 (bsc#1227149). * wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes). * wifi: mt76: mt7603: disable A-MSDU tx support on MT7628 (bsc#1227149). * wifi: mt76: mt7603: fix beacon interval after disabling a single vif (bsc#1227149). * wifi: mt76: mt7603: fix tx filter/flush function (bsc#1227149). * wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes). * wifi: mt76: mt7603: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7603: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7615: add missing chanctx ops (bsc#1227149). * wifi: mt76: mt7615: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149). * wifi: mt76: mt7615: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7615: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt76_connac3: move lmac queue enumeration in mt76_connac3_mac.h (bsc#1227149). * wifi: mt76: mt76x02: fix return value check in mt76x02_mac_process_rx (bsc#1227149). * wifi: mt76: mt76x2u: add netgear wdna3100v3 to device table (bsc#1227149). * wifi: mt76: mt7915 add tc offloading support (bsc#1227149). * wifi: mt76: mt7915: accumulate mu-mimo ofdma muru stats (bsc#1227149). * wifi: mt76: mt7915: add locking for accessing mapped registers (bsc#1227149). * wifi: mt76: mt7915: add missing chanctx ops (bsc#1227149). * wifi: mt76: mt7915: add support for MT7981 (bsc#1227149). * wifi: mt76: mt7915: also MT7981 is 3T3R but nss2 on 5 GHz band (bsc#1227149). * wifi: mt76: mt7915: disable WFDMA Tx/Rx during SER recovery (bsc#1227149). * wifi: mt76: mt7915: drop return in mt7915_sta_statistics (bsc#1227149). * wifi: mt76: mt7915: fix EEPROM offset of TSSI flag on MT7981 (bsc#1227149). * wifi: mt76: mt7915: fix error recovery with WED enabled (bsc#1227149). * wifi: mt76: mt7915: fix monitor mode issues (bsc#1227149). * wifi: mt76: mt7915: move mib_stats structure in mt76.h (bsc#1227149). * wifi: mt76: mt7915: move poll_list in mt76_wcid (bsc#1227149). * wifi: mt76: mt7915: move sta_poll_list and sta_poll_lock in mt76_dev (bsc#1227149). * wifi: mt76: mt7915: report tx retries/failed counts for non-WED path (bsc#1227149). * wifi: mt76: mt7915: update mpdu density capability (bsc#1227149). * wifi: mt76: mt7915: update mt798x_wmac_adie_patch_7976 (bsc#1227149). * wifi: mt76: mt7915: workaround too long expansion sparse warnings (git- fixes). * wifi: mt76: mt7921: Support temp sensor (bsc#1227149). * wifi: mt76: mt7921: add 6GHz power type support for clc (bsc#1227149). * wifi: mt76: mt7921: convert acpisar and clc pointers to void (bsc#1227149). * wifi: mt76: mt7921: enable set txpower for UNII-4 (bsc#1227149). * wifi: mt76: mt7921: fix 6GHz disabled by the missing default CLC config (bsc#1227149). * wifi: mt76: mt7921: fix CLC command timeout when suspend/resume (bsc#1227149). * wifi: mt76: mt7921: fix a potential association failure upon resuming (bsc#1227149). * wifi: mt76: mt7921: fix kernel panic by accessing invalid 6GHz channel info (bsc#1227149). * wifi: mt76: mt7921: fix suspend issue on MediaTek COB platform (bsc#1227149). * wifi: mt76: mt7921: fix the unfinished command of regd_notifier before suspend (bsc#1227149). * wifi: mt76: mt7921: fix wrong 6Ghz power type (bsc#1227149). * wifi: mt76: mt7921: get regulatory information from the clc event (bsc#1227149). * wifi: mt76: mt7921: get rid of MT7921_RESET_TIMEOUT marco (bsc#1227149). * wifi: mt76: mt7921: make mt7921_mac_sta_poll static (bsc#1227149). * wifi: mt76: mt7921: move acpi_sar code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move common register definition in mt792x_regs.h (bsc#1227149). * wifi: mt76: mt7921: move connac nic capability handling to mt7921 (bsc#1227149). * wifi: mt76: mt7921: move debugfs shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move dma shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move hif_ops macro in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move init shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move mac shared code in mt792x-lib module (bsc#1227149). * wifi: mt76: mt7921: move mt7921_dma_init in pci.c (bsc#1227149). * wifi: mt76: mt7921: move mt7921u_disconnect mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: move mt792x_hw_dev in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move mt792x_mutex_{acquire/release} in mt792x.h (bsc#1227149). * wifi: mt76: mt7921: move runtime-pm pci code in mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: move shared runtime-pm code on mt792x-lib (bsc#1227149). * wifi: mt76: mt7921: reduce the size of MCU firmware download Rx queue (bsc#1227149). * wifi: mt76: mt7921: rely on mib_stats shared definition (bsc#1227149). * wifi: mt76: mt7921: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7921: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7921: remove macro duplication in regs.h (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_dev in mt792x_dev (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_hif_ops in mt792x_hif_ops (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_phy in mt792x_phy (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_sta in mt792x_sta (bsc#1227149). * wifi: mt76: mt7921: rename mt7921_vif in mt792x_vif (bsc#1227149). * wifi: mt76: mt7921: support 5.9/6GHz channel config in acpi (bsc#1227149). * wifi: mt76: mt7921: update the channel usage when the regd domain changed (bsc#1227149). * wifi: mt76: mt7921e: report tx retries/failed counts in tx free event (bsc#1227149). * wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (stable- fixes). * wifi: mt76: mt7925: add Mediatek Wi-Fi7 driver for mt7925 chips (bsc#1227149). * wifi: mt76: mt7925: add flow to avoid chip bt function fail (bsc#1227149). * wifi: mt76: mt7925: add support to set ifs time by mcu command (bsc#1227149). * wifi: mt76: mt7925: ensure 4-byte alignment for suspend & wow command (bsc#1227149). * wifi: mt76: mt7925: fix SAP no beacon issue in 5Ghz and 6Ghz band (bsc#1227149). * wifi: mt76: mt7925: fix WoW failed in encrypted mode (bsc#1227149). * wifi: mt76: mt7925: fix connect to 80211b mode fail in 2Ghz band (bsc#1227149). * wifi: mt76: mt7925: fix fw download fail (bsc#1227149). * wifi: mt76: mt7925: fix mcu query command fail (bsc#1227149). * wifi: mt76: mt7925: fix the wrong data type for scan command (bsc#1227149). * wifi: mt76: mt7925: fix the wrong header translation config (bsc#1227149). * wifi: mt76: mt7925: fix typo in mt7925_init_he_caps (bsc#1227149). * wifi: mt76: mt7925: fix wmm queue mapping (bsc#1227149). * wifi: mt76: mt7925: remove iftype from mt7925_init_eht_caps signature (bsc#1227149). * wifi: mt76: mt7925: support temperature sensor (bsc#1227149). * wifi: mt76: mt7925: update PCIe DMA settings (bsc#1227149). * wifi: mt76: mt7925e: fix use-after-free in free_irq() (bsc#1227149). * wifi: mt76: mt792x: add the illegal value check for mtcl table of acpi (bsc#1227149). * wifi: mt76: mt792x: fix ethtool warning (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x-lib module (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x-usb module (bsc#1227149). * wifi: mt76: mt792x: introduce mt792x_irq_map (bsc#1227149). * wifi: mt76: mt792x: move MT7921_PM_TIMEOUT and MT7921_HW_SCAN_TIMEOUT in common code (bsc#1227149). * wifi: mt76: mt792x: move more dma shared code in mt792x_dma (bsc#1227149). * wifi: mt76: mt792x: move mt7921_load_firmware in mt792x-lib module (bsc#1227149). * wifi: mt76: mt792x: move mt7921_skb_add_usb_sdio_hdr in mt792x module (bsc#1227149). * wifi: mt76: mt792x: move shared structure definition in mt792x.h (bsc#1227149). * wifi: mt76: mt792x: move some common usb code in mt792x module (bsc#1227149). * wifi: mt76: mt792x: support mt7925 chip init (bsc#1227149). * wifi: mt76: mt792x: update the country list of EU for ACPI SAR (bsc#1227149). * wifi: mt76: mt792xu: enable dmashdl support (bsc#1227149). * wifi: mt76: mt7996: Add mcu commands for getting sta tx statistic (bsc#1227149). * wifi: mt76: mt7996: Use DECLARE_FLEX_ARRAY() and fix -Warray-bounds warnings (bsc#1227149). * wifi: mt76: mt7996: add DMA support for mt7992 (bsc#1227149). * wifi: mt76: mt7996: add TX statistics for EHT mode in debugfs (bsc#1227149). * wifi: mt76: mt7996: add locking for accessing mapped registers (stable- fixes). * wifi: mt76: mt7996: add muru support (bsc#1227149). * wifi: mt76: mt7996: add sanity checks for background radar trigger (stable- fixes). * wifi: mt76: mt7996: add support for variants with auxiliary RX path (bsc#1227149). * wifi: mt76: mt7996: add thermal sensor device support (bsc#1227149). * wifi: mt76: mt7996: add txpower setting support (bsc#1227149). * wifi: mt76: mt7996: adjust WFDMA settings to improve performance (bsc#1227149). * wifi: mt76: mt7996: adjust interface num and wtbl size for mt7992 (bsc#1227149). * wifi: mt76: mt7996: align the format of fixed rate command (bsc#1227149). * wifi: mt76: mt7996: check txs format before getting skb by pid (bsc#1227149). * wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes). * wifi: mt76: mt7996: disable WFDMA Tx/Rx during SER recovery (bsc#1227149). * wifi: mt76: mt7996: drop return in mt7996_sta_statistics (bsc#1227149). * wifi: mt76: mt7996: enable BSS_CHANGED_MU_GROUPS support (bsc#1227149). * wifi: mt76: mt7996: enable PPDU-TxS to host (bsc#1227149). * wifi: mt76: mt7996: enable VHT extended NSS BW feature (bsc#1227149). * wifi: mt76: mt7996: ensure 4-byte alignment for beacon commands (bsc#1227149). * wifi: mt76: mt7996: fix alignment of sta info event (bsc#1227149). * wifi: mt76: mt7996: fix fortify warning (bsc#1227149). * wifi: mt76: mt7996: fix fw loading timeout (bsc#1227149). * wifi: mt76: mt7996: fix mt7996_mcu_all_sta_info_event struct packing (bsc#1227149). * wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature (bsc#1227149). * wifi: mt76: mt7996: fix size of txpower MCU command (bsc#1227149). * wifi: mt76: mt7996: fix uninitialized variable in mt7996_irq_tasklet() (bsc#1227149). * wifi: mt76: mt7996: fix uninitialized variable in parsing txfree (bsc#1227149). * wifi: mt76: mt7996: get tx_retries and tx_failed from txfree (bsc#1227149). * wifi: mt76: mt7996: handle IEEE80211_RC_SMPS_CHANGED (bsc#1227149). * wifi: mt76: mt7996: increase tx token size (bsc#1227149). * wifi: mt76: mt7996: introduce mt7996_band_valid() (bsc#1227149). * wifi: mt76: mt7996: mark GCMP IGTK unsupported (bsc#1227149). * wifi: mt76: mt7996: move radio ctrl commands to proper functions (bsc#1227149). * wifi: mt76: mt7996: only set vif teardown cmds at remove interface (bsc#1227149). * wifi: mt76: mt7996: rely on mib_stats shared definition (bsc#1227149). * wifi: mt76: mt7996: rely on shared poll_list field (bsc#1227149). * wifi: mt76: mt7996: rely on shared sta_poll_list and sta_poll_lock (bsc#1227149). * wifi: mt76: mt7996: remove TXS queue setting (bsc#1227149). * wifi: mt76: mt7996: remove periodic MPDU TXS request (bsc#1227149). * wifi: mt76: mt7996: rework ampdu params setting (bsc#1227149). * wifi: mt76: mt7996: rework register offsets for mt7992 (bsc#1227149). * wifi: mt76: mt7996: set DMA mask to 36 bits for boards with more than 4GB of RAM (bsc#1227149). * wifi: mt76: mt7996: support more options for mt7996_set_bitrate_mask() (bsc#1227149). * wifi: mt76: mt7996: support mt7992 eeprom loading (bsc#1227149). * wifi: mt76: mt7996: support per-band LED control (bsc#1227149). * wifi: mt76: mt7996: switch to mcu command for TX GI report (bsc#1227149). * wifi: mt76: mt7996: use u16 for val field in mt7996_mcu_set_rro signature (bsc#1227149). * wifi: mt76: permit to load precal from NVMEM cell for mt7915 (bsc#1227149). * wifi: mt76: permit to use alternative cell name to eeprom NVMEM load (bsc#1227149). * wifi: mt76: reduce spin_lock_bh held up in mt76_dma_rx_cleanup (bsc#1227149). * wifi: mt76: replace skb_put with skb_put_zero (stable-fixes). * wifi: mt76: report non-binding skb tx rate when WED is active (bsc#1227149). * wifi: mt76: set page_pool napi pointer for mmio devices (bsc#1227149). * wifi: mt76: split get_of_eeprom in subfunction (bsc#1227149). * wifi: mt76: usb: create a dedicated queue for psd traffic (bsc#1227149). * wifi: mt76: usb: store usb endpoint in mt76_queue (bsc#1227149). * wifi: mt76: use atomic iface iteration for pre-TBTT work (bsc#1227149). * wifi: mt76: use chainmask for power delta calculation (bsc#1227149). * wifi: mwifiex: Drop unused headers (bsc#1227149). * wifi: mwifiex: Fix interface type change (git-fixes). * wifi: mwifiex: Refactor 1-element array into flexible array in struct mwifiex_ie_types_chan_list_param_set (bsc#1227149). * wifi: mwifiex: Replace one-element array with flexible-array member in struct mwifiex_ie_types_rxba_sync (bsc#1227149). * wifi: mwifiex: Set WIPHY_FLAG_NETNS_OK flag (bsc#1227149). * wifi: mwifiex: Use default @max_active for workqueues (bsc#1227149). * wifi: mwifiex: Use helpers to check multicast addresses (bsc#1227149). * wifi: mwifiex: Use list_count_nodes() (bsc#1227149). * wifi: mwifiex: cleanup adapter data (bsc#1227149). * wifi: mwifiex: cleanup private data structures (bsc#1227149). * wifi: mwifiex: cleanup struct mwifiex_sdio_mpa_rx (bsc#1227149). * wifi: mwifiex: drop BUG_ON from TX paths (bsc#1227149). * wifi: mwifiex: fix comment typos in SDIO module (bsc#1227149). * wifi: mwifiex: followup PCIE and related cleanups (bsc#1227149). * wifi: mwifiex: handle possible mwifiex_write_reg() errors (bsc#1227149). * wifi: mwifiex: handle possible sscanf() errors (bsc#1227149). * wifi: mwifiex: mwifiex_process_sleep_confirm_resp(): remove unused priv variable (bsc#1227149). * wifi: mwifiex: prefer strscpy() over strlcpy() (bsc#1227149). * wifi: mwifiex: simplify PCIE write operations (bsc#1227149). * wifi: mwifiex: use MODULE_FIRMWARE to add firmware files metadata (bsc#1227149). * wifi: mwifiex: use cfg80211_ssid_eq() instead of mwifiex_ssid_cmp() (bsc#1227149). * wifi: mwifiex: use is_zero_ether_addr() instead of ether_addr_equal() (bsc#1227149). * wifi: mwifiex: use kstrtoX_from_user() in debugfs handlers (bsc#1227149). * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes). * wifi: nl80211: Avoid address calculations via out of bounds array indexing (git-fixes). * wifi: nl80211: Extend del pmksa support for SAE and OWE security (bsc#1227149). * wifi: nl80211: Remove unused declaration nl80211_pmsr_dump_results() (bsc#1227149). * wifi: nl80211: additions to NL80211_CMD_SET_BEACON (bsc#1227149). * wifi: nl80211: allow reporting wakeup for unprot deauth/disassoc (bsc#1227149). * wifi: nl80211: do not free NULL coalescing rule (git-fixes). * wifi: nl80211: fixes to FILS discovery updates (bsc#1227149). * wifi: nl80211: refactor nl80211_send_mlme_event() arguments (bsc#1227149). * wifi: p54: Add missing MODULE_FIRMWARE macro (bsc#1227149). * wifi: p54: Annotate struct p54_cal_database with __counted_by (bsc#1227149). * wifi: p54: fix GCC format truncation warning with wiphy->fw_version (bsc#1227149). * wifi: plfxlc: Drop unused include (bsc#1227149). * wifi: radiotap: add bandwidth definition of EHT U-SIG (bsc#1227149). * wifi: remove unused argument of ieee80211_get_tdls_action() (bsc#1227149). * wifi: rsi: fix restricted __le32 degrades to integer sparse warnings (bsc#1227149). * wifi: rsi: rsi_91x_coex: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_debugfs: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_hal: Remove unnecessary conversions (bsc#1227149). * wifi: rsi: rsi_91x_mac80211: Remove unnecessary conversions (bsc#1227149). * wifi: rsi: rsi_91x_main: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_sdio: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_sdio_ops: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_usb: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rsi: rsi_91x_usb_ops: Remove unnecessary (void*) conversions (bsc#1227149). * wifi: rt2x00: Simplify bool conversion (bsc#1227149). * wifi: rt2x00: correct MAC_SYS_CTRL register RX mask in R-Calibration (bsc#1227149). * wifi: rt2x00: disable RTS threshold for rt2800 by default (bsc#1227149). * wifi: rt2x00: fix MT7620 low RSSI issue (bsc#1227149). * wifi: rt2x00: fix rt2800 watchdog function (bsc#1227149). * wifi: rt2x00: fix the typo in comments (bsc#1227149). * wifi: rt2x00: improve MT7620 register initialization (bsc#1227149). * wifi: rt2x00: introduce DMA busy check watchdog for rt2800 (bsc#1227149). * wifi: rt2x00: limit MT7620 TX power based on eeprom calibration (bsc#1227149). * wifi: rt2x00: make watchdog param per device (bsc#1227149). * wifi: rt2x00: remove redundant check if u8 array element is less than zero (bsc#1227149). * wifi: rt2x00: remove useless code in rt2x00queue_create_tx_descriptor() (bsc#1227149). * wifi: rt2x00: rework MT7620 PA/LNA RF calibration (bsc#1227149). * wifi: rt2x00: rework MT7620 channel config function (bsc#1227149). * wifi: rt2x00: silence sparse warnings (bsc#1227149). * wifi: rt2x00: simplify rt2x00crypto_rx_insert_iv() (bsc#1227149). * wifi: rtl8xxxu: 8188e: convert usage of priv->vif to priv->vifs[0] (bsc#1227149). * wifi: rtl8xxxu: 8188f: Limit TX power index (git-fixes). * wifi: rtl8xxxu: Actually use macid in rtl8xxxu_gen2_report_connect (bsc#1227149). * wifi: rtl8xxxu: Add TP-Link TL-WN823N V2 (bsc#1227149). * wifi: rtl8xxxu: Add a description about the device ID 0x7392:0xb722 (bsc#1227149). * wifi: rtl8xxxu: Add beacon functions (bsc#1227149). * wifi: rtl8xxxu: Add parameter force to rtl8xxxu_refresh_rate_mask (bsc#1227149). * wifi: rtl8xxxu: Add parameter macid to update_rate_mask (bsc#1227149). * wifi: rtl8xxxu: Add parameter role to report_connect (bsc#1227149). * wifi: rtl8xxxu: Add set_tim() callback (bsc#1227149). * wifi: rtl8xxxu: Add sta_add() and sta_remove() callbacks (bsc#1227149). * wifi: rtl8xxxu: Add start_ap() callback (bsc#1227149). * wifi: rtl8xxxu: Allow creating interface in AP mode (bsc#1227149). * wifi: rtl8xxxu: Allow setting rts threshold to -1 (bsc#1227149). * wifi: rtl8xxxu: Clean up filter configuration (bsc#1227149). * wifi: rtl8xxxu: Declare AP mode support for 8188f (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8192EU (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8710BU (RTL8188GU) (bsc#1227149). * wifi: rtl8xxxu: Enable AP mode for RTL8723BU (bsc#1227149). * wifi: rtl8xxxu: Enable hw seq for mgmt/non-QoS data frames (bsc#1227149). * wifi: rtl8xxxu: Fix LED control code of RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: Fix off by one initial RTS rate (bsc#1227149). * wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes). * wifi: rtl8xxxu: Put the macid in txdesc (bsc#1227149). * wifi: rtl8xxxu: Remove usage of ieee80211_get_tx_rate() (bsc#1227149). * wifi: rtl8xxxu: Remove usage of tx_info->control.rates[0].flags (bsc#1227149). * wifi: rtl8xxxu: Rename some registers (bsc#1227149). * wifi: rtl8xxxu: Select correct queue for beacon frames (bsc#1227149). * wifi: rtl8xxxu: Set maximum number of supported stations (bsc#1227149). * wifi: rtl8xxxu: Support USB RX aggregation for the newer chips (bsc#1227149). * wifi: rtl8xxxu: Support new chip RTL8192FU (bsc#1227149). * wifi: rtl8xxxu: add hw crypto support for AP mode (bsc#1227149). * wifi: rtl8xxxu: add macids for STA mode (bsc#1227149). * wifi: rtl8xxxu: add missing number of sec cam entries for all variants (bsc#1227149). * wifi: rtl8xxxu: check vif before using in rtl8xxxu_tx() (bsc#1227149). * wifi: rtl8xxxu: convert EN_DESC_ID of TX descriptor to le32 type (bsc#1227149). * wifi: rtl8xxxu: declare concurrent mode support for 8188f (bsc#1227149). * wifi: rtl8xxxu: do not parse CFO, if both interfaces are connected in STA mode (bsc#1227149). * wifi: rtl8xxxu: enable MFP support with security flag of RX descriptor (bsc#1227149). * wifi: rtl8xxxu: enable channel switch support (bsc#1227149). * wifi: rtl8xxxu: extend check for matching bssid to both interfaces (bsc#1227149). * wifi: rtl8xxxu: extend wifi connected check to both interfaces (bsc#1227149). * wifi: rtl8xxxu: fix error messages (bsc#1227149). * wifi: rtl8xxxu: fix mixed declarations in rtl8xxxu_set_aifs() (bsc#1227149). * wifi: rtl8xxxu: make instances of iface limit and combination to be static const (bsc#1227149). * wifi: rtl8xxxu: make supporting AP mode only on port 0 transparent (bsc#1227149). * wifi: rtl8xxxu: mark TOTOLINK N150UA V5/N150UA-B as tested (bsc#1227149). * wifi: rtl8xxxu: prepare supporting two virtual interfaces (bsc#1227149). * wifi: rtl8xxxu: remove assignment of priv->vif in rtl8xxxu_bss_info_changed() (bsc#1227149). * wifi: rtl8xxxu: remove obsolete priv->vif (bsc#1227149). * wifi: rtl8xxxu: rtl8xxxu_rx_complete(): remove unnecessary return (bsc#1227149). * wifi: rtl8xxxu: support multiple interface in start_ap() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in bss_info_changed() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in configure_filter() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in set_aifs() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in update_beacon_work_callback() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in watchdog_callback() (bsc#1227149). * wifi: rtl8xxxu: support multiple interfaces in {add,remove}_interface() (bsc#1227149). * wifi: rtl8xxxu: support setting bssid register for multiple interfaces (bsc#1227149). * wifi: rtl8xxxu: support setting linktype for both interfaces (bsc#1227149). * wifi: rtl8xxxu: support setting mac address register for both interfaces (bsc#1227149). * wifi: rtl8xxxu: update rate mask per sta (bsc#1227149). * wifi: rtlwifi: Convert to use PCIe capability accessors (bsc#1227149). * wifi: rtlwifi: Ignore IEEE80211_CONF_CHANGE_RETRY_LIMITS (bsc#1227149). * wifi: rtlwifi: Remove bridge vendor/device ids (bsc#1227149). * wifi: rtlwifi: Remove rtl_intf_ops.read_efuse_byte (bsc#1227149). * wifi: rtlwifi: Remove unused PCI related defines and struct (bsc#1227149). * wifi: rtlwifi: Speed up firmware loading for USB (bsc#1227149). * wifi: rtlwifi: cleanup USB interface (bsc#1227149). * wifi: rtlwifi: cleanup few rtlxxx_tx_fill_desc() routines (bsc#1227149). * wifi: rtlwifi: cleanup few rtlxxxx_set_hw_reg() routines (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_hal (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_phy (bsc#1227149). * wifi: rtlwifi: cleanup struct rtl_ps_ctl (bsc#1227149). * wifi: rtlwifi: drop chk_switch_dmdp() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop fill_fake_txdesc() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop pre_fill_tx_bd_desc() from HAL interface (bsc#1227149). * wifi: rtlwifi: drop unused const_amdpci_aspm (bsc#1227149). * wifi: rtlwifi: remove misused flag from HAL data (bsc#1227149). * wifi: rtlwifi: remove unreachable code in rtl92d_dm_check_edca_turbo() (bsc#1227149). * wifi: rtlwifi: remove unused dualmac control leftovers (bsc#1227149). * wifi: rtlwifi: remove unused timer and related code (bsc#1227149). * wifi: rtlwifi: rtl8192cu: Fix 2T2R chip type detection (bsc#1227149). * wifi: rtlwifi: rtl8192cu: Fix TX aggregation (bsc#1227149). * wifi: rtlwifi: rtl8192de: Do not read register in _rtl92de_query_rxphystatus (bsc#1227149). * wifi: rtlwifi: rtl8192de: Fix 5 GHz TX power (stable-fixes). * wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes). * wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes). * wifi: rtlwifi: rtl8723: Remove unused function rtl8723_cmd_send_packet() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Access full PMCS reg and use pci_regs.h (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Add pdev into _rtl8821ae_clear_pci_pme_status() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Remove unnecessary PME_Status bit set (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Reverse PM Capability exists check (bsc#1227149). * wifi: rtlwifi: rtl8821ae: Use pci_find_capability() (bsc#1227149). * wifi: rtlwifi: rtl8821ae: phy: remove some useless code (bsc#1227149). * wifi: rtlwifi: rtl8821ae: phy: using calculate_bit_shift() (bsc#1227149). * wifi: rtlwifi: rtl92ee_dm_dynamic_primary_cca_check(): fix typo in function name (bsc#1227149). * wifi: rtlwifi: rtl_usb: Store the endpoint addresses (bsc#1227149). * wifi: rtlwifi: rtl_usb: Use sync register writes (bsc#1227149). * wifi: rtlwifi: set initial values for unexpected cases of USB endpoint priority (bsc#1227149). * wifi: rtlwifi: simplify LED management (bsc#1227149). * wifi: rtlwifi: simplify TX command fill callbacks (bsc#1227149). * wifi: rtlwifi: simplify rtl_action_proc() and rtl_tx_agg_start() (bsc#1227149). * wifi: rtlwifi: use convenient list_count_nodes() (bsc#1227149). * wifi: rtlwifi: use eth_broadcast_addr() to assign broadcast address (bsc#1227149). * wifi: rtlwifi: use helper function rtl_get_hdr() (bsc#1227149). * wifi: rtlwifi: use unsigned long for bt_coexist_8723 timestamp (bsc#1227149). * wifi: rtlwifi: use unsigned long for rtl_bssid_entry timestamp (bsc#1227149). * wifi: rtw88: 8821c: tweak CCK TX filter setting for SRRC regulation (bsc#1227149). * wifi: rtw88: 8821c: update TX power limit to V67 (bsc#1227149). * wifi: rtw88: 8821cu: Fix connection failure (stable-fixes). * wifi: rtw88: 8822c: update TX power limit to V70 (bsc#1227149). * wifi: rtw88: 8822ce: refine power parameters for RFE type 5 (bsc#1227149). * wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes). * wifi: rtw88: Add support for the SDIO based RTL8723DS chipset (bsc#1227149). * wifi: rtw88: Fix AP mode incorrect DTIM behavior (bsc#1227149). * wifi: rtw88: Fix action frame transmission fail before association (bsc#1227149). * wifi: rtw88: Skip high queue in hci_flush (bsc#1227149). * wifi: rtw88: Stop high queue during scan (bsc#1227149). * wifi: rtw88: Use random MAC when efuse MAC invalid (bsc#1227149). * wifi: rtw88: add missing unwind goto for __rtw_download_firmware() (bsc#1227149). * wifi: rtw88: debug: add to check if debug mask is enabled (bsc#1227149). * wifi: rtw88: debug: remove wrapper of rtw_dbg() (bsc#1227149). * wifi: rtw88: dump firmware debug information in abnormal state (bsc#1227149). * wifi: rtw88: fix incorrect error codes in rtw_debugfs_copy_from_user (bsc#1227149). * wifi: rtw88: fix incorrect error codes in rtw_debugfs_set_* (bsc#1227149). * wifi: rtw88: fix not entering PS mode after AP stops (bsc#1227149). * wifi: rtw88: fix typo rtw8822cu_probe (bsc#1227149). * wifi: rtw88: process VO packets without workqueue to avoid PTK rekey failed (bsc#1227149). * wifi: rtw88: refine register based H2C command (bsc#1227149). * wifi: rtw88: regd: configure QATAR and UK (bsc#1227149). * wifi: rtw88: regd: update regulatory map to R64-R42 (bsc#1227149). * wifi: rtw88: remove unused USB bulkout size set (bsc#1227149). * wifi: rtw88: remove unused and set but unused leftovers (bsc#1227149). * wifi: rtw88: rtw8723d: Implement RTL8723DS (SDIO) efuse parsing (bsc#1227149). * wifi: rtw88: simplify __rtw_tx_work() (bsc#1227149). * wifi: rtw88: simplify vif iterators (bsc#1227149). * wifi: rtw88: use cfg80211_ssid_eq() instead of rtw_ssid_equal() (bsc#1227149). * wifi: rtw88: use kstrtoX_from_user() in debugfs handlers (bsc#1227149). * wifi: rtw88: use struct instead of macros to set TX desc (bsc#1227149). * wifi: rtw89: 52c: rfk: disable DPK during MCC (bsc#1227149). * wifi: rtw89: 52c: rfk: refine MCC channel info notification (bsc#1227149). * wifi: rtw89: 8851b: add 8851B basic chip_info (bsc#1227149). * wifi: rtw89: 8851b: add 8851be to Makefile and Kconfig (bsc#1227149). * wifi: rtw89: 8851b: add BT coexistence support function (bsc#1227149). * wifi: rtw89: 8851b: add DLE mem and HFC quota (bsc#1227149). * wifi: rtw89: 8851b: add MAC configurations to chip_info (bsc#1227149). * wifi: rtw89: 8851b: add NCTL post table (bsc#1227149). * wifi: rtw89: 8851b: add RF configurations (bsc#1227149). * wifi: rtw89: 8851b: add TX power related functions (bsc#1227149). * wifi: rtw89: 8851b: add basic power on function (bsc#1227149). * wifi: rtw89: 8851b: add set channel function (bsc#1227149). * wifi: rtw89: 8851b: add set_channel_rf() (bsc#1227149). * wifi: rtw89: 8851b: add support WoWLAN to 8851B (bsc#1227149). * wifi: rtw89: 8851b: add to parse efuse content (bsc#1227149). * wifi: rtw89: 8851b: add to read efuse version to recognize hardware version B (bsc#1227149). * wifi: rtw89: 8851b: configure CRASH_TRIGGER feature for 8851B (bsc#1227149). * wifi: rtw89: 8851b: configure GPIO according to RFE type (bsc#1227149). * wifi: rtw89: 8851b: configure to force 1 TX power value (bsc#1227149). * wifi: rtw89: 8851b: enable hw_scan support (bsc#1227149). * wifi: rtw89: 8851b: fill BB related capabilities to chip_info (bsc#1227149). * wifi: rtw89: 8851b: rfk: Fix spelling mistake KIP_RESOTRE -> KIP_RESTORE (bsc#1227149). * wifi: rtw89: 8851b: rfk: add AACK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add DACK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add DPK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add IQK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add LCK track (bsc#1227149). * wifi: rtw89: 8851b: rfk: add RCK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add RX DCK (bsc#1227149). * wifi: rtw89: 8851b: rfk: add TSSI (bsc#1227149). * wifi: rtw89: 8851b: rfk: update IQK to version 0x8 (bsc#1227149). * wifi: rtw89: 8851b: update RF radio A parameters to R28 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R28 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R34 (bsc#1227149). * wifi: rtw89: 8851b: update TX power tables to R37 (bsc#1227149). * wifi: rtw89: 8851be: add 8851BE PCI entry and fill PCI capabilities (bsc#1227149). * wifi: rtw89: 8852b: fix definition of KIP register number (git-fixes). * wifi: rtw89: 8852b: update TX power tables to R35 (bsc#1227149). * wifi: rtw89: 8852b: update TX power tables to R36 (bsc#1227149). * wifi: rtw89: 8852c: Fix TSSI causes transmit power inaccuracy (bsc#1227149). * wifi: rtw89: 8852c: Update bandedge parameters for better performance (bsc#1227149). * wifi: rtw89: 8852c: add quirk to set PCI BER for certain platforms (bsc#1227149). * wifi: rtw89: 8852c: declare to support two chanctx (bsc#1227149). * wifi: rtw89: 8852c: read RX gain offset from efuse for 6GHz channels (bsc#1227149). * wifi: rtw89: 8852c: update RF radio A/B parameters to R63 (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (1 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (2 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R63 with 6 GHz power type (3 of 3) (bsc#1227149). * wifi: rtw89: 8852c: update TX power tables to R67 (bsc#1227149). * wifi: rtw89: 8922a: add 8922A basic chip info (bsc#1227149). * wifi: rtw89: 8922a: add BTG functions to assist BT coexistence to control TX/RX (bsc#1227149). * wifi: rtw89: 8922a: add NCTL pre-settings for WiFi 7 chips (bsc#1227149). * wifi: rtw89: 8922a: add RF read/write v2 (bsc#1227149). * wifi: rtw89: 8922a: add SER IMR tables (bsc#1227149). * wifi: rtw89: 8922a: add TX power related ops (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops related to BB init (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops to get thermal value (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::bb_preinit to enable BB before downloading firmware (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::cfg_txrx_path (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::rfk_hw_init (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::rfk_init_late to do initial RF calibrations later (bsc#1227149). * wifi: rtw89: 8922a: add chip_ops::{enable,disable}_bb_rf (bsc#1227149). * wifi: rtw89: 8922a: add coexistence helpers of SW grant (bsc#1227149). * wifi: rtw89: 8922a: add helper of set_channel (bsc#1227149). * wifi: rtw89: 8922a: add ieee80211_ops::hw_scan (bsc#1227149). * wifi: rtw89: 8922a: add more fields to beacon H2C command to support multi- links (bsc#1227149). * wifi: rtw89: 8922a: add power on/off functions (bsc#1227149). * wifi: rtw89: 8922a: add register definitions of H2C, C2H, page, RRSR and EDCCA (bsc#1227149). * wifi: rtw89: 8922a: add set_channel BB part (bsc#1227149). * wifi: rtw89: 8922a: add set_channel MAC part (bsc#1227149). * wifi: rtw89: 8922a: add set_channel RF part (bsc#1227149). * wifi: rtw89: 8922a: configure CRASH_TRIGGER FW feature (bsc#1227149). * wifi: rtw89: 8922a: correct register definition and merge IO for ctrl_nbtg_bt_tx() (bsc#1227149). * wifi: rtw89: 8922a: declare to support two chanctx (bsc#1227149). * wifi: rtw89: 8922a: dump MAC registers when SER occurs (bsc#1227149). * wifi: rtw89: 8922a: extend and add quota number (bsc#1227149). * wifi: rtw89: 8922a: hook handlers of TX/RX descriptors to chip_ops (bsc#1227149). * wifi: rtw89: 8922a: implement AP mode related reg for BE generation (bsc#1227149). * wifi: rtw89: 8922a: implement {stop,resume}_sch_tx and cfg_ppdu (bsc#1227149). * wifi: rtw89: 8922a: read efuse content from physical map (bsc#1227149). * wifi: rtw89: 8922a: read efuse content via efuse map struct from logic map (bsc#1227149). * wifi: rtw89: 8922a: rfk: implement chip_ops to call RF calibrations (bsc#1227149). * wifi: rtw89: 8922a: set RX gain along with set_channel operation (bsc#1227149). * wifi: rtw89: 8922a: set chip_ops FEM and GPIO to NULL (bsc#1227149). * wifi: rtw89: 8922a: set memory heap address for secure firmware (bsc#1227149). * wifi: rtw89: 8922a: update BA CAM number to 24 (bsc#1227149). * wifi: rtw89: 8922a: update the register used in DIG and the DIG flow (bsc#1227149). * wifi: rtw89: 8922ae: add 8922AE PCI entry and basic info (bsc#1227149). * wifi: rtw89: 8922ae: add v2 interrupt handlers for 8922AE (bsc#1227149). * wifi: rtw89: Add EHT rate mask as parameters of RA H2C command (bsc#1227149). * wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git- fixes). * wifi: rtw89: Fix clang -Wimplicit-fallthrough in rtw89_query_sar() (bsc#1227149). * wifi: rtw89: Introduce Time Averaged SAR (TAS) feature (bsc#1227149). * wifi: rtw89: Refine active scan behavior in 6 GHz (bsc#1227149). * wifi: rtw89: Set default CQM config if not present (bsc#1227149). * wifi: rtw89: TX power stuffs replace confusing naming of _max with _num (bsc#1227149). * wifi: rtw89: Update EHT PHY beamforming capability (bsc#1227149). * wifi: rtw89: acpi: process 6 GHz band policy from DSM (bsc#1227149). * wifi: rtw89: add C2H RA event V1 to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: add C2H event handlers of RFK log and report (bsc#1227149). * wifi: rtw89: add CFO XTAL registers field to support 8851B (bsc#1227149). * wifi: rtw89: add DBCC H2C to notify firmware the status (bsc#1227149). * wifi: rtw89: add EHT capabilities for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add EHT radiotap in monitor mode (bsc#1227149). * wifi: rtw89: add EVM and SNR statistics to debugfs (bsc#1227149). * wifi: rtw89: add EVM for antenna diversity (bsc#1227149). * wifi: rtw89: add H2C RA command V1 to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: add H2C command to download beacon frame for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add RSSI based antenna diversity (bsc#1227149). * wifi: rtw89: add RSSI statistics for the case of antenna diversity to debugfs (bsc#1227149). * wifi: rtw89: add XTAL SI for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add chip_info::chip_gen to determine chip generation (bsc#1227149). * wifi: rtw89: add chip_info::txwd_info size to generalize TX WD submit (bsc#1227149). * wifi: rtw89: add chip_ops::h2c_ba_cam() to configure BA CAM (bsc#1227149). * wifi: rtw89: add chip_ops::query_rxdesc() and rxd_len as helpers to support newer chips (bsc#1227149). * wifi: rtw89: add chip_ops::update_beacon to abstract update beacon operation (bsc#1227149). * wifi: rtw89: add firmware H2C command of BA CAM V1 (bsc#1227149). * wifi: rtw89: add firmware parser for v1 format (bsc#1227149). * wifi: rtw89: add firmware suit for BB MCU 0/1 (bsc#1227149). * wifi: rtw89: add function prototype for coex request duration (bsc#1227149). * wifi: rtw89: add mac_gen pointer to access mac port registers (bsc#1227149). * wifi: rtw89: add mlo_dbcc_mode for WiFi 7 chips (bsc#1227149). * wifi: rtw89: add new H2C command to pause/sleep transmitting by MAC ID (bsc#1227149). * wifi: rtw89: add new H2C for PS mode in 802.11be chip (bsc#1227149). * wifi: rtw89: add reserved size as factor of DLE used size (bsc#1227149). * wifi: rtw89: add subband index of primary channel to struct rtw89_chan (bsc#1227149). * wifi: rtw89: add to display hardware rates v1 histogram in debugfs (bsc#1227149). * wifi: rtw89: add to fill TX descriptor for firmware command v2 (bsc#1227149). * wifi: rtw89: add to fill TX descriptor v2 (bsc#1227149). * wifi: rtw89: add to parse firmware elements of BB and RF tables (bsc#1227149). * wifi: rtw89: add to query RX descriptor format v2 (bsc#1227149). * wifi: rtw89: add tx_wake notify for 8851B (bsc#1227149). * wifi: rtw89: add wait/completion for abort scan (bsc#1227149). * wifi: rtw89: adjust init_he_cap() to add EHT cap into iftype_data (bsc#1227149). * wifi: rtw89: advertise missing extended scan feature (bsc#1227149). * wifi: rtw89: avoid stringop-overflow warning (bsc#1227149). * wifi: rtw89: call rtw89_chan_get() by vif chanctx if aware of vif (bsc#1227149). * wifi: rtw89: chan: MCC take reconfig into account (bsc#1227149). * wifi: rtw89: chan: add sub-entity swap function to cover replacing (bsc#1227149). * wifi: rtw89: chan: move handling from add/remove to assign/unassign for MLO (bsc#1227149). * wifi: rtw89: chan: support MCC on Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: chan: tweak bitmap recalc ahead before MLO (bsc#1227149). * wifi: rtw89: chan: tweak weight recalc ahead before MLO (bsc#1227149). * wifi: rtw89: change naming of BA CAM from V1 to V0_EXT (bsc#1227149). * wifi: rtw89: change qutoa to DBCC by default for WiFi 7 chips (bsc#1227149). * wifi: rtw89: change supported bandwidths of chip_info to bit mask (bsc#1227149). * wifi: rtw89: cleanup firmware elements parsing (bsc#1227149). * wifi: rtw89: cleanup private data structures (bsc#1227149). * wifi: rtw89: cleanup rtw89_iqk_info and related code (bsc#1227149). * wifi: rtw89: coex: Add Bluetooth RSSI level information (bsc#1227149). * wifi: rtw89: coex: Add Pre-AGC control to enhance Wi-Fi RX performance (bsc#1227149). * wifi: rtw89: coex: Add coexistence policy to decrease WiFi packet CRC-ERR (bsc#1227149). * wifi: rtw89: coex: Fix wrong Wi-Fi role info and FDDT parameter members (bsc#1227149). * wifi: rtw89: coex: Record down Wi-Fi initial mode information (bsc#1227149). * wifi: rtw89: coex: Reorder H2C command index to align with firmware (bsc#1227149). * wifi: rtw89: coex: Set Bluetooth scan low-priority when Wi-Fi link/scan (bsc#1227149). * wifi: rtw89: coex: Still show hardware grant signal info even Wi-Fi is PS (bsc#1227149). * wifi: rtw89: coex: To improve Wi-Fi performance while BT is idle (bsc#1227149). * wifi: rtw89: coex: Translate antenna configuration from ID to string (bsc#1227149). * wifi: rtw89: coex: Update BTG control related logic (bsc#1227149). * wifi: rtw89: coex: Update RF parameter control setting logic (bsc#1227149). * wifi: rtw89: coex: Update coexistence policy for Wi-Fi LPS (bsc#1227149). * wifi: rtw89: coex: When Bluetooth not available do not set power/gain (bsc#1227149). * wifi: rtw89: coex: add BTC ctrl_info version 7 and related logic (bsc#1227149). * wifi: rtw89: coex: add annotation __counted_by() for struct rtw89_btc_btf_set_slot_table (bsc#1227149). * wifi: rtw89: coex: add annotation __counted_by() to struct rtw89_btc_btf_set_mon_reg (bsc#1227149). * wifi: rtw89: coex: add init_info H2C command format version 7 (bsc#1227149). * wifi: rtw89: coex: add return value to ensure H2C command is success or not (bsc#1227149). * wifi: rtw89: coex: fix configuration for shared antenna for 8922A (bsc#1227149). * wifi: rtw89: coex: use struct assignment to replace memcpy() to append TDMA content (bsc#1227149). * wifi: rtw89: configure PPDU max user by chip (bsc#1227149). * wifi: rtw89: consider RX info for WiFi 7 chips (bsc#1227149). * wifi: rtw89: consolidate registers of mac port to struct (bsc#1227149). * wifi: rtw89: correct PHY register offset for PHY-1 (bsc#1227149). * wifi: rtw89: correct aSIFSTime for 6GHz band (stable-fixes). * wifi: rtw89: correct the DCFO tracking flow to improve CFO compensation (bsc#1227149). * wifi: rtw89: debug: add FW log component for scan (bsc#1227149). * wifi: rtw89: debug: add debugfs entry to disable dynamic mechanism (bsc#1227149). * wifi: rtw89: debug: add to check if debug mask is enabled (bsc#1227149). * wifi: rtw89: debug: remove wrapper of rtw89_debug() (bsc#1227149). * wifi: rtw89: debug: show txpwr table according to chip gen (bsc#1227149). * wifi: rtw89: debug: txpwr table access only valid page according to chip (bsc#1227149). * wifi: rtw89: debug: txpwr table supports Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: declare EXT NSS BW of VHT capability (bsc#1227149). * wifi: rtw89: declare MCC in interface combination (bsc#1227149). * wifi: rtw89: define hardware rate v1 for WiFi 7 chips (bsc#1227149). * wifi: rtw89: differentiate narrow_bw_ru_dis setting according to chip gen (bsc#1227149). * wifi: rtw89: disable RTS when broadcast/multicast (bsc#1227149). * wifi: rtw89: download firmware with five times retry (bsc#1227149). * wifi: rtw89: drop TIMING_BEACON_ONLY and sync beacon TSF by self (bsc#1227149). * wifi: rtw89: enlarge supported length of read_reg debugfs entry (bsc#1227149). * wifi: rtw89: extend PHY status parser to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: fix HW scan not aborting properly (git-fixes). * wifi: rtw89: fix HW scan timeout due to TSF sync issue (bsc#1227149). * wifi: rtw89: fix a width vs precision bug (bsc#1227149). * wifi: rtw89: fix disabling concurrent mode TX hang issue (bsc#1227149). * wifi: rtw89: fix misbehavior of TX beacon in concurrent mode (bsc#1227149). * wifi: rtw89: fix not entering PS mode after AP stops (bsc#1227149). * wifi: rtw89: fix null pointer access when abort scan (stable-fixes). * wifi: rtw89: fix spelling typo of IQK debug messages (bsc#1227149). * wifi: rtw89: fix typo of rtw89_fw_h2c_mcc_macid_bitmap() (bsc#1227149). * wifi: rtw89: fw: add H2C command to reset CMAC table for WiFi 7 (bsc#1227149). * wifi: rtw89: fw: add H2C command to reset DMAC table for WiFi 7 (bsc#1227149). * wifi: rtw89: fw: add H2C command to update security CAM v2 (bsc#1227149). * wifi: rtw89: fw: add checking type for variant type of firmware (bsc#1227149). * wifi: rtw89: fw: add chip_ops to update CMAC table to associated station (bsc#1227149). * wifi: rtw89: fw: add definition of H2C command and C2H event for MRC series (bsc#1227149). * wifi: rtw89: fw: add version field to BB MCU firmware element (bsc#1227149). * wifi: rtw89: fw: consider checksum length of security data (bsc#1227149). * wifi: rtw89: fw: download firmware with key data for secure boot (bsc#1227149). * wifi: rtw89: fw: extend JOIN H2C command to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: extend program counter dump for Wi-Fi 7 chip (bsc#1227149). * wifi: rtw89: fw: fill CMAC table to associated station for WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: generalize download firmware flow by mac_gen pointers (bsc#1227149). * wifi: rtw89: fw: implement MRC H2C command functions (bsc#1227149). * wifi: rtw89: fw: implement supported functions of download firmware for WiFi 7 chips (bsc#1227149). * wifi: rtw89: fw: load TX power track tables from fw_element (bsc#1227149). * wifi: rtw89: fw: move polling function of firmware path ready to an individual function (bsc#1227149). * wifi: rtw89: fw: parse secure section from firmware file (bsc#1227149). * wifi: rtw89: fw: propagate an argument include_bb for BB MCU firmware (bsc#1227149). * wifi: rtw89: fw: read firmware secure information from efuse (bsc#1227149). * wifi: rtw89: fw: refine download flow to support variant firmware suits (bsc#1227149). * wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (bsc#1227149). * wifi: rtw89: fw: update TX AMPDU parameter to CMAC table (bsc#1227149). * wifi: rtw89: fw: use struct to fill BA CAM H2C commands (bsc#1227149). * wifi: rtw89: fw: use struct to fill JOIN H2C command (bsc#1227149). * wifi: rtw89: get data rate mode/NSS/MCS v1 from RX descriptor (bsc#1227149). * wifi: rtw89: indicate TX power by rate table inside RFE parameter (bsc#1227149). * wifi: rtw89: indicate TX shape table inside RFE parameter (bsc#1227149). * wifi: rtw89: initialize antenna for antenna diversity (bsc#1227149). * wifi: rtw89: initialize multi-channel handling (bsc#1227149). * wifi: rtw89: introduce infrastructure of firmware elements (bsc#1227149). * wifi: rtw89: introduce realtek ACPI DSM method (bsc#1227149). * wifi: rtw89: introduce v1 format of firmware header (bsc#1227149). * wifi: rtw89: load BB parameters to PHY-1 (bsc#1227149). * wifi: rtw89: load RFK log format string from firmware file (bsc#1227149). * wifi: rtw89: load TX power by rate when RFE parms setup (bsc#1227149). * wifi: rtw89: load TX power related tables from FW elements (bsc#1227149). * wifi: rtw89: mac: Fix spelling mistakes "notfify" -> "notify" (bsc#1227149). * wifi: rtw89: mac: add coexistence helpers {cfg/get}_plt (bsc#1227149). * wifi: rtw89: mac: add feature_init to initialize BA CAM V1 (bsc#1227149). * wifi: rtw89: mac: add flags to check if CMAC and DMAC are enabled (bsc#1227149). * wifi: rtw89: mac: add mac_gen_def::band1_offset to map MAC band1 register address (bsc#1227149). * wifi: rtw89: mac: add registers of MU-EDCA parameters for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add suffix _ax to MAC functions (bsc#1227149). * wifi: rtw89: mac: add sys_init and filter option for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add to access efuse for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: add to get DLE reserved quota (bsc#1227149). * wifi: rtw89: mac: check queue empty according to chip gen (bsc#1227149). * wifi: rtw89: mac: correct MUEDCA setting for MAC-1 (bsc#1227149). * wifi: rtw89: mac: define internal memory address for WiFi 7 chip (bsc#1227149). * wifi: rtw89: mac: define register address of rx_filter to generalize code (bsc#1227149). * wifi: rtw89: mac: do bf_monitor only if WiFi 6 chips (bsc#1227149). * wifi: rtw89: mac: functions to configure hardware engine and quota for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: generalize code to indirectly access WiFi internal memory (bsc#1227149). * wifi: rtw89: mac: generalize register of MU-EDCA switch according to chip gen (bsc#1227149). * wifi: rtw89: mac: get TX power control register according to chip gen (bsc#1227149). * wifi: rtw89: mac: handle C2H receive/done ACK in interrupt context (bsc#1227149). * wifi: rtw89: mac: implement MRC C2H event handling (bsc#1227149). * wifi: rtw89: mac: implement to configure TX/RX engines for WiFi 7 chips (bsc#1227149). * wifi: rtw89: mac: move code related to hardware engine to individual functions (bsc#1227149). * wifi: rtw89: mac: refine SER setting during WiFi CPU power on (bsc#1227149). * wifi: rtw89: mac: reset PHY-1 hardware when going to enable/disable (bsc#1227149). * wifi: rtw89: mac: return held quota of DLE when changing MAC-1 (bsc#1227149). * wifi: rtw89: mac: set bf_assoc capabilities according to chip gen (bsc#1227149). * wifi: rtw89: mac: set bfee_ctrl() according to chip gen (bsc#1227149). * wifi: rtw89: mac: update RTS threshold according to chip gen (bsc#1227149). * wifi: rtw89: mac: use mac_gen pointer to access about efuse (bsc#1227149). * wifi: rtw89: mac: use pointer to access functions of hardware engine and quota (bsc#1227149). * wifi: rtw89: mcc: consider and determine BT duration (bsc#1227149). * wifi: rtw89: mcc: deal with BT slot change (bsc#1227149). * wifi: rtw89: mcc: deal with P2P PS change (bsc#1227149). * wifi: rtw89: mcc: deal with beacon NoA if GO exists (bsc#1227149). * wifi: rtw89: mcc: decide pattern and calculate parameters (bsc#1227149). * wifi: rtw89: mcc: fill fundamental configurations (bsc#1227149). * wifi: rtw89: mcc: fix NoA start time when GO is auxiliary (bsc#1227149). * wifi: rtw89: mcc: initialize start flow (bsc#1227149). * wifi: rtw89: mcc: track beacon offset and update when needed (bsc#1227149). * wifi: rtw89: mcc: trigger FW to start/stop MCC (bsc#1227149). * wifi: rtw89: mcc: update role bitmap when changed (bsc#1227149). * wifi: rtw89: modify the register setting and the flow of CFO tracking (bsc#1227149). * wifi: rtw89: move software DCFO compensation setting to proper position (bsc#1227149). * wifi: rtw89: only reset BB/RF for existing WiFi 6 chips while starting up (bsc#1227149). * wifi: rtw89: packet offload wait for FW response (bsc#1227149). * wifi: rtw89: parse EHT information from RX descriptor and PPDU status packet (bsc#1227149). * wifi: rtw89: parse TX EHT rate selected by firmware from RA C2H report (bsc#1227149). * wifi: rtw89: parse and print out RFK log from C2H events (bsc#1227149). * wifi: rtw89: pause/proceed MCC for ROC and HW scan (bsc#1227149). * wifi: rtw89: pci: add LTR v2 for WiFi 7 chip (bsc#1227149). * wifi: rtw89: pci: add PCI generation information to pci_info for each chip (bsc#1227149). * wifi: rtw89: pci: add new RX ring design to determine full RX ring efficiently (bsc#1227149). * wifi: rtw89: pci: add pre_deinit to be called after probe complete (bsc#1227149). * wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of firmware command (git-fixes). * wifi: rtw89: pci: correct interrupt mitigation register for 8852CE (bsc#1227149). * wifi: rtw89: pci: define PCI ring address for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor (stable-fixes). * wifi: rtw89: pci: fix interrupt enable mask for HALT C2H of RTL8851B (bsc#1227149). * wifi: rtw89: pci: generalize code of PCI control DMA IO for WiFi 7 (bsc#1227149). * wifi: rtw89: pci: generalize interrupt status bits of interrupt handlers (bsc#1227149). * wifi: rtw89: pci: implement PCI CLK/ASPM/L1SS for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: implement PCI mac_post_init for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: implement PCI mac_pre_init for WiFi 7 chips (bsc#1227149). * wifi: rtw89: pci: interrupt v2 refine IMR for SER (bsc#1227149). * wifi: rtw89: pci: reset BDRAM according to chip gen (bsc#1227149). * wifi: rtw89: pci: stop/start DMA for level 1 recovery according to chip gen (bsc#1227149). * wifi: rtw89: pci: update SER timer unit and timeout time (bsc#1227149). * wifi: rtw89: pci: update interrupt mitigation register for 8922AE (bsc#1227149). * wifi: rtw89: pci: use DBI function for 8852AE/8852BE/8851BE (bsc#1227149). * wifi: rtw89: pci: use gen_def pointer to configure mac_{pre,post}_init and clear PCI ring index (bsc#1227149). * wifi: rtw89: pci: validate RX tag for RXQ and RPQ (bsc#1227149). * wifi: rtw89: phy: add BB wrapper of TX power for WiFi 7 chips (bsc#1227149). * wifi: rtw89: phy: add parser to support RX gain dynamic setting flow (bsc#1227149). * wifi: rtw89: phy: add phy_gen_def::cr_base to support WiFi 7 chips (bsc#1227149). * wifi: rtw89: phy: change naming related BT coexistence functions (bsc#1227149). * wifi: rtw89: phy: dynamically adjust EDCCA threshold (bsc#1227149). * wifi: rtw89: phy: extend TX power common stuffs for Wi-Fi 7 chips (bsc#1227149). * wifi: rtw89: phy: generalize valid bit of BSS color (bsc#1227149). * wifi: rtw89: phy: ignore special data from BB parameter file (bsc#1227149). * wifi: rtw89: phy: modify register setting of ENV_MNTR, PHYSTS and DIG (bsc#1227149). * wifi: rtw89: phy: move bb_gain_info used by WiFi 6 chips to union (bsc#1227149). * wifi: rtw89: phy: print out RFK log with formatted string (bsc#1227149). * wifi: rtw89: phy: rate pattern handles HW rate by chip gen (bsc#1227149). * wifi: rtw89: phy: refine helpers used for raw TX power (bsc#1227149). * wifi: rtw89: phy: set TX power RU limit according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power by rate according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power limit according to chip gen (bsc#1227149). * wifi: rtw89: phy: set TX power offset according to chip gen (bsc#1227149). * wifi: rtw89: phy: set channel_info for WiFi 7 chips (bsc#1227149). * wifi: rtw89: prepare scan leaf functions for wifi 7 ICs (bsc#1227149). * wifi: rtw89: process regulatory for 6 GHz power type (bsc#1227149). * wifi: rtw89: provide functions to configure NoA for beacon update (bsc#1227149). * wifi: rtw89: recognize log format from firmware file (bsc#1227149). * wifi: rtw89: reference quota mode when setting Tx power (bsc#1227149). * wifi: rtw89: refine H2C command that pause transmitting by MAC ID (bsc#1227149). * wifi: rtw89: refine add_chan H2C command to encode_bits (bsc#1227149). * wifi: rtw89: refine bandwidth 160MHz uplink OFDMA performance (bsc#1227149). * wifi: rtw89: refine clearing supported bands to check 2/5 GHz first (bsc#1227149). * wifi: rtw89: refine element naming used by queue empty check (bsc#1227149). * wifi: rtw89: refine hardware scan C2H events (bsc#1227149). * wifi: rtw89: refine packet offload delete flow of 6 GHz probe (bsc#1227149). * wifi: rtw89: refine packet offload handling under SER (bsc#1227149). * wifi: rtw89: refine remain on channel flow to improve P2P connection (bsc#1227149). * wifi: rtw89: refine rtw89_correct_cck_chan() by rtw89_hw_to_nl80211_band() (bsc#1227149). * wifi: rtw89: refine uplink trigger based control mechanism (bsc#1227149). * wifi: rtw89: regd: configure Thailand in regulation type (bsc#1227149). * wifi: rtw89: regd: handle policy of 6 GHz according to BIOS (bsc#1227149). * wifi: rtw89: regd: judge 6 GHz according to chip and BIOS (bsc#1227149). * wifi: rtw89: regd: judge UNII-4 according to BIOS and chip (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R64-R40 (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R64-R43 (bsc#1227149). * wifi: rtw89: regd: update regulatory map to R65-R44 (bsc#1227149). * wifi: rtw89: release bit in rtw89_fw_h2c_del_pkt_offload() (bsc#1227149). * wifi: rtw89: return failure if needed firmware elements are not recognized (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger DACK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger DPK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger IQK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger RX DCK (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger TSSI (bsc#1227149). * wifi: rtw89: rfk: add H2C command to trigger TXGAPK (bsc#1227149). * wifi: rtw89: rfk: add a completion to wait RF calibration report from C2H event (bsc#1227149). * wifi: rtw89: rfk: disable driver tracking during MCC (bsc#1227149). * wifi: rtw89: rfk: send channel information to firmware for RF calibrations (bsc#1227149). * wifi: rtw89: sar: let caller decide the center frequency to query (bsc#1227149). * wifi: rtw89: scan offload wait for FW done ACK (bsc#1227149). * wifi: rtw89: ser: L1 add pre-M0 and post-M0 states (bsc#1227149). * wifi: rtw89: ser: reset total_sta_assoc and tdls_peer when L2 (bsc#1227149). * wifi: rtw89: set TX power without precondition during setting channel (bsc#1227149). * wifi: rtw89: set capability of TX antenna diversity (bsc#1227149). * wifi: rtw89: set entry size of address CAM to H2C field by chip (bsc#1227149). * wifi: rtw89: show EHT rate in debugfs (bsc#1227149). * wifi: rtw89: support U-NII-4 channels on 5GHz band (bsc#1227149). * wifi: rtw89: support firmware log with formatted text (bsc#1227149). * wifi: rtw89: suppress the log for specific SER called CMDPSR_FRZTO (bsc#1227149). * wifi: rtw89: tweak H2C TX waiting function for SER (bsc#1227149). * wifi: rtw89: update DMA function with different generation (bsc#1227149). * wifi: rtw89: update ps_state register for chips with different generation (bsc#1227149). * wifi: rtw89: update scan C2H messages for wifi 7 IC (bsc#1227149). * wifi: rtw89: update suspend/resume for different generation (bsc#1227149). * wifi: rtw89: use PLCP information to match BSS_COLOR and AID (bsc#1227149). * wifi: rtw89: use chip_info::small_fifo_size to choose debug_mask (bsc#1227149). * wifi: rtw89: use flexible array member in rtw89_btc_btf_tlv (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits to access RX info (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits() to access RX descriptor (bsc#1227149). * wifi: rtw89: use struct and le32_get_bits() to access received PHY status IEs (bsc#1227149). * wifi: rtw89: use struct rtw89_phy_sts_ie0 instead of macro to access PHY IE0 status (bsc#1227149). * wifi: rtw89: use struct to access RA report (bsc#1227149). * wifi: rtw89: use struct to access firmware C2H event header (bsc#1227149). * wifi: rtw89: use struct to access register-based H2C/C2H (bsc#1227149). * wifi: rtw89: use struct to fill H2C command to download beacon frame (bsc#1227149). * wifi: rtw89: use struct to parse firmware header (bsc#1227149). * wifi: rtw89: use struct to set RA H2C command (bsc#1227149). * wifi: rtw89: wow: move release offload packet earlier for WoWLAN mode (bsc#1227149). * wifi: rtw89: wow: refine WoWLAN flows of HCI interrupts and low power mode (bsc#1227149). * wifi: rtw89: wow: set security engine options for 802.11ax chips only (bsc#1227149). * wifi: rtw89: wow: update WoWLAN reason register for different chips (bsc#1227149). * wifi: rtw89: wow: update WoWLAN status register for different generation (bsc#1227149). * wifi: rtw89: wow: update config mac function with different generation (bsc#1227149). * wifi: ti: wlcore: sdio: Drop unused include (bsc#1227149). * wifi: virt_wifi: avoid reporting connection success with wrong SSID (git- fixes). * wifi: virt_wifi: do not use strlen() in const context (git-fixes). * wifi: wcn36xx: Annotate struct wcn36xx_hal_ind_msg with __counted_by (bsc#1227149). * wifi: wcn36xx: Convert to platform remove callback returning void (bsc#1227149). * wifi: wcn36xx: remove unnecessary (void*) conversions (bsc#1227149). * wifi: wext: avoid extra calls to strlen() in ieee80211_bss() (bsc#1227149). * wifi: wfx: Use devm_kmemdup to replace devm_kmalloc + memcpy (bsc#1227149). * wifi: wfx: allow to send frames during ROC (bsc#1227149). * wifi: wfx: fix power_save setting when AP is stopped (bsc#1227149). * wifi: wfx: implement wfx_remain_on_channel() (bsc#1227149). * wifi: wfx: introduce hif_scan_uniq() (bsc#1227149). * wifi: wfx: move wfx_skb_*() out of the header file (bsc#1227149). * wifi: wfx: relocate wfx_rate_mask_to_hw() (bsc#1227149). * wifi: wfx: scan_lock is global to the device (bsc#1227149). * wifi: wfx: simplify exclusion between scan and Rx filters (bsc#1227149). * wifi: wil6210: fw: Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper (bsc#1227149). * wifi: wil6210: wmi: Replace zero-length array with DECLARE_FLEX_ARRAY() helper (bsc#1227149). * wifi: wilc1000: Increase ASSOC response buffer (bsc#1227149). * wifi: wilc1000: Remove unused declarations (bsc#1227149). * wifi: wilc1000: add SPI commands retry mechanism (bsc#1227149). * wifi: wilc1000: add back-off algorithm to balance tx queue packets (bsc#1227149). * wifi: wilc1000: add missing read critical sections around vif list traversal (bsc#1227149). * wifi: wilc1000: always release SDIO host in wilc_sdio_cmd53() (bsc#1227149). * wifi: wilc1000: cleanup struct wilc_conn_info (bsc#1227149). * wifi: wilc1000: correct CRC7 calculation (bsc#1227149). * wifi: wilc1000: fix declarations ordering (bsc#1227149). * wifi: wilc1000: fix driver_handler when committing initial configuration (bsc#1227149). * wifi: wilc1000: fix ies_len type in connect path (git-fixes). * wifi: wilc1000: fix incorrect power down sequence (bsc#1227149). * wifi: wilc1000: remove AKM suite be32 conversion for external auth request (bsc#1227149). * wifi: wilc1000: remove setting msg.spi (bsc#1227149). * wifi: wilc1000: remove use of has_thrpt_enh3 flag (bsc#1227149). * wifi: wilc1000: set preamble size to auto as default in wilc_init_fw_config() (bsc#1227149). * wifi: wilc1000: simplify remain on channel support (bsc#1227149). * wifi: wilc1000: simplify wilc_scan() (bsc#1227149). * wifi: wilc1000: split deeply nested RCU list traversal in dedicated helper (bsc#1227149). * wifi: wilc1000: use SRCU instead of RCU for vif list traversal (bsc#1227149). * wifi: wilc1000: validate chip id during bus probe (bsc#1227149). * wifi: wl1251: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wl18xx: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: boot: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: main: replace deprecated strncpy with strscpy (bsc#1227149). * wifi: wlcore: sdio: Rate limit wl12xx_sdio_raw_{read,write}() failures warns (bsc#1227149). * wifi: wlcore: sdio: Use module_sdio_driver macro to simplify the code (bsc#1227149). * wifi: zd1211rw: fix typo "tranmits" (bsc#1227149). * wifi: zd1211rw: remove __nocast from zd_addr_t (bsc#1227149). * wifi: zd1211rw: silence sparse warnings (bsc#1227149). * wireguard: netlink: access device through ctx instead of peer (git-fixes). * wireguard: netlink: check for dangling peer via is_dead instead of empty list (git-fixes). * wireguard: receive: annotate data-race around receiving_counter.counter (git-fixes). * wlcore: spi: Remove redundant of_match_ptr() (bsc#1227149). * work around gcc bugs with 'asm goto' with outputs (git-fixes). * x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes). * x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes). * x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes). * x86/amd_nb: Check for invalid SMN reads (git-fixes). * x86/apic: Force native_apic_mem_read() to use the MOV instruction (git- fixes). * x86/asm: Fix build of UML with KASAN (git-fixes). * x86/asm: Remove the __iomem annotation of movdir64b()'s dst argument (git- fixes). * x86/bhi: Avoid warning in #DB handler due to BHI mitigation :(git-fixes). * x86/boot: Ignore NMIs during very early boot (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes). * x86/bugs: Remove default case for fully switched enums (git-fixes). * x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git- fixes). * x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes). * x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes). * x86/cpu: Provide default cache line size if not enumerated (git-fixes). * x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git- fixes). * x86/csum: Fix clang -Wuninitialized in csum_partial() (git-fixes). * x86/csum: Improve performance of `csum_partial` (git-fixes). * x86/csum: Remove unnecessary odd handling (git-fixes). * x86/csum: clean up `csum_partial' further (git-fixes). * x86/efistub: Add missing boot_params for mixed mode compat entry (git- fixes). * x86/efistub: Call mixed mode boot services on the firmware's stack (git- fixes). * x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes). * x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes). * x86/head/64: Move the __head definition to <asm/init.h> (git-fixes). * x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes). * x86/hyperv: Use per cpu initial stack for vtl context (git-fixes). * x86/insn: Add VEX versions of VPDPBUSD, VPDPBUSDS, VPDPWSSD and VPDPWSSDS (git-fixes). * x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git- fixes). * x86/kconfig: Add as-instr64 macro to properly evaluate AS_WRUSS (git-fixes). * x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when UNWINDER_FRAME_POINTER=y (git-fixes). * x86/kexec: Fix bug with call depth tracking (git-fixes). * x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes). * x86/mce: Dynamically size space for machine check records (bsc#1222241). * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes). * x86/mce: Mark fatal MCE's page as poison to avoid panic in the kdump kernel (git-fixes). * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes). * x86/nmi: Fix the inverse "in NMI handler" check (git-fixes). * x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes). * x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes). * x86/purgatory: Switch to the position-independent small code model (git- fixes). * x86/resctrl: Read supported bandwidth sources from CPUID (git-fixes). * x86/resctrl: Remove redundant variable in mbm_config_write_domain() (git- fixes). * x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes). * x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git- fixes). * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes). * x86/sev: Fix position dependent variable references in startup code (git- fixes). * x86/shstk: Make return uprobe work with shadow stack (git-fixes). * x86/speculation, objtool: Use absolute relocations for annotations (git- fixes). * x86/srso: Disentangle rethunk-dependent options (git-fixes). * x86/srso: Fix unret validation dependencies (git-fixes). * x86/srso: Improve i-cache locality for alias mitigation (git-fixes). * x86/srso: Print actual mitigation if requested mitigation isn't possible (git-fixes). * x86/srso: Remove 'pred_cmd' label (git-fixes). * x86/srso: Unexport untraining functions (git-fixes). * x86/tdx: Preserve shared bit on mprotect() (git-fixes). * x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962). * x86/uaccess: Fix missed zeroing of ia32 u64 get_user() range checking (git- fixes). * x86/xen: Add some null pointer checking to smp.c (git-fixes). * x86/xen: attempt to inflate the memory balloon on PVH (git-fixes). * x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502) * xdp, bonding: Fix feature flags when there are no slave devs anymore (git- fixes). * xen-netfront: Add missing skb_mark_for_recycle (git-fixes). * xen/events: drop xen_allocate_irqs_dynamic() (git-fixes). * xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes). * xen/events: increment refcnt only if event channel is refcounted (git- fixes). * xen/events: modify internal [un]bind interfaces (git-fixes). * xen/events: reduce externally visible helper functions (git-fixes). * xen/events: remove some simple helpers from events_base.c (git-fixes). * xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes). * xen/x86: add extra pages to unpopulated-alloc if available (git-fixes). * xen: evtchn: Allow shared registration of IRQ handers (git-fixes). * xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228211). * xfs: add lock protection when remove perag from radix tree (git-fixes). * xfs: allow extent free intents to be retried (git-fixes). * xfs: fix perag leak when growfs fails (git-fixes). * xfs: force all buffers to be written during btree bulk load (git-fixes). * xfs: make xchk_iget safer in the presence of corrupt inode btrees (git- fixes). * xfs: pass the xfs_defer_pending object to iop_recover (git-fixes). * xfs: recompute growfsrtfree transaction reservation while growing rt volume (git-fixes). * xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes). * xfs: use roundup_pow_of_two instead of ffs during xlog_find_tail (git- fixes). * xfs: use xfs_defer_pending objects to recover intent items (git-fixes). * xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes). * xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes). * xhci: Handle TD clearing for multiple streams case (git-fixes). * xhci: Set correct transferred length for cancelled bulk transfers (stable- fixes). * xhci: Simplify event ring dequeue pointer update for port change events (git-fixes). * xhci: add helper that checks for unhandled events on a event ring (git- fixes). * xhci: always resume roothubs if xHC was reset during resume (stable-fixes). * xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event() (git-fixes). * xhci: simplify event ring dequeue tracking for transfer events (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-14=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-14=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-macros-6.4.0-18.1 * kernel-devel-6.4.0-18.1 * kernel-source-6.4.0-18.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-18.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debuginfo-6.4.0-18.1 * kernel-default-debugsource-6.4.0-18.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-default-livepatch-6.4.0-18.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-18.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-18.1 * kernel-kvmsmall-debugsource-6.4.0-18.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-17.1.1.51 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-18.1 * kernel-default-6.4.0-18.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-18.1 * kernel-64kb-devel-6.4.0-18.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-syms-6.4.0-18.1 * kernel-default-debugsource-6.4.0-18.1 * kernel-obs-build-6.4.0-18.1 * kernel-default-devel-6.4.0-18.1 * kernel-obs-build-debugsource-6.4.0-18.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-18.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47432.html * https://www.suse.com/security/cve/CVE-2022-48669.html * https://www.suse.com/security/cve/CVE-2022-48772.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-38417.html * https://www.suse.com/security/cve/CVE-2023-47210.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-52434.html * https://www.suse.com/security/cve/CVE-2023-52435.html * https://www.suse.com/security/cve/CVE-2023-52458.html * https://www.suse.com/security/cve/CVE-2023-52472.html * https://www.suse.com/security/cve/CVE-2023-52483.html * https://www.suse.com/security/cve/CVE-2023-52503.html * https://www.suse.com/security/cve/CVE-2023-52616.html * https://www.suse.com/security/cve/CVE-2023-52618.html * https://www.suse.com/security/cve/CVE-2023-52622.html * https://www.suse.com/security/cve/CVE-2023-52631.html * https://www.suse.com/security/cve/CVE-2023-52635.html * https://www.suse.com/security/cve/CVE-2023-52640.html * https://www.suse.com/security/cve/CVE-2023-52641.html * https://www.suse.com/security/cve/CVE-2023-52645.html * https://www.suse.com/security/cve/CVE-2023-52647.html * https://www.suse.com/security/cve/CVE-2023-52648.html * https://www.suse.com/security/cve/CVE-2023-52649.html * https://www.suse.com/security/cve/CVE-2023-52650.html * https://www.suse.com/security/cve/CVE-2023-52652.html * https://www.suse.com/security/cve/CVE-2023-52653.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52656.html * https://www.suse.com/security/cve/CVE-2023-52657.html * https://www.suse.com/security/cve/CVE-2023-52658.html * https://www.suse.com/security/cve/CVE-2023-52659.html * https://www.suse.com/security/cve/CVE-2023-52660.html * https://www.suse.com/security/cve/CVE-2023-52661.html * https://www.suse.com/security/cve/CVE-2023-52662.html * https://www.suse.com/security/cve/CVE-2023-52663.html * https://www.suse.com/security/cve/CVE-2023-52664.html * https://www.suse.com/security/cve/CVE-2023-52667.html * https://www.suse.com/security/cve/CVE-2023-52669.html * https://www.suse.com/security/cve/CVE-2023-52670.html * https://www.suse.com/security/cve/CVE-2023-52671.html * https://www.suse.com/security/cve/CVE-2023-52672.html * https://www.suse.com/security/cve/CVE-2023-52673.html * https://www.suse.com/security/cve/CVE-2023-52674.html * https://www.suse.com/security/cve/CVE-2023-52675.html * https://www.suse.com/security/cve/CVE-2023-52676.html * https://www.suse.com/security/cve/CVE-2023-52678.html * https://www.suse.com/security/cve/CVE-2023-52679.html * https://www.suse.com/security/cve/CVE-2023-52680.html * https://www.suse.com/security/cve/CVE-2023-52681.html * https://www.suse.com/security/cve/CVE-2023-52683.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52687.html * https://www.suse.com/security/cve/CVE-2023-52690.html * https://www.suse.com/security/cve/CVE-2023-52691.html * https://www.suse.com/security/cve/CVE-2023-52692.html * https://www.suse.com/security/cve/CVE-2023-52693.html * https://www.suse.com/security/cve/CVE-2023-52694.html * https://www.suse.com/security/cve/CVE-2023-52695.html * https://www.suse.com/security/cve/CVE-2023-52696.html * https://www.suse.com/security/cve/CVE-2023-52697.html * https://www.suse.com/security/cve/CVE-2023-52698.html * https://www.suse.com/security/cve/CVE-2023-52699.html * https://www.suse.com/security/cve/CVE-2023-52735.html * https://www.suse.com/security/cve/CVE-2023-52749.html * https://www.suse.com/security/cve/CVE-2023-52750.html * https://www.suse.com/security/cve/CVE-2023-52751.html * https://www.suse.com/security/cve/CVE-2023-52753.html * https://www.suse.com/security/cve/CVE-2023-52754.html * https://www.suse.com/security/cve/CVE-2023-52757.html * https://www.suse.com/security/cve/CVE-2023-52759.html * https://www.suse.com/security/cve/CVE-2023-52762.html * https://www.suse.com/security/cve/CVE-2023-52763.html * https://www.suse.com/security/cve/CVE-2023-52764.html * https://www.suse.com/security/cve/CVE-2023-52765.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52767.html * https://www.suse.com/security/cve/CVE-2023-52768.html * https://www.suse.com/security/cve/CVE-2023-52769.html * https://www.suse.com/security/cve/CVE-2023-52771.html * https://www.suse.com/security/cve/CVE-2023-52772.html * https://www.suse.com/security/cve/CVE-2023-52773.html * https://www.suse.com/security/cve/CVE-2023-52774.html * https://www.suse.com/security/cve/CVE-2023-52775.html * https://www.suse.com/security/cve/CVE-2023-52776.html * https://www.suse.com/security/cve/CVE-2023-52777.html * https://www.suse.com/security/cve/CVE-2023-52780.html * https://www.suse.com/security/cve/CVE-2023-52781.html * https://www.suse.com/security/cve/CVE-2023-52782.html * https://www.suse.com/security/cve/CVE-2023-52783.html * https://www.suse.com/security/cve/CVE-2023-52784.html * https://www.suse.com/security/cve/CVE-2023-52786.html * https://www.suse.com/security/cve/CVE-2023-52787.html * https://www.suse.com/security/cve/CVE-2023-52788.html * https://www.suse.com/security/cve/CVE-2023-52789.html * https://www.suse.com/security/cve/CVE-2023-52791.html * https://www.suse.com/security/cve/CVE-2023-52792.html * https://www.suse.com/security/cve/CVE-2023-52794.html * https://www.suse.com/security/cve/CVE-2023-52795.html * https://www.suse.com/security/cve/CVE-2023-52796.html * https://www.suse.com/security/cve/CVE-2023-52798.html * https://www.suse.com/security/cve/CVE-2023-52799.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52801.html * https://www.suse.com/security/cve/CVE-2023-52803.html * https://www.suse.com/security/cve/CVE-2023-52804.html * https://www.suse.com/security/cve/CVE-2023-52805.html * https://www.suse.com/security/cve/CVE-2023-52806.html * https://www.suse.com/security/cve/CVE-2023-52807.html * https://www.suse.com/security/cve/CVE-2023-52808.html * https://www.suse.com/security/cve/CVE-2023-52809.html * https://www.suse.com/security/cve/CVE-2023-52810.html * https://www.suse.com/security/cve/CVE-2023-52811.html * https://www.suse.com/security/cve/CVE-2023-52812.html * https://www.suse.com/security/cve/CVE-2023-52813.html * https://www.suse.com/security/cve/CVE-2023-52814.html * https://www.suse.com/security/cve/CVE-2023-52815.html * https://www.suse.com/security/cve/CVE-2023-52816.html * https://www.suse.com/security/cve/CVE-2023-52817.html * https://www.suse.com/security/cve/CVE-2023-52818.html * https://www.suse.com/security/cve/CVE-2023-52819.html * https://www.suse.com/security/cve/CVE-2023-52821.html * https://www.suse.com/security/cve/CVE-2023-52825.html * https://www.suse.com/security/cve/CVE-2023-52826.html * https://www.suse.com/security/cve/CVE-2023-52827.html * https://www.suse.com/security/cve/CVE-2023-52829.html * https://www.suse.com/security/cve/CVE-2023-52832.html * https://www.suse.com/security/cve/CVE-2023-52833.html * https://www.suse.com/security/cve/CVE-2023-52834.html * https://www.suse.com/security/cve/CVE-2023-52835.html * https://www.suse.com/security/cve/CVE-2023-52836.html * https://www.suse.com/security/cve/CVE-2023-52837.html * https://www.suse.com/security/cve/CVE-2023-52838.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52841.html * https://www.suse.com/security/cve/CVE-2023-52842.html * https://www.suse.com/security/cve/CVE-2023-52843.html * https://www.suse.com/security/cve/CVE-2023-52844.html * https://www.suse.com/security/cve/CVE-2023-52845.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-52847.html * https://www.suse.com/security/cve/CVE-2023-52849.html * https://www.suse.com/security/cve/CVE-2023-52850.html * https://www.suse.com/security/cve/CVE-2023-52851.html * https://www.suse.com/security/cve/CVE-2023-52853.html * https://www.suse.com/security/cve/CVE-2023-52854.html * https://www.suse.com/security/cve/CVE-2023-52855.html * https://www.suse.com/security/cve/CVE-2023-52856.html * https://www.suse.com/security/cve/CVE-2023-52857.html * https://www.suse.com/security/cve/CVE-2023-52858.html * https://www.suse.com/security/cve/CVE-2023-52860.html * https://www.suse.com/security/cve/CVE-2023-52861.html * https://www.suse.com/security/cve/CVE-2023-52862.html * https://www.suse.com/security/cve/CVE-2023-52863.html * https://www.suse.com/security/cve/CVE-2023-52864.html * https://www.suse.com/security/cve/CVE-2023-52865.html * https://www.suse.com/security/cve/CVE-2023-52866.html * https://www.suse.com/security/cve/CVE-2023-52867.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52869.html * https://www.suse.com/security/cve/CVE-2023-52870.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52872.html * https://www.suse.com/security/cve/CVE-2023-52873.html * https://www.suse.com/security/cve/CVE-2023-52874.html * https://www.suse.com/security/cve/CVE-2023-52875.html * https://www.suse.com/security/cve/CVE-2023-52876.html * https://www.suse.com/security/cve/CVE-2023-52877.html * https://www.suse.com/security/cve/CVE-2023-52878.html * https://www.suse.com/security/cve/CVE-2023-52879.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52882.html * https://www.suse.com/security/cve/CVE-2023-52883.html * https://www.suse.com/security/cve/CVE-2023-52884.html * https://www.suse.com/security/cve/CVE-2023-6238.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2024-0639.html * https://www.suse.com/security/cve/CVE-2024-21823.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-24861.html * https://www.suse.com/security/cve/CVE-2024-25739.html * https://www.suse.com/security/cve/CVE-2024-25741.html * https://www.suse.com/security/cve/CVE-2024-26601.html * https://www.suse.com/security/cve/CVE-2024-26611.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26615.html * https://www.suse.com/security/cve/CVE-2024-26623.html * https://www.suse.com/security/cve/CVE-2024-26625.html * https://www.suse.com/security/cve/CVE-2024-26632.html * https://www.suse.com/security/cve/CVE-2024-26633.html * https://www.suse.com/security/cve/CVE-2024-26635.html * https://www.suse.com/security/cve/CVE-2024-26636.html * https://www.suse.com/security/cve/CVE-2024-26638.html * https://www.suse.com/security/cve/CVE-2024-26641.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26654.html * https://www.suse.com/security/cve/CVE-2024-26656.html * https://www.suse.com/security/cve/CVE-2024-26657.html * https://www.suse.com/security/cve/CVE-2024-26663.html * https://www.suse.com/security/cve/CVE-2024-26665.html * https://www.suse.com/security/cve/CVE-2024-26671.html * https://www.suse.com/security/cve/CVE-2024-26673.html * https://www.suse.com/security/cve/CVE-2024-26674.html * https://www.suse.com/security/cve/CVE-2024-26676.html * https://www.suse.com/security/cve/CVE-2024-26679.html * https://www.suse.com/security/cve/CVE-2024-26684.html * https://www.suse.com/security/cve/CVE-2024-26685.html * https://www.suse.com/security/cve/CVE-2024-26691.html * https://www.suse.com/security/cve/CVE-2024-26692.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26714.html * https://www.suse.com/security/cve/CVE-2024-26726.html * https://www.suse.com/security/cve/CVE-2024-26731.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://www.suse.com/security/cve/CVE-2024-26734.html * https://www.suse.com/security/cve/CVE-2024-26737.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26740.html * https://www.suse.com/security/cve/CVE-2024-26742.html * https://www.suse.com/security/cve/CVE-2024-26750.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26760.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26769.html * https://www.suse.com/security/cve/CVE-2024-26772.html * https://www.suse.com/security/cve/CVE-2024-26773.html * https://www.suse.com/security/cve/CVE-2024-26774.html * https://www.suse.com/security/cve/CVE-2024-26775.html * https://www.suse.com/security/cve/CVE-2024-26780.html * https://www.suse.com/security/cve/CVE-2024-26783.html * https://www.suse.com/security/cve/CVE-2024-26785.html * https://www.suse.com/security/cve/CVE-2024-26786.html * https://www.suse.com/security/cve/CVE-2024-26791.html * https://www.suse.com/security/cve/CVE-2024-26793.html * https://www.suse.com/security/cve/CVE-2024-26794.html * https://www.suse.com/security/cve/CVE-2024-26802.html * https://www.suse.com/security/cve/CVE-2024-26805.html * https://www.suse.com/security/cve/CVE-2024-26807.html * https://www.suse.com/security/cve/CVE-2024-26813.html * https://www.suse.com/security/cve/CVE-2024-26814.html * https://www.suse.com/security/cve/CVE-2024-26815.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26822.html * https://www.suse.com/security/cve/CVE-2024-26826.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26832.html * https://www.suse.com/security/cve/CVE-2024-26836.html * https://www.suse.com/security/cve/CVE-2024-26844.html * https://www.suse.com/security/cve/CVE-2024-26845.html * https://www.suse.com/security/cve/CVE-2024-26846.html * https://www.suse.com/security/cve/CVE-2024-26853.html * https://www.suse.com/security/cve/CVE-2024-26854.html * https://www.suse.com/security/cve/CVE-2024-26855.html * https://www.suse.com/security/cve/CVE-2024-26856.html * https://www.suse.com/security/cve/CVE-2024-26857.html * https://www.suse.com/security/cve/CVE-2024-26858.html * https://www.suse.com/security/cve/CVE-2024-26860.html * https://www.suse.com/security/cve/CVE-2024-26861.html * https://www.suse.com/security/cve/CVE-2024-26862.html * https://www.suse.com/security/cve/CVE-2024-26863.html * https://www.suse.com/security/cve/CVE-2024-26865.html * https://www.suse.com/security/cve/CVE-2024-26866.html * https://www.suse.com/security/cve/CVE-2024-26868.html * https://www.suse.com/security/cve/CVE-2024-26870.html * https://www.suse.com/security/cve/CVE-2024-26878.html * https://www.suse.com/security/cve/CVE-2024-26881.html * https://www.suse.com/security/cve/CVE-2024-26882.html * https://www.suse.com/security/cve/CVE-2024-26883.html * https://www.suse.com/security/cve/CVE-2024-26884.html * https://www.suse.com/security/cve/CVE-2024-26885.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26899.html * https://www.suse.com/security/cve/CVE-2024-26900.html * https://www.suse.com/security/cve/CVE-2024-26901.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26909.html * https://www.suse.com/security/cve/CVE-2024-26919.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26922.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26928.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-26931.html * https://www.suse.com/security/cve/CVE-2024-26932.html * https://www.suse.com/security/cve/CVE-2024-26933.html * https://www.suse.com/security/cve/CVE-2024-26934.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-26937.html * https://www.suse.com/security/cve/CVE-2024-26938.html * https://www.suse.com/security/cve/CVE-2024-26939.html * https://www.suse.com/security/cve/CVE-2024-26940.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26944.html * https://www.suse.com/security/cve/CVE-2024-26945.html * https://www.suse.com/security/cve/CVE-2024-26946.html * https://www.suse.com/security/cve/CVE-2024-26948.html * https://www.suse.com/security/cve/CVE-2024-26949.html * https://www.suse.com/security/cve/CVE-2024-26950.html * https://www.suse.com/security/cve/CVE-2024-26951.html * https://www.suse.com/security/cve/CVE-2024-26955.html * https://www.suse.com/security/cve/CVE-2024-26956.html * https://www.suse.com/security/cve/CVE-2024-26957.html * https://www.suse.com/security/cve/CVE-2024-26958.html * https://www.suse.com/security/cve/CVE-2024-26959.html * https://www.suse.com/security/cve/CVE-2024-26960.html * https://www.suse.com/security/cve/CVE-2024-26961.html * https://www.suse.com/security/cve/CVE-2024-26962.html * https://www.suse.com/security/cve/CVE-2024-26963.html * https://www.suse.com/security/cve/CVE-2024-26964.html * https://www.suse.com/security/cve/CVE-2024-26965.html * https://www.suse.com/security/cve/CVE-2024-26966.html * https://www.suse.com/security/cve/CVE-2024-26968.html * https://www.suse.com/security/cve/CVE-2024-26969.html * https://www.suse.com/security/cve/CVE-2024-26970.html * https://www.suse.com/security/cve/CVE-2024-26972.html * https://www.suse.com/security/cve/CVE-2024-26973.html * https://www.suse.com/security/cve/CVE-2024-26974.html * https://www.suse.com/security/cve/CVE-2024-26975.html * https://www.suse.com/security/cve/CVE-2024-26977.html * https://www.suse.com/security/cve/CVE-2024-26978.html * https://www.suse.com/security/cve/CVE-2024-26981.html * https://www.suse.com/security/cve/CVE-2024-26982.html * https://www.suse.com/security/cve/CVE-2024-26983.html * https://www.suse.com/security/cve/CVE-2024-26984.html * https://www.suse.com/security/cve/CVE-2024-26986.html * https://www.suse.com/security/cve/CVE-2024-26988.html * https://www.suse.com/security/cve/CVE-2024-26989.html * https://www.suse.com/security/cve/CVE-2024-26990.html * https://www.suse.com/security/cve/CVE-2024-26991.html * https://www.suse.com/security/cve/CVE-2024-26992.html * https://www.suse.com/security/cve/CVE-2024-26993.html * https://www.suse.com/security/cve/CVE-2024-26994.html * https://www.suse.com/security/cve/CVE-2024-26995.html * https://www.suse.com/security/cve/CVE-2024-26996.html * https://www.suse.com/security/cve/CVE-2024-26997.html * https://www.suse.com/security/cve/CVE-2024-26999.html * https://www.suse.com/security/cve/CVE-2024-27000.html * https://www.suse.com/security/cve/CVE-2024-27001.html * https://www.suse.com/security/cve/CVE-2024-27002.html * https://www.suse.com/security/cve/CVE-2024-27003.html * https://www.suse.com/security/cve/CVE-2024-27004.html * https://www.suse.com/security/cve/CVE-2024-27008.html * https://www.suse.com/security/cve/CVE-2024-27009.html * https://www.suse.com/security/cve/CVE-2024-27012.html * https://www.suse.com/security/cve/CVE-2024-27013.html * https://www.suse.com/security/cve/CVE-2024-27014.html * https://www.suse.com/security/cve/CVE-2024-27015.html * https://www.suse.com/security/cve/CVE-2024-27016.html * https://www.suse.com/security/cve/CVE-2024-27019.html * https://www.suse.com/security/cve/CVE-2024-27020.html * https://www.suse.com/security/cve/CVE-2024-27022.html * https://www.suse.com/security/cve/CVE-2024-27023.html * https://www.suse.com/security/cve/CVE-2024-27025.html * https://www.suse.com/security/cve/CVE-2024-27027.html * https://www.suse.com/security/cve/CVE-2024-27028.html * https://www.suse.com/security/cve/CVE-2024-27029.html * https://www.suse.com/security/cve/CVE-2024-27030.html * https://www.suse.com/security/cve/CVE-2024-27031.html * https://www.suse.com/security/cve/CVE-2024-27036.html * https://www.suse.com/security/cve/CVE-2024-27037.html * https://www.suse.com/security/cve/CVE-2024-27038.html * https://www.suse.com/security/cve/CVE-2024-27039.html * https://www.suse.com/security/cve/CVE-2024-27040.html * https://www.suse.com/security/cve/CVE-2024-27041.html * https://www.suse.com/security/cve/CVE-2024-27042.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27044.html * https://www.suse.com/security/cve/CVE-2024-27045.html * https://www.suse.com/security/cve/CVE-2024-27046.html * https://www.suse.com/security/cve/CVE-2024-27047.html * https://www.suse.com/security/cve/CVE-2024-27048.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-27052.html * https://www.suse.com/security/cve/CVE-2024-27053.html * https://www.suse.com/security/cve/CVE-2024-27054.html * https://www.suse.com/security/cve/CVE-2024-27056.html * https://www.suse.com/security/cve/CVE-2024-27057.html * https://www.suse.com/security/cve/CVE-2024-27059.html * https://www.suse.com/security/cve/CVE-2024-27060.html * https://www.suse.com/security/cve/CVE-2024-27062.html * https://www.suse.com/security/cve/CVE-2024-27064.html * https://www.suse.com/security/cve/CVE-2024-27065.html * https://www.suse.com/security/cve/CVE-2024-27067.html * https://www.suse.com/security/cve/CVE-2024-27068.html * https://www.suse.com/security/cve/CVE-2024-27071.html * https://www.suse.com/security/cve/CVE-2024-27072.html * https://www.suse.com/security/cve/CVE-2024-27073.html * https://www.suse.com/security/cve/CVE-2024-27074.html * https://www.suse.com/security/cve/CVE-2024-27075.html * https://www.suse.com/security/cve/CVE-2024-27076.html * https://www.suse.com/security/cve/CVE-2024-27077.html * https://www.suse.com/security/cve/CVE-2024-27078.html * https://www.suse.com/security/cve/CVE-2024-27080.html * https://www.suse.com/security/cve/CVE-2024-27388.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://www.suse.com/security/cve/CVE-2024-27391.html * https://www.suse.com/security/cve/CVE-2024-27393.html * https://www.suse.com/security/cve/CVE-2024-27395.html * https://www.suse.com/security/cve/CVE-2024-27396.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27399.html * https://www.suse.com/security/cve/CVE-2024-27400.html * https://www.suse.com/security/cve/CVE-2024-27401.html * https://www.suse.com/security/cve/CVE-2024-27402.html * https://www.suse.com/security/cve/CVE-2024-27404.html * https://www.suse.com/security/cve/CVE-2024-27405.html * https://www.suse.com/security/cve/CVE-2024-27408.html * https://www.suse.com/security/cve/CVE-2024-27410.html * https://www.suse.com/security/cve/CVE-2024-27411.html * https://www.suse.com/security/cve/CVE-2024-27412.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-27414.html * https://www.suse.com/security/cve/CVE-2024-27416.html * https://www.suse.com/security/cve/CVE-2024-27417.html * https://www.suse.com/security/cve/CVE-2024-27418.html * https://www.suse.com/security/cve/CVE-2024-27419.html * https://www.suse.com/security/cve/CVE-2024-27431.html * https://www.suse.com/security/cve/CVE-2024-27432.html * https://www.suse.com/security/cve/CVE-2024-27434.html * https://www.suse.com/security/cve/CVE-2024-27435.html * https://www.suse.com/security/cve/CVE-2024-27436.html * https://www.suse.com/security/cve/CVE-2024-33619.html * https://www.suse.com/security/cve/CVE-2024-34777.html * https://www.suse.com/security/cve/CVE-2024-35247.html * https://www.suse.com/security/cve/CVE-2024-35784.html * https://www.suse.com/security/cve/CVE-2024-35786.html * https://www.suse.com/security/cve/CVE-2024-35788.html * https://www.suse.com/security/cve/CVE-2024-35789.html * https://www.suse.com/security/cve/CVE-2024-35790.html * https://www.suse.com/security/cve/CVE-2024-35791.html * https://www.suse.com/security/cve/CVE-2024-35794.html * https://www.suse.com/security/cve/CVE-2024-35795.html * https://www.suse.com/security/cve/CVE-2024-35796.html * https://www.suse.com/security/cve/CVE-2024-35799.html * https://www.suse.com/security/cve/CVE-2024-35800.html * https://www.suse.com/security/cve/CVE-2024-35801.html * https://www.suse.com/security/cve/CVE-2024-35803.html * https://www.suse.com/security/cve/CVE-2024-35804.html * https://www.suse.com/security/cve/CVE-2024-35805.html * https://www.suse.com/security/cve/CVE-2024-35806.html * https://www.suse.com/security/cve/CVE-2024-35807.html * https://www.suse.com/security/cve/CVE-2024-35808.html * https://www.suse.com/security/cve/CVE-2024-35809.html * https://www.suse.com/security/cve/CVE-2024-35810.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35812.html * https://www.suse.com/security/cve/CVE-2024-35813.html * https://www.suse.com/security/cve/CVE-2024-35814.html * https://www.suse.com/security/cve/CVE-2024-35815.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35819.html * https://www.suse.com/security/cve/CVE-2024-35821.html * https://www.suse.com/security/cve/CVE-2024-35822.html * https://www.suse.com/security/cve/CVE-2024-35823.html * https://www.suse.com/security/cve/CVE-2024-35824.html * https://www.suse.com/security/cve/CVE-2024-35825.html * https://www.suse.com/security/cve/CVE-2024-35827.html * https://www.suse.com/security/cve/CVE-2024-35828.html * https://www.suse.com/security/cve/CVE-2024-35829.html * https://www.suse.com/security/cve/CVE-2024-35830.html * https://www.suse.com/security/cve/CVE-2024-35831.html * https://www.suse.com/security/cve/CVE-2024-35833.html * https://www.suse.com/security/cve/CVE-2024-35834.html * https://www.suse.com/security/cve/CVE-2024-35835.html * https://www.suse.com/security/cve/CVE-2024-35836.html * https://www.suse.com/security/cve/CVE-2024-35837.html * https://www.suse.com/security/cve/CVE-2024-35838.html * https://www.suse.com/security/cve/CVE-2024-35841.html * https://www.suse.com/security/cve/CVE-2024-35842.html * https://www.suse.com/security/cve/CVE-2024-35843.html * https://www.suse.com/security/cve/CVE-2024-35845.html * https://www.suse.com/security/cve/CVE-2024-35847.html * https://www.suse.com/security/cve/CVE-2024-35848.html * https://www.suse.com/security/cve/CVE-2024-35849.html * https://www.suse.com/security/cve/CVE-2024-35850.html * https://www.suse.com/security/cve/CVE-2024-35851.html * https://www.suse.com/security/cve/CVE-2024-35852.html * https://www.suse.com/security/cve/CVE-2024-35853.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35857.html * https://www.suse.com/security/cve/CVE-2024-35860.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35865.html * https://www.suse.com/security/cve/CVE-2024-35866.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35868.html * https://www.suse.com/security/cve/CVE-2024-35869.html * https://www.suse.com/security/cve/CVE-2024-35870.html * https://www.suse.com/security/cve/CVE-2024-35872.html * https://www.suse.com/security/cve/CVE-2024-35875.html * https://www.suse.com/security/cve/CVE-2024-35877.html * https://www.suse.com/security/cve/CVE-2024-35878.html * https://www.suse.com/security/cve/CVE-2024-35879.html * https://www.suse.com/security/cve/CVE-2024-35880.html * https://www.suse.com/security/cve/CVE-2024-35883.html * https://www.suse.com/security/cve/CVE-2024-35884.html * https://www.suse.com/security/cve/CVE-2024-35885.html * https://www.suse.com/security/cve/CVE-2024-35886.html * https://www.suse.com/security/cve/CVE-2024-35887.html * https://www.suse.com/security/cve/CVE-2024-35889.html * https://www.suse.com/security/cve/CVE-2024-35890.html * https://www.suse.com/security/cve/CVE-2024-35891.html * https://www.suse.com/security/cve/CVE-2024-35892.html * https://www.suse.com/security/cve/CVE-2024-35893.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35896.html * https://www.suse.com/security/cve/CVE-2024-35898.html * https://www.suse.com/security/cve/CVE-2024-35899.html * https://www.suse.com/security/cve/CVE-2024-35900.html * https://www.suse.com/security/cve/CVE-2024-35901.html * https://www.suse.com/security/cve/CVE-2024-35903.html * https://www.suse.com/security/cve/CVE-2024-35904.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35907.html * https://www.suse.com/security/cve/CVE-2024-35908.html * https://www.suse.com/security/cve/CVE-2024-35909.html * https://www.suse.com/security/cve/CVE-2024-35911.html * https://www.suse.com/security/cve/CVE-2024-35912.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-35915.html * https://www.suse.com/security/cve/CVE-2024-35916.html * https://www.suse.com/security/cve/CVE-2024-35917.html * https://www.suse.com/security/cve/CVE-2024-35921.html * https://www.suse.com/security/cve/CVE-2024-35922.html * https://www.suse.com/security/cve/CVE-2024-35924.html * https://www.suse.com/security/cve/CVE-2024-35925.html * https://www.suse.com/security/cve/CVE-2024-35926.html * https://www.suse.com/security/cve/CVE-2024-35927.html * https://www.suse.com/security/cve/CVE-2024-35928.html * https://www.suse.com/security/cve/CVE-2024-35930.html * https://www.suse.com/security/cve/CVE-2024-35931.html * https://www.suse.com/security/cve/CVE-2024-35932.html * https://www.suse.com/security/cve/CVE-2024-35933.html * https://www.suse.com/security/cve/CVE-2024-35934.html * https://www.suse.com/security/cve/CVE-2024-35935.html * https://www.suse.com/security/cve/CVE-2024-35936.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35938.html * https://www.suse.com/security/cve/CVE-2024-35940.html * https://www.suse.com/security/cve/CVE-2024-35942.html * https://www.suse.com/security/cve/CVE-2024-35943.html * https://www.suse.com/security/cve/CVE-2024-35944.html * https://www.suse.com/security/cve/CVE-2024-35945.html * https://www.suse.com/security/cve/CVE-2024-35946.html * https://www.suse.com/security/cve/CVE-2024-35947.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-35951.html * https://www.suse.com/security/cve/CVE-2024-35952.html * https://www.suse.com/security/cve/CVE-2024-35953.html * https://www.suse.com/security/cve/CVE-2024-35954.html * https://www.suse.com/security/cve/CVE-2024-35955.html * https://www.suse.com/security/cve/CVE-2024-35956.html * https://www.suse.com/security/cve/CVE-2024-35957.html * https://www.suse.com/security/cve/CVE-2024-35958.html * https://www.suse.com/security/cve/CVE-2024-35959.html * https://www.suse.com/security/cve/CVE-2024-35960.html * https://www.suse.com/security/cve/CVE-2024-35961.html * https://www.suse.com/security/cve/CVE-2024-35962.html * https://www.suse.com/security/cve/CVE-2024-35963.html * https://www.suse.com/security/cve/CVE-2024-35964.html * https://www.suse.com/security/cve/CVE-2024-35965.html * https://www.suse.com/security/cve/CVE-2024-35966.html * https://www.suse.com/security/cve/CVE-2024-35967.html * https://www.suse.com/security/cve/CVE-2024-35969.html * https://www.suse.com/security/cve/CVE-2024-35970.html * https://www.suse.com/security/cve/CVE-2024-35971.html * https://www.suse.com/security/cve/CVE-2024-35972.html * https://www.suse.com/security/cve/CVE-2024-35973.html * https://www.suse.com/security/cve/CVE-2024-35974.html * https://www.suse.com/security/cve/CVE-2024-35975.html * https://www.suse.com/security/cve/CVE-2024-35976.html * https://www.suse.com/security/cve/CVE-2024-35977.html * https://www.suse.com/security/cve/CVE-2024-35978.html * https://www.suse.com/security/cve/CVE-2024-35979.html * https://www.suse.com/security/cve/CVE-2024-35981.html * https://www.suse.com/security/cve/CVE-2024-35982.html * https://www.suse.com/security/cve/CVE-2024-35984.html * https://www.suse.com/security/cve/CVE-2024-35986.html * https://www.suse.com/security/cve/CVE-2024-35989.html * https://www.suse.com/security/cve/CVE-2024-35990.html * https://www.suse.com/security/cve/CVE-2024-35991.html * https://www.suse.com/security/cve/CVE-2024-35992.html * https://www.suse.com/security/cve/CVE-2024-35995.html * https://www.suse.com/security/cve/CVE-2024-35997.html * https://www.suse.com/security/cve/CVE-2024-35998.html * https://www.suse.com/security/cve/CVE-2024-35999.html * https://www.suse.com/security/cve/CVE-2024-36002.html * https://www.suse.com/security/cve/CVE-2024-36003.html * https://www.suse.com/security/cve/CVE-2024-36004.html * https://www.suse.com/security/cve/CVE-2024-36005.html * https://www.suse.com/security/cve/CVE-2024-36006.html * https://www.suse.com/security/cve/CVE-2024-36007.html * https://www.suse.com/security/cve/CVE-2024-36008.html * https://www.suse.com/security/cve/CVE-2024-36009.html * https://www.suse.com/security/cve/CVE-2024-36010.html * https://www.suse.com/security/cve/CVE-2024-36011.html * https://www.suse.com/security/cve/CVE-2024-36012.html * https://www.suse.com/security/cve/CVE-2024-36013.html * https://www.suse.com/security/cve/CVE-2024-36014.html * https://www.suse.com/security/cve/CVE-2024-36015.html * https://www.suse.com/security/cve/CVE-2024-36016.html * https://www.suse.com/security/cve/CVE-2024-36017.html * https://www.suse.com/security/cve/CVE-2024-36018.html * https://www.suse.com/security/cve/CVE-2024-36019.html * https://www.suse.com/security/cve/CVE-2024-36020.html * https://www.suse.com/security/cve/CVE-2024-36021.html * https://www.suse.com/security/cve/CVE-2024-36024.html * https://www.suse.com/security/cve/CVE-2024-36025.html * https://www.suse.com/security/cve/CVE-2024-36026.html * https://www.suse.com/security/cve/CVE-2024-36029.html * https://www.suse.com/security/cve/CVE-2024-36030.html * https://www.suse.com/security/cve/CVE-2024-36032.html * https://www.suse.com/security/cve/CVE-2024-36281.html * https://www.suse.com/security/cve/CVE-2024-36477.html * https://www.suse.com/security/cve/CVE-2024-36478.html * https://www.suse.com/security/cve/CVE-2024-36479.html * https://www.suse.com/security/cve/CVE-2024-36880.html * https://www.suse.com/security/cve/CVE-2024-36882.html * https://www.suse.com/security/cve/CVE-2024-36885.html * https://www.suse.com/security/cve/CVE-2024-36887.html * https://www.suse.com/security/cve/CVE-2024-36889.html * https://www.suse.com/security/cve/CVE-2024-36890.html * https://www.suse.com/security/cve/CVE-2024-36891.html * https://www.suse.com/security/cve/CVE-2024-36893.html * https://www.suse.com/security/cve/CVE-2024-36894.html * https://www.suse.com/security/cve/CVE-2024-36895.html * https://www.suse.com/security/cve/CVE-2024-36896.html * https://www.suse.com/security/cve/CVE-2024-36897.html * https://www.suse.com/security/cve/CVE-2024-36898.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36900.html * https://www.suse.com/security/cve/CVE-2024-36901.html * https://www.suse.com/security/cve/CVE-2024-36902.html * https://www.suse.com/security/cve/CVE-2024-36903.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36906.html * https://www.suse.com/security/cve/CVE-2024-36909.html * https://www.suse.com/security/cve/CVE-2024-36910.html * https://www.suse.com/security/cve/CVE-2024-36911.html * https://www.suse.com/security/cve/CVE-2024-36912.html * https://www.suse.com/security/cve/CVE-2024-36913.html * https://www.suse.com/security/cve/CVE-2024-36914.html * https://www.suse.com/security/cve/CVE-2024-36915.html * https://www.suse.com/security/cve/CVE-2024-36916.html * https://www.suse.com/security/cve/CVE-2024-36917.html * https://www.suse.com/security/cve/CVE-2024-36918.html * https://www.suse.com/security/cve/CVE-2024-36919.html * https://www.suse.com/security/cve/CVE-2024-36921.html * https://www.suse.com/security/cve/CVE-2024-36922.html * https://www.suse.com/security/cve/CVE-2024-36923.html * https://www.suse.com/security/cve/CVE-2024-36924.html * https://www.suse.com/security/cve/CVE-2024-36926.html * https://www.suse.com/security/cve/CVE-2024-36928.html * https://www.suse.com/security/cve/CVE-2024-36930.html * https://www.suse.com/security/cve/CVE-2024-36931.html * https://www.suse.com/security/cve/CVE-2024-36934.html * https://www.suse.com/security/cve/CVE-2024-36935.html * https://www.suse.com/security/cve/CVE-2024-36936.html * https://www.suse.com/security/cve/CVE-2024-36937.html * https://www.suse.com/security/cve/CVE-2024-36938.html * https://www.suse.com/security/cve/CVE-2024-36940.html * https://www.suse.com/security/cve/CVE-2024-36941.html * https://www.suse.com/security/cve/CVE-2024-36942.html * https://www.suse.com/security/cve/CVE-2024-36944.html * https://www.suse.com/security/cve/CVE-2024-36945.html * https://www.suse.com/security/cve/CVE-2024-36946.html * https://www.suse.com/security/cve/CVE-2024-36947.html * https://www.suse.com/security/cve/CVE-2024-36949.html * https://www.suse.com/security/cve/CVE-2024-36950.html * https://www.suse.com/security/cve/CVE-2024-36951.html * https://www.suse.com/security/cve/CVE-2024-36952.html * https://www.suse.com/security/cve/CVE-2024-36955.html * https://www.suse.com/security/cve/CVE-2024-36957.html * https://www.suse.com/security/cve/CVE-2024-36959.html * https://www.suse.com/security/cve/CVE-2024-36960.html * https://www.suse.com/security/cve/CVE-2024-36962.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-36965.html * https://www.suse.com/security/cve/CVE-2024-36967.html * https://www.suse.com/security/cve/CVE-2024-36969.html * https://www.suse.com/security/cve/CVE-2024-36971.html * https://www.suse.com/security/cve/CVE-2024-36972.html * https://www.suse.com/security/cve/CVE-2024-36973.html * https://www.suse.com/security/cve/CVE-2024-36974.html * https://www.suse.com/security/cve/CVE-2024-36975.html * https://www.suse.com/security/cve/CVE-2024-36977.html * https://www.suse.com/security/cve/CVE-2024-36978.html * https://www.suse.com/security/cve/CVE-2024-37021.html * https://www.suse.com/security/cve/CVE-2024-37078.html * https://www.suse.com/security/cve/CVE-2024-37353.html * https://www.suse.com/security/cve/CVE-2024-37354.html * https://www.suse.com/security/cve/CVE-2024-38381.html * https://www.suse.com/security/cve/CVE-2024-38384.html * https://www.suse.com/security/cve/CVE-2024-38385.html * https://www.suse.com/security/cve/CVE-2024-38388.html * https://www.suse.com/security/cve/CVE-2024-38390.html * https://www.suse.com/security/cve/CVE-2024-38391.html * https://www.suse.com/security/cve/CVE-2024-38539.html * https://www.suse.com/security/cve/CVE-2024-38540.html * https://www.suse.com/security/cve/CVE-2024-38541.html * https://www.suse.com/security/cve/CVE-2024-38543.html * https://www.suse.com/security/cve/CVE-2024-38544.html * https://www.suse.com/security/cve/CVE-2024-38545.html * https://www.suse.com/security/cve/CVE-2024-38546.html * https://www.suse.com/security/cve/CVE-2024-38547.html * https://www.suse.com/security/cve/CVE-2024-38548.html * https://www.suse.com/security/cve/CVE-2024-38549.html * https://www.suse.com/security/cve/CVE-2024-38550.html * https://www.suse.com/security/cve/CVE-2024-38551.html * https://www.suse.com/security/cve/CVE-2024-38552.html * https://www.suse.com/security/cve/CVE-2024-38553.html * https://www.suse.com/security/cve/CVE-2024-38554.html * https://www.suse.com/security/cve/CVE-2024-38555.html * https://www.suse.com/security/cve/CVE-2024-38556.html * https://www.suse.com/security/cve/CVE-2024-38557.html * https://www.suse.com/security/cve/CVE-2024-38558.html * https://www.suse.com/security/cve/CVE-2024-38559.html * https://www.suse.com/security/cve/CVE-2024-38560.html * https://www.suse.com/security/cve/CVE-2024-38562.html * https://www.suse.com/security/cve/CVE-2024-38564.html * https://www.suse.com/security/cve/CVE-2024-38565.html * https://www.suse.com/security/cve/CVE-2024-38566.html * https://www.suse.com/security/cve/CVE-2024-38567.html * https://www.suse.com/security/cve/CVE-2024-38568.html * https://www.suse.com/security/cve/CVE-2024-38569.html * https://www.suse.com/security/cve/CVE-2024-38570.html * https://www.suse.com/security/cve/CVE-2024-38571.html * https://www.suse.com/security/cve/CVE-2024-38572.html * https://www.suse.com/security/cve/CVE-2024-38573.html * https://www.suse.com/security/cve/CVE-2024-38575.html * https://www.suse.com/security/cve/CVE-2024-38578.html * https://www.suse.com/security/cve/CVE-2024-38579.html * https://www.suse.com/security/cve/CVE-2024-38580.html * https://www.suse.com/security/cve/CVE-2024-38581.html * https://www.suse.com/security/cve/CVE-2024-38582.html * https://www.suse.com/security/cve/CVE-2024-38583.html * https://www.suse.com/security/cve/CVE-2024-38586.html * https://www.suse.com/security/cve/CVE-2024-38587.html * https://www.suse.com/security/cve/CVE-2024-38588.html * https://www.suse.com/security/cve/CVE-2024-38590.html * https://www.suse.com/security/cve/CVE-2024-38591.html * https://www.suse.com/security/cve/CVE-2024-38592.html * https://www.suse.com/security/cve/CVE-2024-38594.html * https://www.suse.com/security/cve/CVE-2024-38595.html * https://www.suse.com/security/cve/CVE-2024-38597.html * https://www.suse.com/security/cve/CVE-2024-38598.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-38600.html * https://www.suse.com/security/cve/CVE-2024-38601.html * https://www.suse.com/security/cve/CVE-2024-38602.html * https://www.suse.com/security/cve/CVE-2024-38603.html * https://www.suse.com/security/cve/CVE-2024-38604.html * https://www.suse.com/security/cve/CVE-2024-38605.html * https://www.suse.com/security/cve/CVE-2024-38608.html * https://www.suse.com/security/cve/CVE-2024-38610.html * https://www.suse.com/security/cve/CVE-2024-38611.html * https://www.suse.com/security/cve/CVE-2024-38615.html * https://www.suse.com/security/cve/CVE-2024-38616.html * https://www.suse.com/security/cve/CVE-2024-38617.html * https://www.suse.com/security/cve/CVE-2024-38618.html * https://www.suse.com/security/cve/CVE-2024-38619.html * https://www.suse.com/security/cve/CVE-2024-38621.html * https://www.suse.com/security/cve/CVE-2024-38622.html * https://www.suse.com/security/cve/CVE-2024-38627.html * https://www.suse.com/security/cve/CVE-2024-38628.html * https://www.suse.com/security/cve/CVE-2024-38629.html * https://www.suse.com/security/cve/CVE-2024-38630.html * https://www.suse.com/security/cve/CVE-2024-38633.html * https://www.suse.com/security/cve/CVE-2024-38634.html * https://www.suse.com/security/cve/CVE-2024-38635.html * https://www.suse.com/security/cve/CVE-2024-38636.html * https://www.suse.com/security/cve/CVE-2024-38659.html * https://www.suse.com/security/cve/CVE-2024-38661.html * https://www.suse.com/security/cve/CVE-2024-38663.html * https://www.suse.com/security/cve/CVE-2024-38664.html * https://www.suse.com/security/cve/CVE-2024-38780.html * https://www.suse.com/security/cve/CVE-2024-39276.html * https://www.suse.com/security/cve/CVE-2024-39277.html * https://www.suse.com/security/cve/CVE-2024-39291.html * https://www.suse.com/security/cve/CVE-2024-39296.html * https://www.suse.com/security/cve/CVE-2024-39301.html * https://www.suse.com/security/cve/CVE-2024-39362.html * https://www.suse.com/security/cve/CVE-2024-39371.html * https://www.suse.com/security/cve/CVE-2024-39463.html * https://www.suse.com/security/cve/CVE-2024-39466.html * https://www.suse.com/security/cve/CVE-2024-39468.html * https://www.suse.com/security/cve/CVE-2024-39469.html * https://www.suse.com/security/cve/CVE-2024-39471.html * https://www.suse.com/security/cve/CVE-2024-39472.html * https://www.suse.com/security/cve/CVE-2024-39473.html * https://www.suse.com/security/cve/CVE-2024-39474.html * https://www.suse.com/security/cve/CVE-2024-39475.html * https://www.suse.com/security/cve/CVE-2024-39479.html * https://www.suse.com/security/cve/CVE-2024-39481.html * https://www.suse.com/security/cve/CVE-2024-39482.html * https://www.suse.com/security/cve/CVE-2024-39487.html * https://www.suse.com/security/cve/CVE-2024-39490.html * https://www.suse.com/security/cve/CVE-2024-39494.html * https://www.suse.com/security/cve/CVE-2024-39496.html * https://www.suse.com/security/cve/CVE-2024-39498.html * https://www.suse.com/security/cve/CVE-2024-39502.html * https://www.suse.com/security/cve/CVE-2024-39504.html * https://www.suse.com/security/cve/CVE-2024-39507.html * https://www.suse.com/security/cve/CVE-2024-40901.html * https://www.suse.com/security/cve/CVE-2024-40906.html * https://www.suse.com/security/cve/CVE-2024-40908.html * https://www.suse.com/security/cve/CVE-2024-40919.html * https://www.suse.com/security/cve/CVE-2024-40923.html * https://www.suse.com/security/cve/CVE-2024-40925.html * https://www.suse.com/security/cve/CVE-2024-40928.html * https://www.suse.com/security/cve/CVE-2024-40931.html * https://www.suse.com/security/cve/CVE-2024-40935.html * https://www.suse.com/security/cve/CVE-2024-40937.html * https://www.suse.com/security/cve/CVE-2024-40940.html * https://www.suse.com/security/cve/CVE-2024-40947.html * https://www.suse.com/security/cve/CVE-2024-40948.html * https://www.suse.com/security/cve/CVE-2024-40953.html * https://www.suse.com/security/cve/CVE-2024-40960.html * https://www.suse.com/security/cve/CVE-2024-40961.html * https://www.suse.com/security/cve/CVE-2024-40966.html * https://www.suse.com/security/cve/CVE-2024-40970.html * https://www.suse.com/security/cve/CVE-2024-40972.html * https://www.suse.com/security/cve/CVE-2024-40975.html * https://www.suse.com/security/cve/CVE-2024-40979.html * https://www.suse.com/security/cve/CVE-2024-40998.html * https://www.suse.com/security/cve/CVE-2024-40999.html * https://www.suse.com/security/cve/CVE-2024-41006.html * https://www.suse.com/security/cve/CVE-2024-41011.html * https://www.suse.com/security/cve/CVE-2024-41013.html * https://www.suse.com/security/cve/CVE-2024-41014.html * https://www.suse.com/security/cve/CVE-2024-41017.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-41091.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1186716 * https://bugzilla.suse.com/show_bug.cgi?id=1187716 * https://bugzilla.suse.com/show_bug.cgi?id=1193599 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1195775 * https://bugzilla.suse.com/show_bug.cgi?id=1204562 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208593 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1213573 * https://bugzilla.suse.com/show_bug.cgi?id=1214852 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215587 * https://bugzilla.suse.com/show_bug.cgi?id=1216196 * https://bugzilla.suse.com/show_bug.cgi?id=1216358 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1217384 * https://bugzilla.suse.com/show_bug.cgi?id=1217408 * https://bugzilla.suse.com/show_bug.cgi?id=1217481 * https://bugzilla.suse.com/show_bug.cgi?id=1217489 * https://bugzilla.suse.com/show_bug.cgi?id=1217750 * https://bugzilla.suse.com/show_bug.cgi?id=1217912 * https://bugzilla.suse.com/show_bug.cgi?id=1217959 * https://bugzilla.suse.com/show_bug.cgi?id=1218205 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218442 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218779 * https://bugzilla.suse.com/show_bug.cgi?id=1218820 * https://bugzilla.suse.com/show_bug.cgi?id=1218917 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219224 * https://bugzilla.suse.com/show_bug.cgi?id=1219451 * https://bugzilla.suse.com/show_bug.cgi?id=1219478 * https://bugzilla.suse.com/show_bug.cgi?id=1219485 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219623 * https://bugzilla.suse.com/show_bug.cgi?id=1219633 * https://bugzilla.suse.com/show_bug.cgi?id=1219832 * https://bugzilla.suse.com/show_bug.cgi?id=1219834 * https://bugzilla.suse.com/show_bug.cgi?id=1219847 * https://bugzilla.suse.com/show_bug.cgi?id=1219953 * https://bugzilla.suse.com/show_bug.cgi?id=1220021 * https://bugzilla.suse.com/show_bug.cgi?id=1220045 * https://bugzilla.suse.com/show_bug.cgi?id=1220120 * https://bugzilla.suse.com/show_bug.cgi?id=1220138 * https://bugzilla.suse.com/show_bug.cgi?id=1220148 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220342 * https://bugzilla.suse.com/show_bug.cgi?id=1220427 * https://bugzilla.suse.com/show_bug.cgi?id=1220428 * https://bugzilla.suse.com/show_bug.cgi?id=1220430 * https://bugzilla.suse.com/show_bug.cgi?id=1220569 * https://bugzilla.suse.com/show_bug.cgi?id=1220587 * https://bugzilla.suse.com/show_bug.cgi?id=1220738 * https://bugzilla.suse.com/show_bug.cgi?id=1220783 * https://bugzilla.suse.com/show_bug.cgi?id=1220915 * https://bugzilla.suse.com/show_bug.cgi?id=1220942 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221057 * https://bugzilla.suse.com/show_bug.cgi?id=1221086 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221303 * https://bugzilla.suse.com/show_bug.cgi?id=1221504 * https://bugzilla.suse.com/show_bug.cgi?id=1221612 * https://bugzilla.suse.com/show_bug.cgi?id=1221615 * https://bugzilla.suse.com/show_bug.cgi?id=1221635 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221647 * https://bugzilla.suse.com/show_bug.cgi?id=1221649 * https://bugzilla.suse.com/show_bug.cgi?id=1221654 * https://bugzilla.suse.com/show_bug.cgi?id=1221656 * https://bugzilla.suse.com/show_bug.cgi?id=1221659 * https://bugzilla.suse.com/show_bug.cgi?id=1221765 * https://bugzilla.suse.com/show_bug.cgi?id=1221777 * https://bugzilla.suse.com/show_bug.cgi?id=1221783 * https://bugzilla.suse.com/show_bug.cgi?id=1221816 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1221958 * https://bugzilla.suse.com/show_bug.cgi?id=1222011 * https://bugzilla.suse.com/show_bug.cgi?id=1222015 * https://bugzilla.suse.com/show_bug.cgi?id=1222080 * https://bugzilla.suse.com/show_bug.cgi?id=1222173 * https://bugzilla.suse.com/show_bug.cgi?id=1222241 * https://bugzilla.suse.com/show_bug.cgi?id=1222264 * https://bugzilla.suse.com/show_bug.cgi?id=1222273 * https://bugzilla.suse.com/show_bug.cgi?id=1222294 * https://bugzilla.suse.com/show_bug.cgi?id=1222301 * https://bugzilla.suse.com/show_bug.cgi?id=1222303 * https://bugzilla.suse.com/show_bug.cgi?id=1222304 * https://bugzilla.suse.com/show_bug.cgi?id=1222307 * https://bugzilla.suse.com/show_bug.cgi?id=1222326 * https://bugzilla.suse.com/show_bug.cgi?id=1222328 * https://bugzilla.suse.com/show_bug.cgi?id=1222357 * https://bugzilla.suse.com/show_bug.cgi?id=1222366 * https://bugzilla.suse.com/show_bug.cgi?id=1222368 * https://bugzilla.suse.com/show_bug.cgi?id=1222371 * https://bugzilla.suse.com/show_bug.cgi?id=1222378 * https://bugzilla.suse.com/show_bug.cgi?id=1222380 * https://bugzilla.suse.com/show_bug.cgi?id=1222385 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222426 * https://bugzilla.suse.com/show_bug.cgi?id=1222428 * https://bugzilla.suse.com/show_bug.cgi?id=1222437 * https://bugzilla.suse.com/show_bug.cgi?id=1222438 * https://bugzilla.suse.com/show_bug.cgi?id=1222445 * https://bugzilla.suse.com/show_bug.cgi?id=1222459 * https://bugzilla.suse.com/show_bug.cgi?id=1222463 * https://bugzilla.suse.com/show_bug.cgi?id=1222464 * https://bugzilla.suse.com/show_bug.cgi?id=1222489 * https://bugzilla.suse.com/show_bug.cgi?id=1222522 * https://bugzilla.suse.com/show_bug.cgi?id=1222525 * https://bugzilla.suse.com/show_bug.cgi?id=1222532 * https://bugzilla.suse.com/show_bug.cgi?id=1222557 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222563 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222588 * https://bugzilla.suse.com/show_bug.cgi?id=1222596 * https://bugzilla.suse.com/show_bug.cgi?id=1222606 * https://bugzilla.suse.com/show_bug.cgi?id=1222608 * https://bugzilla.suse.com/show_bug.cgi?id=1222613 * https://bugzilla.suse.com/show_bug.cgi?id=1222615 * https://bugzilla.suse.com/show_bug.cgi?id=1222617 * https://bugzilla.suse.com/show_bug.cgi?id=1222618 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222622 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222627 * https://bugzilla.suse.com/show_bug.cgi?id=1222630 * https://bugzilla.suse.com/show_bug.cgi?id=1222635 * https://bugzilla.suse.com/show_bug.cgi?id=1222654 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222727 * https://bugzilla.suse.com/show_bug.cgi?id=1222768 * https://bugzilla.suse.com/show_bug.cgi?id=1222769 * https://bugzilla.suse.com/show_bug.cgi?id=1222771 * https://bugzilla.suse.com/show_bug.cgi?id=1222775 * https://bugzilla.suse.com/show_bug.cgi?id=1222777 * https://bugzilla.suse.com/show_bug.cgi?id=1222779 * https://bugzilla.suse.com/show_bug.cgi?id=1222780 * https://bugzilla.suse.com/show_bug.cgi?id=1222782 * https://bugzilla.suse.com/show_bug.cgi?id=1222793 * https://bugzilla.suse.com/show_bug.cgi?id=1222799 * https://bugzilla.suse.com/show_bug.cgi?id=1222801 * https://bugzilla.suse.com/show_bug.cgi?id=1222809 * https://bugzilla.suse.com/show_bug.cgi?id=1222810 * https://bugzilla.suse.com/show_bug.cgi?id=1222893 * https://bugzilla.suse.com/show_bug.cgi?id=1222968 * https://bugzilla.suse.com/show_bug.cgi?id=1223007 * https://bugzilla.suse.com/show_bug.cgi?id=1223010 * https://bugzilla.suse.com/show_bug.cgi?id=1223011 * https://bugzilla.suse.com/show_bug.cgi?id=1223015 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223018 * https://bugzilla.suse.com/show_bug.cgi?id=1223020 * https://bugzilla.suse.com/show_bug.cgi?id=1223021 * https://bugzilla.suse.com/show_bug.cgi?id=1223023 * https://bugzilla.suse.com/show_bug.cgi?id=1223024 * https://bugzilla.suse.com/show_bug.cgi?id=1223033 * https://bugzilla.suse.com/show_bug.cgi?id=1223034 * https://bugzilla.suse.com/show_bug.cgi?id=1223035 * https://bugzilla.suse.com/show_bug.cgi?id=1223038 * https://bugzilla.suse.com/show_bug.cgi?id=1223039 * https://bugzilla.suse.com/show_bug.cgi?id=1223041 * https://bugzilla.suse.com/show_bug.cgi?id=1223045 * https://bugzilla.suse.com/show_bug.cgi?id=1223046 * https://bugzilla.suse.com/show_bug.cgi?id=1223051 * https://bugzilla.suse.com/show_bug.cgi?id=1223052 * https://bugzilla.suse.com/show_bug.cgi?id=1223058 * https://bugzilla.suse.com/show_bug.cgi?id=1223060 * https://bugzilla.suse.com/show_bug.cgi?id=1223061 * https://bugzilla.suse.com/show_bug.cgi?id=1223062 * https://bugzilla.suse.com/show_bug.cgi?id=1223076 * https://bugzilla.suse.com/show_bug.cgi?id=1223077 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223111 * https://bugzilla.suse.com/show_bug.cgi?id=1223113 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223143 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223189 * https://bugzilla.suse.com/show_bug.cgi?id=1223190 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223198 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223265 * https://bugzilla.suse.com/show_bug.cgi?id=1223285 * https://bugzilla.suse.com/show_bug.cgi?id=1223315 * https://bugzilla.suse.com/show_bug.cgi?id=1223338 * https://bugzilla.suse.com/show_bug.cgi?id=1223369 * https://bugzilla.suse.com/show_bug.cgi?id=1223380 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223439 * https://bugzilla.suse.com/show_bug.cgi?id=1223462 * https://bugzilla.suse.com/show_bug.cgi?id=1223532 * https://bugzilla.suse.com/show_bug.cgi?id=1223539 * https://bugzilla.suse.com/show_bug.cgi?id=1223570 * https://bugzilla.suse.com/show_bug.cgi?id=1223575 * https://bugzilla.suse.com/show_bug.cgi?id=1223590 * https://bugzilla.suse.com/show_bug.cgi?id=1223591 * https://bugzilla.suse.com/show_bug.cgi?id=1223592 * https://bugzilla.suse.com/show_bug.cgi?id=1223593 * https://bugzilla.suse.com/show_bug.cgi?id=1223625 * https://bugzilla.suse.com/show_bug.cgi?id=1223626 * https://bugzilla.suse.com/show_bug.cgi?id=1223627 * https://bugzilla.suse.com/show_bug.cgi?id=1223629 * https://bugzilla.suse.com/show_bug.cgi?id=1223631 * https://bugzilla.suse.com/show_bug.cgi?id=1223632 * https://bugzilla.suse.com/show_bug.cgi?id=1223633 * https://bugzilla.suse.com/show_bug.cgi?id=1223634 * https://bugzilla.suse.com/show_bug.cgi?id=1223637 * https://bugzilla.suse.com/show_bug.cgi?id=1223638 * https://bugzilla.suse.com/show_bug.cgi?id=1223641 * https://bugzilla.suse.com/show_bug.cgi?id=1223642 * https://bugzilla.suse.com/show_bug.cgi?id=1223643 * https://bugzilla.suse.com/show_bug.cgi?id=1223644 * https://bugzilla.suse.com/show_bug.cgi?id=1223645 * https://bugzilla.suse.com/show_bug.cgi?id=1223646 * https://bugzilla.suse.com/show_bug.cgi?id=1223648 * https://bugzilla.suse.com/show_bug.cgi?id=1223649 * https://bugzilla.suse.com/show_bug.cgi?id=1223650 * https://bugzilla.suse.com/show_bug.cgi?id=1223651 * https://bugzilla.suse.com/show_bug.cgi?id=1223652 * https://bugzilla.suse.com/show_bug.cgi?id=1223653 * https://bugzilla.suse.com/show_bug.cgi?id=1223654 * https://bugzilla.suse.com/show_bug.cgi?id=1223655 * https://bugzilla.suse.com/show_bug.cgi?id=1223657 * https://bugzilla.suse.com/show_bug.cgi?id=1223660 * https://bugzilla.suse.com/show_bug.cgi?id=1223661 * https://bugzilla.suse.com/show_bug.cgi?id=1223663 * https://bugzilla.suse.com/show_bug.cgi?id=1223664 * https://bugzilla.suse.com/show_bug.cgi?id=1223665 * https://bugzilla.suse.com/show_bug.cgi?id=1223666 * https://bugzilla.suse.com/show_bug.cgi?id=1223667 * https://bugzilla.suse.com/show_bug.cgi?id=1223668 * https://bugzilla.suse.com/show_bug.cgi?id=1223669 * https://bugzilla.suse.com/show_bug.cgi?id=1223670 * https://bugzilla.suse.com/show_bug.cgi?id=1223671 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1223677 * https://bugzilla.suse.com/show_bug.cgi?id=1223678 * https://bugzilla.suse.com/show_bug.cgi?id=1223679 * https://bugzilla.suse.com/show_bug.cgi?id=1223686 * https://bugzilla.suse.com/show_bug.cgi?id=1223692 * https://bugzilla.suse.com/show_bug.cgi?id=1223693 * https://bugzilla.suse.com/show_bug.cgi?id=1223695 * https://bugzilla.suse.com/show_bug.cgi?id=1223696 * https://bugzilla.suse.com/show_bug.cgi?id=1223698 * https://bugzilla.suse.com/show_bug.cgi?id=1223699 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223709 * https://bugzilla.suse.com/show_bug.cgi?id=1223711 * https://bugzilla.suse.com/show_bug.cgi?id=1223712 * https://bugzilla.suse.com/show_bug.cgi?id=1223714 * https://bugzilla.suse.com/show_bug.cgi?id=1223715 * https://bugzilla.suse.com/show_bug.cgi?id=1223717 * https://bugzilla.suse.com/show_bug.cgi?id=1223718 * https://bugzilla.suse.com/show_bug.cgi?id=1223723 * https://bugzilla.suse.com/show_bug.cgi?id=1223725 * https://bugzilla.suse.com/show_bug.cgi?id=1223728 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223732 * https://bugzilla.suse.com/show_bug.cgi?id=1223734 * https://bugzilla.suse.com/show_bug.cgi?id=1223735 * https://bugzilla.suse.com/show_bug.cgi?id=1223737 * https://bugzilla.suse.com/show_bug.cgi?id=1223738 * https://bugzilla.suse.com/show_bug.cgi?id=1223739 * https://bugzilla.suse.com/show_bug.cgi?id=1223740 * https://bugzilla.suse.com/show_bug.cgi?id=1223741 * https://bugzilla.suse.com/show_bug.cgi?id=1223744 * https://bugzilla.suse.com/show_bug.cgi?id=1223745 * https://bugzilla.suse.com/show_bug.cgi?id=1223747 * https://bugzilla.suse.com/show_bug.cgi?id=1223748 * https://bugzilla.suse.com/show_bug.cgi?id=1223749 * https://bugzilla.suse.com/show_bug.cgi?id=1223750 * https://bugzilla.suse.com/show_bug.cgi?id=1223752 * https://bugzilla.suse.com/show_bug.cgi?id=1223754 * https://bugzilla.suse.com/show_bug.cgi?id=1223756 * https://bugzilla.suse.com/show_bug.cgi?id=1223757 * https://bugzilla.suse.com/show_bug.cgi?id=1223759 * https://bugzilla.suse.com/show_bug.cgi?id=1223760 * https://bugzilla.suse.com/show_bug.cgi?id=1223761 * https://bugzilla.suse.com/show_bug.cgi?id=1223762 * https://bugzilla.suse.com/show_bug.cgi?id=1223764 * https://bugzilla.suse.com/show_bug.cgi?id=1223765 * https://bugzilla.suse.com/show_bug.cgi?id=1223768 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1223770 * https://bugzilla.suse.com/show_bug.cgi?id=1223774 * https://bugzilla.suse.com/show_bug.cgi?id=1223776 * https://bugzilla.suse.com/show_bug.cgi?id=1223778 * https://bugzilla.suse.com/show_bug.cgi?id=1223779 * https://bugzilla.suse.com/show_bug.cgi?id=1223780 * https://bugzilla.suse.com/show_bug.cgi?id=1223781 * https://bugzilla.suse.com/show_bug.cgi?id=1223782 * https://bugzilla.suse.com/show_bug.cgi?id=1223787 * https://bugzilla.suse.com/show_bug.cgi?id=1223788 * https://bugzilla.suse.com/show_bug.cgi?id=1223789 * https://bugzilla.suse.com/show_bug.cgi?id=1223790 * https://bugzilla.suse.com/show_bug.cgi?id=1223802 * https://bugzilla.suse.com/show_bug.cgi?id=1223804 * https://bugzilla.suse.com/show_bug.cgi?id=1223805 * https://bugzilla.suse.com/show_bug.cgi?id=1223806 * https://bugzilla.suse.com/show_bug.cgi?id=1223807 * https://bugzilla.suse.com/show_bug.cgi?id=1223808 * https://bugzilla.suse.com/show_bug.cgi?id=1223810 * https://bugzilla.suse.com/show_bug.cgi?id=1223813 * https://bugzilla.suse.com/show_bug.cgi?id=1223815 * https://bugzilla.suse.com/show_bug.cgi?id=1223816 * https://bugzilla.suse.com/show_bug.cgi?id=1223819 * https://bugzilla.suse.com/show_bug.cgi?id=1223821 * https://bugzilla.suse.com/show_bug.cgi?id=1223822 * https://bugzilla.suse.com/show_bug.cgi?id=1223823 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223826 * https://bugzilla.suse.com/show_bug.cgi?id=1223827 * https://bugzilla.suse.com/show_bug.cgi?id=1223828 * https://bugzilla.suse.com/show_bug.cgi?id=1223829 * https://bugzilla.suse.com/show_bug.cgi?id=1223831 * https://bugzilla.suse.com/show_bug.cgi?id=1223834 * https://bugzilla.suse.com/show_bug.cgi?id=1223836 * https://bugzilla.suse.com/show_bug.cgi?id=1223837 * https://bugzilla.suse.com/show_bug.cgi?id=1223838 * https://bugzilla.suse.com/show_bug.cgi?id=1223842 * https://bugzilla.suse.com/show_bug.cgi?id=1223843 * https://bugzilla.suse.com/show_bug.cgi?id=1223844 * https://bugzilla.suse.com/show_bug.cgi?id=1223847 * https://bugzilla.suse.com/show_bug.cgi?id=1223863 * https://bugzilla.suse.com/show_bug.cgi?id=1223869 * https://bugzilla.suse.com/show_bug.cgi?id=1223870 * https://bugzilla.suse.com/show_bug.cgi?id=1223871 * https://bugzilla.suse.com/show_bug.cgi?id=1223872 * https://bugzilla.suse.com/show_bug.cgi?id=1223874 * https://bugzilla.suse.com/show_bug.cgi?id=1223944 * https://bugzilla.suse.com/show_bug.cgi?id=1223945 * https://bugzilla.suse.com/show_bug.cgi?id=1223946 * https://bugzilla.suse.com/show_bug.cgi?id=1223991 * https://bugzilla.suse.com/show_bug.cgi?id=1224049 * https://bugzilla.suse.com/show_bug.cgi?id=1224076 * https://bugzilla.suse.com/show_bug.cgi?id=1224096 * https://bugzilla.suse.com/show_bug.cgi?id=1224098 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224137 * https://bugzilla.suse.com/show_bug.cgi?id=1224166 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224177 * https://bugzilla.suse.com/show_bug.cgi?id=1224180 * https://bugzilla.suse.com/show_bug.cgi?id=1224181 * https://bugzilla.suse.com/show_bug.cgi?id=1224187 * https://bugzilla.suse.com/show_bug.cgi?id=1224331 * https://bugzilla.suse.com/show_bug.cgi?id=1224348 * https://bugzilla.suse.com/show_bug.cgi?id=1224414 * https://bugzilla.suse.com/show_bug.cgi?id=1224422 * https://bugzilla.suse.com/show_bug.cgi?id=1224423 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224430 * https://bugzilla.suse.com/show_bug.cgi?id=1224432 * https://bugzilla.suse.com/show_bug.cgi?id=1224433 * https://bugzilla.suse.com/show_bug.cgi?id=1224437 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224439 * https://bugzilla.suse.com/show_bug.cgi?id=1224442 * https://bugzilla.suse.com/show_bug.cgi?id=1224443 * https://bugzilla.suse.com/show_bug.cgi?id=1224445 * https://bugzilla.suse.com/show_bug.cgi?id=1224449 * https://bugzilla.suse.com/show_bug.cgi?id=1224477 * https://bugzilla.suse.com/show_bug.cgi?id=1224479 * https://bugzilla.suse.com/show_bug.cgi?id=1224480 * https://bugzilla.suse.com/show_bug.cgi?id=1224481 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224486 * https://bugzilla.suse.com/show_bug.cgi?id=1224487 * https://bugzilla.suse.com/show_bug.cgi?id=1224488 * https://bugzilla.suse.com/show_bug.cgi?id=1224490 * https://bugzilla.suse.com/show_bug.cgi?id=1224491 * https://bugzilla.suse.com/show_bug.cgi?id=1224492 * https://bugzilla.suse.com/show_bug.cgi?id=1224493 * https://bugzilla.suse.com/show_bug.cgi?id=1224494 * https://bugzilla.suse.com/show_bug.cgi?id=1224495 * https://bugzilla.suse.com/show_bug.cgi?id=1224497 * https://bugzilla.suse.com/show_bug.cgi?id=1224498 * https://bugzilla.suse.com/show_bug.cgi?id=1224499 * https://bugzilla.suse.com/show_bug.cgi?id=1224500 * https://bugzilla.suse.com/show_bug.cgi?id=1224501 * https://bugzilla.suse.com/show_bug.cgi?id=1224502 * https://bugzilla.suse.com/show_bug.cgi?id=1224504 * https://bugzilla.suse.com/show_bug.cgi?id=1224505 * https://bugzilla.suse.com/show_bug.cgi?id=1224506 * https://bugzilla.suse.com/show_bug.cgi?id=1224507 * https://bugzilla.suse.com/show_bug.cgi?id=1224508 * https://bugzilla.suse.com/show_bug.cgi?id=1224509 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224512 * https://bugzilla.suse.com/show_bug.cgi?id=1224513 * https://bugzilla.suse.com/show_bug.cgi?id=1224515 * https://bugzilla.suse.com/show_bug.cgi?id=1224516 * https://bugzilla.suse.com/show_bug.cgi?id=1224517 * https://bugzilla.suse.com/show_bug.cgi?id=1224519 * https://bugzilla.suse.com/show_bug.cgi?id=1224520 * https://bugzilla.suse.com/show_bug.cgi?id=1224521 * https://bugzilla.suse.com/show_bug.cgi?id=1224523 * https://bugzilla.suse.com/show_bug.cgi?id=1224524 * https://bugzilla.suse.com/show_bug.cgi?id=1224525 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224530 * https://bugzilla.suse.com/show_bug.cgi?id=1224531 * https://bugzilla.suse.com/show_bug.cgi?id=1224534 * https://bugzilla.suse.com/show_bug.cgi?id=1224537 * https://bugzilla.suse.com/show_bug.cgi?id=1224539 * https://bugzilla.suse.com/show_bug.cgi?id=1224540 * https://bugzilla.suse.com/show_bug.cgi?id=1224541 * https://bugzilla.suse.com/show_bug.cgi?id=1224542 * https://bugzilla.suse.com/show_bug.cgi?id=1224543 * https://bugzilla.suse.com/show_bug.cgi?id=1224544 * https://bugzilla.suse.com/show_bug.cgi?id=1224545 * https://bugzilla.suse.com/show_bug.cgi?id=1224546 * https://bugzilla.suse.com/show_bug.cgi?id=1224549 * https://bugzilla.suse.com/show_bug.cgi?id=1224550 * https://bugzilla.suse.com/show_bug.cgi?id=1224552 * https://bugzilla.suse.com/show_bug.cgi?id=1224553 * https://bugzilla.suse.com/show_bug.cgi?id=1224555 * https://bugzilla.suse.com/show_bug.cgi?id=1224557 * https://bugzilla.suse.com/show_bug.cgi?id=1224558 * https://bugzilla.suse.com/show_bug.cgi?id=1224559 * https://bugzilla.suse.com/show_bug.cgi?id=1224562 * https://bugzilla.suse.com/show_bug.cgi?id=1224565 * https://bugzilla.suse.com/show_bug.cgi?id=1224566 * https://bugzilla.suse.com/show_bug.cgi?id=1224567 * https://bugzilla.suse.com/show_bug.cgi?id=1224568 * https://bugzilla.suse.com/show_bug.cgi?id=1224569 * https://bugzilla.suse.com/show_bug.cgi?id=1224571 * https://bugzilla.suse.com/show_bug.cgi?id=1224572 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1224575 * https://bugzilla.suse.com/show_bug.cgi?id=1224576 * https://bugzilla.suse.com/show_bug.cgi?id=1224577 * https://bugzilla.suse.com/show_bug.cgi?id=1224578 * https://bugzilla.suse.com/show_bug.cgi?id=1224579 * https://bugzilla.suse.com/show_bug.cgi?id=1224580 * https://bugzilla.suse.com/show_bug.cgi?id=1224581 * https://bugzilla.suse.com/show_bug.cgi?id=1224582 * https://bugzilla.suse.com/show_bug.cgi?id=1224583 * https://bugzilla.suse.com/show_bug.cgi?id=1224584 * https://bugzilla.suse.com/show_bug.cgi?id=1224585 * https://bugzilla.suse.com/show_bug.cgi?id=1224586 * https://bugzilla.suse.com/show_bug.cgi?id=1224587 * https://bugzilla.suse.com/show_bug.cgi?id=1224588 * https://bugzilla.suse.com/show_bug.cgi?id=1224589 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224596 * https://bugzilla.suse.com/show_bug.cgi?id=1224598 * https://bugzilla.suse.com/show_bug.cgi?id=1224600 * https://bugzilla.suse.com/show_bug.cgi?id=1224601 * https://bugzilla.suse.com/show_bug.cgi?id=1224602 * https://bugzilla.suse.com/show_bug.cgi?id=1224603 * https://bugzilla.suse.com/show_bug.cgi?id=1224604 * https://bugzilla.suse.com/show_bug.cgi?id=1224605 * https://bugzilla.suse.com/show_bug.cgi?id=1224606 * https://bugzilla.suse.com/show_bug.cgi?id=1224607 * https://bugzilla.suse.com/show_bug.cgi?id=1224608 * https://bugzilla.suse.com/show_bug.cgi?id=1224609 * https://bugzilla.suse.com/show_bug.cgi?id=1224611 * https://bugzilla.suse.com/show_bug.cgi?id=1224612 * https://bugzilla.suse.com/show_bug.cgi?id=1224613 * https://bugzilla.suse.com/show_bug.cgi?id=1224614 * https://bugzilla.suse.com/show_bug.cgi?id=1224615 * https://bugzilla.suse.com/show_bug.cgi?id=1224617 * https://bugzilla.suse.com/show_bug.cgi?id=1224618 * https://bugzilla.suse.com/show_bug.cgi?id=1224619 * https://bugzilla.suse.com/show_bug.cgi?id=1224620 * https://bugzilla.suse.com/show_bug.cgi?id=1224621 * https://bugzilla.suse.com/show_bug.cgi?id=1224622 * https://bugzilla.suse.com/show_bug.cgi?id=1224623 * https://bugzilla.suse.com/show_bug.cgi?id=1224624 * https://bugzilla.suse.com/show_bug.cgi?id=1224626 * https://bugzilla.suse.com/show_bug.cgi?id=1224627 * https://bugzilla.suse.com/show_bug.cgi?id=1224628 * https://bugzilla.suse.com/show_bug.cgi?id=1224629 * https://bugzilla.suse.com/show_bug.cgi?id=1224630 * https://bugzilla.suse.com/show_bug.cgi?id=1224632 * https://bugzilla.suse.com/show_bug.cgi?id=1224633 * https://bugzilla.suse.com/show_bug.cgi?id=1224634 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224637 * https://bugzilla.suse.com/show_bug.cgi?id=1224638 * https://bugzilla.suse.com/show_bug.cgi?id=1224639 * https://bugzilla.suse.com/show_bug.cgi?id=1224640 * https://bugzilla.suse.com/show_bug.cgi?id=1224641 * https://bugzilla.suse.com/show_bug.cgi?id=1224643 * https://bugzilla.suse.com/show_bug.cgi?id=1224644 * https://bugzilla.suse.com/show_bug.cgi?id=1224645 * https://bugzilla.suse.com/show_bug.cgi?id=1224646 * https://bugzilla.suse.com/show_bug.cgi?id=1224647 * https://bugzilla.suse.com/show_bug.cgi?id=1224648 * https://bugzilla.suse.com/show_bug.cgi?id=1224649 * https://bugzilla.suse.com/show_bug.cgi?id=1224650 * https://bugzilla.suse.com/show_bug.cgi?id=1224651 * https://bugzilla.suse.com/show_bug.cgi?id=1224652 * https://bugzilla.suse.com/show_bug.cgi?id=1224653 * https://bugzilla.suse.com/show_bug.cgi?id=1224654 * https://bugzilla.suse.com/show_bug.cgi?id=1224655 * https://bugzilla.suse.com/show_bug.cgi?id=1224657 * https://bugzilla.suse.com/show_bug.cgi?id=1224659 * https://bugzilla.suse.com/show_bug.cgi?id=1224660 * https://bugzilla.suse.com/show_bug.cgi?id=1224661 * https://bugzilla.suse.com/show_bug.cgi?id=1224662 * https://bugzilla.suse.com/show_bug.cgi?id=1224663 * https://bugzilla.suse.com/show_bug.cgi?id=1224664 * https://bugzilla.suse.com/show_bug.cgi?id=1224665 * https://bugzilla.suse.com/show_bug.cgi?id=1224666 * https://bugzilla.suse.com/show_bug.cgi?id=1224667 * https://bugzilla.suse.com/show_bug.cgi?id=1224668 * https://bugzilla.suse.com/show_bug.cgi?id=1224670 * https://bugzilla.suse.com/show_bug.cgi?id=1224671 * https://bugzilla.suse.com/show_bug.cgi?id=1224672 * https://bugzilla.suse.com/show_bug.cgi?id=1224673 * https://bugzilla.suse.com/show_bug.cgi?id=1224674 * https://bugzilla.suse.com/show_bug.cgi?id=1224675 * https://bugzilla.suse.com/show_bug.cgi?id=1224676 * https://bugzilla.suse.com/show_bug.cgi?id=1224677 * https://bugzilla.suse.com/show_bug.cgi?id=1224678 * https://bugzilla.suse.com/show_bug.cgi?id=1224679 * https://bugzilla.suse.com/show_bug.cgi?id=1224680 * https://bugzilla.suse.com/show_bug.cgi?id=1224681 * https://bugzilla.suse.com/show_bug.cgi?id=1224682 * https://bugzilla.suse.com/show_bug.cgi?id=1224683 * https://bugzilla.suse.com/show_bug.cgi?id=1224685 * https://bugzilla.suse.com/show_bug.cgi?id=1224686 * https://bugzilla.suse.com/show_bug.cgi?id=1224687 * https://bugzilla.suse.com/show_bug.cgi?id=1224688 * https://bugzilla.suse.com/show_bug.cgi?id=1224692 * https://bugzilla.suse.com/show_bug.cgi?id=1224696 * https://bugzilla.suse.com/show_bug.cgi?id=1224697 * https://bugzilla.suse.com/show_bug.cgi?id=1224698 * https://bugzilla.suse.com/show_bug.cgi?id=1224699 * https://bugzilla.suse.com/show_bug.cgi?id=1224701 * https://bugzilla.suse.com/show_bug.cgi?id=1224703 * https://bugzilla.suse.com/show_bug.cgi?id=1224704 * https://bugzilla.suse.com/show_bug.cgi?id=1224705 * https://bugzilla.suse.com/show_bug.cgi?id=1224706 * https://bugzilla.suse.com/show_bug.cgi?id=1224707 * https://bugzilla.suse.com/show_bug.cgi?id=1224709 * https://bugzilla.suse.com/show_bug.cgi?id=1224710 * https://bugzilla.suse.com/show_bug.cgi?id=1224712 * https://bugzilla.suse.com/show_bug.cgi?id=1224714 * https://bugzilla.suse.com/show_bug.cgi?id=1224716 * https://bugzilla.suse.com/show_bug.cgi?id=1224717 * https://bugzilla.suse.com/show_bug.cgi?id=1224718 * https://bugzilla.suse.com/show_bug.cgi?id=1224719 * https://bugzilla.suse.com/show_bug.cgi?id=1224720 * https://bugzilla.suse.com/show_bug.cgi?id=1224721 * https://bugzilla.suse.com/show_bug.cgi?id=1224722 * https://bugzilla.suse.com/show_bug.cgi?id=1224723 * https://bugzilla.suse.com/show_bug.cgi?id=1224725 * https://bugzilla.suse.com/show_bug.cgi?id=1224727 * https://bugzilla.suse.com/show_bug.cgi?id=1224729 * https://bugzilla.suse.com/show_bug.cgi?id=1224730 * https://bugzilla.suse.com/show_bug.cgi?id=1224731 * https://bugzilla.suse.com/show_bug.cgi?id=1224732 * https://bugzilla.suse.com/show_bug.cgi?id=1224733 * https://bugzilla.suse.com/show_bug.cgi?id=1224735 * https://bugzilla.suse.com/show_bug.cgi?id=1224736 * https://bugzilla.suse.com/show_bug.cgi?id=1224738 * https://bugzilla.suse.com/show_bug.cgi?id=1224739 * https://bugzilla.suse.com/show_bug.cgi?id=1224740 * https://bugzilla.suse.com/show_bug.cgi?id=1224741 * https://bugzilla.suse.com/show_bug.cgi?id=1224742 * https://bugzilla.suse.com/show_bug.cgi?id=1224743 * https://bugzilla.suse.com/show_bug.cgi?id=1224747 * https://bugzilla.suse.com/show_bug.cgi?id=1224749 * https://bugzilla.suse.com/show_bug.cgi?id=1224751 * https://bugzilla.suse.com/show_bug.cgi?id=1224759 * https://bugzilla.suse.com/show_bug.cgi?id=1224763 * https://bugzilla.suse.com/show_bug.cgi?id=1224764 * https://bugzilla.suse.com/show_bug.cgi?id=1224765 * https://bugzilla.suse.com/show_bug.cgi?id=1224766 * https://bugzilla.suse.com/show_bug.cgi?id=1224767 * https://bugzilla.suse.com/show_bug.cgi?id=1224790 * https://bugzilla.suse.com/show_bug.cgi?id=1224792 * https://bugzilla.suse.com/show_bug.cgi?id=1224793 * https://bugzilla.suse.com/show_bug.cgi?id=1224803 * https://bugzilla.suse.com/show_bug.cgi?id=1224804 * https://bugzilla.suse.com/show_bug.cgi?id=1224866 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224930 * https://bugzilla.suse.com/show_bug.cgi?id=1224932 * https://bugzilla.suse.com/show_bug.cgi?id=1224933 * https://bugzilla.suse.com/show_bug.cgi?id=1224935 * https://bugzilla.suse.com/show_bug.cgi?id=1224936 * https://bugzilla.suse.com/show_bug.cgi?id=1224937 * https://bugzilla.suse.com/show_bug.cgi?id=1224939 * https://bugzilla.suse.com/show_bug.cgi?id=1224941 * https://bugzilla.suse.com/show_bug.cgi?id=1224944 * https://bugzilla.suse.com/show_bug.cgi?id=1224946 * https://bugzilla.suse.com/show_bug.cgi?id=1224947 * https://bugzilla.suse.com/show_bug.cgi?id=1224949 * https://bugzilla.suse.com/show_bug.cgi?id=1224951 * https://bugzilla.suse.com/show_bug.cgi?id=1224988 * https://bugzilla.suse.com/show_bug.cgi?id=1224989 * https://bugzilla.suse.com/show_bug.cgi?id=1224992 * https://bugzilla.suse.com/show_bug.cgi?id=1224998 * https://bugzilla.suse.com/show_bug.cgi?id=1225000 * https://bugzilla.suse.com/show_bug.cgi?id=1225001 * https://bugzilla.suse.com/show_bug.cgi?id=1225004 * https://bugzilla.suse.com/show_bug.cgi?id=1225006 * https://bugzilla.suse.com/show_bug.cgi?id=1225007 * https://bugzilla.suse.com/show_bug.cgi?id=1225008 * https://bugzilla.suse.com/show_bug.cgi?id=1225009 * https://bugzilla.suse.com/show_bug.cgi?id=1225014 * https://bugzilla.suse.com/show_bug.cgi?id=1225015 * https://bugzilla.suse.com/show_bug.cgi?id=1225022 * https://bugzilla.suse.com/show_bug.cgi?id=1225025 * https://bugzilla.suse.com/show_bug.cgi?id=1225028 * https://bugzilla.suse.com/show_bug.cgi?id=1225029 * https://bugzilla.suse.com/show_bug.cgi?id=1225031 * https://bugzilla.suse.com/show_bug.cgi?id=1225036 * https://bugzilla.suse.com/show_bug.cgi?id=1225041 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1225049 * https://bugzilla.suse.com/show_bug.cgi?id=1225050 * https://bugzilla.suse.com/show_bug.cgi?id=1225053 * https://bugzilla.suse.com/show_bug.cgi?id=1225076 * https://bugzilla.suse.com/show_bug.cgi?id=1225077 * https://bugzilla.suse.com/show_bug.cgi?id=1225078 * https://bugzilla.suse.com/show_bug.cgi?id=1225081 * https://bugzilla.suse.com/show_bug.cgi?id=1225085 * https://bugzilla.suse.com/show_bug.cgi?id=1225086 * https://bugzilla.suse.com/show_bug.cgi?id=1225088 * https://bugzilla.suse.com/show_bug.cgi?id=1225090 * https://bugzilla.suse.com/show_bug.cgi?id=1225092 * https://bugzilla.suse.com/show_bug.cgi?id=1225096 * https://bugzilla.suse.com/show_bug.cgi?id=1225097 * https://bugzilla.suse.com/show_bug.cgi?id=1225098 * https://bugzilla.suse.com/show_bug.cgi?id=1225101 * https://bugzilla.suse.com/show_bug.cgi?id=1225103 * https://bugzilla.suse.com/show_bug.cgi?id=1225104 * https://bugzilla.suse.com/show_bug.cgi?id=1225105 * https://bugzilla.suse.com/show_bug.cgi?id=1225106 * https://bugzilla.suse.com/show_bug.cgi?id=1225108 * https://bugzilla.suse.com/show_bug.cgi?id=1225120 * https://bugzilla.suse.com/show_bug.cgi?id=1225132 * https://bugzilla.suse.com/show_bug.cgi?id=1225133 * https://bugzilla.suse.com/show_bug.cgi?id=1225134 * https://bugzilla.suse.com/show_bug.cgi?id=1225136 * https://bugzilla.suse.com/show_bug.cgi?id=1225172 * https://bugzilla.suse.com/show_bug.cgi?id=1225180 * https://bugzilla.suse.com/show_bug.cgi?id=1225272 * https://bugzilla.suse.com/show_bug.cgi?id=1225300 * https://bugzilla.suse.com/show_bug.cgi?id=1225391 * https://bugzilla.suse.com/show_bug.cgi?id=1225472 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225476 * https://bugzilla.suse.com/show_bug.cgi?id=1225477 * https://bugzilla.suse.com/show_bug.cgi?id=1225478 * https://bugzilla.suse.com/show_bug.cgi?id=1225485 * https://bugzilla.suse.com/show_bug.cgi?id=1225489 * https://bugzilla.suse.com/show_bug.cgi?id=1225490 * https://bugzilla.suse.com/show_bug.cgi?id=1225502 * https://bugzilla.suse.com/show_bug.cgi?id=1225527 * https://bugzilla.suse.com/show_bug.cgi?id=1225529 * https://bugzilla.suse.com/show_bug.cgi?id=1225530 * https://bugzilla.suse.com/show_bug.cgi?id=1225532 * https://bugzilla.suse.com/show_bug.cgi?id=1225534 * https://bugzilla.suse.com/show_bug.cgi?id=1225548 * https://bugzilla.suse.com/show_bug.cgi?id=1225550 * https://bugzilla.suse.com/show_bug.cgi?id=1225553 * https://bugzilla.suse.com/show_bug.cgi?id=1225554 * https://bugzilla.suse.com/show_bug.cgi?id=1225555 * https://bugzilla.suse.com/show_bug.cgi?id=1225556 * https://bugzilla.suse.com/show_bug.cgi?id=1225557 * https://bugzilla.suse.com/show_bug.cgi?id=1225559 * https://bugzilla.suse.com/show_bug.cgi?id=1225560 * https://bugzilla.suse.com/show_bug.cgi?id=1225564 * https://bugzilla.suse.com/show_bug.cgi?id=1225565 * https://bugzilla.suse.com/show_bug.cgi?id=1225566 * https://bugzilla.suse.com/show_bug.cgi?id=1225568 * https://bugzilla.suse.com/show_bug.cgi?id=1225569 * https://bugzilla.suse.com/show_bug.cgi?id=1225570 * https://bugzilla.suse.com/show_bug.cgi?id=1225571 * https://bugzilla.suse.com/show_bug.cgi?id=1225572 * https://bugzilla.suse.com/show_bug.cgi?id=1225573 * https://bugzilla.suse.com/show_bug.cgi?id=1225577 * https://bugzilla.suse.com/show_bug.cgi?id=1225578 * https://bugzilla.suse.com/show_bug.cgi?id=1225579 * https://bugzilla.suse.com/show_bug.cgi?id=1225580 * https://bugzilla.suse.com/show_bug.cgi?id=1225581 * https://bugzilla.suse.com/show_bug.cgi?id=1225583 * https://bugzilla.suse.com/show_bug.cgi?id=1225584 * https://bugzilla.suse.com/show_bug.cgi?id=1225585 * https://bugzilla.suse.com/show_bug.cgi?id=1225586 * https://bugzilla.suse.com/show_bug.cgi?id=1225587 * https://bugzilla.suse.com/show_bug.cgi?id=1225588 * https://bugzilla.suse.com/show_bug.cgi?id=1225589 * https://bugzilla.suse.com/show_bug.cgi?id=1225590 * https://bugzilla.suse.com/show_bug.cgi?id=1225591 * https://bugzilla.suse.com/show_bug.cgi?id=1225592 * https://bugzilla.suse.com/show_bug.cgi?id=1225593 * https://bugzilla.suse.com/show_bug.cgi?id=1225594 * https://bugzilla.suse.com/show_bug.cgi?id=1225595 * https://bugzilla.suse.com/show_bug.cgi?id=1225599 * https://bugzilla.suse.com/show_bug.cgi?id=1225600 * https://bugzilla.suse.com/show_bug.cgi?id=1225601 * https://bugzilla.suse.com/show_bug.cgi?id=1225602 * https://bugzilla.suse.com/show_bug.cgi?id=1225605 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225609 * https://bugzilla.suse.com/show_bug.cgi?id=1225610 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225616 * https://bugzilla.suse.com/show_bug.cgi?id=1225618 * https://bugzilla.suse.com/show_bug.cgi?id=1225640 * https://bugzilla.suse.com/show_bug.cgi?id=1225642 * https://bugzilla.suse.com/show_bug.cgi?id=1225681 * https://bugzilla.suse.com/show_bug.cgi?id=1225692 * https://bugzilla.suse.com/show_bug.cgi?id=1225694 * https://bugzilla.suse.com/show_bug.cgi?id=1225695 * https://bugzilla.suse.com/show_bug.cgi?id=1225696 * https://bugzilla.suse.com/show_bug.cgi?id=1225698 * https://bugzilla.suse.com/show_bug.cgi?id=1225699 * https://bugzilla.suse.com/show_bug.cgi?id=1225702 * https://bugzilla.suse.com/show_bug.cgi?id=1225704 * https://bugzilla.suse.com/show_bug.cgi?id=1225705 * https://bugzilla.suse.com/show_bug.cgi?id=1225708 * https://bugzilla.suse.com/show_bug.cgi?id=1225710 * https://bugzilla.suse.com/show_bug.cgi?id=1225711 * https://bugzilla.suse.com/show_bug.cgi?id=1225712 * https://bugzilla.suse.com/show_bug.cgi?id=1225714 * https://bugzilla.suse.com/show_bug.cgi?id=1225715 * https://bugzilla.suse.com/show_bug.cgi?id=1225717 * https://bugzilla.suse.com/show_bug.cgi?id=1225719 * https://bugzilla.suse.com/show_bug.cgi?id=1225720 * https://bugzilla.suse.com/show_bug.cgi?id=1225722 * https://bugzilla.suse.com/show_bug.cgi?id=1225723 * https://bugzilla.suse.com/show_bug.cgi?id=1225726 * https://bugzilla.suse.com/show_bug.cgi?id=1225728 * https://bugzilla.suse.com/show_bug.cgi?id=1225731 * https://bugzilla.suse.com/show_bug.cgi?id=1225732 * https://bugzilla.suse.com/show_bug.cgi?id=1225734 * https://bugzilla.suse.com/show_bug.cgi?id=1225735 * https://bugzilla.suse.com/show_bug.cgi?id=1225736 * https://bugzilla.suse.com/show_bug.cgi?id=1225737 * https://bugzilla.suse.com/show_bug.cgi?id=1225741 * https://bugzilla.suse.com/show_bug.cgi?id=1225744 * https://bugzilla.suse.com/show_bug.cgi?id=1225745 * https://bugzilla.suse.com/show_bug.cgi?id=1225746 * https://bugzilla.suse.com/show_bug.cgi?id=1225747 * https://bugzilla.suse.com/show_bug.cgi?id=1225748 * https://bugzilla.suse.com/show_bug.cgi?id=1225749 * https://bugzilla.suse.com/show_bug.cgi?id=1225750 * https://bugzilla.suse.com/show_bug.cgi?id=1225752 * https://bugzilla.suse.com/show_bug.cgi?id=1225753 * https://bugzilla.suse.com/show_bug.cgi?id=1225756 * https://bugzilla.suse.com/show_bug.cgi?id=1225757 * https://bugzilla.suse.com/show_bug.cgi?id=1225758 * https://bugzilla.suse.com/show_bug.cgi?id=1225759 * https://bugzilla.suse.com/show_bug.cgi?id=1225760 * https://bugzilla.suse.com/show_bug.cgi?id=1225761 * https://bugzilla.suse.com/show_bug.cgi?id=1225762 * https://bugzilla.suse.com/show_bug.cgi?id=1225763 * https://bugzilla.suse.com/show_bug.cgi?id=1225765 * https://bugzilla.suse.com/show_bug.cgi?id=1225766 * https://bugzilla.suse.com/show_bug.cgi?id=1225767 * https://bugzilla.suse.com/show_bug.cgi?id=1225769 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1225773 * https://bugzilla.suse.com/show_bug.cgi?id=1225775 * https://bugzilla.suse.com/show_bug.cgi?id=1225805 * https://bugzilla.suse.com/show_bug.cgi?id=1225810 * https://bugzilla.suse.com/show_bug.cgi?id=1225815 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1225823 * https://bugzilla.suse.com/show_bug.cgi?id=1225827 * https://bugzilla.suse.com/show_bug.cgi?id=1225829 * https://bugzilla.suse.com/show_bug.cgi?id=1225830 * https://bugzilla.suse.com/show_bug.cgi?id=1225834 * https://bugzilla.suse.com/show_bug.cgi?id=1225835 * https://bugzilla.suse.com/show_bug.cgi?id=1225839 * https://bugzilla.suse.com/show_bug.cgi?id=1225840 * https://bugzilla.suse.com/show_bug.cgi?id=1225842 * https://bugzilla.suse.com/show_bug.cgi?id=1225843 * https://bugzilla.suse.com/show_bug.cgi?id=1225847 * https://bugzilla.suse.com/show_bug.cgi?id=1225851 * https://bugzilla.suse.com/show_bug.cgi?id=1225856 * https://bugzilla.suse.com/show_bug.cgi?id=1225866 * https://bugzilla.suse.com/show_bug.cgi?id=1225872 * https://bugzilla.suse.com/show_bug.cgi?id=1225894 * https://bugzilla.suse.com/show_bug.cgi?id=1225895 * https://bugzilla.suse.com/show_bug.cgi?id=1225896 * https://bugzilla.suse.com/show_bug.cgi?id=1225898 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1225945 * https://bugzilla.suse.com/show_bug.cgi?id=1226022 * https://bugzilla.suse.com/show_bug.cgi?id=1226131 * https://bugzilla.suse.com/show_bug.cgi?id=1226145 * https://bugzilla.suse.com/show_bug.cgi?id=1226149 * https://bugzilla.suse.com/show_bug.cgi?id=1226155 * https://bugzilla.suse.com/show_bug.cgi?id=1226158 * https://bugzilla.suse.com/show_bug.cgi?id=1226163 * https://bugzilla.suse.com/show_bug.cgi?id=1226202 * https://bugzilla.suse.com/show_bug.cgi?id=1226211 * https://bugzilla.suse.com/show_bug.cgi?id=1226212 * https://bugzilla.suse.com/show_bug.cgi?id=1226213 * https://bugzilla.suse.com/show_bug.cgi?id=1226226 * https://bugzilla.suse.com/show_bug.cgi?id=1226457 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226503 * https://bugzilla.suse.com/show_bug.cgi?id=1226513 * https://bugzilla.suse.com/show_bug.cgi?id=1226514 * https://bugzilla.suse.com/show_bug.cgi?id=1226519 * https://bugzilla.suse.com/show_bug.cgi?id=1226520 * https://bugzilla.suse.com/show_bug.cgi?id=1226582 * https://bugzilla.suse.com/show_bug.cgi?id=1226587 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226592 * https://bugzilla.suse.com/show_bug.cgi?id=1226593 * https://bugzilla.suse.com/show_bug.cgi?id=1226594 * https://bugzilla.suse.com/show_bug.cgi?id=1226595 * https://bugzilla.suse.com/show_bug.cgi?id=1226597 * https://bugzilla.suse.com/show_bug.cgi?id=1226607 * https://bugzilla.suse.com/show_bug.cgi?id=1226608 * https://bugzilla.suse.com/show_bug.cgi?id=1226610 * https://bugzilla.suse.com/show_bug.cgi?id=1226612 * https://bugzilla.suse.com/show_bug.cgi?id=1226613 * https://bugzilla.suse.com/show_bug.cgi?id=1226630 * https://bugzilla.suse.com/show_bug.cgi?id=1226632 * https://bugzilla.suse.com/show_bug.cgi?id=1226633 * https://bugzilla.suse.com/show_bug.cgi?id=1226634 * https://bugzilla.suse.com/show_bug.cgi?id=1226637 * https://bugzilla.suse.com/show_bug.cgi?id=1226657 * https://bugzilla.suse.com/show_bug.cgi?id=1226658 * https://bugzilla.suse.com/show_bug.cgi?id=1226734 * https://bugzilla.suse.com/show_bug.cgi?id=1226735 * https://bugzilla.suse.com/show_bug.cgi?id=1226737 * https://bugzilla.suse.com/show_bug.cgi?id=1226738 * https://bugzilla.suse.com/show_bug.cgi?id=1226739 * https://bugzilla.suse.com/show_bug.cgi?id=1226740 * https://bugzilla.suse.com/show_bug.cgi?id=1226741 * https://bugzilla.suse.com/show_bug.cgi?id=1226742 * https://bugzilla.suse.com/show_bug.cgi?id=1226744 * https://bugzilla.suse.com/show_bug.cgi?id=1226746 * https://bugzilla.suse.com/show_bug.cgi?id=1226747 * https://bugzilla.suse.com/show_bug.cgi?id=1226749 * https://bugzilla.suse.com/show_bug.cgi?id=1226750 * https://bugzilla.suse.com/show_bug.cgi?id=1226754 * https://bugzilla.suse.com/show_bug.cgi?id=1226757 * https://bugzilla.suse.com/show_bug.cgi?id=1226758 * https://bugzilla.suse.com/show_bug.cgi?id=1226760 * https://bugzilla.suse.com/show_bug.cgi?id=1226761 * https://bugzilla.suse.com/show_bug.cgi?id=1226764 * https://bugzilla.suse.com/show_bug.cgi?id=1226767 * https://bugzilla.suse.com/show_bug.cgi?id=1226768 * https://bugzilla.suse.com/show_bug.cgi?id=1226769 * https://bugzilla.suse.com/show_bug.cgi?id=1226771 * https://bugzilla.suse.com/show_bug.cgi?id=1226772 * https://bugzilla.suse.com/show_bug.cgi?id=1226774 * https://bugzilla.suse.com/show_bug.cgi?id=1226775 * https://bugzilla.suse.com/show_bug.cgi?id=1226776 * https://bugzilla.suse.com/show_bug.cgi?id=1226777 * https://bugzilla.suse.com/show_bug.cgi?id=1226780 * https://bugzilla.suse.com/show_bug.cgi?id=1226781 * https://bugzilla.suse.com/show_bug.cgi?id=1226783 * https://bugzilla.suse.com/show_bug.cgi?id=1226785 * https://bugzilla.suse.com/show_bug.cgi?id=1226786 * https://bugzilla.suse.com/show_bug.cgi?id=1226788 * https://bugzilla.suse.com/show_bug.cgi?id=1226789 * https://bugzilla.suse.com/show_bug.cgi?id=1226790 * https://bugzilla.suse.com/show_bug.cgi?id=1226791 * https://bugzilla.suse.com/show_bug.cgi?id=1226796 * https://bugzilla.suse.com/show_bug.cgi?id=1226799 * https://bugzilla.suse.com/show_bug.cgi?id=1226837 * https://bugzilla.suse.com/show_bug.cgi?id=1226839 * https://bugzilla.suse.com/show_bug.cgi?id=1226840 * https://bugzilla.suse.com/show_bug.cgi?id=1226841 * https://bugzilla.suse.com/show_bug.cgi?id=1226842 * https://bugzilla.suse.com/show_bug.cgi?id=1226844 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226852 * https://bugzilla.suse.com/show_bug.cgi?id=1226856 * https://bugzilla.suse.com/show_bug.cgi?id=1226857 * https://bugzilla.suse.com/show_bug.cgi?id=1226859 * https://bugzilla.suse.com/show_bug.cgi?id=1226861 * https://bugzilla.suse.com/show_bug.cgi?id=1226863 * https://bugzilla.suse.com/show_bug.cgi?id=1226864 * https://bugzilla.suse.com/show_bug.cgi?id=1226866 * https://bugzilla.suse.com/show_bug.cgi?id=1226867 * https://bugzilla.suse.com/show_bug.cgi?id=1226868 * https://bugzilla.suse.com/show_bug.cgi?id=1226875 * https://bugzilla.suse.com/show_bug.cgi?id=1226876 * https://bugzilla.suse.com/show_bug.cgi?id=1226878 * https://bugzilla.suse.com/show_bug.cgi?id=1226879 * https://bugzilla.suse.com/show_bug.cgi?id=1226883 * https://bugzilla.suse.com/show_bug.cgi?id=1226886 * https://bugzilla.suse.com/show_bug.cgi?id=1226890 * https://bugzilla.suse.com/show_bug.cgi?id=1226891 * https://bugzilla.suse.com/show_bug.cgi?id=1226894 * https://bugzilla.suse.com/show_bug.cgi?id=1226895 * https://bugzilla.suse.com/show_bug.cgi?id=1226905 * https://bugzilla.suse.com/show_bug.cgi?id=1226908 * https://bugzilla.suse.com/show_bug.cgi?id=1226909 * https://bugzilla.suse.com/show_bug.cgi?id=1226911 * https://bugzilla.suse.com/show_bug.cgi?id=1226915 * https://bugzilla.suse.com/show_bug.cgi?id=1226928 * https://bugzilla.suse.com/show_bug.cgi?id=1226934 * https://bugzilla.suse.com/show_bug.cgi?id=1226938 * https://bugzilla.suse.com/show_bug.cgi?id=1226939 * https://bugzilla.suse.com/show_bug.cgi?id=1226941 * https://bugzilla.suse.com/show_bug.cgi?id=1226948 * https://bugzilla.suse.com/show_bug.cgi?id=1226949 * https://bugzilla.suse.com/show_bug.cgi?id=1226950 * https://bugzilla.suse.com/show_bug.cgi?id=1226962 * https://bugzilla.suse.com/show_bug.cgi?id=1226976 * https://bugzilla.suse.com/show_bug.cgi?id=1226989 * https://bugzilla.suse.com/show_bug.cgi?id=1226990 * https://bugzilla.suse.com/show_bug.cgi?id=1226992 * https://bugzilla.suse.com/show_bug.cgi?id=1226993 * https://bugzilla.suse.com/show_bug.cgi?id=1226994 * https://bugzilla.suse.com/show_bug.cgi?id=1226995 * https://bugzilla.suse.com/show_bug.cgi?id=1226996 * https://bugzilla.suse.com/show_bug.cgi?id=1227066 * https://bugzilla.suse.com/show_bug.cgi?id=1227072 * https://bugzilla.suse.com/show_bug.cgi?id=1227085 * https://bugzilla.suse.com/show_bug.cgi?id=1227089 * https://bugzilla.suse.com/show_bug.cgi?id=1227090 * https://bugzilla.suse.com/show_bug.cgi?id=1227096 * https://bugzilla.suse.com/show_bug.cgi?id=1227101 * https://bugzilla.suse.com/show_bug.cgi?id=1227103 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227190 * https://bugzilla.suse.com/show_bug.cgi?id=1227282 * https://bugzilla.suse.com/show_bug.cgi?id=1227362 * https://bugzilla.suse.com/show_bug.cgi?id=1227363 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227432 * https://bugzilla.suse.com/show_bug.cgi?id=1227434 * https://bugzilla.suse.com/show_bug.cgi?id=1227435 * https://bugzilla.suse.com/show_bug.cgi?id=1227443 * https://bugzilla.suse.com/show_bug.cgi?id=1227446 * https://bugzilla.suse.com/show_bug.cgi?id=1227447 * https://bugzilla.suse.com/show_bug.cgi?id=1227487 * https://bugzilla.suse.com/show_bug.cgi?id=1227573 * https://bugzilla.suse.com/show_bug.cgi?id=1227626 * https://bugzilla.suse.com/show_bug.cgi?id=1227716 * https://bugzilla.suse.com/show_bug.cgi?id=1227719 * https://bugzilla.suse.com/show_bug.cgi?id=1227723 * https://bugzilla.suse.com/show_bug.cgi?id=1227730 * https://bugzilla.suse.com/show_bug.cgi?id=1227736 * https://bugzilla.suse.com/show_bug.cgi?id=1227755 * https://bugzilla.suse.com/show_bug.cgi?id=1227757 * https://bugzilla.suse.com/show_bug.cgi?id=1227762 * https://bugzilla.suse.com/show_bug.cgi?id=1227763 * https://bugzilla.suse.com/show_bug.cgi?id=1227779 * https://bugzilla.suse.com/show_bug.cgi?id=1227780 * https://bugzilla.suse.com/show_bug.cgi?id=1227783 * https://bugzilla.suse.com/show_bug.cgi?id=1227786 * https://bugzilla.suse.com/show_bug.cgi?id=1227788 * https://bugzilla.suse.com/show_bug.cgi?id=1227789 * https://bugzilla.suse.com/show_bug.cgi?id=1227797 * https://bugzilla.suse.com/show_bug.cgi?id=1227800 * https://bugzilla.suse.com/show_bug.cgi?id=1227801 * https://bugzilla.suse.com/show_bug.cgi?id=1227803 * https://bugzilla.suse.com/show_bug.cgi?id=1227806 * https://bugzilla.suse.com/show_bug.cgi?id=1227813 * https://bugzilla.suse.com/show_bug.cgi?id=1227814 * https://bugzilla.suse.com/show_bug.cgi?id=1227836 * https://bugzilla.suse.com/show_bug.cgi?id=1227855 * https://bugzilla.suse.com/show_bug.cgi?id=1227862 * https://bugzilla.suse.com/show_bug.cgi?id=1227866 * https://bugzilla.suse.com/show_bug.cgi?id=1227886 * https://bugzilla.suse.com/show_bug.cgi?id=1227899 * https://bugzilla.suse.com/show_bug.cgi?id=1227910 * https://bugzilla.suse.com/show_bug.cgi?id=1227913 * https://bugzilla.suse.com/show_bug.cgi?id=1227926 * https://bugzilla.suse.com/show_bug.cgi?id=1228090 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228193 * https://bugzilla.suse.com/show_bug.cgi?id=1228211 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228289 * https://bugzilla.suse.com/show_bug.cgi?id=1228327 * https://bugzilla.suse.com/show_bug.cgi?id=1228328 * https://bugzilla.suse.com/show_bug.cgi?id=1228403 * https://bugzilla.suse.com/show_bug.cgi?id=1228405 * https://bugzilla.suse.com/show_bug.cgi?id=1228408 * https://bugzilla.suse.com/show_bug.cgi?id=1228417 * https://jira.suse.com/browse/PED-542 * https://jira.suse.com/browse/PED-8111 * https://jira.suse.com/browse/PED-8240 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8570 * https://jira.suse.com/browse/PED-8644 * https://jira.suse.com/browse/PED-8645 * https://jira.suse.com/browse/PED-8649 * https://jira.suse.com/browse/PED-8688 * https://jira.suse.com/browse/PED-8701 * https://jira.suse.com/browse/PED-8954 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 12:30:22 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 12:30:22 -0000 Subject: SUSE-SU-2025:01812-1: important: Security update for libsoup Message-ID: <174904022230.4520.6499372569936290194@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:01812-1 Release Date: 2025-06-04T10:12:19Z Rating: important References: * bsc#1243332 * bsc#1243422 * bsc#1243423 Cross-References: * CVE-2025-4476 * CVE-2025-4948 * CVE-2025-4969 CVSS scores: * CVE-2025-4476 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4476 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-4476 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-4948 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-4948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4969 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4969 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-4969 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) * CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) * CVE-2025-4476: Fixed NULL pointer dereference may lead to denial of service (bsc#1243422) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1812=1 openSUSE-SLE-15.6-2025-1812=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1812=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1812=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-3_0-0-debuginfo-3.4.4-150600.3.10.1 * libsoup-3_0-0-3.4.4-150600.3.10.1 * libsoup-debugsource-3.4.4-150600.3.10.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.10.1 * libsoup-devel-3.4.4-150600.3.10.1 * openSUSE Leap 15.6 (x86_64) * libsoup-devel-32bit-3.4.4-150600.3.10.1 * libsoup-3_0-0-32bit-3.4.4-150600.3.10.1 * libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.10.1 * openSUSE Leap 15.6 (noarch) * libsoup-lang-3.4.4-150600.3.10.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-devel-64bit-3.4.4-150600.3.10.1 * libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.10.1 * libsoup-3_0-0-64bit-3.4.4-150600.3.10.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.4-150600.3.10.1 * libsoup-3_0-0-3.4.4-150600.3.10.1 * libsoup-debugsource-3.4.4-150600.3.10.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.10.1 * libsoup-devel-3.4.4-150600.3.10.1 * Basesystem Module 15-SP6 (noarch) * libsoup-lang-3.4.4-150600.3.10.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.4-150600.3.10.1 * libsoup-3_0-0-3.4.4-150600.3.10.1 * libsoup-debugsource-3.4.4-150600.3.10.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.10.1 * libsoup-devel-3.4.4-150600.3.10.1 * Basesystem Module 15-SP7 (noarch) * libsoup-lang-3.4.4-150600.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4476.html * https://www.suse.com/security/cve/CVE-2025-4948.html * https://www.suse.com/security/cve/CVE-2025-4969.html * https://bugzilla.suse.com/show_bug.cgi?id=1243332 * https://bugzilla.suse.com/show_bug.cgi?id=1243422 * https://bugzilla.suse.com/show_bug.cgi?id=1243423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 12:30:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 12:30:36 -0000 Subject: SUSE-SU-2025:01810-1: important: Security update for python3-setuptools Message-ID: <174904023693.4520.1780362395680861629@smelt2.prg2.suse.org> # Security update for python3-setuptools Announcement ID: SUSE-SU-2025:01810-1 Release Date: 2025-06-04T09:29:46Z Rating: important References: * bsc#1243313 Cross-References: * CVE-2025-47273 CVSS scores: * CVE-2025-47273 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-47273 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-47273 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python3-setuptools fixes the following issues: * CVE-2025-47273: path traversal in PackageIndex.download may lead to an arbitrary file write (bsc#1243313). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1810=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1810=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1810=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1810=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1810=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1810=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1810=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1810=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1810=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1810=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1810=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1810=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1810=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1810=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1810=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1810=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1810=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1810=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1810=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1810=1 ## Package List: * Basesystem Module 15-SP6 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * Basesystem Module 15-SP7 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Manager Proxy 4.3 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Manager Server 4.3 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * openSUSE Leap 15.4 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * openSUSE Leap 15.6 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * python3-setuptools-wheel-44.1.1-150400.9.12.1 * python3-setuptools-test-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-setuptools-44.1.1-150400.9.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47273.html * https://bugzilla.suse.com/show_bug.cgi?id=1243313 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 12:30:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 12:30:34 -0000 Subject: SUSE-SU-2025:01811-1: moderate: Security update for gnuplot Message-ID: <174904023421.4520.3389048278850693634@smelt2.prg2.suse.org> # Security update for gnuplot Announcement ID: SUSE-SU-2025:01811-1 Release Date: 2025-06-04T09:29:58Z Rating: moderate References: * bsc#1240325 * bsc#1240326 * bsc#1240327 * bsc#1240328 * bsc#1240329 * bsc#1240330 * bsc#1241684 Cross-References: * CVE-2025-31176 * CVE-2025-31177 * CVE-2025-31178 * CVE-2025-31179 * CVE-2025-31180 * CVE-2025-31181 * CVE-2025-3359 CVSS scores: * CVE-2025-31176 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31176 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31177 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31178 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31178 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31179 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31179 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31180 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31180 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31181 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31181 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3359 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3359 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3359 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities can now be installed. ## Description: This update for gnuplot fixes the following issues: * CVE-2025-31176: invalid read leads to segmentation fault on plot3d_points (bsc#1240325). * CVE-2025-31177: improper bounds check leads to heap-buffer overflow on utf8_copy_one (bsc#1240326). * CVE-2025-31178: unvalidated user input leads to segmentation fault on GetAnnotateString (bsc#1240327). * CVE-2025-31179: improper verification of time values leads to segmentation fault on xstrftime (bsc#1240328). * CVE-2025-31180: unchecked invalid pointer access leads to segmentation fault on CANVAS_text (bsc#1240329). * CVE-2025-31181: double fclose() call leads to segmentation fault on X11_graphics (bsc#1240330). * CVE-2025-3359: out-of-bounds read when parsing font names may lead to a segmentation fault (bsc#1241684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1811=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1811=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1811=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gnuplot-debugsource-5.4.3-150400.3.3.1 * gnuplot-debuginfo-5.4.3-150400.3.3.1 * gnuplot-5.4.3-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * gnuplot-doc-5.4.3-150400.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * gnuplot-debugsource-5.4.3-150400.3.3.1 * gnuplot-debuginfo-5.4.3-150400.3.3.1 * gnuplot-5.4.3-150400.3.3.1 * openSUSE Leap 15.6 (noarch) * gnuplot-doc-5.4.3-150400.3.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gnuplot-debugsource-5.4.3-150400.3.3.1 * gnuplot-debuginfo-5.4.3-150400.3.3.1 * gnuplot-5.4.3-150400.3.3.1 * Server Applications Module 15-SP6 (noarch) * gnuplot-doc-5.4.3-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31176.html * https://www.suse.com/security/cve/CVE-2025-31177.html * https://www.suse.com/security/cve/CVE-2025-31178.html * https://www.suse.com/security/cve/CVE-2025-31179.html * https://www.suse.com/security/cve/CVE-2025-31180.html * https://www.suse.com/security/cve/CVE-2025-31181.html * https://www.suse.com/security/cve/CVE-2025-3359.html * https://bugzilla.suse.com/show_bug.cgi?id=1240325 * https://bugzilla.suse.com/show_bug.cgi?id=1240326 * https://bugzilla.suse.com/show_bug.cgi?id=1240327 * https://bugzilla.suse.com/show_bug.cgi?id=1240328 * https://bugzilla.suse.com/show_bug.cgi?id=1240329 * https://bugzilla.suse.com/show_bug.cgi?id=1240330 * https://bugzilla.suse.com/show_bug.cgi?id=1241684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 12:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 12:30:16 -0000 Subject: SUSE-SU-2025:01490-1: important: Security update for java-17-openjdk Message-ID: <174904021689.4520.8826112004926912566@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2025:01490-1 Release Date: 2025-06-04T10:12:32Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Legacy Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: Update to upstream tag jdk-17.0.15+6 (April 2025 CPU) CVEs: * CVE-2025-21587: Fixed JSSE unauthorized access, deletion or modification of critical data (bsc#1241274) * CVE-2025-30691: Fixed Oracle Java SE Compiler Unauthorized Data Access (bsc#1241275) * CVE-2025-30698: Fixed Oracle Java 2D unauthorized data access and DoS (bsc#1241276) Changes: + JDK-6355567: AdobeMarkerSegment causes failure to read valid JPEG + JDK-8065099: [macos] javax/swing/PopupFactory/6276087/ /NonOpaquePopupMenuTest.java fails: no background shine through + JDK-8179502: Enhance OCSP, CRL and Certificate Fetch Timeouts + JDK-8198237: [macos] Test java/awt/Frame/ /ExceptionOnSetExtendedStateTest/ /ExceptionOnSetExtendedStateTest.java fails + JDK-8198666: Many java/awt/Modal/OnTop/ test fails on mac + JDK-8208565: [TEST_BUG] javax/swing/PopupFactory/6276087/ /NonOpaquePopupMenuTest.java throws NPE + JDK-8226933: [TEST_BUG]GTK L&F: There is no swatches or RGB tab in JColorChooser + JDK-8226938: [TEST_BUG]GTK L&F: There is no Details button in FileChooser Dialog + JDK-8266435: WBMPImageReader.read() should not truncate the input stream + JDK-8267893: Improve jtreg test failure handler do get native/mixed stack traces for cores and live processes + JDK-8270961: [TESTBUG] Move GotWrongOOMEException into vm.share.gc package + JDK-8274893: Update java.desktop classes to use try-with-resources + JDK-8276202: LogFileOutput.invalid_file_vm asserts when being executed from a read only working directory + JDK-8277240: java/awt/Graphics2D/ScaledTransform/ /ScaledTransform.java dialog does not get disposed + JDK-8281234: The -protected option is not always checked in keytool and jarsigner + JDK-8282314: nsk/jvmti/SuspendThread/suspendthrd003 may leak memory + JDK-8283387: [macos] a11y : Screen magnifier does not show selected Tab + JDK-8283404: [macos] a11y : Screen magnifier does not show JMenu name + JDK-8283664: Remove jtreg tag manual=yesno for java/awt/print/PrinterJob/PrintTextTest.java + JDK-8286779: javax.crypto.CryptoPolicyParser#isConsistent always returns 'true' + JDK-8286875: ProgrammableUpcallHandler::on_entry/on_exit access thread fields from native + JDK-8290400: Must run exe installers in jpackage jtreg tests without UI + JDK-8292588: [macos] Multiscreen/MultiScreenLocationTest/ /MultiScreenLocationTest.java: Robot.mouseMove test failed on Screen #0 + JDK-8292704: sun/security/tools/jarsigner/compatibility/ /Compatibility.java use wrong key size for EC + JDK-8292848: AWT_Mixing and TrayIcon tests fail on el8 with hard-coded isOel7 + JDK-8293345: SunPKCS11 provider checks on PKCS11 Mechanism are problematic + JDK-8293412: Remove unnecessary java.security.egd overrides + JDK-8294067: [macOS] javax/swing/JComboBox/6559152/ /bug6559152.java Cannot select an item from popup with the ENTER key. + JDK-8294316: SA core file support is broken on macosx-x64 starting with macOS 12.x + JDK-8295087: Manual Test to Automated Test Conversion + JDK-8295176: some langtools test pollutes source tree + JDK-8296591: Signature benchmark + JDK-8296818: Enhance JMH tests java/security/Signatures.java + JDK-8299077: [REDO] JDK-4512626 Non-editable JTextArea provides no visual indication of keyboard focus + JDK-8299127: [REDO] JDK-8194048 Regression automated test '/open/test/jdk/javax/swing/text/DefaultCaret/HidingSelection/ /HidingSelectionTest.java' fails + JDK-8299128: [REDO] JDK-8213562 Test javax/swing/text/ /DefaultCaret/HidingSelection/MultiSelectionTest.java fails + JDK-8299739: HashedPasswordFileTest.java and ExceptionTest.java can fail with java.lang.NullPointerException + JDK-8299994: java/security/Policy/Root/Root.java fails when home directory is read-only + JDK-8301989: new javax.swing.text.DefaultCaret().setBlinkRate(N) results in NPE + JDK-8302111: Serialization considerations + JDK-8305853: java/text/Format/DateFormat/ /DateFormatRegression.java fails with "Uncaught exception thrown in test method Test4089106" + JDK-8306711: Improve diagnosis of `IntlTest` framework + JDK-8308341: JNI_GetCreatedJavaVMs returns a partially initialized JVM + JDK-8309171: Test vmTestbase/nsk/jvmti/scenarios/ /jni_interception/JI05/ji05t001/TestDescription.java fails after JDK-8308341 + JDK-8309231: ProblemList vmTestbase/nsk/jvmti/scenarios/ /jni_interception/JI05/ji05t001/TestDescription.java + JDK-8309740: Expand timeout windows for tests in JDK-8179502 + JDK-8309841: Jarsigner should print a warning if an entry is removed + JDK-8310234: Refactor Locale tests to use JUnit + JDK-8310629: java/security/cert/CertPathValidator/OCSP/ /OCSPTimeout.java fails with RuntimeException: Server not ready + JDK-8311306: Test com/sun/management/ThreadMXBean/ /ThreadCpuTimeArray.java failed: out of expected range + JDK-8311546: Certificate name constraints improperly validated with leading period + JDK-8311663: Additional refactoring of Locale tests to JUnit + JDK-8312416: Tests in Locale should have more descriptive names + JDK-8312518: [macos13] setFullScreenWindow() shows black screen on macOS 13 & above + JDK-8313633: [macOS] java/awt/dnd/NextDropActionTest/ /NextDropActionTest.java fails with java.lang.RuntimeException: wrong next drop action! + JDK-8313710: jcmd: typo in the documentation of JFR.start and JFR.dump + JDK-8314225: SIGSEGV in JavaThread::is_lock_owned + JDK-8314610: hotspot can't compile with the latest of gtest because of <iomanip> + JDK-8314752: Use google test string comparison macros + JDK-8314909: tools/jpackage/windows/Win8282351Test.java fails with java.lang.AssertionError: Expected [0]. Actual [1618]: + JDK-8314975: JavadocTester should set source path if not specified + JDK-8315486: vmTestbase/nsk/jdwp/ThreadReference/ /ForceEarlyReturn/forceEarlyReturn002/forceEarlyReturn002.java timed out + JDK-8315825: Open some swing tests + JDK-8315882: Open some swing tests 2 + JDK-8315883: Open source several Swing JToolbar tests + JDK-8315952: Open source several Swing JToolbar JTooltip JTree tests + JDK-8316056: Open source several Swing JTree tests + JDK-8316146: Open some swing tests 4 + JDK-8316149: Open source several Swing JTree JViewport KeyboardManager tests + JDK-8316218: Open some swing tests 5 + JDK-8316371: Open some swing tests 6 + JDK-8316559: Refactor some util/Calendar tests to JUnit + JDK-8316627: JViewport Test headless failure + JDK-8316696: Remove the testing base classes: IntlTest and CollatorTest + JDK-8317631: Refactor ChoiceFormat tests to use JUnit + JDK-8317636: Improve heap walking API tests to verify correctness of field indexes + JDK-8318442: java/net/httpclient/ManyRequests2.java fails intermittently on Linux + JDK-8319567: Update java/lang/invoke tests to support vm flags + JDK-8319568: Update java/lang/reflect/exeCallerAccessTest/ /CallerAccessTest.java to accept vm flags + JDK-8319569: Several java/util tests should be updated to accept VM flags + JDK-8319647: Few java/lang/System/LoggerFinder/modules tests ignore vm flags + JDK-8319648: java/lang/SecurityManager tests ignore vm flags + JDK-8319672: Several classloader tests ignore VM flags + JDK-8319673: Few security tests ignore VM flags + JDK-8319676: A couple of jdk/modules/incubator/ tests ignore VM flags + JDK-8319677: Test jdk/internal/misc/VM/RuntimeArguments.java should be marked as flagless + JDK-8319818: Address GCC 13.2.0 warnings (stringop-overflow and dangling-pointer) + JDK-8320372: test/jdk/sun/security/x509/DNSName/ /LeadingPeriod.java validity check failed + JDK-8320676: Manual printer tests have no Pass/Fail buttons, instructions close set 1 + JDK-8320691: Timeout handler on Windows takes 2 hours to complete + JDK-8320714: java/util/Locale/LocaleProvidersRun.java and java/util/ResourceBundle/modules/visibility/ /VisibilityTest.java timeout after passing + JDK-8320916: jdk/jfr/event/gc/stacktrace/ /TestParallelMarkSweepAllocationPendingStackTrace.java failed with "OutOfMemoryError: GC overhead limit exceeded" + JDK-8321818: vmTestbase/nsk/stress/strace/strace015.java failed with 'Cannot read the array length because "<local4>" is null' + JDK-8323196: jdk/jfr/api/consumer/filestream/TestOrdered.java failed with "Events are not ordered! Reuse = false" + JDK-8324672: Update jdk/java/time/tck/java/time/TCKInstant.java now() to be more robust + JDK-8324807: Manual printer tests have no Pass/Fail buttons, instructions close set 2 + JDK-8325024: java/security/cert/CertPathValidator/OCSP( /OCSPTimeout.java incorrect comment information + JDK-8325042: Remove unused JVMDITools test files + JDK-8325529: Remove unused imports from `ModuleGenerator` test file + JDK-8325659: Normalize Random usage by incubator vector tests + JDK-8325906: Problemlist vmTestbase/vm/mlvm/meth/stress/ /compiler/deoptimize/Test.java#id1 until JDK-8320865 is fixed + JDK-8325908: Finish removal of IntlTest and CollatorTest + JDK-8325937: runtime/handshake/HandshakeDirectTest.java causes "monitor end should be strictly below the frame pointer" assertion failure on AArch64 + JDK-8326421: Add jtreg test for large arrayCopy disjoint case. + JDK-8326525: com/sun/tools/attach/BasicTests.java does not verify AgentLoadException case + JDK-8327098: GTest needs larger combination limit + JDK-8327476: Upgrade JLine to 3.26.1 + JDK-8327505: Test com/sun/jmx/remote/ /NotificationMarshalVersions/TestSerializationMismatch.java fails + JDK-8327857: Remove applet usage from JColorChooser tests Test4222508 + JDK-8327859: Remove applet usage from JColorChooser tests Test4319113 + JDK-8327986: ASAN reports use-after-free in DirectivesParserTest.empty_object_vm + JDK-8328005: Convert java/awt/im/JTextFieldTest.java applet test to main + JDK-8328085: C2: Use after free in PhaseChaitin::Register_Allocate() + JDK-8328121: Remove applet usage from JColorChooser tests Test4759306 + JDK-8328130: Remove applet usage from JColorChooser tests Test4759934 + JDK-8328185: Convert java/awt/image/MemoryLeakTest/ /MemoryLeakTest.java applet test to main + JDK-8328227: Remove applet usage from JColorChooser tests Test4887836 + JDK-8328368: Convert java/awt/image/multiresolution/ /MultiDisplayTest/MultiDisplayTest.java applet test to main + JDK-8328370: Convert java/awt/print/Dialog/PrintApplet.java applet test to main + JDK-8328380: Remove applet usage from JColorChooser tests Test6348456 + JDK-8328387: Convert java/awt/Frame/FrameStateTest/ /FrameStateTest.html applet test to main + JDK-8328403: Remove applet usage from JColorChooser tests Test6977726 + JDK-8328553: Get rid of JApplet in test/jdk/sanity/client/lib/SwingSet2/src/DemoModule.java + JDK-8328558: Convert javax/swing/JCheckBox/8032667/ /bug8032667.java applet test to main + JDK-8328717: Convert javax/swing/JColorChooser/8065098/ /bug8065098.java applet test to main + JDK-8328719: Convert java/awt/print/PageFormat/SetOrient.html applet test to main + JDK-8328730: Convert java/awt/print/bug8023392/bug8023392.html applet test to main + JDK-8328753: Open source few Undecorated Frame tests + JDK-8328819: Remove applet usage from JFileChooser tests bug6698013 + JDK-8328827: Convert java/awt/print/PrinterJob/ /PrinterDialogsModalityTest/PrinterDialogsModalityTest.html applet test to main + JDK-8329210: Delete Redundant Printer Dialog Modality Test + JDK-8329320: Simplify awt/print/PageFormat/NullPaper.java test + JDK-8329322: Convert PageFormat/Orient.java to use PassFailJFrame + JDK-8329692: Add more details to FrameStateTest.java test instructions + JDK-8330702: Update failure handler to don't generate Error message if cores actions are empty + JDK-8331153: JFR: Improve logging of jdk/jfr/api/consumer/filestream/TestOrdered.java + JDK-8331735: UpcallLinker::on_exit races with GC when copying frame anchor + JDK-8331959: Update PKCS#11 Cryptographic Token Interface to v3.1 + JDK-8332158: [XWayland] test/jdk/java/awt/Mouse/ /EnterExitEvents/ResizingFrameTest.java + JDK-8332917: failure_handler should execute gdb "info threads" command on linux + JDK-8333360: PrintNullString.java doesn't use float arguments + JDK-8333391: Test com/sun/jdi/InterruptHangTest.java failed: Thread was never interrupted during sleep + JDK-8333403: Write a test to check various components events are triggered properly + JDK-8333427: langtools/tools/javac/newlines/NewLineTest.java is failing on Japanese Windows + JDK-8334305: Remove all code for nsk.share.Log verbose mode + JDK-8334490: Normalize string with locale invariant `toLowerCase()` + JDK-8334777: Test javax/management/remote/mandatory/notif/ /NotifReconnectDeadlockTest.java failed with NullPointerException + JDK-8335150: Test LogGeneratedClassesTest.java fails on rpmbuild mock enviroment + JDK-8335172: Add manual steps to run security/auth/callback/ /TextCallbackHandler/Password.java test + JDK-8335789: [TESTBUG] XparColor.java test fails with Error. Parse Exception: Invalid or unrecognized bugid: @ + JDK-8336012: Fix usages of jtreg-reserved properties + JDK-8336498: [macos] [build]: install-file macro may run into permission denied error + JDK-8336692: Redo fix for JDK-8284620 + JDK-8336942: Improve test coverage for class loading elements with annotations of different retentions + JDK-8337222: gc/TestDisableExplicitGC.java fails due to unexpected CodeCache GC + JDK-8337494: Clarify JarInputStream behavior + JDK-8337692: Better TLS connection support + JDK-8337826: Improve logging in OCSPTimeout and SimpleOCSPResponder to help diagnose JDK-8309754 + JDK-8337886: java/awt/Frame/MaximizeUndecoratedTest.java fails in OEL due to a slight color difference + JDK-8337951: Test sun/security/validator/samedn.sh CertificateNotYetValidException: NotBefore validation + JDK-8338100: C2: assert(!n_loop->is_member(get_loop(lca))) failed: control must not be back in the loop + JDK-8338426: Test java/nio/channels/Selector/WakeupNow.java failed + JDK-8338430: Improve compiler transformations + JDK-8338571: [TestBug] DefaultCloseOperation.java test not working as expected wrt instruction after JDK-8325851 fix + JDK-8338595: Add more linesize for MIME decoder in macro bench test Base64Decode + JDK-8338668: Test javax/swing/JFileChooser/8080628/ /bug8080628.java doesn't test for GTK L&F + JDK-8339154: Cleanups and JUnit conversion of test/jdk/java/util/zip/Available.java + JDK-8339261: Logs truncated in test javax/net/ssl/DTLS/DTLSRehandshakeTest.java + JDK-8339356: Test javax/net/ssl/SSLSocket/Tls13PacketSize.java failed with java.net.SocketException: An established connection was aborted by the software in your host machine + JDK-8339524: Clean up a few ExtendedRobot tests + JDK-8339687: Rearrange reachabilityFence()s in jdk.test.lib.util.ForceGC + JDK-8339728: [Accessibility,Windows,JAWS] Bug in the getKeyChar method of the AccessBridge class + JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract + JDK-8339883: Open source several AWT/2D related tests + JDK-8339902: Open source couple TextField related tests + JDK-8339943: Frame not disposed in java/awt/dnd/DropActionChangeTest.java + JDK-8340078: Open source several 2D tests + JDK-8340116: test/jdk/sun/security/tools/jarsigner/ /PreserveRawManifestEntryAndDigest.java can fail due to regex + JDK-8340411: open source several 2D imaging tests + JDK-8340480: Bad copyright notices in changes from JDK-8339902 + JDK-8340687: Open source closed frame tests #1 + JDK-8340719: Open source AWT List tests + JDK-8340969: jdk/jfr/startupargs/TestStartDuration.java should be marked as flagless + JDK-8341037: Use standard layouts in DefaultFrameIconTest.java and MenuCrash.java + JDK-8341111: open source several AWT tests including menu shortcut tests + JDK-8341316: [macos] javax/swing/ProgressMonitor/ /ProgressMonitorEscapeKeyPress.java fails sometimes in macos + JDK-8341412: Various test failures after JDK-8334305 + JDK-8341424: GHA: Collect hs_errs from build time failures + JDK-8341453: java/awt/a11y/AccessibleJTableTest.java fails in some cases where the test tables are not visible + JDK-8341722: Fix some warnings as errors when building on Linux with toolchain clang + JDK-8341881: [REDO] java/nio/file/attribute/ /BasicFileAttributeView/CreationTime.java#tmp fails on alinux3 + JDK-8341978: Improve JButton/bug4490179.java + JDK-8341982: Simplify JButton/bug4323121.java + JDK-8342098: Write a test to compare the images + JDK-8342145: File libCreationTimeHelper.c compile fails on Alpine + JDK-8342270: Test sun/security/pkcs11/Provider/ /RequiredMechCheck.java needs write access to src tree + JDK-8342498: Add test for Allocation elimination after use as alignment reference by SuperWord + JDK-8342508: Use latch in BasicMenuUI/bug4983388.java instead of delay + JDK-8342541: Exclude List/KeyEventsTest/KeyEventsTest.java from running on macOS + JDK-8342562: Enhance Deflater operations + JDK-8342602: Remove JButton/PressedButtonRightClickTest test + JDK-8342607: Enhance register printing on x86_64 platforms + JDK-8342609: jpackage test helper function incorrectly removes a directory instead of its contents only + JDK-8342634: javax/imageio/plugins/wbmp/ /WBMPStreamTruncateTest.java creates temp file in src dir + JDK-8342635: javax/swing/JFileChooser/FileSystemView/ /WindowsDefaultIconSizeTest.java creates tmp file in src dir + JDK-8342704: GHA: Report truncation is broken after JDK-8341424 + JDK-8342811: java/net/httpclient/PlainProxyConnectionTest.java failed: Unexpected connection count: 5 + JDK-8342858: Make target mac-jdk-bundle fails on chmod command + JDK-8342988: GHA: Build JTReg in single step + JDK-8343007: Enhance Buffered Image handling + JDK-8343100: Consolidate EmptyFolderTest and EmptyFolderPackageTest jpackage tests into single java file + JDK-8343101: Rework BasicTest.testTemp test cases + JDK-8343118: [TESTBUG] java/awt/PrintJob/PrintCheckboxTest/ /PrintCheckboxManualTest.java fails with Error. Can't find HTML file PrintCheckboxManualTest.html + JDK-8343128: PassFailJFrame.java test result: Error. Bad action for script: build} + JDK-8343129: Disable unstable check of ThreadsListHandle.sanity_vm ThreadList values + JDK-8343178: Test BasicTest.java javac compile fails cannot find symbol + JDK-8343378: Exceptions in javax/management DeadLockTest.java do not cause test failure + JDK-8343491: javax/management/remote/mandatory/connection/ /DeadLockTest.java failing with NoSuchObjectException: no such object in table + JDK-8343599: Kmem limit and max values swapped when printing container information + JDK-8343724: [PPC64] Disallow OptoScheduling + JDK-8343882: BasicAnnoTests doesn't handle multiple annotations at the same position + JDK-8344581: [TESTBUG] java/awt/Robot/ /ScreenCaptureRobotTest.java failing on macOS + JDK-8344589: Update IANA Language Subtag Registry to Version 2024-11-19 + JDK-8344646: The libjsig deprecation warning should go to stderr not stdout + JDK-8345296: AArch64: VM crashes with SIGILL when prctl is disallowed + JDK-8345368: java/io/File/createTempFile/SpecialTempFile.java fails on Windows Server 2025 + JDK-8345371: Bump update version for OpenJDK: jdk-17.0.15 + JDK-8345375: Improve debuggability of test/jdk/java/net/Socket/CloseAvailable.java + JDK-8345414: Google CAInterop test failures + JDK-8345468: test/jdk/javax/swing/JScrollBar/4865918/ /bug4865918.java fails in ubuntu22.04 + JDK-8346055: javax/swing/text/StyledEditorKit/4506788/ /bug4506788.java fails in ubuntu22.04 + JDK-8346324: javax/swing/JScrollBar/4865918/bug4865918.java fails in CI + JDK-8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs + JDK-8346671: java/nio/file/Files/probeContentType/Basic.java fails on Windows 2025 + JDK-8346828: javax/swing/JScrollBar/4865918/bug4865918.java still fails in CI + JDK-8346887: DrawFocusRect() may cause an assertion failure + JDK-8346908: Update JDK 17 javadoc man page + JDK-8346972: Test java/nio/channels/FileChannel/ /LoopingTruncate.java fails sometimes with IOException: There is not enough space on the disk + JDK-8347424: Fix and rewrite sun/security/x509/DNSName/LeadingPeriod.java test + JDK-8347427: JTabbedPane/8134116/Bug8134116.java has no license header + JDK-8347740: java/io/File/createTempFile/SpecialTempFile.java failing + JDK-8347847: Enhance jar file support + JDK-8347965: (tz) Update Timezone Data to 2025a + JDK-8348625: [21u, 17u] Revert JDK-8185862 to restore old java.awt.headless behavior on Windows + JDK-8348675: TrayIcon tests fail in Ubuntu 24.10 Wayland + JDK-8349603: [21u, 17u, 11u] Update GHA JDKs after Jan/25 updates + JDK-8352097: (tz) zone.tab update missed in 2025a backport + JDK-8353905: [17u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.15 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1490=1 ## Package List: * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-17.0.15.0-150400.3.54.1 * java-17-openjdk-demo-17.0.15.0-150400.3.54.1 * java-17-openjdk-devel-debuginfo-17.0.15.0-150400.3.54.1 * java-17-openjdk-debugsource-17.0.15.0-150400.3.54.1 * java-17-openjdk-headless-17.0.15.0-150400.3.54.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 12:30:38 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 12:30:38 -0000 Subject: SUSE-SU-2025:01809-1: moderate: Security update for govulncheck-vulndb Message-ID: <174904023890.4520.4302639232628354907@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:01809-1 Release Date: 2025-06-04T09:28:08Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: Update to version 0.0.20250529T205903 2025-05-29T20:59:03Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3717 * GO-2025-3718 * GO-2025-3719 * GO-2025-3720 * GO-2025-3721 Update to version 0.0.20250527T204717 2025-05-27T20:47:17Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3699 * GO-2025-3701 * GO-2025-3704 * GO-2025-3705 * GO-2025-3706 * GO-2025-3707 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1809=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1809=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250529T205903-150000.1.82.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250529T205903-150000.1.82.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:12 -0000 Subject: SUSE-SU-2025:01766-2: moderate: Security update for postgresql16 Message-ID: <174905461284.627.18281504338509061038@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2025:01766-2 Release Date: 2025-06-04T13:37:51Z Rating: moderate References: * bsc#1242931 Cross-References: * CVE-2025-4207 CVSS scores: * CVE-2025-4207 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4207 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Legacy Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgrade to 16.9: * CVE-2025-4207: Fixed PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation (bsc#1242931) Changelog: https://www.postgresql.org/docs/release/16.9/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1766=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1766=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1766=1 ## Package List: * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql16-debugsource-16.9-150600.16.18.1 * postgresql16-contrib-debuginfo-16.9-150600.16.18.1 * postgresql16-debuginfo-16.9-150600.16.18.1 * postgresql16-devel-16.9-150600.16.18.1 * postgresql16-contrib-16.9-150600.16.18.1 * postgresql16-devel-debuginfo-16.9-150600.16.18.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql16-llvmjit-16.9-150600.16.18.1 * postgresql16-debugsource-16.9-150600.16.18.1 * postgresql16-llvmjit-debuginfo-16.9-150600.16.18.1 * postgresql16-test-16.9-150600.16.18.1 * postgresql16-debuginfo-16.9-150600.16.18.1 * postgresql16-llvmjit-devel-16.9-150600.16.18.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql16-debugsource-16.9-150600.16.18.1 * postgresql16-server-debuginfo-16.9-150600.16.18.1 * postgresql16-debuginfo-16.9-150600.16.18.1 * postgresql16-16.9-150600.16.18.1 * postgresql16-server-16.9-150600.16.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4207.html * https://bugzilla.suse.com/show_bug.cgi?id=1242931 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:10 -0000 Subject: SUSE-SU-2025:01813-1: important: Security update for MozillaThunderbird Message-ID: <174905461028.627.9503502239702399051@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2025:01813-1 Release Date: 2025-06-04T14:09:26Z Rating: important References: * bsc#1243303 Cross-References: * CVE-2025-4918 * CVE-2025-4919 CVSS scores: * CVE-2025-4918 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4918 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-4918 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4919 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4919 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-4919 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 128.10.2 (MFSA 2025-40, bsc#1243303): Security fixes: * CVE-2025-4918: Out-of-bounds access when resolving Promise objects (bmo#1966612) * CVE-2025-4919: Out-of-bounds access when optimizing linear sums (bmo#1966614) Other fixes: * Messages could not be viewed if the profile used a UNC path (bmo#1966256) * Visual and UX improvements (bmo#1964156) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1813=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1813=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1813=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1813=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1813=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-128.10.2-150200.8.218.1 * MozillaThunderbird-debugsource-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-other-128.10.2-150200.8.218.1 * MozillaThunderbird-debuginfo-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-common-128.10.2-150200.8.218.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * MozillaThunderbird-128.10.2-150200.8.218.1 * MozillaThunderbird-debugsource-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-other-128.10.2-150200.8.218.1 * MozillaThunderbird-debuginfo-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-common-128.10.2-150200.8.218.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-128.10.2-150200.8.218.1 * MozillaThunderbird-debugsource-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-other-128.10.2-150200.8.218.1 * MozillaThunderbird-debuginfo-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-common-128.10.2-150200.8.218.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-128.10.2-150200.8.218.1 * MozillaThunderbird-debugsource-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-other-128.10.2-150200.8.218.1 * MozillaThunderbird-debuginfo-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-common-128.10.2-150200.8.218.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * MozillaThunderbird-128.10.2-150200.8.218.1 * MozillaThunderbird-debugsource-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-other-128.10.2-150200.8.218.1 * MozillaThunderbird-debuginfo-128.10.2-150200.8.218.1 * MozillaThunderbird-translations-common-128.10.2-150200.8.218.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4918.html * https://www.suse.com/security/cve/CVE-2025-4919.html * https://bugzilla.suse.com/show_bug.cgi?id=1243303 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:07 -0000 Subject: SUSE-SU-2025:01814-1: important: Security update for MozillaFirefox Message-ID: <174905460728.627.1600863783064714579@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:01814-1 Release Date: 2025-06-04T14:11:09Z Rating: important References: * bsc#1243353 Cross-References: * CVE-2025-5263 * CVE-2025-5264 * CVE-2025-5265 * CVE-2025-5266 * CVE-2025-5267 * CVE-2025-5268 * CVE-2025-5269 CVSS scores: * CVE-2025-5263 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5263 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5264 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5264 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5265 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5265 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5266 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5266 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5267 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-5267 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-5268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5268 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5269 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5269 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Mozilla Firefox ESR 128.11 (MFSA 2025-44, bsc#1243353): * MFSA-TMP-2025-0001: Double-free in libvpx encoder (bmo#1962421) * CVE-2025-5263: Error handling for script execution was incorrectly isolated from web content (bmo#1960745) * CVE-2025-5264: Potential local code execution in "Copy as cURL" command (bmo#1950001) * CVE-2025-5265: Potential local code execution in "Copy as cURL" command (bmo#1962301) * CVE-2025-5266: Script element events leaked cross-origin resource status (bmo#1965628) * CVE-2025-5267: Clickjacking vulnerability could have led to leaking saved payment card details (bmo#1954137) * CVE-2025-5268: Memory safety bugs fixed in Firefox 139, Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11 (bmo#1950136, bmo#1958121, bmo#1960499, bmo#1962634) * CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird 128.11 (bmo#1924108) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1814=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1814=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1814=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1814=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1814=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1814=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1814=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1814=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1814=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1814=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1814=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1814=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1814=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1814=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1814=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-branding-upstream-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * Desktop Applications Module 15-SP7 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-translations-other-128.11.0-150200.152.185.1 * MozillaFirefox-translations-common-128.11.0-150200.152.185.1 * MozillaFirefox-128.11.0-150200.152.185.1 * MozillaFirefox-debuginfo-128.11.0-150200.152.185.1 * MozillaFirefox-debugsource-128.11.0-150200.152.185.1 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-128.11.0-150200.152.185.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5263.html * https://www.suse.com/security/cve/CVE-2025-5264.html * https://www.suse.com/security/cve/CVE-2025-5265.html * https://www.suse.com/security/cve/CVE-2025-5266.html * https://www.suse.com/security/cve/CVE-2025-5267.html * https://www.suse.com/security/cve/CVE-2025-5268.html * https://www.suse.com/security/cve/CVE-2025-5269.html * https://bugzilla.suse.com/show_bug.cgi?id=1243353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:17 -0000 Subject: SUSE-RU-2025:01461-1: moderate: Recommended update for google-cloud-sap-agent Message-ID: <174905461756.627.16783271623851793185@smelt2.prg2.suse.org> # Recommended update for google-cloud-sap-agent Announcement ID: SUSE-RU-2025:01461-1 Release Date: 2025-06-04T13:37:29Z Rating: moderate References: * bsc#1238831 * bsc#1238833 Affected Products: * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has two fixes can now be installed. ## Description: This update for google-cloud-sap-agent fixes the following issues: * Update to version v3.7: (bsc#1238831, bsc#1238833) * No public description * Moving CG disk validation to CheckPreConditions * Fix issue with filling in ha_hosts in HANA systems * Use updated UAP method for Guest Actions * Fix grep command used for landscape ID discovery * Correct arguments used by HANA disk discovery. * Add tagged disks to discovery data sent to Data Warehouse * Identify disks by mount point in SAP System data. * Auto updated compiled protocol buffers * Add collection for WLM Pacemaker alias IP setting. * Add the Maintenance Events Sample Dashboard * Auto updated compiled protocol buffers * Remove obsolete events proto from sapagent * Auto updated compiled protocol buffers * Add collection for WLM Pacemaker health check and internal load balancer metrics. * Auto updated compiled protocol buffers * Add collection for WLM Pacemaker SAPInstance automatic recover and monitor settings. * Remove restart logic used in configure OTE. Rely on config poller. * fixing TypedValue * migrating from the platform integration/common/shared to sharedlibraries * Default topology to SCALE_UP for non-HANA DBs. * Remove restarting from guestactions * Update to version v3.6: * Removing experimental check. Enable config poller by default. * removing the experimental check from role based awareness in HANA Monitoring * adding oldest_backup_catalog_data_queries in HANA Monitoring * added backup_catalog_size_queries to HANA Monitoring * adding latest_log_backup_queries in HANA Monitoring * adding data backup duration queries * adding data backup log catalog queries * adding backups/log/catalog metric in HANA Monitoring * running the proto compile on push * only building and submitting protocol buffers when .proto files are modified * Auto updated compiled protocol buffers * fixes the build failure notifications, forcing a proto compile on this submit, will update with paths after * compiling protos on submit, removes the need for a submodule doring normal github clone and build * Add collection for whether UEFI is enabled on the OS. * fix panic in HANA Monitoring when Role based awareness is invoked * Moving references to the sharedproto dir * Add collection for WLM Pacemaker SAP HANA failover settings. * Add collection for WLM Pacemaker SAP HANA topology attributes. * Fix bug in parsing of Pacemaker XML resource clone tags. * Don't return before having a chance to discover non HANA DBs * Set "min_version" for Pacemaker metrics newly added for v3.7. * Add db type and host info to app discovery to support discovery of non HANA dbs * Add collection for WLM Pacemaker SAP HANA monitor metrics. * Read HANA landscape ID from nameserver.ini * Enable DR reconciliation for new SAP Agent builds * Fix for number of lines for CheckTopology * Add collection for WLM Pacemaker SAP HANA Topology start/stop timeout metrics. * Add a check to verify if disk names with specified prefix already exist * Update backup and restore logic for scaleout setup * Add support for restoration of disks in scaleout systems * Adding support for backing up disks for scaleout systems. * Use TimeoutSec for all command executions in configureinstance subcommand * Remove configureinstance overrideVersion parameter * allow query overrides to modify RunOn field for a query in HANA Monitoring * Adding new Backint config parameters to the agent status report * fixes issue where the windows service delete can hang until the session is closed * Rename status name to Workload Manager Evaluation * Add object retention optional parameter to Backint - Agent for SAP * Update HANA Disk Restore functions to use revised interface methods. * Using temporary attachDisk interface instead of old interface * Add IAM tests for backint, wlm metrics, system discovery and disk snapshot * Add reference links to status ote * Fix race condition causing flaky unit test. * Change labels var name from "l" to "labels". * Explicitly specify default empty string values for new Pacemaker metrics. * Adds the winservice OTE and fixes the windows install / uninstall * Add functional checks for system discovery status ote. * Move configurablemetrics package into shared repository. * sap/nw/instance/role metric fix for SAP NW Java * Update HANA HA availability metric to account for DR setups. * DR discovery * Adds "-compact" flag to status ote for less verbose output. * Remove extra labels from reliability query * adds a replace for the submodule common code * Add functional checks for Hostmetrics, Processmetrics and Hanamonitoring in Status OTE * updates the go.mod and go.sum for platform changes * Compiles the platform and sapagent protos together * Adds the workloadagentplatform as a submoduile * Correct process names used for Netweaver Role identification * Add the functionality to provide the new disk prefix for group snapshot. * Add utility modules for sapagent IAM permissions * Add WLM collection for Pacemaker ERS metrics. * Update go.mod and sum * No public description * Move shared packages and protos from sapagent to workloadagentplatform * adding the handling for auth errors in case of connection retrial loop in hana monitoring * Add instance_name to labels for live migration metric event * Add log level functionality to metric events. * Add the IAM package with permission checking functionalities for checking permissions on GCP Project, Buckets, Secrets, and Disk * adding collection logic for Pacemkaer HANA clone attributes * Fix discovering virtual hostname for instances * Implements API scope full access check for Status OTE * SAP Events - Prepend full URL for availability metrics * Functional checks for Backint in Status OTE * Add Backint config value parsing/printing to Status OTE * adding WLM pacemaker stonith cluster property metric collection * adding WLM metric collection for OP timeout * Add Insight type for torso workload validation. * Add Insight type for torso workload validation. * Status OTE make service status a "State" type rather than bool. * ConfigureInstance - update SAPTune re-apply logic to support multiple solutions * Add agent health metrics to iam-permissions.yaml * adding retrials for connecting to databases till all are submitted in workerpool * Add network and subnetwork discovery to SAP System discovery process. * Add instance_name label to process metrics * Fix formatting in some log messages * only notifying on build failure for main branch * Add IAM Audit yaml that lists IAM permissions for various agent functionalities * Order labels in metric events * adding a separate check for HANA DB instances not defined in HANA Monitoring Configuration * Use the common rest package in instantsnapshotgroup * Add support for event overview and analysis to aianalyze. * Fix log message * updates to the build process * Only print denied/error IAM permissions in status ote * Fix enqueue_server WLM metric collection. * Status OTE switch IAM "role" to "permission" * Buffer metric event writes to group similar paths and reduce bloat * Add ASCS metrics to WLM collection definition. * Adding helpers and for aianalyze * Adding helpers and for aianalyze * Fix status OTE commandlineexecutor * Configuration validation in status OTE * Move sapagent GCS storage logic to shared * Add support analyzer one time command. * internal change * Ensure that performancediagnosticshandler_test will run quickly * copy /var/log/messages to support bundle * Change status proto `fullyfunctional` from bool to state enum * Get available version and systemd info in Status OTE * Add testable commandlineexecutor to supportbundle and performancediagnostics to address github test waits * Add WLM Pacemaker metric collection category for ASCS metrics. * Config validation in Status OTE * updates the github action notify * Bump sapagent version to 3.7. * Add ping functionality for hdbuserstore connections in databaseconnector * Remove assumption of package name and repo name being the same for getting latest agent version status * Add extra checks around file not existing in configureinstance * Add more states to bools in status OTE * Update the link to the next steps for HANA restore from disk snapshot. * Improvements to Pacemaker metrics tests. * Add identifier to netweaver availability * Simplify Workload Manager Pacemaker tests. * Add proper labels for availability SAP Events. * Add collection for WLM Pacemaker metric `gcpstonith`. * Add logging to cloudmetricreader and fix typo in configurationmetricreader * Skeleton code and agent status checks for status OTE * Configureinstance parameter name fix * Configureinstance parameter name fix for backport * MultipartUpload OTE * Add helpers for agent installation and service status * Improved error handling for GCE operations ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1461=1 ## Package List: * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.7-150100.3.47.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1238831 * https://bugzilla.suse.com/show_bug.cgi?id=1238833 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:50 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:50 -0000 Subject: SUSE-RU-2025:20372-1: moderate: Recommended update for openscap Message-ID: <174905465046.627.1960427144484592520@smelt2.prg2.suse.org> # Recommended update for openscap Announcement ID: SUSE-RU-2025:20372-1 Release Date: 2025-06-03T08:57:26Z Rating: moderate References: * jsc#SLE-12852 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for openscap fixes the following issues: openscap is shipped in version 1.4.1. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-129=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxmlsec1-1-debuginfo-1.2.40-slfo.1.1_1.2 * libopenscap33-1.4.1-slfo.1.1_1.1 * libxmlsec1-openssl1-1.2.40-slfo.1.1_1.2 * libxmlsec1-openssl1-debuginfo-1.2.40-slfo.1.1_1.2 * openscap-utils-1.4.1-slfo.1.1_1.1 * openscap-1.4.1-slfo.1.1_1.1 * openscap-debugsource-1.4.1-slfo.1.1_1.1 * xmlsec1-debugsource-1.2.40-slfo.1.1_1.2 * libopenscap33-debuginfo-1.4.1-slfo.1.1_1.1 * openscap-utils-debuginfo-1.4.1-slfo.1.1_1.1 * openscap-debuginfo-1.4.1-slfo.1.1_1.1 * libxmlsec1-1-1.2.40-slfo.1.1_1.2 ## References: * https://jira.suse.com/browse/SLE-12852 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:48 -0000 Subject: SUSE-SU-2025:20373-1: important: Security update for elemental-toolkit Message-ID: <174905464861.627.1114124642689817823@smelt2.prg2.suse.org> # Security update for elemental-toolkit Announcement ID: SUSE-SU-2025:20373-1 Release Date: 2025-06-03T09:03:45Z Rating: important References: * bsc#1238700 * bsc#1239335 Cross-References: * CVE-2025-22869 * CVE-2025-22870 CVSS scores: * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for elemental-toolkit fixes the following issues: * Updated to v2.2.3: * Adapted .golangci.yml format to a new version * Simplified podman calls in CI steup * Switched GHA runners to Ubuntu 24.04 * Updated year in headers * Vendored go.mod libraries * CVE-2025-22870: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238700) * CVE-2025-22869: golang.org/x/crypto/ssh: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239335) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-130=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 x86_64) * elemental-toolkit-2.2.3-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1238700 * https://bugzilla.suse.com/show_bug.cgi?id=1239335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:43 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:43 -0000 Subject: SUSE-SU-2025:20374-1: important: Security update for python311 Message-ID: <174905464399.627.17997548886255732959@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:20374-1 Release Date: 2025-06-03T09:05:30Z Rating: important References: * bsc#1210638 * bsc#1219559 * bsc#1219666 * bsc#1221854 * bsc#1225660 * bsc#1226447 * bsc#1226448 * bsc#1227378 * bsc#1227999 * bsc#1228165 * bsc#1228780 * bsc#1229596 * bsc#1229704 * bsc#1230227 * bsc#1230906 * bsc#1231795 * bsc#1232241 * bsc#1236705 * bsc#1238450 * bsc#1239210 * bsc#1241067 * bsc#1243273 Cross-References: * CVE-2022-25236 * CVE-2023-27043 * CVE-2023-52425 * CVE-2023-6597 * CVE-2024-0397 * CVE-2024-0450 * CVE-2024-4030 * CVE-2024-4032 * CVE-2024-6232 * CVE-2024-6923 * CVE-2024-7592 * CVE-2024-8088 * CVE-2024-9287 * CVE-2025-0938 * CVE-2025-1795 * CVE-2025-4516 CVSS scores: * CVE-2022-25236 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-25236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52425 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6597 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0397 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0397 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-0450 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0450 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-4030 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-4032 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6232 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-6923 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8088 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8088 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9287 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9287 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0938 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-0938 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-1795 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.1 An update that solves 16 vulnerabilities and has six fixes can now be installed. ## Description: This update for python311 fixes the following issues: * CVE-2025-4516: Fixed blocking DecodeError handling vulnerability, which could lead to DoS. (bsc#1243273) Update to 3.11.12: * gh-105704: When using urllib.parse.urlsplit() and urllib.parse.urlparse() host parsing would not reject domain names containing square brackets ([ and ]). Square brackets are only valid for IPv6 and IPvFuture hosts according to RFC 3986 Section 3.2.2 (bsc#1236705, CVE-2025-0938, gh#python/cpython#105704). * gh-121284: Fix bug in the folding of rfc2047 encoded-words when flattening an email message using a modern email policy. Previously when an encoded- word was too long for a line, it would be decoded, split across lines, and re-encoded. But commas and other special characters in the original text could be left unencoded and unquoted. This could theoretically be used to spoof header lines using a carefully constructed encoded-word if the resulting rendered email was transmitted or re-parsed. * gh-80222: Fix bug in the folding of quoted strings when flattening an email message using a modern email policy. Previously when a quoted string was folded so that it spanned more than one line, the surrounding quotes and internal escapes would be omitted. This could theoretically be used to spoof header lines using a carefully constructed quoted string if the resulting rendered email was transmitted or re-parsed. * gh-119511: Fix a potential denial of service in the imaplib module. When connecting to a malicious server, it could cause an arbitrary amount of memory to be allocated. On many systems this is harmless as unused virtual memory is only a mapping, but if this hit a virtual address size limit it could lead to a MemoryError or other process crash. On unusual systems or builds where all allocated memory is touched and backed by actual ram or storage it could?ve consumed resources doing so until similarly crashing. * gh-127257: In ssl, system call failures that OpenSSL reports using ERR_LIB_SYS are now raised as OSError. * gh-121277: Writers of CPython?s documentation can now use next as the version for the versionchanged, versionadded, deprecated directives. * gh-106883: Disable GC during the _PyThread_CurrentFrames() and _PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock. * CVE-2025-0938: disallow square brackets ([ and ]) in domain names for parsed URLs (bsc#1236705, gh#python/cpython#105704) Update to 3.11.11: * Tools/Demos * gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15 and multissltests to use 3.0.15, 3.1.7, and 3.2.3. * Security * gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to consistently use the mapped IPv4 address value for deciding properties. Properties which have their behavior fixed are is_multicast, is_reserved, is_link_local, is_global, and is_unspecified. * Library * gh-124651: Properly quote template strings in venv activation scripts (bsc#1232241, CVE-2024-9287). * Remove -IVendor/ from python-config bsc#1231795 * CVE-2024-9287: Properly quote path names provided when creating a virtual environment (bsc#1232241, * Drop .pyc files from docdir for reproducible builds (bsc#1230906). Update to 3.11.10: * Security * gh-121957: Fixed missing audit events around interactive use of Python, now also properly firing for `python -i`, as well as for `python -m asyncio`. The event in question is `cpython.run_stdin`. * gh-122133: Authenticate the socket connection for the `socket.socketpair()` fallback on platforms where `AF_UNIX` is not available like Windows. Patch by Gregory P. Smith and Seth Larson . Reported by Ellie * gh-121285: Remove backtracking from tarfile header parsing for `hdrcharset`, PAX, and GNU sparse headers (bsc#1230227, CVE-2024-6232). * gh-118486: :func:`os.mkdir` on Windows now accepts _mode_ of `0o700` to restrict the new directory to the current user. This fixes CVE-2024-4030 affecting :func:`tempfile.mkdtemp` in scenarios where the base temporary directory is more permissive than the default. * Library * gh-123270: Applied a more surgical fix for malformed payloads in :class:`zipfile.Path` causing infinite loops (gh-122905) without breaking contents using legitimate characters (bsc#1229704, CVE-2024-8088). * gh-123067: Fix quadratic complexity in parsing `"`-quoted cookie values with backslashes by :mod:`http.cookies` (bsc#1229596, CVE-2024-7592). * gh-122905: :class:`zipfile.Path` objects now sanitize names from the zipfile. * gh-121650: :mod:`email` headers with embedded newlines are now quoted on output. The :mod:`~email.generator` will now refuse to serialize (write) headers that are unsafely folded or delimited; see :attr:`~email.policy.Policy.verify_generated_headers`. (Contributed by Bas Bloemsaat and Petr Viktorin in :gh:`121650`; CVE-2024-6923, bsc#1228780). * gh-119506: Fix :meth:`!io.TextIOWrapper.write` method breaks internal buffer when the method is called again during flushing internal buffer. * gh-118643: Fix an AttributeError in the :mod:`email` module when re-fold a long address list. Also fix more cases of incorrect encoding of the address separator in the address list. * gh-113171: Fixed various false positives and false negatives in * :attr:`ipaddress.IPv4Address.is_private` (see these docs for details) * :attr:`ipaddress.IPv4Address.is_global` * :attr:`ipaddress.IPv6Address.is_private` * :attr:`ipaddress.IPv6Address.is_global` Also in the corresponding :class:`ipaddress.IPv4Network` and :class:`ipaddress.IPv6Network` attributes. Fixes bsc#1226448 (CVE-2024-4032). * gh-102988: :func:`email.utils.getaddresses` and :func:`email.utils.parseaddr` now return `('', '')` 2-tuples in more situations where invalid email addresses are encountered instead of potentially inaccurate values. Add optional _strict_ parameter to these two functions: use `strict=False` to get the old behavior, accept malformed inputs. `getattr(email.utils, 'supports_strict_parsing', False)` can be use to check if the _strict_ paramater is available. Patch by Thomas Dwyer and Victor Stinner to improve the CVE-2023-27043 fix (bsc#1210638). * gh-67693: Fix :func:`urllib.parse.urlunparse` and :func:`urllib.parse.urlunsplit` for URIs with path starting with multiple slashes and no authority. Based on patch by Ashwin Ramaswami. * Core and Builtins * gh-112275: A deadlock involving `pystate.c`'s `HEAD_LOCK` in `posixmodule.c` at fork is now fixed. Patch by ChuBoning based on previous Python 3.12 fix by Victor Stinner. * gh-109120: Added handle of incorrect star expressions, e.g `f(3, *)`. Patch by Grigoryev Semyon * CVE-2024-8088: Prevent malformed payload to cause infinite loops in zipfile.Path (bsc#1229704) * Make pip and modern tools install directly in /usr/local when used by the user. (bsc#1225660) * CVE-2024-4032: Fix rearranging definition of private v global IP addresses. (bsc#1226448) Update to 3.11.9: * Security * gh-115398: Allow controlling Expat >=2.6.0 reparse deferral (CVE-2023-52425, bsc#1219559) by adding five new methods: xml.etree.ElementTree.XMLParser.flush() xml.etree.ElementTree.XMLPullParser.flush() xml.parsers.expat.xmlparser.GetReparseDeferralEnabled() xml.parsers.expat.xmlparser.SetReparseDeferralEnabled() xml.sax.expatreader.ExpatParser.flush() * gh-115399: Update bundled libexpat to 2.6.0 * gh-115243: Fix possible crashes in collections.deque.index() when the deque is concurrently modified. * gh-114572: ssl.SSLContext.cert_store_stats() and ssl.SSLContext.get_ca_certs() now correctly lock access to the certificate store, when the ssl.SSLContext is shared across multiple threads (bsc#1226447, CVE-2024-0397). * Core and Builtins * gh-116296: Fix possible refleak in object. **reduce** () internal error handling. * gh-116034: Fix location of the error on a failed assertion. * gh-115823: Properly calculate error ranges in the parser when raising SyntaxError exceptions caused by invalid byte sequences. Patch by Pablo Galindo * gh-112087: For an empty reverse iterator for list will be reduced to reversed(). Patch by Donghee Na. * gh-115011: Setters for members with an unsigned integer type now support the same range of valid values for objects that has a **index** () method as for int. * gh-96497: Fix incorrect resolution of mangled class variables used in assignment expressions in comprehensions. * Library * gh-117310: Fixed an unlikely early & extra Py_DECREF triggered crash in ssl when creating a new _ssl._SSLContext if CPython was built implausibly such that the default cipher list is empty or the SSL library it was linked against reports a failure from its C SSL_CTX_set_cipher_list() API. * gh-117178: Fix regression in lazy loading of self-referential modules, introduced in gh-114781. * gh-117084: Fix zipfile extraction for directory entries with the name containing backslashes on Windows. * gh-117110: Fix a bug that prevents subclasses of typing.Any to be instantiated with arguments. Patch by Chris Fu. * gh-90872: On Windows, subprocess.Popen.wait() no longer calls WaitForSingleObject() with a negative timeout: pass 0 ms if the timeout is negative. Patch by Victor Stinner. * gh-116957: configparser: Don?t leave ConfigParser values in an invalid state (stored as a list instead of a str) after an earlier read raised DuplicateSectionError or DuplicateOptionError. * gh-90095: Ignore empty lines and comments in .pdbrc * gh-116764: Restore support of None and other false values in urllib.parse functions parse_qs() and parse_qsl(). Also, they now raise a TypeError for non-zero integers and non-empty sequences. * gh-116811: In PathFinder.invalidate_caches, delegate to MetadataPathFinder.invalidate_caches. * gh-116600: Fix repr() for global Flag members. * gh-116484: Change automatically generated tkinter.Checkbutton widget names to avoid collisions with automatically generated tkinter.ttk.Checkbutton widget names within the same parent widget. * gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on opening named pipe. * gh-116143: Fix a race in pydoc _start_server, eliminating a window in which _start_server can return a thread that is ?serving? but without a docserver set. * gh-116325: typing: raise SyntaxError instead of AttributeError on forward references as empty strings. * gh-90535: Fix support of interval values > 1 in logging.TimedRotatingFileHandler for when='MIDNIGHT' and when='Wx'. * gh-115978: Disable preadv(), readv(), pwritev(), and writev() on WASI. * Under wasmtime for WASI 0.2, these functions don?t pass test_posix (https://github.com/bytecodealliance/wasmtime/issues/7830). * gh-88352: Fix the computation of the next rollover time in the logging.TimedRotatingFileHandler handler. computeRollover() now always returns a timestamp larger than the specified time and works correctly during the DST change. doRollover() no longer overwrite the already rolled over file, saving from data loss when run at midnight or during repeated time at the DST change. * gh-87115: Set **main**. **spec** to None when running a script with pdb * gh-76511: Fix UnicodeEncodeError in email.Message.as_string() that results when a message that claims to be in the ascii character set actually has non-ascii characters. Non-ascii characters are now replaced with the U+FFFD replacement character, like in the replace error handler. * gh-75988: Fixed unittest.mock.create_autospec() to pass the call through to the wrapped object to return the real result. * gh-115881: Fix issue where ast.parse() would incorrectly flag conditional context managers (such as with (x() if y else z()): ...) as invalid syntax if feature_version=(3, 8) was passed. This reverts changes to the grammar made as part of gh-94949. * gh-115886: Fix silent truncation of the name with an embedded null character in multiprocessing.shared_memory.SharedMemory. * gh-115809: Improve algorithm for computing which rolled-over log files to delete in logging.TimedRotatingFileHandler. It is now reliable for handlers without namer and with arbitrary deterministic namer that leaves the datetime part in the file name unmodified. * gh-74668: urllib.parse functions parse_qs() and parse_qsl() now support bytes arguments containing raw and percent-encoded non-ASCII data. * gh-67044: csv.writer() now always quotes or escapes '\r' and '\n', regardless of lineterminator value. * gh-115712: csv.writer() now quotes empty fields if delimiter is a space and skipinitialspace is true and raises exception if quoting is not possible. * gh-115618: Fix improper decreasing the reference count for None argument in property methods getter(), setter() and deleter(). * gh-115570: A DeprecationWarning is no longer omitted on access to the **doc** attributes of the deprecated typing.io and typing.re pseudo-modules. * gh-112006: Fix inspect.unwrap() for types with the **wrapper** data descriptor. * gh-101293: Support callables with the **call** () method and types with **new** () and **init** () methods set to class methods, static methods, bound methods, partial functions, and other types of methods and descriptors in inspect.Signature.from_callable(). * gh-115392: Fix a bug in doctest where incorrect line numbers would be reported for decorated functions. * gh-114563: Fix several format() bugs when using the C implementation of Decimal: * memory leak in some rare cases when using the z format option (coerce negative 0) * incorrect output when applying the z format option to type F (fixed-point with capital NAN / INF) * incorrect output when applying the # format option (alternate form) * gh-115197: urllib.request no longer resolves the hostname before checking it against the system?s proxy bypass list on macOS and Windows. * gh-115198: Fix support of Docutils >= 0.19 in distutils. * gh-115165: Most exceptions are now ignored when attempting to set the **orig_class** attribute on objects returned when calling typing generic aliases (including generic aliases created using typing.Annotated). Previously only AttributeError was ignored. Patch by Dave Shawley. * gh-115133: Fix tests for XMLPullParser with Expat 2.6.0. * gh-115059: io.BufferedRandom.read1() now flushes the underlying write buffer. * gh-79382: Trailing ** no longer allows to match files and non-existing paths in recursive glob(). * gh-114763: Protect modules loaded with importlib.util.LazyLoader from race conditions when multiple threads try to access attributes before the loading is complete. * gh-97959: Fix rendering class methods, bound methods, method and function aliases in pydoc. Class methods no longer have ?method of builtins.type instance? note. Corresponding notes are now added for class and unbound methods. Method and function aliases now have references to the module or the class where the origin was defined if it differs from the current. Bound methods are now listed in the static methods section. Methods of builtin classes are now supported as well as methods of Python classes. * gh-112281: Allow creating union of types for typing.Annotated with unhashable metadata. * gh-111775: Fix importlib.resources.simple.ResourceHandle.open() for text mode, added missed stream argument. * gh-90095: Make .pdbrc and -c work with any valid pdb commands. * gh-107155: Fix incorrect output of help(x) where x is a lambda function, which has an **annotations** dictionary attribute with a "return" key. * gh-105866: Fixed _get_slots bug which caused error when defining dataclasses with slots and a weakref_slot. * gh-60346: Fix ArgumentParser inconsistent with parse_known_args. * gh-100985: Update HTTPSConnection to consistently wrap IPv6 Addresses when using a proxy. * gh-100884: email: fix misfolding of comma in address-lists over multiple lines in combination with unicode encoding (bsc#1238450 CVE-2025-1795) * gh-95782: Fix io.BufferedReader.tell(), io.BufferedReader.seek(), _pyio.BufferedReader.tell(), io.BufferedRandom.tell(), io.BufferedRandom.seek() and _pyio.BufferedRandom.tell() being able to return negative offsets. * gh-96310: Fix a traceback in argparse when all options in a mutually exclusive group are suppressed. * gh-93205: Fixed a bug in logging.handlers.TimedRotatingFileHandler where multiple rotating handler instances pointing to files with the same name but different extensions would conflict and not delete the correct files. * bpo-44865: Add missing call to localization function in argparse. * bpo-43952: Fix multiprocessing.connection.Listener.accept() to accept empty bytes as authkey. Not accepting empty bytes as key causes it to hang indefinitely. * bpo-42125: linecache: get module name from **spec** if available. This allows getting source code for the **main** module when a custom loader is used. * gh-66543: Make mimetypes.guess_type() properly parsing of URLs with only a host name, URLs containing fragment or query, and filenames with only a UNC sharepoint on Windows. Based on patch by Dong-hee Na. * bpo-33775: Add ?default? and ?version? help text for localization in argparse. * Documentation * gh-115399: Document CVE-2023-52425 of Expat <2.6.0 under ?XML vulnerabilities?. * gh-115233: Fix an example for LoggerAdapter in the Logging Cookbook. * IDLE * gh-88516: On macOS show a proxy icon in the title bar of editor windows to match platform behaviour. * Tools/Demos * gh-113516: Don?t set LDSHARED when building for WASI. * C API * gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows 64-bit platforms. * Add reference to CVE-2024-0450 (bsc#1221854) to changelog. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-128=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * python311-curses-3.11.12-slfo.1.1_1.1 * python311-debuginfo-3.11.12-slfo.1.1_1.1 * python311-base-debuginfo-3.11.12-slfo.1.1_1.1 * python311-debugsource-3.11.12-slfo.1.1_1.1 * libpython3_11-1_0-3.11.12-slfo.1.1_1.1 * python311-core-debugsource-3.11.12-slfo.1.1_1.1 * libpython3_11-1_0-debuginfo-3.11.12-slfo.1.1_1.1 * python311-base-3.11.12-slfo.1.1_1.1 * python311-curses-debuginfo-3.11.12-slfo.1.1_1.1 * python311-3.11.12-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2022-25236.html * https://www.suse.com/security/cve/CVE-2023-27043.html * https://www.suse.com/security/cve/CVE-2023-52425.html * https://www.suse.com/security/cve/CVE-2023-6597.html * https://www.suse.com/security/cve/CVE-2024-0397.html * https://www.suse.com/security/cve/CVE-2024-0450.html * https://www.suse.com/security/cve/CVE-2024-4030.html * https://www.suse.com/security/cve/CVE-2024-4032.html * https://www.suse.com/security/cve/CVE-2024-6232.html * https://www.suse.com/security/cve/CVE-2024-6923.html * https://www.suse.com/security/cve/CVE-2024-7592.html * https://www.suse.com/security/cve/CVE-2024-8088.html * https://www.suse.com/security/cve/CVE-2024-9287.html * https://www.suse.com/security/cve/CVE-2025-0938.html * https://www.suse.com/security/cve/CVE-2025-1795.html * https://www.suse.com/security/cve/CVE-2025-4516.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 * https://bugzilla.suse.com/show_bug.cgi?id=1219559 * https://bugzilla.suse.com/show_bug.cgi?id=1219666 * https://bugzilla.suse.com/show_bug.cgi?id=1221854 * https://bugzilla.suse.com/show_bug.cgi?id=1225660 * https://bugzilla.suse.com/show_bug.cgi?id=1226447 * https://bugzilla.suse.com/show_bug.cgi?id=1226448 * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1227999 * https://bugzilla.suse.com/show_bug.cgi?id=1228165 * https://bugzilla.suse.com/show_bug.cgi?id=1228780 * https://bugzilla.suse.com/show_bug.cgi?id=1229596 * https://bugzilla.suse.com/show_bug.cgi?id=1229704 * https://bugzilla.suse.com/show_bug.cgi?id=1230227 * https://bugzilla.suse.com/show_bug.cgi?id=1230906 * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1232241 * https://bugzilla.suse.com/show_bug.cgi?id=1236705 * https://bugzilla.suse.com/show_bug.cgi?id=1238450 * https://bugzilla.suse.com/show_bug.cgi?id=1239210 * https://bugzilla.suse.com/show_bug.cgi?id=1241067 * https://bugzilla.suse.com/show_bug.cgi?id=1243273 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 16:30:53 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 16:30:53 -0000 Subject: SUSE-RU-2025:20371-1: moderate: Recommended update for elemental Message-ID: <174905465373.627.6327151253048555017@smelt2.prg2.suse.org> # Recommended update for elemental Announcement ID: SUSE-RU-2025:20371-1 Release Date: 2025-06-02T09:11:24Z Rating: moderate References: * bsc#1239623 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for elemental fixes the following issues: Update to v2.2.1: * Include an empty /etc/machine-id file (bsc#1239623) * Remove /etc/machine-id from base container ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-127=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * elemental-updater-2.2.1-slfo.1.1_1.1 * elemental-2.2.1-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * elemental-support-1.7.2-slfo.1.1_1.1 * elemental-register-1.7.2-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239623 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 20:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 20:30:09 -0000 Subject: SUSE-SU-2025:01815-1: important: Security update for apache-commons-beanutils Message-ID: <174906900906.10808.3327390527717375731@smelt2.prg2.suse.org> # Security update for apache-commons-beanutils Announcement ID: SUSE-SU-2025:01815-1 Release Date: 2025-06-04T17:02:10Z Rating: important References: * bsc#1243793 Cross-References: * CVE-2025-48734 CVSS scores: * CVE-2025-48734 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-48734 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP6 * Web and Scripting Module 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for apache-commons-beanutils fixes the following issues: Update to 1.11.0 * CVE-2025-48734: Fixed possible arbitrary code execution vulnerability (bsc#1243793) Full changelog: https://commons.apache.org/proper/commons-beanutils/changes.html#a1.11.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1815=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1815=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1815=1 * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-1815=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1815=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1815=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1815=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1815=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1815=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1815=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1815=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1815=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1815=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1815=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1815=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1815=1 ## Package List: * SUSE Enterprise Storage 7.1 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * openSUSE Leap 15.6 (noarch) * apache-commons-beanutils-javadoc-1.11.0-150200.3.9.1 * apache-commons-beanutils-1.11.0-150200.3.9.1 * Web and Scripting Module 15-SP6 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * Web and Scripting Module 15-SP7 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 * SUSE Manager Server 4.3 (noarch) * apache-commons-beanutils-1.11.0-150200.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48734.html * https://bugzilla.suse.com/show_bug.cgi?id=1243793 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 4 20:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Jun 2025 20:30:05 -0000 Subject: SUSE-SU-2025:01816-1: important: Security update for libcryptopp Message-ID: <174906900520.10808.4015523434790239212@smelt2.prg2.suse.org> # Security update for libcryptopp Announcement ID: SUSE-SU-2025:01816-1 Release Date: 2025-06-04T17:04:07Z Rating: important References: * bsc#1224280 Cross-References: * CVE-2024-28285 CVSS scores: * CVE-2024-28285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libcryptopp fixes the following issues: * CVE-2024-28285: Fixed potential leak of secret key of ElGamal encryption via fault injection (bsc#1224280) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1816=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1816=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1816=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1816=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1816=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1816=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1816=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1816=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1816=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1816=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1816=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1816=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1816=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1816=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1816=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * openSUSE Leap 15.4 (x86_64) * libcryptopp8_6_0-32bit-8.6.0-150400.3.9.1 * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.9.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libcryptopp8_6_0-64bit-8.6.0-150400.3.9.1 * libcryptopp8_6_0-64bit-debuginfo-8.6.0-150400.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * openSUSE Leap 15.6 (x86_64) * libcryptopp8_6_0-32bit-8.6.0-150400.3.9.1 * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.9.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.9.1 * libcryptopp-devel-8.6.0-150400.3.9.1 * libcryptopp8_6_0-8.6.0-150400.3.9.1 * libcryptopp-debugsource-8.6.0-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28285.html * https://bugzilla.suse.com/show_bug.cgi?id=1224280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 08:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 08:30:10 -0000 Subject: SUSE-SU-2025:01704-2: important: Security update for python-setuptools Message-ID: <174911221047.24168.8982226593891230258@smelt2.prg2.suse.org> # Security update for python-setuptools Announcement ID: SUSE-SU-2025:01704-2 Release Date: 2025-06-05T07:48:18Z Rating: important References: * bsc#1243313 Cross-References: * CVE-2025-47273 CVSS scores: * CVE-2025-47273 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-47273 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-47273 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-setuptools fixes the following issues: * CVE-2025-47273: path traversal in PackageIndex.download may lead to an arbitrary file write (bsc#1243313). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-1704=1 ## Package List: * Python 3 Module 15-SP7 (noarch) * python311-setuptools-67.7.2-150400.3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47273.html * https://bugzilla.suse.com/show_bug.cgi?id=1243313 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 08:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 08:30:15 -0000 Subject: SUSE-SU-2025:01817-1: important: Security update for libsoup Message-ID: <174911221513.24168.10546216368906224010@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:01817-1 Release Date: 2025-06-05T06:52:43Z Rating: important References: * bsc#1243332 * bsc#1243422 * bsc#1243423 Cross-References: * CVE-2025-4476 * CVE-2025-4948 * CVE-2025-4969 CVSS scores: * CVE-2025-4476 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4476 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-4476 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-4948 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-4948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4969 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4969 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-4969 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) * CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) * CVE-2025-4476: Fixed NULL pointer dereference may lead to denial of service (bsc#1243422) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1817=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1817=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1817=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1817=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1817=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1817=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1817=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1817=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1817=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1817=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1817=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1817=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * openSUSE Leap 15.4 (x86_64) * libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.10.1 * libsoup-3_0-0-32bit-3.0.4-150400.3.10.1 * libsoup-devel-32bit-3.0.4-150400.3.10.1 * openSUSE Leap 15.4 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-devel-64bit-3.0.4-150400.3.10.1 * libsoup-3_0-0-64bit-3.0.4-150400.3.10.1 * libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Manager Proxy 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.10.1 * libsoup-debugsource-3.0.4-150400.3.10.1 * libsoup-devel-3.0.4-150400.3.10.1 * libsoup-3_0-0-3.0.4-150400.3.10.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.10.1 * SUSE Manager Server 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4476.html * https://www.suse.com/security/cve/CVE-2025-4948.html * https://www.suse.com/security/cve/CVE-2025-4969.html * https://bugzilla.suse.com/show_bug.cgi?id=1243332 * https://bugzilla.suse.com/show_bug.cgi?id=1243422 * https://bugzilla.suse.com/show_bug.cgi?id=1243423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 08:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 08:30:07 -0000 Subject: SUSE-SU-2025:01525-1: important: Security update for java-1_8_0-openjdk Message-ID: <174911220784.24168.2046779406549964361@smelt2.prg2.suse.org> # Security update for java-1_8_0-openjdk Announcement ID: SUSE-SU-2025:01525-1 Release Date: 2025-06-05T07:48:33Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Legacy Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openjdk fixes the following issues: Update to version jdk8u452 (icedtea-3.35.0) Security issues fixed: * CVE-2025-21587: unauthorized creation, deletion or modification of critical data through the JSSE component. (bsc#1241274) * CVE-2025-30691: unauthorized update, insert or delete access to a subset of Oracle Java SE data through the Compiler component. (bsc#1241275) * CVE-2025-30698: unauthorized access to Oracle Java SE data and unauthorized ability to cause partial DoS through the 2D component. (bsc#1241276) Non-security issues fixed: * JDK-8212096: javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java failed intermittently due to SSLException: Tag mismatch. * JDK-8261020: wrong format parameter in create_emergency_chunk_path. * JDK-8266881: enable debug log for SSLEngineExplorerMatchedSNI.java. * JDK-8268457: XML Transformer outputs Unicode supplementary character incorrectly to HTML. * JDK-8309841: Jarsigner should print a warning if an entry is removed. * JDK-8337494: clarify JarInputStream behavior. * JDK-8339637: (tz) update Timezone Data to 2024b. * JDK-8339644: improve parsing of Day/Month in tzdata rules * JDK-8339810: clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract. * JDK-8340552: harden TzdbZoneRulesCompiler against missing zone names. * JDK-8342562: enhance Deflater operations. * JDK-8346587: distrust TLS server certificates anchored by Camerfirma Root CAs. * JDK-8347847: enhance jar file support. * JDK-8347965: (tz) update Timezone Data to 2025a. * JDK-8348211: [8u] sun/management/jmxremote/startstop/JMXStartStopTest.java fails after backport of JDK-8066708. * JDK-8350816: [8u] update TzdbZoneRulesCompiler to ignore HST/EST/MST links. * JDK-8352097: (tz) zone.tab update missed in 2025a backport. * JDK-8353433: XCG currency code not recognized in JDK 8u. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1525=1 ## Package List: * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-debuginfo-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-headless-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-demo-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-devel-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-debugsource-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-debuginfo-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.452-150000.3.106.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.452-150000.3.106.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:08 -0000 Subject: SUSE-RU-2025:01826-1: moderate: Recommended update for google-guest-agent Message-ID: <174914100841.629.10384670752064267657@smelt2.prg2.suse.org> # Recommended update for google-guest-agent Announcement ID: SUSE-RU-2025:01826-1 Release Date: 2025-06-05T14:39:16Z Rating: moderate References: * bsc#1243254 * bsc#1243505 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for google-guest-agent fixes the following issues: * Update to version 20250506.01 (bsc#1243254, bsc#1243505) * Make sure agent added connections are activated by NM * Wrap NSS cache refresh in a goroutine * Wicked: Only reload interfaces for which configurations are written or changed. * Add AuthorizedKeysCompat to windows packaging * Remove error messages from gce_workload_cert_refresh and metadata script runner * Update guest-logging-go dependency * Add 'created-by' metadata, and pass it as option to logging library * Re-enable disabled services if the core plugin was enabled * Enable guest services on package upgrade * Fix core plugin path * Fix package build issues * Fix dependencies ran go mod tidy -v * Bundle compat metadata script runner binary in package * Bump golang.org/x/net from 0.27.0 to 0.36.0 * Update startup/shutdown services to launch compat manager * Bundle new gce metadata script runner binary in agent package * Revert "Revert bundling new binaries in the package" ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-1826=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-1.53.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243254 * https://bugzilla.suse.com/show_bug.cgi?id=1243505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:14 -0000 Subject: SUSE-RU-2025:01825-1: moderate: Recommended update for google-guest-agent Message-ID: <174914101423.629.7339701521576283325@smelt2.prg2.suse.org> # Recommended update for google-guest-agent Announcement ID: SUSE-RU-2025:01825-1 Release Date: 2025-06-05T14:39:03Z Rating: moderate References: * bsc#1243254 * bsc#1243505 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for google-guest-agent fixes the following issues: * Update to version 20250506.01 (bsc#1243254, bsc#1243505) * Make sure agent added connections are activated by NM * Wrap NSS cache refresh in a goroutine * Wicked: Only reload interfaces for which configurations are written or changed. * Add AuthorizedKeysCompat to windows packaging * Remove error messages from gce_workload_cert_refresh and metadata script runner * Update guest-logging-go dependency * Add 'created-by' metadata, and pass it as option to logging library * Re-enable disabled services if the core plugin was enabled * Enable guest services on package upgrade * Fix core plugin path * Fix package build issues * Fix dependencies ran go mod tidy -v * Bundle compat metadata script runner binary in package * Bump golang.org/x/net from 0.27.0 to 0.36.0 * Update startup/shutdown services to launch compat manager * Bundle new gce metadata script runner binary in agent package * Revert "Revert bundling new binaries in the package" ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1825=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1825=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1825=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1825=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1825=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1825=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1825=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250506.01-150000.1.63.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243254 * https://bugzilla.suse.com/show_bug.cgi?id=1243505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:18 -0000 Subject: SUSE-RU-2025:01824-1: moderate: Recommended update for resource-agents Message-ID: <174914101834.629.7022280515303006911@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2025:01824-1 Release Date: 2025-06-05T14:23:32Z Rating: moderate References: * bsc#1241692 * bsc#1241867 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for resource-agents fixes the following issues: * DB2 resource agent forcefully shuts down database, risking data loss (bsc#1241692). * fuser returning unexpected list of PIDs to Filesystem RA (bsc#1241867). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1824=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-1824=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * ldirectord-4.12.0+git30.7fd7c8fa-150500.3.20.1 * resource-agents-debugsource-4.12.0+git30.7fd7c8fa-150500.3.20.1 * resource-agents-debuginfo-4.12.0+git30.7fd7c8fa-150500.3.20.1 * resource-agents-4.12.0+git30.7fd7c8fa-150500.3.20.1 * resource-agents-zfs-4.12.0+git30.7fd7c8fa-150500.3.20.1 * openSUSE Leap 15.5 (noarch) * monitoring-plugins-metadata-4.12.0+git30.7fd7c8fa-150500.3.20.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * resource-agents-debugsource-4.12.0+git30.7fd7c8fa-150500.3.20.1 * resource-agents-debuginfo-4.12.0+git30.7fd7c8fa-150500.3.20.1 * resource-agents-4.12.0+git30.7fd7c8fa-150500.3.20.1 * ldirectord-4.12.0+git30.7fd7c8fa-150500.3.20.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * monitoring-plugins-metadata-4.12.0+git30.7fd7c8fa-150500.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241692 * https://bugzilla.suse.com/show_bug.cgi?id=1241867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:21 -0000 Subject: SUSE-RU-2025:01823-1: moderate: Recommended update for resource-agents Message-ID: <174914102133.629.16754305045121639336@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2025:01823-1 Release Date: 2025-06-05T14:23:23Z Rating: moderate References: * bsc#1241692 * bsc#1241867 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for resource-agents fixes the following issue: * DB2 resource agent forcefully shuts down database, risking data loss (bsc#1241692). * fuser returning unexpected list of PIDs to Filesystem RA (bsc#1241867). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1823=1 openSUSE-SLE-15.6-2025-1823=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-1823=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * resource-agents-debuginfo-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-4.13.0+git6.ae50f94f-150600.4.14.3 * ldirectord-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-debugsource-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-zfs-4.13.0+git6.ae50f94f-150600.4.14.3 * openSUSE Leap 15.6 (noarch) * monitoring-plugins-metadata-4.13.0+git6.ae50f94f-150600.4.14.3 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * resource-agents-debuginfo-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-debugsource-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-4.13.0+git6.ae50f94f-150600.4.14.3 * ldirectord-4.13.0+git6.ae50f94f-150600.4.14.3 * SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch) * monitoring-plugins-metadata-4.13.0+git6.ae50f94f-150600.4.14.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241692 * https://bugzilla.suse.com/show_bug.cgi?id=1241867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:26 -0000 Subject: SUSE-RU-2025:01822-1: moderate: Recommended update for resource-agents Message-ID: <174914102653.629.15558000914398670249@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2025:01822-1 Release Date: 2025-06-05T14:23:08Z Rating: moderate References: * bsc#1241692 * bsc#1241867 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for resource-agents fixes the following issue: * DB2 resource agent forcefully shuts down database, risking data loss (bsc#1241692). * fuser returning unexpected list of PIDs to Filesystem RA (bsc#1241867). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1822=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1822=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * resource-agents-4.10.0+git40.0f4de473-150400.3.39.1 * resource-agents-debugsource-4.10.0+git40.0f4de473-150400.3.39.1 * ldirectord-4.10.0+git40.0f4de473-150400.3.39.1 * resource-agents-debuginfo-4.10.0+git40.0f4de473-150400.3.39.1 * openSUSE Leap 15.4 (noarch) * monitoring-plugins-metadata-4.10.0+git40.0f4de473-150400.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * resource-agents-4.10.0+git40.0f4de473-150400.3.39.1 * resource-agents-debugsource-4.10.0+git40.0f4de473-150400.3.39.1 * ldirectord-4.10.0+git40.0f4de473-150400.3.39.1 * resource-agents-debuginfo-4.10.0+git40.0f4de473-150400.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (noarch) * monitoring-plugins-metadata-4.10.0+git40.0f4de473-150400.3.39.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241692 * https://bugzilla.suse.com/show_bug.cgi?id=1241867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:31 -0000 Subject: SUSE-RU-2025:01821-1: moderate: Recommended update for resource-agents Message-ID: <174914103166.629.17551759586511454179@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2025:01821-1 Release Date: 2025-06-05T14:22:58Z Rating: moderate References: * bsc#1241692 * bsc#1241867 Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has two fixes can now be installed. ## Description: This update for resource-agents fixes the following issue: * DB2 resource agent forcefully shuts down database, risking data loss (bsc#1241692). * fuser returning unexpected list of PIDs to Filesystem RA (bsc#1241867). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1821=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-1821=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * resource-agents-4.8.0+git30.d0077df0-150300.8.48.2 * resource-agents-debugsource-4.8.0+git30.d0077df0-150300.8.48.2 * resource-agents-debuginfo-4.8.0+git30.d0077df0-150300.8.48.2 * ldirectord-4.8.0+git30.d0077df0-150300.8.48.2 * openSUSE Leap 15.3 (noarch) * monitoring-plugins-metadata-4.8.0+git30.d0077df0-150300.8.48.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * resource-agents-4.8.0+git30.d0077df0-150300.8.48.2 * resource-agents-debugsource-4.8.0+git30.d0077df0-150300.8.48.2 * resource-agents-debuginfo-4.8.0+git30.d0077df0-150300.8.48.2 * ldirectord-4.8.0+git30.d0077df0-150300.8.48.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (noarch) * monitoring-plugins-metadata-4.8.0+git30.d0077df0-150300.8.48.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241692 * https://bugzilla.suse.com/show_bug.cgi?id=1241867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:33 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:33 -0000 Subject: SUSE-RU-2025:01820-1: moderate: Recommended update for resource-agents Message-ID: <174914103375.629.7379482748212844779@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2025:01820-1 Release Date: 2025-06-05T14:22:47Z Rating: moderate References: * bsc#1241692 Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for resource-agents fixes the following issue: * DB2 resource agent forcefully shuts down database, risking data loss (bsc#1241692). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2025-1820=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2025-1820=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * resource-agents-debugsource-4.3.018.a7fb5035-3.113.3 * ldirectord-4.3.018.a7fb5035-3.113.3 * resource-agents-debuginfo-4.3.018.a7fb5035-3.113.3 * resource-agents-4.3.018.a7fb5035-3.113.3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * monitoring-plugins-metadata-4.3.018.a7fb5035-3.113.3 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * resource-agents-debugsource-4.3.018.a7fb5035-3.113.3 * ldirectord-4.3.018.a7fb5035-3.113.3 * resource-agents-debuginfo-4.3.018.a7fb5035-3.113.3 * resource-agents-4.3.018.a7fb5035-3.113.3 * SUSE Linux Enterprise High Availability Extension 12 SP5 (noarch) * monitoring-plugins-metadata-4.3.018.a7fb5035-3.113.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:36 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:36 -0000 Subject: SUSE-SU-2025:01571-1: moderate: Security update for gimp Message-ID: <174914103610.629.4660950187050758340@smelt2.prg2.suse.org> # Security update for gimp Announcement ID: SUSE-SU-2025:01571-1 Release Date: 2025-06-05T14:08:12Z Rating: moderate References: * bsc#1241691 Cross-References: * CVE-2025-2761 CVSS scores: * CVE-2025-2761 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-2761 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gimp fixes the following issues: * CVE-2025-2761: unvalidated user input in FLI file parsing may lead to an out-of-bounds write (bsc#1241691). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1571=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1571=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64) * gimp-plugin-aa-debuginfo-2.10.30-150400.3.14.1 * gimp-devel-debuginfo-2.10.30-150400.3.14.1 * gimp-devel-2.10.30-150400.3.14.1 * gimp-plugin-aa-2.10.30-150400.3.14.1 * gimp-2.10.30-150400.3.14.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * gimp-debugsource-2.10.30-150400.3.14.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.14.1 * gimp-debuginfo-2.10.30-150400.3.14.1 * libgimp-2_0-0-debuginfo-2.10.30-150400.3.14.1 * libgimpui-2_0-0-2.10.30-150400.3.14.1 * libgimp-2_0-0-2.10.30-150400.3.14.1 * SUSE Package Hub 15 15-SP7 (noarch) * gimp-lang-2.10.30-150400.3.14.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * gimp-debugsource-2.10.30-150400.3.14.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.14.1 * gimp-devel-debuginfo-2.10.30-150400.3.14.1 * gimp-devel-2.10.30-150400.3.14.1 * gimp-debuginfo-2.10.30-150400.3.14.1 * libgimp-2_0-0-debuginfo-2.10.30-150400.3.14.1 * libgimpui-2_0-0-2.10.30-150400.3.14.1 * libgimp-2_0-0-2.10.30-150400.3.14.1 * gimp-2.10.30-150400.3.14.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * gimp-lang-2.10.30-150400.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2761.html * https://bugzilla.suse.com/show_bug.cgi?id=1241691 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:40 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:40 -0000 Subject: SUSE-SU-2025:01818-1: low: Security update for python-cryptography Message-ID: <174914104008.629.16447734289460845179@smelt2.prg2.suse.org> # Security update for python-cryptography Announcement ID: SUSE-SU-2025:01818-1 Release Date: 2025-06-05T13:53:12Z Rating: low References: * bsc#1242631 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-cryptography fixes the following issues: * CVE-2025-3416: openssl: use-after-free in `Md::fetch` and `Cipher::fetch` when `Some(...)` value passed as `properties` argument to either function (bsc#1242631). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1818=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1818=1 ## Package List: * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-cryptography-41.0.3-150400.16.22.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-cryptography-41.0.3-150400.16.22.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 16:30:44 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 16:30:44 -0000 Subject: SUSE-SU-2025:01500-1: moderate: Security update for opensaml Message-ID: <174914104420.629.16737465746682384489@smelt2.prg2.suse.org> # Security update for opensaml Announcement ID: SUSE-SU-2025:01500-1 Release Date: 2025-06-05T13:19:14Z Rating: moderate References: * bsc#1239889 Cross-References: * CVE-2025-31335 CVSS scores: * CVE-2025-31335 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-31335 ( NVD ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for opensaml fixes the following issues: * CVE-2025-31335: Fixed a bug where parameter manipulation allows the forging of signed SAML messages. (bsc#1239889) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1500=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * opensaml-debuginfo-3.1.0-150300.3.3.1 * opensaml-schemas-3.1.0-150300.3.3.1 * libsaml11-debuginfo-3.1.0-150300.3.3.1 * libsaml-devel-3.1.0-150300.3.3.1 * opensaml-debugsource-3.1.0-150300.3.3.1 * libsaml11-3.1.0-150300.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31335.html * https://bugzilla.suse.com/show_bug.cgi?id=1239889 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 5 20:30:03 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Jun 2025 20:30:03 -0000 Subject: SUSE-OU-2025:01827-1: low: Optional update for python-six Message-ID: <174915540398.655.15236297829863351649@smelt2.prg2.suse.org> # Optional update for python-six Announcement ID: SUSE-OU-2025:01827-1 Release Date: 2025-06-05T16:11:27Z Rating: low References: Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update python-six fixes the following issue: * Rebuild for consistency across products, no source changes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1827=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1827=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1827=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-1827=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-1827=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-six-1.16.0-150400.18.11.1 * openSUSE Leap 15.6 (noarch) * python311-six-1.16.0-150400.18.11.1 * Public Cloud Module 15-SP4 (noarch) * python311-six-1.16.0-150400.18.11.1 * Python 3 Module 15-SP6 (noarch) * python311-six-1.16.0-150400.18.11.1 * Python 3 Module 15-SP7 (noarch) * python311-six-1.16.0-150400.18.11.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 08:30:03 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 08:30:03 -0000 Subject: SUSE-RU-2025:01828-1: moderate: Recommended update for SUSE Manager 4.3 LTS Message-ID: <174919860363.627.9378407060793306783@smelt2.prg2.suse.org> # Recommended update for SUSE Manager 4.3 LTS Announcement ID: SUSE-RU-2025:01828-1 Release Date: 2025-06-06T07:44:22Z Rating: moderate References: * jsc#MSC-956 Affected Products: * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 LTS An update that contains one feature can now be installed. ## Description: This update for SUSE Manager 4.3 LTS fixes the following issue: * Set product lifecycle: * suse-manager-server-lts-release * suse-manager-proxy-lts-release * suse-manager-retail-branch-server-lts-release ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-1828=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-1828=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-1828=1 ## Package List: * SUSE Manager Proxy 4.3 LTS (x86_64) * suse-manager-proxy-lts-release-4.3-150400.10.3.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * suse-manager-retail-branch-server-lts-release-4.3-150400.10.3.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * suse-manager-server-lts-release-4.3-150400.10.3.1 ## References: * https://jira.suse.com/browse/MSC-956 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:04 -0000 Subject: SUSE-SU-2025:00764-1: moderate: Security update for gnutls Message-ID: <174921300499.655.1328746736443905429@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2025:00764-1 Release Date: 2025-06-06T10:05:59Z Rating: moderate References: * bsc#1236974 Cross-References: * CVE-2024-12243 CVSS scores: * CVE-2024-12243 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-12243 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-12243 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Certifications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-12243: quadratic complexity of DER input decoding in libtasn1 can lead to a DoS (bsc#1236974). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Certifications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Certifications-15-SP7-2025-764=1 ## Package List: * Certifications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libgnutlsxx30-3.8.3-150600.4.6.2 * libgnutls-devel-3.8.3-150600.4.6.2 * libgnutls30-debuginfo-3.8.3-150600.4.6.2 * libgnutls30-3.8.3-150600.4.6.2 * libgnutlsxx-devel-3.8.3-150600.4.6.2 * gnutls-debugsource-3.8.3-150600.4.6.2 * libgnutlsxx30-debuginfo-3.8.3-150600.4.6.2 * Certifications Module 15-SP7 (x86_64) * libgnutls30-32bit-3.8.3-150600.4.6.2 * libgnutls-devel-32bit-3.8.3-150600.4.6.2 * libgnutls30-32bit-debuginfo-3.8.3-150600.4.6.2 ## References: * https://www.suse.com/security/cve/CVE-2024-12243.html * https://bugzilla.suse.com/show_bug.cgi?id=1236974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:09 -0000 Subject: SUSE-RU-2025:01696-2: moderate: Recommended update for brasero Message-ID: <174921300926.655.13341543545383924437@smelt2.prg2.suse.org> # Recommended update for brasero Announcement ID: SUSE-RU-2025:01696-2 Release Date: 2025-06-06T10:05:20Z Rating: moderate References: * bsc#1240410 Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for brasero fixes the following issue: * Prefer "application/vnd.efi.iso" to "application/x-cd-image" mime type for ISO images (bsc#1240410). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1696=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libbrasero-utils3-1-3.12.3-150600.10.3.2 * typelib-1_0-BraseroMedia-3_2_0-3.12.3-150600.10.3.2 * brasero-devel-3.12.3-150600.10.3.2 * libbrasero-utils3-1-debuginfo-3.12.3-150600.10.3.2 * brasero-debugsource-3.12.3-150600.10.3.2 * libbrasero-media3-1-debuginfo-3.12.3-150600.10.3.2 * brasero-debuginfo-3.12.3-150600.10.3.2 * libbrasero-burn3-1-debuginfo-3.12.3-150600.10.3.2 * libbrasero-media3-1-3.12.3-150600.10.3.2 * libbrasero-burn3-1-3.12.3-150600.10.3.2 * brasero-3.12.3-150600.10.3.2 * typelib-1_0-BraseroBurn-3_2_0-3.12.3-150600.10.3.2 * Desktop Applications Module 15-SP7 (noarch) * brasero-lang-3.12.3-150600.10.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:12 -0000 Subject: SUSE-SU-2025:01508-1: moderate: Security update for openvpn Message-ID: <174921301273.655.3655371340013408719@smelt2.prg2.suse.org> # Security update for openvpn Announcement ID: SUSE-SU-2025:01508-1 Release Date: 2025-06-06T10:05:14Z Rating: moderate References: * bsc#1240392 Cross-References: * CVE-2025-2704 CVSS scores: * CVE-2025-2704 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-2704 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2704 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * CVE-2025-2704: Fixed remote DoS due to possible ASSERT() on OpenVPN servers using --tls-crypt-v2 (bsc#1240392) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1508=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openvpn-dco-debugsource-2.6.8-150600.3.17.1 * openvpn-debuginfo-2.6.8-150600.3.17.1 * openvpn-debugsource-2.6.8-150600.3.17.1 * openvpn-2.6.8-150600.3.17.1 * openvpn-devel-2.6.8-150600.3.17.1 * openvpn-dco-2.6.8-150600.3.17.1 * openvpn-auth-pam-plugin-2.6.8-150600.3.17.1 * openvpn-dco-debuginfo-2.6.8-150600.3.17.1 * openvpn-auth-pam-plugin-debuginfo-2.6.8-150600.3.17.1 * openvpn-dco-devel-2.6.8-150600.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2704.html * https://bugzilla.suse.com/show_bug.cgi?id=1240392 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:15 -0000 Subject: SUSE-RU-2025:01829-1: moderate: Recommended update for libnettle Message-ID: <174921301582.655.15160074658009502379@smelt2.prg2.suse.org> # Recommended update for libnettle Announcement ID: SUSE-RU-2025:01829-1 Release Date: 2025-06-06T10:05:01Z Rating: moderate References: * bsc#1221714 * bsc#1226724 Affected Products: * Certifications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has two fixes can now be installed. ## Description: This update for libnettle fixes the following issue: * FIPS integrity checksums were not correct on s390x (bsc#1221714) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Certifications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Certifications-15-SP7-2025-1829=1 ## Package List: * Certifications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libhogweed6-debuginfo-3.9.1-150600.3.2.1 * libnettle-debugsource-3.9.1-150600.3.2.1 * libnettle-devel-3.9.1-150600.3.2.1 * libnettle8-3.9.1-150600.3.2.1 * libnettle8-debuginfo-3.9.1-150600.3.2.1 * libhogweed6-3.9.1-150600.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221714 * https://bugzilla.suse.com/show_bug.cgi?id=1226724 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:18 -0000 Subject: SUSE-RU-2025:01595-2: moderate: Recommended update for clamav Message-ID: <174921301891.655.1878737532072722824@smelt2.prg2.suse.org> # Recommended update for clamav Announcement ID: SUSE-RU-2025:01595-2 Release Date: 2025-06-06T10:04:56Z Rating: moderate References: * bsc#1239957 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for clamav fixes the following issues: * Build binaries as position independend executable. (bsc#1239957) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1595=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * clamav-1.4.2-150600.18.12.1 * libclamav12-1.4.2-150600.18.12.1 * clamav-debugsource-1.4.2-150600.18.12.1 * clamav-devel-1.4.2-150600.18.12.1 * libclamav12-debuginfo-1.4.2-150600.18.12.1 * clamav-milter-1.4.2-150600.18.12.1 * libclammspack0-debuginfo-1.4.2-150600.18.12.1 * clamav-debuginfo-1.4.2-150600.18.12.1 * libclammspack0-1.4.2-150600.18.12.1 * libfreshclam3-debuginfo-1.4.2-150600.18.12.1 * clamav-milter-debuginfo-1.4.2-150600.18.12.1 * libfreshclam3-1.4.2-150600.18.12.1 * Basesystem Module 15-SP7 (noarch) * clamav-docs-html-1.4.2-150600.18.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239957 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:22 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:22 -0000 Subject: SUSE-SU-2025:01638-2: moderate: Security update for openssh Message-ID: <174921302221.655.16424883679617771837@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:01638-2 Release Date: 2025-06-06T10:04:49Z Rating: moderate References: * bsc#1236826 * bsc#1239671 * bsc#1241012 Cross-References: * CVE-2025-32728 CVSS scores: * CVE-2025-32728 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-32728 ( SUSE ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-32728 ( NVD ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-32728 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for openssh fixes the following issue: Security fixes: * CVE-2025-32728: Fixed logic error in DisableForwarding option (bsc#1241012) Other fixes: \- Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). The problem was introduced in the rebase of the patch for 9.6p1 \- Enable --with- logind to call the SetTTY dbus method in systemd. This allows "wall" to print messages in ssh ttys (bsc#1239671) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1638=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1638=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openssh-9.6p1-150600.6.26.1 * openssh-common-debuginfo-9.6p1-150600.6.26.1 * openssh-server-9.6p1-150600.6.26.1 * openssh-clients-9.6p1-150600.6.26.1 * openssh-server-config-disallow-rootlogin-9.6p1-150600.6.26.1 * openssh-debugsource-9.6p1-150600.6.26.1 * openssh-clients-debuginfo-9.6p1-150600.6.26.1 * openssh-fips-9.6p1-150600.6.26.1 * openssh-debuginfo-9.6p1-150600.6.26.1 * openssh-server-debuginfo-9.6p1-150600.6.26.1 * openssh-common-9.6p1-150600.6.26.1 * openssh-helpers-debuginfo-9.6p1-150600.6.26.1 * openssh-helpers-9.6p1-150600.6.26.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-debuginfo-9.6p1-150600.6.26.1 * openssh-askpass-gnome-debugsource-9.6p1-150600.6.26.1 * openssh-askpass-gnome-9.6p1-150600.6.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32728.html * https://bugzilla.suse.com/show_bug.cgi?id=1236826 * https://bugzilla.suse.com/show_bug.cgi?id=1239671 * https://bugzilla.suse.com/show_bug.cgi?id=1241012 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:24 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:24 -0000 Subject: SUSE-RU-2025:01689-2: moderate: Recommended update for hwinfo Message-ID: <174921302499.655.1473633955104346183@smelt2.prg2.suse.org> # Recommended update for hwinfo Announcement ID: SUSE-RU-2025:01689-2 Release Date: 2025-06-06T10:04:31Z Rating: moderate References: * bsc#1240648 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for hwinfo fixes the following issues: * Version update v21.88 * Fix network card detection on aarch64 (bsc#1240648). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1689=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * hwinfo-21.88-150500.3.9.2 * hwinfo-devel-21.88-150500.3.9.2 * hwinfo-devel-debuginfo-21.88-150500.3.9.2 * hwinfo-debugsource-21.88-150500.3.9.2 * hwinfo-debuginfo-21.88-150500.3.9.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240648 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:26 -0000 Subject: SUSE-RU-2025:01597-2: moderate: Recommended update for icewm Message-ID: <174921302609.655.17040083541535479813@smelt2.prg2.suse.org> # Recommended update for icewm Announcement ID: SUSE-RU-2025:01597-2 Release Date: 2025-06-06T10:04:21Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for icewm fixes the following issues: * Update the latest translation from https://l10n.opensuse.org/projects/icewm/icewm-1-4-branch/. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1597=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * icewm-default-debuginfo-1.4.2-150000.7.18.1 * icewm-lite-1.4.2-150000.7.18.1 * icewm-lite-debuginfo-1.4.2-150000.7.18.1 * icewm-debuginfo-1.4.2-150000.7.18.1 * icewm-default-1.4.2-150000.7.18.1 * icewm-debugsource-1.4.2-150000.7.18.1 * icewm-1.4.2-150000.7.18.1 * Basesystem Module 15-SP7 (noarch) * icewm-lang-1.4.2-150000.7.18.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:27 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:27 -0000 Subject: SUSE-RU-2025:01536-1: moderate: Recommended update for libreoffice Message-ID: <174921302773.655.10545629177010878978@smelt2.prg2.suse.org> # Recommended update for libreoffice Announcement ID: SUSE-RU-2025:01536-1 Release Date: 2025-06-06T10:04:07Z Rating: moderate References: * jsc#PED-10362 Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that contains one feature can now be installed. ## Description: This update for libreoffice fixes the following issues: Libreoffice was updated from version 24.8.5.2 to 24.8.6.2 (jsc#PED-10362): * Highlights: * Better file compatibility with Microsoft Office * Fixed issues opening certain files, including password protected ones * Improved Dark/Light Mode * Improved file picker reliability * More consistent spelling suggestions * Various bug fixes affecting stability and usability * Detailed Release Notes: * https://wiki.documentfoundation.org/Releases/24.8.6/RC1 * https://wiki.documentfoundation.org/Releases/24.8.6/RC2 * Updated bundled dependencies: * curl version update from 8.12.0 to 8.12.1 * libassuan version update from 3.0.1 to 3.0.2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1536=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1536=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le) * libreofficekit-devel-24.8.6.2-150500.20.21.2 * libreoffice-calc-extensions-24.8.6.2-150500.20.21.2 * libreofficekit-24.8.6.2-150500.20.21.2 * libreoffice-calc-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-pyuno-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-draw-24.8.6.2-150500.20.21.2 * libreoffice-librelogo-24.8.6.2-150500.20.21.2 * libreoffice-sdk-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-impress-24.8.6.2-150500.20.21.2 * libreoffice-24.8.6.2-150500.20.21.2 * libreoffice-base-drivers-postgresql-24.8.6.2-150500.20.21.2 * libreoffice-calc-24.8.6.2-150500.20.21.2 * libreoffice-filters-optional-24.8.6.2-150500.20.21.2 * libreoffice-pyuno-24.8.6.2-150500.20.21.2 * libreoffice-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-qt5-24.8.6.2-150500.20.21.2 * libreoffice-draw-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-gnome-24.8.6.2-150500.20.21.2 * libreoffice-qt5-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-gtk3-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-debugsource-24.8.6.2-150500.20.21.2 * libreoffice-gtk3-24.8.6.2-150500.20.21.2 * libreoffice-impress-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-writer-extensions-24.8.6.2-150500.20.21.2 * libreoffice-base-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-math-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-writer-24.8.6.2-150500.20.21.2 * libreoffice-mailmerge-24.8.6.2-150500.20.21.2 * libreoffice-base-24.8.6.2-150500.20.21.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-writer-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-gnome-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-sdk-doc-24.8.6.2-150500.20.21.2 * libreoffice-math-24.8.6.2-150500.20.21.2 * libreoffice-officebean-24.8.6.2-150500.20.21.2 * libreoffice-officebean-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-sdk-24.8.6.2-150500.20.21.2 * SUSE Package Hub 15 15-SP7 (noarch) * libreoffice-l10n-kn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-es-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ks-24.8.6.2-150500.20.21.2 * libreoffice-branding-upstream-24.8.6.2-150500.20.21.2 * libreoffice-l10n-he-24.8.6.2-150500.20.21.2 * libreoffice-l10n-km-24.8.6.2-150500.20.21.2 * libreoffice-l10n-brx-24.8.6.2-150500.20.21.2 * libreoffice-l10n-lv-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sw_TZ-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pt_PT-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pt_BR-24.8.6.2-150500.20.21.2 * libreoffice-l10n-lt-24.8.6.2-150500.20.21.2 * libreoffice-l10n-lo-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ve-24.8.6.2-150500.20.21.2 * libreoffice-l10n-si-24.8.6.2-150500.20.21.2 * libreoffice-l10n-tt-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fr-24.8.6.2-150500.20.21.2 * libreoffice-glade-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ast-24.8.6.2-150500.20.21.2 * libreoffice-l10n-tg-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sd-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fi-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mni-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mai-24.8.6.2-150500.20.21.2 * libreoffice-l10n-it-24.8.6.2-150500.20.21.2 * libreoffice-gdb-pretty-printers-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ko-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ja-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ru-24.8.6.2-150500.20.21.2 * libreoffice-l10n-gl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-be-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-da-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-zh_TW-24.8.6.2-150500.20.21.2 * libreoffice-l10n-dgo-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sid-24.8.6.2-150500.20.21.2 * libreoffice-l10n-dsb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sa_IN-24.8.6.2-150500.20.21.2 * libreoffice-l10n-gug-24.8.6.2-150500.20.21.2 * libreoffice-l10n-gu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ug-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-th-24.8.6.2-150500.20.21.2 * libreoffice-l10n-kok-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bg-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ca_valencia-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ne-24.8.6.2-150500.20.21.2 * libreoffice-l10n-en_ZA-24.8.6.2-150500.20.21.2 * libreoffice-l10n-zh_CN-24.8.6.2-150500.20.21.2 * libreoffice-l10n-el-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-om-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sat-24.8.6.2-150500.20.21.2 * libreoffice-l10n-uz-24.8.6.2-150500.20.21.2 * libreoffice-l10n-eu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-te-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ts-24.8.6.2-150500.20.21.2 * libreoffice-l10n-is-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fy-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ca-24.8.6.2-150500.20.21.2 * libreoffice-l10n-eo-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nso-24.8.6.2-150500.20.21.2 * libreoffice-l10n-kab-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hi-24.8.6.2-150500.20.21.2 * libreoffice-l10n-kk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ckb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fa-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bn_IN-24.8.6.2-150500.20.21.2 * libreoffice-l10n-et-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hsb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-dz-24.8.6.2-150500.20.21.2 * libreoffice-l10n-zu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sv-24.8.6.2-150500.20.21.2 * libreoffice-l10n-vi-24.8.6.2-150500.20.21.2 * libreoffice-l10n-lb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-st-24.8.6.2-150500.20.21.2 * libreoffice-l10n-uk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fur-24.8.6.2-150500.20.21.2 * libreoffice-l10n-am-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ml-24.8.6.2-150500.20.21.2 * libreoffice-l10n-xh-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bs-24.8.6.2-150500.20.21.2 * libreoffice-l10n-szl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-rw-24.8.6.2-150500.20.21.2 * libreoffice-l10n-id-24.8.6.2-150500.20.21.2 * libreoffice-l10n-my-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ar-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ka-24.8.6.2-150500.20.21.2 * libreoffice-l10n-or-24.8.6.2-150500.20.21.2 * libreoffice-l10n-de-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nr-24.8.6.2-150500.20.21.2 * libreoffice-icon-themes-24.8.6.2-150500.20.21.2 * libreoffice-l10n-en-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pa-24.8.6.2-150500.20.21.2 * libreoffice-l10n-gd-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bo-24.8.6.2-150500.20.21.2 * libreoffice-l10n-vec-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ss-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ta-24.8.6.2-150500.20.21.2 * libreoffice-l10n-kmr_Latn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-br-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ro-24.8.6.2-150500.20.21.2 * libreoffice-l10n-tn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-as-24.8.6.2-150500.20.21.2 * libreoffice-l10n-cy-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sq-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ga-24.8.6.2-150500.20.21.2 * libreoffice-l10n-cs-24.8.6.2-150500.20.21.2 * libreoffice-l10n-en_GB-24.8.6.2-150500.20.21.2 * libreoffice-l10n-af-24.8.6.2-150500.20.21.2 * libreoffice-l10n-tr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-oc-24.8.6.2-150500.20.21.2 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libreoffice-calc-extensions-24.8.6.2-150500.20.21.2 * libreofficekit-24.8.6.2-150500.20.21.2 * libreoffice-calc-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-pyuno-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-draw-24.8.6.2-150500.20.21.2 * libreoffice-impress-24.8.6.2-150500.20.21.2 * libreoffice-24.8.6.2-150500.20.21.2 * libreoffice-base-drivers-postgresql-24.8.6.2-150500.20.21.2 * libreoffice-calc-24.8.6.2-150500.20.21.2 * libreoffice-filters-optional-24.8.6.2-150500.20.21.2 * libreoffice-pyuno-24.8.6.2-150500.20.21.2 * libreoffice-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-draw-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-gnome-24.8.6.2-150500.20.21.2 * libreoffice-gtk3-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-debugsource-24.8.6.2-150500.20.21.2 * libreoffice-gtk3-24.8.6.2-150500.20.21.2 * libreoffice-impress-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-writer-extensions-24.8.6.2-150500.20.21.2 * libreoffice-base-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-math-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-writer-24.8.6.2-150500.20.21.2 * libreoffice-mailmerge-24.8.6.2-150500.20.21.2 * libreoffice-base-24.8.6.2-150500.20.21.2 * libreoffice-base-drivers-postgresql-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-writer-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-gnome-debuginfo-24.8.6.2-150500.20.21.2 * libreoffice-math-24.8.6.2-150500.20.21.2 * libreoffice-officebean-24.8.6.2-150500.20.21.2 * libreoffice-officebean-debuginfo-24.8.6.2-150500.20.21.2 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * libreoffice-l10n-kk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-kn-24.8.6.2-150500.20.21.2 * libreoffice-icon-themes-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ckb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-en-24.8.6.2-150500.20.21.2 * libreoffice-l10n-es-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fa-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pa-24.8.6.2-150500.20.21.2 * libreoffice-l10n-et-24.8.6.2-150500.20.21.2 * libreoffice-branding-upstream-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nb-24.8.6.2-150500.20.21.2 * libreoffice-l10n-gu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-he-24.8.6.2-150500.20.21.2 * libreoffice-l10n-lv-24.8.6.2-150500.20.21.2 * libreoffice-l10n-dz-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pt_PT-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pt_BR-24.8.6.2-150500.20.21.2 * libreoffice-l10n-lt-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ss-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sv-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ve-24.8.6.2-150500.20.21.2 * libreoffice-l10n-th-24.8.6.2-150500.20.21.2 * libreoffice-l10n-si-24.8.6.2-150500.20.21.2 * libreoffice-l10n-zu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-st-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ta-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bg-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fur-24.8.6.2-150500.20.21.2 * libreoffice-l10n-uk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-br-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ml-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ro-24.8.6.2-150500.20.21.2 * libreoffice-l10n-tn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-xh-24.8.6.2-150500.20.21.2 * libreoffice-l10n-fi-24.8.6.2-150500.20.21.2 * libreoffice-l10n-as-24.8.6.2-150500.20.21.2 * libreoffice-l10n-mai-24.8.6.2-150500.20.21.2 * libreoffice-l10n-zh_CN-24.8.6.2-150500.20.21.2 * libreoffice-l10n-el-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sk-24.8.6.2-150500.20.21.2 * libreoffice-l10n-cy-24.8.6.2-150500.20.21.2 * libreoffice-l10n-it-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hy-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ko-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ga-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ja-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ru-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ar-24.8.6.2-150500.20.21.2 * libreoffice-l10n-cs-24.8.6.2-150500.20.21.2 * libreoffice-l10n-eu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hu-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-te-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ts-24.8.6.2-150500.20.21.2 * libreoffice-l10n-af-24.8.6.2-150500.20.21.2 * libreoffice-l10n-or-24.8.6.2-150500.20.21.2 * libreoffice-l10n-de-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-tr-24.8.6.2-150500.20.21.2 * libreoffice-l10n-bn-24.8.6.2-150500.20.21.2 * libreoffice-l10n-ca-24.8.6.2-150500.20.21.2 * libreoffice-l10n-eo-24.8.6.2-150500.20.21.2 * libreoffice-l10n-gl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-sl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-nso-24.8.6.2-150500.20.21.2 * libreoffice-l10n-hi-24.8.6.2-150500.20.21.2 * libreoffice-l10n-da-24.8.6.2-150500.20.21.2 * libreoffice-l10n-pl-24.8.6.2-150500.20.21.2 * libreoffice-l10n-zh_TW-24.8.6.2-150500.20.21.2 ## References: * https://jira.suse.com/browse/PED-10362 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:30 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:30 -0000 Subject: SUSE-SU-2025:01726-2: important: Security update for python-tornado Message-ID: <174921303066.655.4329924328894645298@smelt2.prg2.suse.org> # Security update for python-tornado Announcement ID: SUSE-SU-2025:01726-2 Release Date: 2025-06-06T09:51:14Z Rating: important References: * bsc#1243268 Cross-References: * CVE-2025-47287 CVSS scores: * CVE-2025-47287 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47287 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47287 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-tornado fixes the following issues: * CVE-2025-47287: excessive logging when parsing malformed `multipart/form- data` can lead to a denial-of-service (bsc#1243268). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1726=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python-tornado-debugsource-4.5.3-150000.3.10.1 * python3-tornado-4.5.3-150000.3.10.1 * python-tornado-debuginfo-4.5.3-150000.3.10.1 * python3-tornado-debuginfo-4.5.3-150000.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47287.html * https://bugzilla.suse.com/show_bug.cgi?id=1243268 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:28 -0000 Subject: SUSE-RU-2025:00298-1: moderate: Recommended update for libostree Message-ID: <174921302879.655.16952812712012258026@smelt2.prg2.suse.org> # Recommended update for libostree Announcement ID: SUSE-RU-2025:00298-1 Release Date: 2025-06-06T10:03:36Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for libostree fixes the following issues: \- Version update 2024.10: \+ enable composefs by default, various composefs fixes. \+ core: Always sort incoming xattrs. \+ sign-ed25519: Fix error message of validate_length. \+ profiles-fuse: when fuse execution fails it still returns exit code 0. \+ documentation updates. \+ deploy: Don't recompute verity checksums if not enabled (performance improvement). \+ various prepare-root fixes. \- Drop rcFOO symlinks. \+ Adapt to a change in libcurl that caused ostree to start crashing. \+ switchroot: Stop making /sysroot mount private. \+ bugfix for "transient-etc" users, root.transient switch to tmpfs. \+ sysroot: check if deployments are in the same stateroot, turn on bootloader-naming-2 by default. \+ sepolicy: Fix publicity mismatch for ostree_sepolicy_host_enabled. \+ main: Ignore SIGPIPE when printing version. \+ bootloader/grub2: Don't do anything if we have static configs. \+ kargs: parse spaces in kargs input and keep quotes. \+ Ensure boot directory is open before accessing it for early pruning. \+ checkout: Always replace existing content with overlay mode. \+ Expand ostree admin pin command. \+ Finalize "deployment finalization locking" feature. \+ Add ostree admin post- copy. \+ Speed-up through reflinks. \+ Improvements to system root and bootloader. \+ Bug fixes, documentation updates, and developer fixes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-298=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-298=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libostree-debugsource-2024.10-150500.3.9.4 * typelib-1_0-OSTree-1_0-2024.10-150500.3.9.4 * libostree-devel-2024.10-150500.3.9.4 * libostree-debuginfo-2024.10-150500.3.9.4 * libostree-2024.10-150500.3.9.4 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libostree-debuginfo-2024.10-150500.3.9.4 * libostree-1-1-debuginfo-2024.10-150500.3.9.4 * libostree-debugsource-2024.10-150500.3.9.4 * libostree-1-1-2024.10-150500.3.9.4 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 12:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 12:30:31 -0000 Subject: SUSE-RU-2025:01721-2: moderate: Recommended update for hwdata Message-ID: <174921303189.655.483329754688023605@smelt2.prg2.suse.org> # Recommended update for hwdata Announcement ID: SUSE-RU-2025:01721-2 Release Date: 2025-06-06T09:50:55Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for hwdata fixes the following issue: * Version update 0.394: * Update pci, usb and vendor ids * Fix usb.ids encoding and a couple of typos * Fix configure to honor --prefix ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1721=1 ## Package List: * Basesystem Module 15-SP7 (noarch) * hwdata-0.394-150000.3.77.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 16:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 16:30:10 -0000 Subject: SUSE-SU-2025:01569-1: moderate: Security update for libraw Message-ID: <174922741019.629.1000044855537592102@smelt2.prg2.suse.org> # Security update for libraw Announcement ID: SUSE-SU-2025:01569-1 Release Date: 2025-06-06T13:12:50Z Rating: moderate References: * bsc#1241584 * bsc#1241585 * bsc#1241642 * bsc#1241643 Cross-References: * CVE-2025-43961 * CVE-2025-43962 * CVE-2025-43963 * CVE-2025-43964 CVSS scores: * CVE-2025-43961 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43961 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43961 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43961 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-43962 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-43962 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-43962 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-43962 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43963 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43963 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-43963 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43964 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-43964 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-43964 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43964 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for libraw fixes the following issues: * CVE-2025-43961: Fixed out-of-bounds read in the Fujifilm 0xf00c tag parser in metadata/tiff.cpp (bsc#1241643) * CVE-2025-43962: Fixed out-of-bounds read when tag 0x412 processing in phase_one_correct function (bsc#1241585) * CVE-2025-43963: Fixed out-of-buffer access during phase_one_correct in decoders/load_mfbacks.cpp (bsc#1241642) * CVE-2025-43964: Fixed tag 0x412 processing in phase_one_correct does not enforce minimum w0 and w1 values (bsc#1241584) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1569=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libraw16-debuginfo-0.18.9-150000.3.30.1 * libraw-debugsource-0.18.9-150000.3.30.1 * libraw-debuginfo-0.18.9-150000.3.30.1 * libraw16-0.18.9-150000.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2025-43961.html * https://www.suse.com/security/cve/CVE-2025-43962.html * https://www.suse.com/security/cve/CVE-2025-43963.html * https://www.suse.com/security/cve/CVE-2025-43964.html * https://bugzilla.suse.com/show_bug.cgi?id=1241584 * https://bugzilla.suse.com/show_bug.cgi?id=1241585 * https://bugzilla.suse.com/show_bug.cgi?id=1241642 * https://bugzilla.suse.com/show_bug.cgi?id=1241643 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 16:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 16:30:14 -0000 Subject: SUSE-SU-2025:01572-1: moderate: Security update for libraw Message-ID: <174922741471.629.3274521396743476653@smelt2.prg2.suse.org> # Security update for libraw Announcement ID: SUSE-SU-2025:01572-1 Release Date: 2025-06-06T13:12:48Z Rating: moderate References: * bsc#1241584 * bsc#1241585 * bsc#1241642 * bsc#1241643 Cross-References: * CVE-2025-43961 * CVE-2025-43962 * CVE-2025-43963 * CVE-2025-43964 CVSS scores: * CVE-2025-43961 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43961 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43961 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43961 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-43962 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-43962 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-43962 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-43962 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43963 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43963 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-43963 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43964 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-43964 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-43964 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43964 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for libraw fixes the following issues: * CVE-2025-43961: Fixed out-of-bounds read in the Fujifilm 0xf00c tag parser in metadata/tiff.cpp (bsc#1241643) * CVE-2025-43962: Fixed out-of-bounds read when tag 0x412 processing in phase_one_correct function (bsc#1241585) * CVE-2025-43963: Fixed out-of-buffer access during phase_one_correct in decoders/load_mfbacks.cpp (bsc#1241642) * CVE-2025-43964: Fixed tag 0x412 processing in phase_one_correct does not enforce minimum w0 and w1 values (bsc#1241584) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1572=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1572=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1572=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libraw23-0.21.1-150600.3.5.1 * libraw-debugsource-0.21.1-150600.3.5.1 * libraw23-debuginfo-0.21.1-150600.3.5.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * libraw-devel-0.21.1-150600.3.5.1 * libraw-tools-debuginfo-0.21.1-150600.3.5.1 * libraw-tools-0.21.1-150600.3.5.1 * libraw-debugsource-0.21.1-150600.3.5.1 * libraw-devel-static-0.21.1-150600.3.5.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libraw-devel-0.21.1-150600.3.5.1 * libraw-debugsource-0.21.1-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-43961.html * https://www.suse.com/security/cve/CVE-2025-43962.html * https://www.suse.com/security/cve/CVE-2025-43963.html * https://www.suse.com/security/cve/CVE-2025-43964.html * https://bugzilla.suse.com/show_bug.cgi?id=1241584 * https://bugzilla.suse.com/show_bug.cgi?id=1241585 * https://bugzilla.suse.com/show_bug.cgi?id=1241642 * https://bugzilla.suse.com/show_bug.cgi?id=1241643 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 16:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 16:30:17 -0000 Subject: SUSE-SU-2025:01779-2: moderate: Security update for iputils Message-ID: <174922741781.629.15277973292849383677@smelt2.prg2.suse.org> # Security update for iputils Announcement ID: SUSE-SU-2025:01779-2 Release Date: 2025-06-06T12:20:52Z Rating: moderate References: * bsc#1242300 * bsc#1243284 Cross-References: * CVE-2025-47268 CVSS scores: * CVE-2025-47268 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-47268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-47268 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for iputils fixes the following issues: Security fixes: * CVE-2025-47268: Fixed integer overflow in RTT calculation can lead to undefined behavior (bsc#1242300). Other bug fixes: * Fixed incorrect IPV4 TTL value when using SOCK_DGRAM on big endian systems (bsc#1243284). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1779=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * iputils-debuginfo-20211215-150400.3.19.1 * rarpd-debuginfo-20211215-150400.3.19.1 * rarpd-20211215-150400.3.19.1 * iputils-debugsource-20211215-150400.3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47268.html * https://bugzilla.suse.com/show_bug.cgi?id=1242300 * https://bugzilla.suse.com/show_bug.cgi?id=1243284 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 6 20:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 06 Jun 2025 20:30:05 -0000 Subject: SUSE-SU-2025:01830-1: moderate: Security update for helm-mirror Message-ID: <174924180553.627.14575567174416438577@smelt2.prg2.suse.org> # Security update for helm-mirror Announcement ID: SUSE-SU-2025:01830-1 Release Date: 2025-06-06T15:17:43Z Rating: moderate References: * bsc#1241028 * bsc#1241031 Cross-References: * CVE-2025-32386 * CVE-2025-32387 CVSS scores: * CVE-2025-32386 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32386 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32386 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32387 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32387 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32387 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for helm-mirror fixes the following issues: * CVE-2025-32386: Fixed denial of service due to memory exhaustion after loading a specially crafter chart (bsc#1241028) * CVE-2025-32387: Fixed stack overflow due to parser recursion that can exceed the stack size limit (bsc#1241031) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1830=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1830=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * helm-mirror-debuginfo-0.3.1-150000.1.18.2 * helm-mirror-0.3.1-150000.1.18.2 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * helm-mirror-debuginfo-0.3.1-150000.1.18.2 * helm-mirror-0.3.1-150000.1.18.2 ## References: * https://www.suse.com/security/cve/CVE-2025-32386.html * https://www.suse.com/security/cve/CVE-2025-32387.html * https://bugzilla.suse.com/show_bug.cgi?id=1241028 * https://bugzilla.suse.com/show_bug.cgi?id=1241031 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 08:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 08:30:07 -0000 Subject: SUSE-RU-2025:01831-1: moderate: Recommended update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestf Message-ID: <174945780735.23879.16979622501843004452@smelt2.prg2.suse.org> # Recommended update for kubevirt, virt-api-container, virt-controller- container, virt-exportproxy-container, virt-exportserver-container, virt- handler-container, virt-launcher-container, virt-libguestf Announcement ID: SUSE-RU-2025:01831-1 Release Date: 2025-06-08T20:55:08Z Rating: moderate References: * bsc#1243663 Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for kubevirt, virt-api-container, virt-controller-container, virt- exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator- container, virt-pr-helper-container fixes the following issues: Update to version 1.4.1: * Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.4.1 * Fix for virt-handler crash (bsc#1243663) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1831=1 openSUSE-SLE-15.6-2025-1831=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1831=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * kubevirt-virt-operator-debuginfo-1.4.1-150600.5.18.1 * kubevirt-pr-helper-conf-1.4.1-150600.5.18.1 * kubevirt-virt-exportproxy-debuginfo-1.4.1-150600.5.18.1 * kubevirt-container-disk-1.4.1-150600.5.18.1 * kubevirt-virt-operator-1.4.1-150600.5.18.1 * kubevirt-tests-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-launcher-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-exportserver-1.4.1-150600.5.18.1 * kubevirt-virt-exportserver-debuginfo-1.4.1-150600.5.18.1 * kubevirt-container-disk-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-launcher-1.4.1-150600.5.18.1 * kubevirt-tests-1.4.1-150600.5.18.1 * obs-service-kubevirt_containers_meta-1.4.1-150600.5.18.1 * kubevirt-manifests-1.4.1-150600.5.18.1 * kubevirt-virt-api-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-handler-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-controller-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-controller-1.4.1-150600.5.18.1 * kubevirt-virt-exportproxy-1.4.1-150600.5.18.1 * kubevirt-virtctl-debuginfo-1.4.1-150600.5.18.1 * kubevirt-virt-api-1.4.1-150600.5.18.1 * kubevirt-virt-handler-1.4.1-150600.5.18.1 * kubevirt-virtctl-1.4.1-150600.5.18.1 * Containers Module 15-SP6 (aarch64 x86_64) * kubevirt-virtctl-1.4.1-150600.5.18.1 * kubevirt-manifests-1.4.1-150600.5.18.1 * kubevirt-virtctl-debuginfo-1.4.1-150600.5.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243663 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 12:30:03 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 12:30:03 -0000 Subject: SUSE-RU-2025:01698-2: moderate: Recommended update for wsmancli Message-ID: <174947220314.655.11996627450957569812@smelt2.prg2.suse.org> # Recommended update for wsmancli Announcement ID: SUSE-RU-2025:01698-2 Release Date: 2025-06-09T08:48:33Z Rating: moderate References: * bsc#1237243 Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for wsmancli fixes the following issue: * Fix connecting with TLS (bsc#1237243). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1698=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * wsmancli-debuginfo-2.6.0-150300.7.6.2 * wsmancli-2.6.0-150300.7.6.2 * wsmancli-debugsource-2.6.0-150300.7.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237243 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:04 -0000 Subject: SUSE-SU-2025:01843-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) Message-ID: <174948660431.627.12234444222187623335@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01843-1 Release Date: 2025-06-09T15:33:48Z Rating: important References: * bsc#1239077 Cross-References: * CVE-2024-57996 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_29 fixes one issue. The following security issue was fixed: * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1843=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_29-rt-2-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_9-debugsource-2-150600.2.1 * kernel-livepatch-6_4_0-150600_10_29-rt-debuginfo-2-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:09 -0000 Subject: SUSE-SU-2025:01839-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) Message-ID: <174948660954.627.17604411541099643114@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01839-1 Release Date: 2025-06-09T15:33:45Z Rating: important References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_23 fixes several issues. The following security issues were fixed: * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1839=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1842=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_17-rt-debuginfo-9-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-6-150600.2.1 * kernel-livepatch-6_4_0-150600_10_17-rt-9-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-debuginfo-6-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_7-debugsource-6-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_5-debugsource-9-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:15 -0000 Subject: SUSE-SU-2025:01840-1: important: Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) Message-ID: <174948661526.627.13871931792081197046@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01840-1 Release Date: 2025-06-09T15:33:41Z Rating: important References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_11 fixes several issues. The following security issues were fixed: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1840=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1837=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1838=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1841=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_8-rt-16-150600.3.1 * kernel-livepatch-6_4_0-150600_10_11-rt-debuginfo-11-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource-15-150600.2.1 * kernel-livepatch-6_4_0-150600_8-rt-debuginfo-16-150600.3.1 * kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo-15-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_0-debugsource-16-150600.3.1 * kernel-livepatch-SLE15-SP6-RT_Update_3-debugsource-11-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-11-150600.2.1 * kernel-livepatch-6_4_0-150600_10_11-rt-11-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-11-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-11-150600.2.1 * kernel-livepatch-6_4_0-150600_10_5-rt-15-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:16 -0000 Subject: SUSE-RU-2025:01714-2: moderate: Recommended update for ncurses Message-ID: <174948661686.627.14581726949257298912@smelt2.prg2.suse.org> # Recommended update for ncurses Announcement ID: SUSE-RU-2025:01714-2 Release Date: 2025-06-09T15:46:12Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for ncurses fixes the following issues: * Backport sclp terminfo description entry if for s390 sclp terminal lines * Add a further sclp entry for qemu s390 based systems * Make use of dumb ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1714=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1714=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1714=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ncurses-devel-debuginfo-6.1-150000.5.30.1 * terminfo-screen-6.1-150000.5.30.1 * tack-6.1-150000.5.30.1 * tack-debuginfo-6.1-150000.5.30.1 * libncurses6-6.1-150000.5.30.1 * ncurses-utils-6.1-150000.5.30.1 * ncurses-utils-debuginfo-6.1-150000.5.30.1 * ncurses-devel-6.1-150000.5.30.1 * libncurses6-debuginfo-6.1-150000.5.30.1 * ncurses-debugsource-6.1-150000.5.30.1 * terminfo-6.1-150000.5.30.1 * terminfo-base-6.1-150000.5.30.1 * terminfo-iterm-6.1-150000.5.30.1 * Basesystem Module 15-SP7 (x86_64) * libncurses6-32bit-debuginfo-6.1-150000.5.30.1 * libncurses6-32bit-6.1-150000.5.30.1 * Development Tools Module 15-SP7 (x86_64) * ncurses-devel-32bit-debuginfo-6.1-150000.5.30.1 * ncurses-devel-32bit-6.1-150000.5.30.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ncurses5-devel-6.1-150000.5.30.1 * libncurses5-debuginfo-6.1-150000.5.30.1 * ncurses-debugsource-6.1-150000.5.30.1 * libncurses5-6.1-150000.5.30.1 * Legacy Module 15-SP7 (x86_64) * libncurses5-32bit-6.1-150000.5.30.1 * libncurses5-32bit-debuginfo-6.1-150000.5.30.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:19 -0000 Subject: SUSE-RU-2025:01728-2: moderate: Recommended update for abseil-cpp Message-ID: <174948661984.627.8807644307086837253@smelt2.prg2.suse.org> # Recommended update for abseil-cpp Announcement ID: SUSE-RU-2025:01728-2 Release Date: 2025-06-09T15:44:51Z Rating: moderate References: * bsc#1236438 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for abseil-cpp fixes the following issue: * Version update 20240116.3 * Fix potential integer overflow in hash container create/resize (bsc#1236438). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1728=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * abseil-cpp-debugsource-20240116.3-150600.19.3.15 * abseil-cpp-devel-20240116.3-150600.19.3.15 * libabsl2401_0_0-debuginfo-20240116.3-150600.19.3.15 * libabsl2401_0_0-20240116.3-150600.19.3.15 * Basesystem Module 15-SP7 (x86_64) * libabsl2401_0_0-32bit-debuginfo-20240116.3-150600.19.3.15 * libabsl2401_0_0-32bit-20240116.3-150600.19.3.15 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236438 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:20 -0000 Subject: SUSE-RU-2025:01539-1: moderate: Recommended update for csp-billing-adapter Message-ID: <174948662090.627.2929401708626866893@smelt2.prg2.suse.org> # Recommended update for csp-billing-adapter Announcement ID: SUSE-RU-2025:01539-1 Release Date: 2025-06-09T15:43:55Z Rating: moderate References: Affected Products: * Public Cloud Module 15-SP7 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for csp-billing-adapter fixes the following issues: * Update to version 1.3.1 * Fix bug, Make the datetime timezone aware * Update to version 1.3.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1539=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-1539=1 ## Package List: * Public Cloud Module 15-SP7 (noarch) * csp-billing-adapter-service-1.3.1-150400.9.34.1 * Python 3 Module 15-SP7 (noarch) * python311-csp-billing-adapter-1.3.1-150400.9.34.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:24 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:24 -0000 Subject: SUSE-SU-2025:01534-1: low: Security update for augeas Message-ID: <174948662487.627.9943361932884026079@smelt2.prg2.suse.org> # Security update for augeas Announcement ID: SUSE-SU-2025:01534-1 Release Date: 2025-06-09T13:28:25Z Rating: low References: * bsc#1239909 Cross-References: * CVE-2025-2588 CVSS scores: * CVE-2025-2588 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-2588 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-2588 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-2588 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-2588 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for augeas fixes the following issues: * CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1534=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * augeas-lenses-1.14.1-150600.3.3.1 * libfa1-debuginfo-1.14.1-150600.3.3.1 * libaugeas0-1.14.1-150600.3.3.1 * augeas-debuginfo-1.14.1-150600.3.3.1 * augeas-1.14.1-150600.3.3.1 * libaugeas0-debuginfo-1.14.1-150600.3.3.1 * libfa1-1.14.1-150600.3.3.1 * augeas-debugsource-1.14.1-150600.3.3.1 * augeas-devel-1.14.1-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2588.html * https://bugzilla.suse.com/show_bug.cgi?id=1239909 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:22 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:22 -0000 Subject: SUSE-RU-2025:01836-1: important: Recommended update for cloud-netconfig Message-ID: <174948662291.627.5906745533348710672@smelt2.prg2.suse.org> # Recommended update for cloud-netconfig Announcement ID: SUSE-RU-2025:01836-1 Release Date: 2025-06-09T14:11:51Z Rating: important References: * bsc#1240869 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for cloud-netconfig fixes the following issues: * Add support for creating IPv6 default route in GCE (bsc#1240869) * Minor fix when looking up IPv6 default route ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1836=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1836=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1836=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1836=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1836=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1836=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1836=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1836=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1836=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1836=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1836=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * Public Cloud Module 15-SP3 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * Public Cloud Module 15-SP4 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * Public Cloud Module 15-SP5 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * Public Cloud Module 15-SP6 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * Public Cloud Module 15-SP7 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * openSUSE Leap 15.6 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * cloud-netconfig-ec2-1.15-150000.25.26.1 * cloud-netconfig-azure-1.15-150000.25.26.1 * cloud-netconfig-gce-1.15-150000.25.26.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240869 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:26 -0000 Subject: SUSE-SU-2025:01776-2: moderate: Security update for iputils Message-ID: <174948662699.627.3965358729197881550@smelt2.prg2.suse.org> # Security update for iputils Announcement ID: SUSE-SU-2025:01776-2 Release Date: 2025-06-09T13:27:24Z Rating: moderate References: * bsc#1242300 Cross-References: * CVE-2025-47268 CVSS scores: * CVE-2025-47268 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-47268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-47268 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for iputils fixes the following issues: * CVE-2025-47268: Fixed integer overflow in RTT calculation can lead to undefined behavior (bsc#1242300) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1776=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * iputils-debugsource-20221126-150500.3.11.1 * iputils-20221126-150500.3.11.1 * iputils-debuginfo-20221126-150500.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47268.html * https://bugzilla.suse.com/show_bug.cgi?id=1242300 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 16:30:34 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 16:30:34 -0000 Subject: SUSE-SU-2025:01835-1: moderate: Security update for transfig Message-ID: <174948663450.627.12510648011788831088@smelt2.prg2.suse.org> # Security update for transfig Announcement ID: SUSE-SU-2025:01835-1 Release Date: 2025-06-09T13:24:47Z Rating: moderate References: * bsc#1225947 * bsc#1230427 * bsc#1240379 * bsc#1240380 * bsc#1240381 * bsc#1243260 * bsc#1243261 * bsc#1243262 * bsc#1243263 Cross-References: * CVE-2025-31162 * CVE-2025-31163 * CVE-2025-31164 * CVE-2025-46397 * CVE-2025-46398 * CVE-2025-46399 * CVE-2025-46400 CVSS scores: * CVE-2025-31162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-31162 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-31163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-31163 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-31164 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-31164 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-46397 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46397 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46398 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46398 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46399 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46399 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46400 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves seven vulnerabilities and has two security fixes can now be installed. ## Description: This update for transfig fixes the following issues: Update to fig2dev version 3.2.9a * CVE-2025-31162: Fixed a floating point exception in fig2dev in get_slope function (bsc#1240380). * CVE-2025-31163: Fixed a segmentation fault in fig2dev in put_patternarc function (bsc#1240381). * CVE-2025-31164: Fixed a heap buffer overflow in fig2dev in create_line_with_spline function (bsc#1240379). * CVE-2025-46397: Fixed a stack buffer overflow in fig2dev in bezier_spline function (bsc#1243260). * CVE-2025-46398: Fixed a stack buffer overflow in fig2dev in read_objects function (bsc#1243262). * CVE-2025-46399: Fixed a segmentation fault in fig2dev in genge_itp_spline function (bsc#1243263). * CVE-2025-46400: Fixed a segmentation fault in fig2dev in read_arcobject function (bsc#1243261). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1835=1 SUSE-2025-1835=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1835=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1835=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * transfig-3.2.9a-150600.3.5.1 * transfig-debugsource-3.2.9a-150600.3.5.1 * transfig-debuginfo-3.2.9a-150600.3.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * transfig-3.2.9a-150600.3.5.1 * transfig-debugsource-3.2.9a-150600.3.5.1 * transfig-debuginfo-3.2.9a-150600.3.5.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * transfig-3.2.9a-150600.3.5.1 * transfig-debugsource-3.2.9a-150600.3.5.1 * transfig-debuginfo-3.2.9a-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31162.html * https://www.suse.com/security/cve/CVE-2025-31163.html * https://www.suse.com/security/cve/CVE-2025-31164.html * https://www.suse.com/security/cve/CVE-2025-46397.html * https://www.suse.com/security/cve/CVE-2025-46398.html * https://www.suse.com/security/cve/CVE-2025-46399.html * https://www.suse.com/security/cve/CVE-2025-46400.html * https://bugzilla.suse.com/show_bug.cgi?id=1225947 * https://bugzilla.suse.com/show_bug.cgi?id=1230427 * https://bugzilla.suse.com/show_bug.cgi?id=1240379 * https://bugzilla.suse.com/show_bug.cgi?id=1240380 * https://bugzilla.suse.com/show_bug.cgi?id=1240381 * https://bugzilla.suse.com/show_bug.cgi?id=1243260 * https://bugzilla.suse.com/show_bug.cgi?id=1243261 * https://bugzilla.suse.com/show_bug.cgi?id=1243262 * https://bugzilla.suse.com/show_bug.cgi?id=1243263 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 20:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 20:30:05 -0000 Subject: SUSE-SU-2025:01844-1: important: Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) Message-ID: <174950100539.5776.11989834084512130201@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:01844-1 Release Date: 2025-06-09T16:33:37Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_219 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1844=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_219-default-14-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 20:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 20:30:13 -0000 Subject: SUSE-SU-2025:01848-1: important: Security update for go1.23 Message-ID: <174950101377.5776.4004363771682262537@smelt2.prg2.suse.org> # Security update for go1.23 Announcement ID: SUSE-SU-2025:01848-1 Release Date: 2025-06-09T18:35:51Z Rating: important References: * bsc#1229122 * bsc#1244156 * bsc#1244157 Cross-References: * CVE-2025-0913 * CVE-2025-4673 CVSS scores: * CVE-2025-0913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-0913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4673 ( SUSE ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-4673 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.23 fixes the following issues: go1.23.10 (released 2025-06-05) includes security fixes to the /http and os packages, as well as bug fixes to the linker. (bsc#1229122 go1.23 release tracking CVE-2025-0913 CVE-2025-4673) * CVE-2025-0913: os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows (bsc#1244157) * CVE-2025-4673: net/http: sensitive headers not cleared on cross-origin redirect (bsc#1244156) * runtime/debug: BuildSetting does not document DefaultGODEBUG * cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1848=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1848=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1848=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1848=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1848=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1848=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1848=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1848=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1848=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1848=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1848=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1848=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1848=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1848=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1848=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.23-race-1.23.10-150000.1.34.1 * go1.23-doc-1.23.10-150000.1.34.1 * go1.23-1.23.10-150000.1.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0913.html * https://www.suse.com/security/cve/CVE-2025-4673.html * https://bugzilla.suse.com/show_bug.cgi?id=1229122 * https://bugzilla.suse.com/show_bug.cgi?id=1244156 * https://bugzilla.suse.com/show_bug.cgi?id=1244157 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 20:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 20:30:17 -0000 Subject: SUSE-RU-2025:01847-1: important: Recommended update for go1.24-openssl Message-ID: <174950101705.5776.681962582114434642@smelt2.prg2.suse.org> # Recommended update for go1.24-openssl Announcement ID: SUSE-RU-2025:01847-1 Release Date: 2025-06-09T18:34:41Z Rating: important References: * bsc#1243960 * jsc#SLE-18320 Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature and has one fix can now be installed. ## Description: This update for go1.24-openssl fixes the following issues: Update to version 1.24.3 cut from the go1.24-fips-release branch at the revision tagged go1.24.3-3-openssl-fips. (jsc#SLE-18320) * Fix GOLANG_FIPS=0 and enable CGO for bin/go Update to version 1.24.3 cut from the go1.24-fips-release branch at the revision tagged go1.24.3-2-openssl-fips. (jsc#SLE-18320 bsc#1243960) * Force fips140tls in boring mode and run http tests * Implement HKDF for TLS (#297) bsc#1243960. This was previously left unimplemented and would panic if invoked. This was not caught because we only run a subset of the TLS tests in FIPS mode. This patch adds the test case which would have caught this into our test script and fixes the panic with an implementation of HKDF label expanding. * Improve documentation (#294) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1847=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1847=1 openSUSE-SLE-15.6-2025-1847=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.24-openssl-1.24.3-150600.13.6.1 * go1.24-openssl-doc-1.24.3-150600.13.6.1 * go1.24-openssl-race-1.24.3-150600.13.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * go1.24-openssl-1.24.3-150600.13.6.1 * go1.24-openssl-doc-1.24.3-150600.13.6.1 * go1.24-openssl-debuginfo-1.24.3-150600.13.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.3-150600.13.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243960 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 20:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 20:30:21 -0000 Subject: SUSE-SU-2025:01846-1: important: Security update for go1.24 Message-ID: <174950102164.5776.10822167765912224273@smelt2.prg2.suse.org> # Security update for go1.24 Announcement ID: SUSE-SU-2025:01846-1 Release Date: 2025-06-09T18:34:33Z Rating: important References: * bsc#1236217 * bsc#1242715 * bsc#1244156 * bsc#1244157 * bsc#1244158 Cross-References: * CVE-2025-0913 * CVE-2025-22873 * CVE-2025-22874 * CVE-2025-4673 CVSS scores: * CVE-2025-0913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-0913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-22873 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-22873 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-22874 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-22874 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4673 ( SUSE ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-4673 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.24 fixes the following issues: go1.24.4 (released 2025-06-05) includes security fixes to the crypto/x509, net/http, and os packages, as well as bug fixes to the linker, the go command, and the hash/maphash and os packages. ( bsc#1236217 go1.24 release tracking CVE-2025-22874 CVE-2025-0913 CVE-2025-4673) * CVE-2025-22874: crypto/x509: ExtKeyUsageAny bypasses policy validation (bsc#1244158) * CVE-2025-0913: os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows (bsc#1244157) * CVE-2025-4673: net/http: sensitive headers not cleared on cross-origin redirect (bsc#1244156) * os: Root.Mkdir creates directories with zero permissions on OpenBSD * hash/maphash: hashing channels with purego impl. of maphash.Comparable panics * runtime/debug: BuildSetting does not document DefaultGODEBUG * cmd/go: add fips140 module selection mechanism * cmd/link: Go 1.24.3 and 1.23.9 regression - duplicated definition of symbol dlopen * CVE-2025-22873: os: Root permits access to parent directory ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1846=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1846=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1846=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1846=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1846=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1846=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1846=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1846=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1846=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1846=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1846=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1846=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1846=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1846=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1846=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.24-race-1.24.4-150000.1.26.1 * go1.24-doc-1.24.4-150000.1.26.1 * go1.24-1.24.4-150000.1.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0913.html * https://www.suse.com/security/cve/CVE-2025-22873.html * https://www.suse.com/security/cve/CVE-2025-22874.html * https://www.suse.com/security/cve/CVE-2025-4673.html * https://bugzilla.suse.com/show_bug.cgi?id=1236217 * https://bugzilla.suse.com/show_bug.cgi?id=1242715 * https://bugzilla.suse.com/show_bug.cgi?id=1244156 * https://bugzilla.suse.com/show_bug.cgi?id=1244157 * https://bugzilla.suse.com/show_bug.cgi?id=1244158 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 9 20:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 09 Jun 2025 20:30:25 -0000 Subject: SUSE-RU-2025:01845-1: important: Recommended update for go1.24-openssl Message-ID: <174950102549.5776.10407492361179006572@smelt2.prg2.suse.org> # Recommended update for go1.24-openssl Announcement ID: SUSE-RU-2025:01845-1 Release Date: 2025-06-09T17:04:30Z Rating: important References: * bsc#1243960 * jsc#SLE-18320 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature and has one fix can now be installed. ## Description: This update for go1.24-openssl fixes the following issues: Update to version 1.24.3 cut from the go1.24-fips-release branch at the revision tagged go1.24.3-3-openssl-fips. (jsc#SLE-18320) * Fix GOLANG_FIPS=0 and enable CGO for bin/go Update to version 1.24.3 cut from the go1.24-fips-release branch at the revision tagged go1.24.3-2-openssl-fips. (jsc#SLE-18320 bsc#1243960) * Force fips140tls in boring mode and run http tests * Implement HKDF for TLS (#297) bsc#1243960. This was previously left unimplemented and would panic if invoked. This was not caught because we only run a subset of the TLS tests in FIPS mode. This patch adds the test case which would have caught this into our test script and fixes the panic with an implementation of HKDF label expanding. * Improve documentation (#294) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1845=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1845=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1845=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1845=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1845=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1845=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1845=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1845=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1845=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1845=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1845=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1845=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.24-openssl-race-1.24.3-150000.1.6.1 * go1.24-openssl-1.24.3-150000.1.6.1 * go1.24-openssl-doc-1.24.3-150000.1.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243960 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 08:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 08:30:09 -0000 Subject: SUSE-SU-2025:01853-1: important: Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) Message-ID: <174954420937.627.12923911776317276085@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01853-1 Release Date: 2025-06-10T05:33:36Z Rating: important References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_14 fixes several issues. The following security issues were fixed: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1853=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_4-debugsource-10-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-10-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-debuginfo-10-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 08:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 08:30:15 -0000 Subject: SUSE-SU-2025:01851-1: important: Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) Message-ID: <174954421551.627.10911141055006447491@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01851-1 Release Date: 2025-06-10T05:33:31Z Rating: important References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_26 fixes several issues. The following security issues were fixed: * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1851=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1852=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_20-rt-6-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-6-150600.2.1 * kernel-livepatch-6_4_0-150600_10_26-rt-2-150600.2.1 * kernel-livepatch-6_4_0-150600_10_26-rt-debuginfo-2-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-6-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_8-debugsource-2-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 08:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 08:30:19 -0000 Subject: SUSE-SU-2025:01849-1: important: Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) Message-ID: <174954421902.627.9294779078863710319@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:01849-1 Release Date: 2025-06-09T22:33:38Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_228 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1849=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_228-default-10-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 08:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 08:30:21 -0000 Subject: SUSE-FU-2025:01855-1: low: Feature update for ansible-sap-operations Message-ID: <174954422159.627.13230970382145020413@smelt2.prg2.suse.org> # Feature update for ansible-sap-operations Announcement ID: SUSE-FU-2025:01855-1 Release Date: 2025-06-10T07:21:28Z Rating: low References: * jsc#PED-11950 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SAP Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Systems Management Module 15-SP7 * Systems Management Module 15-SP6 An update that contains one feature can now be installed. ## Description: This update for ansible-sap-operations, ansible-sap-infrastructure, ansible-sap- install fixes the following issues: * Initial release of ansible-sap-operations, ansible-sap-infrastructure, ansible-sap-install. (jsc#PED-11950) * In order to install those new packages make sure the Systems Management Module is enabled on your system. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1855=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2025-1855=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2025-1855=1 * SAP Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP7-2025-1855=1 * Systems Management Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Systems-Management-15-SP6-2025-1855=1 * Systems Management Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Systems-Management-15-SP7-2025-1855=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1855=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1855=1 ## Package List: * openSUSE Leap 15.5 (noarch) * ansible-sap-install-1.5.3-150500.11.3.1 * ansible-sap-infrastructure-1.1.2-150500.11.3.1 * ansible-linux-system-roles-1.0.0-150500.11.3.1 * ansible-sap-operations-0.9.1-150500.11.3.1 * SAP Applications Module 15-SP5 (noarch) * ansible-sap-operations-0.9.1-150500.11.3.1 * ansible-sap-install-1.5.3-150500.11.3.1 * ansible-sap-infrastructure-1.1.2-150500.11.3.1 * SAP Applications Module 15-SP6 (noarch) * ansible-sap-install-1.5.3-150500.11.3.1 * ansible-sap-infrastructure-1.1.2-150500.11.3.1 * ansible-sap-operations-0.9.1-150500.11.3.1 * SAP Applications Module 15-SP7 (noarch) * ansible-sap-install-1.5.3-150500.11.3.1 * ansible-sap-infrastructure-1.1.2-150500.11.3.1 * ansible-sap-operations-0.9.1-150500.11.3.1 * Systems Management Module 15-SP6 (noarch) * ansible-linux-system-roles-1.0.0-150500.11.3.1 * Systems Management Module 15-SP7 (noarch) * ansible-linux-system-roles-1.0.0-150500.11.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * ansible-linux-system-roles-1.0.0-150500.11.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * ansible-linux-system-roles-1.0.0-150500.11.3.1 ## References: * https://jira.suse.com/browse/PED-11950 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 08:30:27 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 08:30:27 -0000 Subject: SUSE-RU-2025:01854-1: important: Recommended update for virt-manager Message-ID: <174954422715.627.10460365552260211896@smelt2.prg2.suse.org> # Recommended update for virt-manager Announcement ID: SUSE-RU-2025:01854-1 Release Date: 2025-06-10T05:55:25Z Rating: important References: * bsc#1027942 * bsc#1236252 * bsc#1239837 * bsc#1241082 * bsc#1241119 * bsc#1243296 * jsc#PED-8910 Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature and has six fixes can now be installed. ## Description: This update for virt-manager fixes the following issues: * Add detection code for SLES 16 media (bsc#1236252, bsc#1243296) * Spec file changes for including the correct dependencies depending on the distro. (bsc#1241082 and bsc#1241119) * Upstream features and bug fixes (bsc#1027942) (jsc#PED-8910) * [Build 20250410] virt_install fails to launch: missing dependencies (bsc#1241082). Spec file modifications * [SLFO] virt-manager still has unresolved dependencies in beta2 (bsc#1239837) Remove dependencies on spice and other Gtk sources as these packages don't exist in SLES16. Cleanup other dependencies. virt-manager.spec * [SLES15 SP7] Refresh Virtualization Tools for Xen and KVM Management (jsc#PED-8910) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1854=1 ## Package List: * Server Applications Module 15-SP7 (noarch) * virt-install-5.0.0-150700.7.3.1 * virt-manager-5.0.0-150700.7.3.1 * virt-manager-common-5.0.0-150700.7.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1027942 * https://bugzilla.suse.com/show_bug.cgi?id=1236252 * https://bugzilla.suse.com/show_bug.cgi?id=1239837 * https://bugzilla.suse.com/show_bug.cgi?id=1241082 * https://bugzilla.suse.com/show_bug.cgi?id=1241119 * https://bugzilla.suse.com/show_bug.cgi?id=1243296 * https://jira.suse.com/browse/PED-8910 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 08:30:30 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 08:30:30 -0000 Subject: SUSE-SU-2025:01850-1: moderate: Security update for xen Message-ID: <174954423077.627.14619212234833385634@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2025:01850-1 Release Date: 2025-06-10T01:33:37Z Rating: moderate References: * bsc#1234282 * bsc#1238043 * bsc#1243117 Cross-References: * CVE-2024-28956 * CVE-2024-53241 * CVE-2025-1713 CVSS scores: * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-1713 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-1713 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for xen fixes the following issues: * CVE-2024-28956: Fixed Intel CPU: Indirect Target Selection (ITS) (XSA-469) (bsc#1243117) * CVE-2024-53241: Fixed Xen hypercall page unsafe against speculative attacks (XSA-466) (bsc#1234282) * CVE-2025-1713: Fixed deadlock potential with VT-d and legacy PCI device pass-through (XSA-467) (bsc#1238043) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1850=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1850=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1850=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1850=1 ## Package List: * openSUSE Leap 15.3 (aarch64 x86_64 i586) * xen-libs-debuginfo-4.14.6_24-150300.3.87.1 * xen-devel-4.14.6_24-150300.3.87.1 * xen-debugsource-4.14.6_24-150300.3.87.1 * xen-tools-domU-4.14.6_24-150300.3.87.1 * xen-tools-domU-debuginfo-4.14.6_24-150300.3.87.1 * xen-libs-4.14.6_24-150300.3.87.1 * openSUSE Leap 15.3 (x86_64) * xen-libs-32bit-4.14.6_24-150300.3.87.1 * xen-libs-32bit-debuginfo-4.14.6_24-150300.3.87.1 * openSUSE Leap 15.3 (aarch64 x86_64) * xen-tools-4.14.6_24-150300.3.87.1 * xen-4.14.6_24-150300.3.87.1 * xen-tools-debuginfo-4.14.6_24-150300.3.87.1 * xen-doc-html-4.14.6_24-150300.3.87.1 * openSUSE Leap 15.3 (noarch) * xen-tools-xendomains-wait-disk-4.14.6_24-150300.3.87.1 * openSUSE Leap 15.3 (aarch64_ilp32) * xen-libs-64bit-debuginfo-4.14.6_24-150300.3.87.1 * xen-libs-64bit-4.14.6_24-150300.3.87.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * xen-debugsource-4.14.6_24-150300.3.87.1 * xen-libs-debuginfo-4.14.6_24-150300.3.87.1 * xen-libs-4.14.6_24-150300.3.87.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * xen-debugsource-4.14.6_24-150300.3.87.1 * xen-libs-debuginfo-4.14.6_24-150300.3.87.1 * xen-libs-4.14.6_24-150300.3.87.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * xen-debugsource-4.14.6_24-150300.3.87.1 * xen-libs-debuginfo-4.14.6_24-150300.3.87.1 * xen-libs-4.14.6_24-150300.3.87.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2025-1713.html * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1238043 * https://bugzilla.suse.com/show_bug.cgi?id=1243117 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:30:20 -0000 Subject: SUSE-RU-2025:01862-1: moderate: Recommended update 5.1.0 RC for Multi-Linux Manager Client Tools Message-ID: <174955862041.655.9369681669068581689@smelt2.prg2.suse.org> # Recommended update 5.1.0 RC for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:01862-1 Release Date: 2025-06-10T09:56:37Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1226964 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * bsc#1235696 * bsc#1235861 * bsc#1236877 * bsc#1238929 * bsc#1240626 * bsc#1240698 * bsc#1241289 * bsc#1242174 * bsc#1242595 * jsc#MSQA-981 Affected Products: * SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204 An update that contains one feature and has 17 fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Versions 5.1.5-0 and 5.1.6-0: * Updated translation strings * Version 5.1.4-0: * Allow translation to wrap strings as weblate forces it scap-security-guide: * New package implemented at version 0.1.76 uyuni-tools: * Version 5.1.11-0: * Always create all necessary systemd files (bsc#1242595) * Patched saline and database images if needed mgradm support ptf * Version 5.1.10-0: * Don't migrate py2*-compat-salt.conf files (bsc#1240626) * Check for restorecon before using it (bsc#1240698) * Adjusted the distro path in cobbler files after migration (bsc#1238929) * Removed rhn-ssl-tool --gen-server RPM feature and options (bsc#1235696) * Added mgradm support ptf podman --pullPolicy flag (bsc#1236877) * Cleaned up host supportconfig files (bsc#1242174) * Allow --tag parameter to override --pgsql-tag if missing (bsc#1241289) * Don't migrate /etc/apache2/vhosts.d/cobbler.conf * Added gpg list command to mgradm * Version 5.1.9-0: * Moved PostgreSQL to a separate container * Increase WaitForServer timeout to 120s * Added mgradm backup and restore commands * Version 5.1.8-0: * Generate SSL certificates before the setup * Reverted use of :z flag on server volumes (bsc#1235861) * Allow mgrpxy install to use stored configuration venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhaced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issues running on Python 3.12 and 3.13 (bsc#1226964) * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and add support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Make _auth calls visible with master stats * Make Salt-SSH work with all SSH passwords (bsc#1215484) * Make x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch SUSE-MultiLinuxManagerTools-Ubuntu-22.04-2025-1862=1 ## Package List: * SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204 (amd64) * librpmbuild9-4.17.0+dfsg1-4build1 * libopenscap8-dbg-1.2.17-0.1ubuntu7~uyuni1 * prometheus-node-exporter-1.3.1-1 * venv-salt-minion-3006.0-3.3.7 * librpmsign9-4.17.0+dfsg1-4build1 * mgrctl-5.1.11-3.3.6 * prometheus-apache-exporter-0.11.0-1 * libopenscap-perl-1.2.17-0.1ubuntu7~uyuni1 * libopenscap8-1.2.17-0.1ubuntu7~uyuni1 * libopenscap-dev-1.2.17-0.1ubuntu7~uyuni1 * rpm-common-4.17.0+dfsg1-4build1 * librpm9-4.17.0+dfsg1-4build1 * python3-openscap-1.2.17-0.1ubuntu7~uyuni1 * prometheus-postgres-exporter-0.10.1-1 * python3-rpm-4.17.0+dfsg1-4build1 * librpmio9-4.17.0+dfsg1-4build1 * libfsverity0-1.4-1~exp1build1 * prometheus-exporter-exporter-0.4.0-1 * SUSE Multi-Linux Manager Client Tools for Ubuntu 22.04 2204 (all) * spacecmd-5.1.6-3.3.6 * mgrctl-zsh-completion-5.1.11-3.3.6 * mgrctl-bash-completion-5.1.11-3.3.6 * scap-security-guide-ubuntu-0.1.76-2.3.3 * mgrctl-fish-completion-5.1.11-3.3.6 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226964 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://bugzilla.suse.com/show_bug.cgi?id=1235696 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://bugzilla.suse.com/show_bug.cgi?id=1236877 * https://bugzilla.suse.com/show_bug.cgi?id=1238929 * https://bugzilla.suse.com/show_bug.cgi?id=1240626 * https://bugzilla.suse.com/show_bug.cgi?id=1240698 * https://bugzilla.suse.com/show_bug.cgi?id=1241289 * https://bugzilla.suse.com/show_bug.cgi?id=1242174 * https://bugzilla.suse.com/show_bug.cgi?id=1242595 * https://jira.suse.com/browse/MSQA-981 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:30:34 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:30:34 -0000 Subject: SUSE-RU-2025:38604-1: moderate: Recommended update 5.1.0 RC for Multi-Linux Manager Client Tools Message-ID: <174955863469.655.7564257396170252182@smelt2.prg2.suse.org> # Recommended update 5.1.0 RC for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:38604-1 Release Date: 2025-06-10T09:56:22Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1226964 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * bsc#1235696 * bsc#1235861 * bsc#1236877 * bsc#1238929 * bsc#1240626 * bsc#1240698 * bsc#1241289 * bsc#1242174 * bsc#1242595 * jsc#MSQA-981 Affected Products: * SUSE Multi-Linux Manager Client Tools for Ubuntu 24.04 2404 An update that contains one feature and has 17 fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Versions 5.1.5-0 and 5.1.6-0: * Updated translation strings * Version 5.1.4-0: * Allow translation to wrap strings as weblate forces it uyuni-tools: * Version 5.1.11-0: * Always create all necessary systemd files (bsc#1242595) * Patch saline and database images if needed mgradm support ptf * Version 5.1.10-0: * Don't migrate py2*-compat-salt.conf files (bsc#1240626) * Check for restorecon before using it (bsc#1240698) * Adjust the distro path in cobbler files after migration (bsc#1238929) * Remove rhn-ssl-tool --gen-server RPM feature and options (bsc#1235696) * Add mgradm support ptf podman --pullPolicy flag. (bsc#1236877) * Cleanup host supportconfig files (bsc#1242174) * allow --tag parameter to override --pgsql-tag if missing (bsc#1241289) * Don't migrate /etc/apache2/vhosts.d/cobbler.conf * add gpg list command to mgradm * Version 5.1.9-0: * Moved PostgreSQL to a separate container * Increase WaitForServer timeout to 120s * Added mgradm backup and restore commands * Version 5.1.8-0: * Generate SSL certificates before the setup * Reverted use of :z flag on server volumes (bsc#1235861) * Allow mgrpxy install to use stored configuration venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhaced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issues running on Python 3.12 and 3.13 (bsc#1226964) * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and add support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Make _auth calls visible with master stats * Make Salt-SSH work with all SSH passwords (bsc#1215484) * Make x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Client Tools for Ubuntu 24.04 2404 zypper in -t patch SUSE-MultiLinuxManagerTools-Ubuntu-24.04-2025-38604=1 ## Package List: * SUSE Multi-Linux Manager Client Tools for Ubuntu 24.04 2404 (all) * spacecmd-5.1.6-3.6.6 * mgrctl-zsh-completion-5.1.11-3.3.6 * mgrctl-bash-completion-5.1.11-3.3.6 * mgrctl-fish-completion-5.1.11-3.3.6 * SUSE Multi-Linux Manager Client Tools for Ubuntu 24.04 2404 (amd64) * prometheus-exporter-exporter-0.4.0-1ubuntu0.24.04.1 * venv-salt-minion-3006.0-3.3.5 * mgrctl-5.1.11-3.3.6 * prometheus-postgres-exporter-0.15.0-1ubuntu0.1 * prometheus-apache-exporter-1.0.6-1ubuntu0.1 * prometheus-node-exporter-1.7.0-1ubuntu0.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226964 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://bugzilla.suse.com/show_bug.cgi?id=1235696 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://bugzilla.suse.com/show_bug.cgi?id=1236877 * https://bugzilla.suse.com/show_bug.cgi?id=1238929 * https://bugzilla.suse.com/show_bug.cgi?id=1240626 * https://bugzilla.suse.com/show_bug.cgi?id=1240698 * https://bugzilla.suse.com/show_bug.cgi?id=1241289 * https://bugzilla.suse.com/show_bug.cgi?id=1242174 * https://bugzilla.suse.com/show_bug.cgi?id=1242595 * https://jira.suse.com/browse/MSQA-981 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:30:49 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:30:49 -0000 Subject: SUSE-RU-2025:01861-1: moderate: Recommended update 5.1.0 RC for Multi-Linux Manager Client Tools Message-ID: <174955864943.655.14976950049824141907@smelt2.prg2.suse.org> # Recommended update 5.1.0 RC for Multi-Linux Manager Client Tools Announcement ID: SUSE-RU-2025:01861-1 Release Date: 2025-06-10T09:56:09Z Rating: moderate References: * bsc#1215484 * bsc#1220905 * bsc#1226964 * bsc#1230642 * bsc#1230944 * bsc#1231605 * bsc#1234022 * bsc#1234881 * bsc#1235696 * bsc#1235861 * bsc#1236877 * bsc#1238929 * bsc#1240626 * bsc#1240698 * bsc#1241289 * bsc#1242174 * bsc#1242595 * jsc#MSQA-981 Affected Products: * SUSE Multi-Linux Manager Client Tools for Debian 12 An update that contains one feature and has 17 fixes can now be installed. ## Description: This update fixes the following issues: spacecmd: * Versions 5.1.5-0 and 5.1.6-0: * Updated translation strings * Version 5.1.4-0: * Allow translation to wrap strings as weblate forces it uyuni-tools: * Version 5.1.11-0: * Always create all necessary systemd files (bsc#1242595) * Patch saline and database images if needed mgradm support ptf * Version 5.1.10-0: * Don't migrate py2*-compat-salt.conf files (bsc#1240626) * Check for restorecon before using it (bsc#1240698) * Adjust the distro path in cobbler files after migration (bsc#1238929) * Remove rhn-ssl-tool --gen-server RPM feature and options (bsc#1235696) * Add mgradm support ptf podman --pullPolicy flag. (bsc#1236877) * Cleanup host supportconfig files (bsc#1242174) * allow --tag parameter to override --pgsql-tag if missing (bsc#1241289) * Don't migrate /etc/apache2/vhosts.d/cobbler.conf * add gpg list command to mgradm * Version 5.1.9-0: * Moved PostgreSQL to a separate container * Increase WaitForServer timeout to 120s * Added mgradm backup and restore commands * Version 5.1.8-0: * Generate SSL certificates before the setup * Reverted use of :z flag on server volumes (bsc#1235861) * Allow mgrpxy install to use stored configuration venv-salt-minion: * Adapted to removal of hex attribute in pygit2 v1.15.0 (bsc#1230642) * Added DEB822 apt repository format support * Detect openEuler as RedHat family OS * Enhaced batch async and fixed some detected issues * Enhanced smart JSON parsing when garbage is present (bsc#1231605) * Ensure the correct crypt module is loaded * Fixed aptpkg 'NoneType object has no attribute split' error * Fixed crash due wrong client reference on `SaltMakoTemplateLookup` * Fixed error to stat '/root/.gitconfig' on gitfs (bsc#1230944, bsc#1234881, bsc#1220905) * Fixed issues running on Python 3.12 and 3.13 (bsc#1226964) * Fixed tests failures after "repo.saltproject.io" deprecation * Fixed virt_query outputter and add support for block devices * Fixed virtual grains for VMs running on Nutanix AHV (bsc#1234022) * Implemented multiple inventory for ansible.targets * Make _auth calls visible with master stats * Make Salt-SSH work with all SSH passwords (bsc#1215484) * Make x509 module compatible with M2Crypto 0.44.0 * Moved logrotate config to /usr/etc/logrotate.d where possible * Removed deprecated code from x509.certificate_managed test mode * Removed strict binary dependency for libcrypt.so for EL9 bundle to make it compatible with openEuler and make using passlib instead. * Repair mount.fstab_present always returning pending changes * Set virtual grain in Podman systemd container ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Client Tools for Debian 12 zypper in -t patch SUSE-MultiLinuxManagerTools-Debian-12-2025-1861=1 ## Package List: * SUSE Multi-Linux Manager Client Tools for Debian 12 (all) * mgrctl-fish-completion-5.1.11-3.5.3 * mgrctl-bash-completion-5.1.11-3.5.3 * spacecmd-5.1.6-3.5.3 * mgrctl-zsh-completion-5.1.11-3.5.3 * SUSE Multi-Linux Manager Client Tools for Debian 12 (amd64 arm64) * mgrctl-5.1.11-3.5.3 * venv-salt-minion-3006.0-3.5.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215484 * https://bugzilla.suse.com/show_bug.cgi?id=1220905 * https://bugzilla.suse.com/show_bug.cgi?id=1226964 * https://bugzilla.suse.com/show_bug.cgi?id=1230642 * https://bugzilla.suse.com/show_bug.cgi?id=1230944 * https://bugzilla.suse.com/show_bug.cgi?id=1231605 * https://bugzilla.suse.com/show_bug.cgi?id=1234022 * https://bugzilla.suse.com/show_bug.cgi?id=1234881 * https://bugzilla.suse.com/show_bug.cgi?id=1235696 * https://bugzilla.suse.com/show_bug.cgi?id=1235861 * https://bugzilla.suse.com/show_bug.cgi?id=1236877 * https://bugzilla.suse.com/show_bug.cgi?id=1238929 * https://bugzilla.suse.com/show_bug.cgi?id=1240626 * https://bugzilla.suse.com/show_bug.cgi?id=1240698 * https://bugzilla.suse.com/show_bug.cgi?id=1241289 * https://bugzilla.suse.com/show_bug.cgi?id=1242174 * https://bugzilla.suse.com/show_bug.cgi?id=1242595 * https://jira.suse.com/browse/MSQA-981 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:30:53 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:30:53 -0000 Subject: SUSE-RU-2025:01734-2: moderate: Recommended update for nvidia-container-runtime Message-ID: <174955865306.655.5816939532407380845@smelt2.prg2.suse.org> # Recommended update for nvidia-container-runtime Announcement ID: SUSE-RU-2025:01734-2 Release Date: 2025-06-10T08:38:36Z Rating: moderate References: * bsc#1242429 Affected Products: * Containers Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for nvidia-container-runtime fixes the following issues: * disable PIE again, the tool does not start. (bsc#1242429) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-1734=1 ## Package List: * Containers Module 15-SP7 (aarch64 ppc64le x86_64) * nvidia-container-runtime-3.5.0-150200.5.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242429 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:30:54 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:30:54 -0000 Subject: SUSE-RU-2025:01733-2: moderate: Recommended update for krb5 Message-ID: <174955865495.655.1167748703676776467@smelt2.prg2.suse.org> # Recommended update for krb5 Announcement ID: SUSE-RU-2025:01733-2 Release Date: 2025-06-10T08:38:31Z Rating: moderate References: * bsc#1242060 Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for krb5 fixes the following issue: * Remove references to the LMDB backend in the kdc.conf manpage (bsc#1242060). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1733=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1733=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * krb5-debuginfo-1.20.1-150600.11.11.2 * krb5-plugin-preauth-otp-1.20.1-150600.11.11.2 * krb5-client-1.20.1-150600.11.11.2 * krb5-devel-1.20.1-150600.11.11.2 * krb5-plugin-preauth-pkinit-1.20.1-150600.11.11.2 * krb5-debugsource-1.20.1-150600.11.11.2 * krb5-1.20.1-150600.11.11.2 * krb5-client-debuginfo-1.20.1-150600.11.11.2 * krb5-plugin-preauth-pkinit-debuginfo-1.20.1-150600.11.11.2 * krb5-plugin-preauth-otp-debuginfo-1.20.1-150600.11.11.2 * Basesystem Module 15-SP7 (x86_64) * krb5-32bit-debuginfo-1.20.1-150600.11.11.2 * krb5-32bit-1.20.1-150600.11.11.2 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * krb5-debuginfo-1.20.1-150600.11.11.2 * krb5-plugin-kdb-ldap-debuginfo-1.20.1-150600.11.11.2 * krb5-plugin-kdb-ldap-1.20.1-150600.11.11.2 * krb5-debugsource-1.20.1-150600.11.11.2 * krb5-server-debuginfo-1.20.1-150600.11.11.2 * krb5-server-1.20.1-150600.11.11.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:30:59 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:30:59 -0000 Subject: SUSE-SU-2025:01639-2: important: Security update for libwebp Message-ID: <174955865904.655.9410467411822354375@smelt2.prg2.suse.org> # Security update for libwebp Announcement ID: SUSE-SU-2025:01639-2 Release Date: 2025-06-10T08:12:52Z Rating: important References: * bsc#1136199 Cross-References: * CVE-2016-9969 CVSS scores: * CVE-2016-9969 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2016-9969 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2016-9969 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libwebp fixes the following issues: * CVE-2016-9969: freeing of uninitialized memory pointer in SetFrame() of AnimEncoder can lead to double free (bsc#1136199). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1639=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1639=1 ## Package List: * SUSE Package Hub 15 15-SP7 (x86_64) * libwebp6-32bit-0.5.0-150000.3.17.1 * libwebp6-32bit-debuginfo-0.5.0-150000.3.17.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libwebp6-0.5.0-150000.3.17.1 * libwebp6-debuginfo-0.5.0-150000.3.17.1 * libwebp-debugsource-0.5.0-150000.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2016-9969.html * https://bugzilla.suse.com/show_bug.cgi?id=1136199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:31:02 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:31:02 -0000 Subject: SUSE-SU-2025:01860-1: moderate: Security update for xen Message-ID: <174955866294.655.11064690424186759648@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2025:01860-1 Release Date: 2025-06-10T08:11:58Z Rating: moderate References: * bsc#1234282 * bsc#1238043 * bsc#1243117 Cross-References: * CVE-2024-28956 * CVE-2024-53241 * CVE-2025-1713 CVSS scores: * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-1713 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-1713 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves three vulnerabilities can now be installed. ## Description: This update for xen fixes the following issues: * CVE-2024-28956: Fixed Intel CPU: Indirect Target Selection (ITS) (XSA-469) (bsc#1243117) * CVE-2024-53241: Fixed Xen hypercall page unsafe against speculative attacks (XSA-466) (bsc#1234282) * CVE-2025-1713: Fixed deadlock potential with VT-d and legacy PCI device pass-through (XSA-467) (bsc#1238043) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1860=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1860=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64 i586) * xen-libs-debuginfo-4.17.5_08-150500.3.45.1 * xen-devel-4.17.5_08-150500.3.45.1 * xen-debugsource-4.17.5_08-150500.3.45.1 * xen-libs-4.17.5_08-150500.3.45.1 * xen-tools-domU-4.17.5_08-150500.3.45.1 * xen-tools-domU-debuginfo-4.17.5_08-150500.3.45.1 * openSUSE Leap 15.5 (x86_64) * xen-libs-32bit-debuginfo-4.17.5_08-150500.3.45.1 * xen-libs-32bit-4.17.5_08-150500.3.45.1 * openSUSE Leap 15.5 (aarch64 x86_64) * xen-tools-4.17.5_08-150500.3.45.1 * xen-doc-html-4.17.5_08-150500.3.45.1 * xen-4.17.5_08-150500.3.45.1 * xen-tools-debuginfo-4.17.5_08-150500.3.45.1 * openSUSE Leap 15.5 (noarch) * xen-tools-xendomains-wait-disk-4.17.5_08-150500.3.45.1 * openSUSE Leap 15.5 (aarch64_ilp32) * xen-libs-64bit-debuginfo-4.17.5_08-150500.3.45.1 * xen-libs-64bit-4.17.5_08-150500.3.45.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * xen-libs-4.17.5_08-150500.3.45.1 * xen-libs-debuginfo-4.17.5_08-150500.3.45.1 * xen-debugsource-4.17.5_08-150500.3.45.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-53241.html * https://www.suse.com/security/cve/CVE-2025-1713.html * https://bugzilla.suse.com/show_bug.cgi?id=1234282 * https://bugzilla.suse.com/show_bug.cgi?id=1238043 * https://bugzilla.suse.com/show_bug.cgi?id=1243117 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:31:04 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:31:04 -0000 Subject: SUSE-RU-2025:01859-1: moderate: Recommended update for cloud-regionsrv-client Message-ID: <174955866446.655.16199574558249835437@smelt2.prg2.suse.org> # Recommended update for cloud-regionsrv-client Announcement ID: SUSE-RU-2025:01859-1 Release Date: 2025-06-10T08:04:47Z Rating: moderate References: Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that can now be installed. ## Description: This update for cloud-regionsrv-client fixes the following issue: * Shipping missing package to their respective products, no source changes: * Adding binary `cloud-regionsrv-client-license-watcher` to relative channels ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-1859=1 ## Package List: * Public Cloud Module 12 (noarch) * cloud-regionsrv-client-license-watcher-1.0.0-52.127.1 * cloud-regionsrv-client-generic-config-1.0.0-52.127.1 * cloud-regionsrv-client-plugin-azure-2.0.0-52.127.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-52.127.1 * cloud-regionsrv-client-plugin-gce-1.0.0-52.127.1 * cloud-regionsrv-client-10.4.0-52.127.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:31:05 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:31:05 -0000 Subject: SUSE-RU-2025:01858-1: moderate: Recommended update for cloud-regionsrv-client Message-ID: <174955866575.655.10566650957560329921@smelt2.prg2.suse.org> # Recommended update for cloud-regionsrv-client Announcement ID: SUSE-RU-2025:01858-1 Release Date: 2025-06-10T08:04:21Z Rating: moderate References: Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for cloud-regionsrv-client fixes the following issue: * Shipping missing package to their respective products, no source changes: * Adding binary `cloud-regionsrv-client-license-watcher` to relative channels ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1858=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1858=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1858=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1858=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1858=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1858=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1858=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1858=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1858=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1858=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1858=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1858=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * Public Cloud Module 15-SP3 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * Public Cloud Module 15-SP4 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * Public Cloud Module 15-SP5 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * Public Cloud Module 15-SP6 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * Public Cloud Module 15-SP7 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * openSUSE Leap 15.3 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * openSUSE Leap 15.6 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * cloud-regionsrv-client-10.4.0-150300.13.24.1 * cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.24.1 * cloud-regionsrv-client-generic-config-1.0.0-150300.13.24.1 * cloud-regionsrv-client-license-watcher-1.0.0-150300.13.24.1 * cloud-regionsrv-client-plugin-ec2-1.0.5-150300.13.24.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 12:31:07 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 12:31:07 -0000 Subject: SUSE-RU-2025:01857-1: moderate: Recommended update for go1.23-openssl Message-ID: <174955866732.655.6528321645280816963@smelt2.prg2.suse.org> # Recommended update for go1.23-openssl Announcement ID: SUSE-RU-2025:01857-1 Release Date: 2025-06-10T07:59:28Z Rating: moderate References: * jsc#SLE-18320 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for go1.23-openssl fixes the following issues: Update to version 1.23.9 cut from the go1.23-fips-release branch at the revision tagged go1.23.9-1-openssl-fips. (jsc#SLE-18320) * No changes to sources, sync with upstream git tag. SUSE local tag go1.23.9-0 and upstream go1.23.9-1-openssl-fips point to the same commit. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1857=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1857=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1857=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1857=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1857=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1857=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1857=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1857=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1857=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1857=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1857=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1857=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.23-openssl-1.23.9-150000.1.12.1 * go1.23-openssl-race-1.23.9-150000.1.12.1 * go1.23-openssl-debuginfo-1.23.9-150000.1.12.1 * go1.23-openssl-doc-1.23.9-150000.1.12.1 ## References: * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:15 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:15 -0000 Subject: SUSE-SU-2025:01868-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Message-ID: <174957319522.627.1199798899663911486@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:01868-1 Release Date: 2025-06-10T15:33:31Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_179 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1868=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1868=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_179-default-10-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_49-debugsource-10-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_179-preempt-10-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-10-150300.2.2 * kernel-livepatch-5_3_18-150300_59_179-default-10-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_49-debugsource-10-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:21 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:21 -0000 Subject: SUSE-RU-2025:01867-1: important: Recommended update for busybox Message-ID: <174957320149.627.10349392382696765989@smelt2.prg2.suse.org> # Recommended update for busybox Announcement ID: SUSE-RU-2025:01867-1 Release Date: 2025-06-10T14:20:07Z Rating: important References: * bsc#1243201 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for busybox fixes the following issues: * Enable halt, poweroff, reboot commands (bsc#1243201) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1867=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1867=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1867=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * busybox-static-1.35.0-150500.10.6.1 * busybox-1.35.0-150500.10.6.1 * openSUSE Leap 15.5 (noarch) * busybox-syslogd-1.35.0-150500.7.4.1 * busybox-kmod-1.35.0-150500.7.4.1 * busybox-diffutils-1.35.0-150500.7.4.1 * busybox-bzip2-1.35.0-150500.7.4.1 * busybox-netcat-1.35.0-150500.7.4.1 * busybox-sed-1.35.0-150500.7.4.1 * busybox-xz-1.35.0-150500.7.4.1 * busybox-sh-1.35.0-150500.7.4.1 * busybox-gzip-1.35.0-150500.7.4.1 * busybox-procps-1.35.0-150500.7.4.1 * busybox-patch-1.35.0-150500.7.4.1 * busybox-man-1.35.0-150500.7.4.1 * busybox-ncurses-utils-1.35.0-150500.7.4.1 * busybox-vi-1.35.0-150500.7.4.1 * busybox-wget-1.35.0-150500.7.4.1 * busybox-gawk-1.35.0-150500.7.4.1 * busybox-vlan-1.35.0-150500.7.4.1 * busybox-which-1.35.0-150500.7.4.1 * busybox-dos2unix-1.35.0-150500.7.4.1 * busybox-policycoreutils-1.35.0-150500.7.4.1 * busybox-iputils-1.35.0-150500.7.4.1 * busybox-links-1.35.0-150500.7.4.1 * busybox-bind-utils-1.35.0-150500.7.4.1 * busybox-findutils-1.35.0-150500.7.4.1 * busybox-less-1.35.0-150500.7.4.1 * busybox-psmisc-1.35.0-150500.7.4.1 * busybox-whois-1.35.0-150500.7.4.1 * busybox-coreutils-1.35.0-150500.7.4.1 * busybox-traceroute-1.35.0-150500.7.4.1 * busybox-adduser-1.35.0-150500.7.4.1 * busybox-unzip-1.35.0-150500.7.4.1 * busybox-grep-1.35.0-150500.7.4.1 * busybox-sysvinit-tools-1.35.0-150500.7.4.1 * busybox-tftp-1.35.0-150500.7.4.1 * busybox-iproute2-1.35.0-150500.7.4.1 * busybox-tunctl-1.35.0-150500.7.4.1 * busybox-sendmail-1.35.0-150500.7.4.1 * busybox-kbd-1.35.0-150500.7.4.1 * busybox-attr-1.35.0-150500.7.4.1 * busybox-cpio-1.35.0-150500.7.4.1 * busybox-ed-1.35.0-150500.7.4.1 * busybox-tar-1.35.0-150500.7.4.1 * busybox-misc-1.35.0-150500.7.4.1 * busybox-selinux-tools-1.35.0-150500.7.4.1 * busybox-net-tools-1.35.0-150500.7.4.1 * busybox-util-linux-1.35.0-150500.7.4.1 * busybox-hostname-1.35.0-150500.7.4.1 * busybox-sharutils-1.35.0-150500.7.4.1 * busybox-time-1.35.0-150500.7.4.1 * busybox-bc-1.35.0-150500.7.4.1 * busybox-telnet-1.35.0-150500.7.4.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * busybox-static-1.35.0-150500.10.6.1 * busybox-1.35.0-150500.10.6.1 * busybox-testsuite-1.35.0-150500.10.6.1 * openSUSE Leap 15.5 (aarch64 x86_64 i586) * busybox-warewulf3-1.35.0-150500.10.6.1 * openSUSE Leap 15.6 (noarch) * busybox-syslogd-1.35.0-150500.7.4.1 * busybox-kmod-1.35.0-150500.7.4.1 * busybox-diffutils-1.35.0-150500.7.4.1 * busybox-bzip2-1.35.0-150500.7.4.1 * busybox-netcat-1.35.0-150500.7.4.1 * busybox-sed-1.35.0-150500.7.4.1 * busybox-xz-1.35.0-150500.7.4.1 * busybox-sh-1.35.0-150500.7.4.1 * busybox-gzip-1.35.0-150500.7.4.1 * busybox-procps-1.35.0-150500.7.4.1 * busybox-patch-1.35.0-150500.7.4.1 * busybox-man-1.35.0-150500.7.4.1 * busybox-ncurses-utils-1.35.0-150500.7.4.1 * busybox-vi-1.35.0-150500.7.4.1 * busybox-wget-1.35.0-150500.7.4.1 * busybox-gawk-1.35.0-150500.7.4.1 * busybox-vlan-1.35.0-150500.7.4.1 * busybox-which-1.35.0-150500.7.4.1 * busybox-dos2unix-1.35.0-150500.7.4.1 * busybox-policycoreutils-1.35.0-150500.7.4.1 * busybox-iputils-1.35.0-150500.7.4.1 * busybox-links-1.35.0-150500.7.4.1 * busybox-bind-utils-1.35.0-150500.7.4.1 * busybox-findutils-1.35.0-150500.7.4.1 * busybox-less-1.35.0-150500.7.4.1 * busybox-psmisc-1.35.0-150500.7.4.1 * busybox-whois-1.35.0-150500.7.4.1 * busybox-coreutils-1.35.0-150500.7.4.1 * busybox-traceroute-1.35.0-150500.7.4.1 * busybox-adduser-1.35.0-150500.7.4.1 * busybox-unzip-1.35.0-150500.7.4.1 * busybox-grep-1.35.0-150500.7.4.1 * busybox-sysvinit-tools-1.35.0-150500.7.4.1 * busybox-tftp-1.35.0-150500.7.4.1 * busybox-iproute2-1.35.0-150500.7.4.1 * busybox-tunctl-1.35.0-150500.7.4.1 * busybox-sendmail-1.35.0-150500.7.4.1 * busybox-kbd-1.35.0-150500.7.4.1 * busybox-attr-1.35.0-150500.7.4.1 * busybox-cpio-1.35.0-150500.7.4.1 * busybox-ed-1.35.0-150500.7.4.1 * busybox-tar-1.35.0-150500.7.4.1 * busybox-misc-1.35.0-150500.7.4.1 * busybox-selinux-tools-1.35.0-150500.7.4.1 * busybox-net-tools-1.35.0-150500.7.4.1 * busybox-util-linux-1.35.0-150500.7.4.1 * busybox-hostname-1.35.0-150500.7.4.1 * busybox-sharutils-1.35.0-150500.7.4.1 * busybox-time-1.35.0-150500.7.4.1 * busybox-bc-1.35.0-150500.7.4.1 * busybox-telnet-1.35.0-150500.7.4.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * busybox-static-1.35.0-150500.10.6.1 * busybox-testsuite-1.35.0-150500.10.6.1 * openSUSE Leap 15.6 (aarch64 x86_64) * busybox-warewulf3-1.35.0-150500.10.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243201 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:25 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:25 -0000 Subject: SUSE-RU-2025:01866-1: important: Recommended update for kbd Message-ID: <174957320544.627.12063451367311011560@smelt2.prg2.suse.org> # Recommended update for kbd Announcement ID: SUSE-RU-2025:01866-1 Release Date: 2025-06-10T14:19:39Z Rating: important References: * bsc#1237230 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for kbd fixes the following issues: * Don't search for resources in the current directory. It can cause unwanted side effects or even infinite loop (bsc#1237230) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1866=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kbd-2.4.0-150700.15.3.1 * kbd-debugsource-2.4.0-150700.15.3.1 * kbd-debuginfo-2.4.0-150700.15.3.1 * Basesystem Module 15-SP7 (noarch) * kbd-legacy-2.4.0-150700.15.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1237230 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:28 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:28 -0000 Subject: SUSE-RU-2025:01685-2: moderate: Recommended update for sysstat Message-ID: <174957320855.627.16131375802406126584@smelt2.prg2.suse.org> # Recommended update for sysstat Announcement ID: SUSE-RU-2025:01685-2 Release Date: 2025-06-10T14:17:28Z Rating: moderate References: * bsc#1239297 Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for sysstat fixes the following issues: * Removed cron dependency in favour of systemd timers (bsc#1239297) * Removed sysstat.cron.suse ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1685=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1685=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * sysstat-debuginfo-12.0.2-150000.3.40.1 * sysstat-isag-12.0.2-150000.3.40.1 * sysstat-debugsource-12.0.2-150000.3.40.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239297 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:31 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:31 -0000 Subject: SUSE-RU-2025:01865-1: moderate: Recommended update for libnvme, nvme-cli Message-ID: <174957321103.627.16951736024210528420@smelt2.prg2.suse.org> # Recommended update for libnvme, nvme-cli Announcement ID: SUSE-RU-2025:01865-1 Release Date: 2025-06-10T14:13:25Z Rating: moderate References: * bsc#1240518 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for libnvme, nvme-cli fixes the following issues: * Version update for libnvme to 1.11+4.ge68a91ae. * tree: add routine to fetch subsys firmware rev (bsc#1240518). * tree: add routine to fetch subsys model (bsc#1240518). * tests: pass thru unknown ioctls. * linux: fix derive_psk_digest on OpenSSL version 1.1. * Version update for nvme-cli to 2.11+22.gd31b1a01. * nvme-print: display fw-rev in list-subsys output (bsc#1240518). * nvme-print: display model in list-subsys output (bsc#1240518). * netapp-ontapdev: add subsysname to regular output (bsc#1240518). * netapp-ontapdev: add subsysname to the verbose output (bsc#1240518). * Revert "nvme-print-json: display only verbose output". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1865=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libnvme-debuginfo-1.11+4.ge68a91ae-150700.4.3.2 * python3-libnvme-debuginfo-1.11+4.ge68a91ae-150700.4.3.2 * libnvme1-debuginfo-1.11+4.ge68a91ae-150700.4.3.2 * nvme-cli-2.11+22.gd31b1a01-150700.3.3.2 * python3-libnvme-1.11+4.ge68a91ae-150700.4.3.2 * nvme-cli-debugsource-2.11+22.gd31b1a01-150700.3.3.2 * libnvme-debugsource-1.11+4.ge68a91ae-150700.4.3.2 * libnvme1-1.11+4.ge68a91ae-150700.4.3.2 * libnvme-devel-1.11+4.ge68a91ae-150700.4.3.2 * libnvme-mi1-1.11+4.ge68a91ae-150700.4.3.2 * nvme-cli-debuginfo-2.11+22.gd31b1a01-150700.3.3.2 * libnvme-mi1-debuginfo-1.11+4.ge68a91ae-150700.4.3.2 * Basesystem Module 15-SP7 (noarch) * nvme-cli-zsh-completion-2.11+22.gd31b1a01-150700.3.3.2 * nvme-cli-bash-completion-2.11+22.gd31b1a01-150700.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1240518 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:38 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:38 -0000 Subject: SUSE-SU-2025:01864-1: important: Security update for libsoup2 Message-ID: <174957321866.627.16812144326033023421@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2025:01864-1 Release Date: 2025-06-10T14:05:02Z Rating: important References: * bsc#1241162 * bsc#1241214 * bsc#1241226 * bsc#1241238 * bsc#1241252 * bsc#1241263 * bsc#1243332 * bsc#1243423 Cross-References: * CVE-2025-32906 * CVE-2025-32909 * CVE-2025-32910 * CVE-2025-32911 * CVE-2025-32912 * CVE-2025-32913 * CVE-2025-4948 * CVE-2025-4969 CVSS scores: * CVE-2025-32906 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-32906 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32909 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-32909 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32909 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32910 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32910 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32910 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32911 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32911 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-32912 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-4948 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4948 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4969 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4969 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-4969 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves eight vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) * CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) * CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) * CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) * CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) * CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via "params". (bsc#1241238) * CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) * CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1864=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1864=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1864=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1864=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1864=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1864=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1864=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1864=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1864=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1864=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1864=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1864=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1864=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1864=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1864=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1864=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1864=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Manager Server 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * openSUSE Leap 15.4 (x86_64) * libsoup2-devel-32bit-2.74.2-150400.3.9.1 * libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.9.1 * libsoup-2_4-1-32bit-2.74.2-150400.3.9.1 * openSUSE Leap 15.4 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-2_4-1-64bit-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-64bit-2.74.2-150400.3.9.1 * libsoup-2_4-1-64bit-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * libsoup-2_4-1-debuginfo-2.74.2-150400.3.9.1 * libsoup2-devel-2.74.2-150400.3.9.1 * libsoup-2_4-1-2.74.2-150400.3.9.1 * libsoup2-debugsource-2.74.2-150400.3.9.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.9.1 * SUSE Manager Proxy 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32906.html * https://www.suse.com/security/cve/CVE-2025-32909.html * https://www.suse.com/security/cve/CVE-2025-32910.html * https://www.suse.com/security/cve/CVE-2025-32911.html * https://www.suse.com/security/cve/CVE-2025-32912.html * https://www.suse.com/security/cve/CVE-2025-32913.html * https://www.suse.com/security/cve/CVE-2025-4948.html * https://www.suse.com/security/cve/CVE-2025-4969.html * https://bugzilla.suse.com/show_bug.cgi?id=1241162 * https://bugzilla.suse.com/show_bug.cgi?id=1241214 * https://bugzilla.suse.com/show_bug.cgi?id=1241226 * https://bugzilla.suse.com/show_bug.cgi?id=1241238 * https://bugzilla.suse.com/show_bug.cgi?id=1241252 * https://bugzilla.suse.com/show_bug.cgi?id=1241263 * https://bugzilla.suse.com/show_bug.cgi?id=1243332 * https://bugzilla.suse.com/show_bug.cgi?id=1243423 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 16:33:40 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 16:33:40 -0000 Subject: SUSE-RU-2025:01863-1: moderate: Recommended update for sles15-image Message-ID: <174957322053.627.14633079818683231304@smelt2.prg2.suse.org> # Recommended update for sles15-image Announcement ID: SUSE-RU-2025:01863-1 Release Date: 2025-06-10T12:33:20Z Rating: moderate References: Affected Products: * openSUSE Leap 15.6 An update that can now be installed. ## Description: This update for sles15-image fixes the following issues: * add support EOL date for SP6 general support * fix use SOURCEURL_WITH for proper README url in all cases * do check rpm signatures ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1863=1 ## Package List: * openSUSE Leap 15.6 (noarch) * container:sles15-image-15.6.0-47.21.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 10 20:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 10 Jun 2025 20:30:11 -0000 Subject: SUSE-SU-2025:01869-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) Message-ID: <174958741174.629.2763836056221169528@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:01869-1 Release Date: 2025-06-10T18:33:47Z Rating: important References: * bsc#1232900 * bsc#1238324 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2022-49080 * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_73 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1872=1 SUSE-2025-1869=1 SUSE-2025-1870=1 SUSE-2025-1871=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1871=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1872=1 SUSE-SLE-Module-Live- Patching-15-SP5-2025-1869=1 SUSE-SLE-Module-Live-Patching-15-SP5-2025-1870=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_62-default-17-150500.2.2 * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-17-150500.2.2 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-16-150500.2.2 * kernel-livepatch-5_14_21-150500_55_73-default-11-150500.2.2 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-11-150500.2.2 * kernel-livepatch-5_14_21-150500_55_65-default-17-150500.2.2 * kernel-livepatch-5_14_21-150500_55_68-default-16-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-17-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_17-debugsource-11-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-17-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-16-150500.2.2 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-17-150500.2.2 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_62-default-17-150500.2.2 * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-17-150500.2.2 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-16-150500.2.2 * kernel-livepatch-5_14_21-150500_55_73-default-11-150500.2.2 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-11-150500.2.2 * kernel-livepatch-5_14_21-150500_55_65-default-17-150500.2.2 * kernel-livepatch-5_14_21-150500_55_68-default-16-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-17-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-17-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-16-150500.2.2 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-17-150500.2.2 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64) * kernel-livepatch-SLE15-SP5_Update_17-debugsource-11-150500.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:08 -0000 Subject: SUSE-SU-2025:01875-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) Message-ID: <174963060843.627.15431740071034581190@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:01875-1 Release Date: 2025-06-10T23:03:54Z Rating: important References: * bsc#1238324 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2022-49080 * CVE-2024-57996 * CVE-2024-58013 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_91 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1876=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1875=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1875=1 SUSE-2025-1876=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_91-default-5-150500.2.2 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-5-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-5-150500.2.2 * kernel-livepatch-5_14_21-150500_55_88-default-5-150500.2.2 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-5-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-5-150500.2.2 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_91-default-5-150500.2.2 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-5-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-5-150500.2.2 * kernel-livepatch-5_14_21-150500_55_88-default-5-150500.2.2 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-5-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-5-150500.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:13 -0000 Subject: SUSE-SU-2025:01873-1: important: Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) Message-ID: <174963061360.627.14739037448515262852@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:01873-1 Release Date: 2025-06-10T22:04:04Z Rating: important References: * bsc#1232900 * bsc#1238324 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2022-49080 * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_83 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1873=1 SUSE-2025-1874=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1873=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1874=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_80-default-9-150500.2.2 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-9-150500.2.2 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-9-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_19-debugsource-9-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-9-150500.2.2 * kernel-livepatch-5_14_21-150500_55_83-default-9-150500.2.2 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_80-default-9-150500.2.2 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-9-150500.2.2 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-9-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_19-debugsource-9-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-9-150500.2.2 * kernel-livepatch-5_14_21-150500_55_83-default-9-150500.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:18 -0000 Subject: SUSE-SU-2025:01890-1: moderate: Security update for transfig Message-ID: <174963061866.627.7646482114373545192@smelt2.prg2.suse.org> # Security update for transfig Announcement ID: SUSE-SU-2025:01890-1 Release Date: 2025-06-11T05:43:47Z Rating: moderate References: * bsc#1243260 * bsc#1243261 * bsc#1243262 * bsc#1243263 Cross-References: * CVE-2025-46397 * CVE-2025-46398 * CVE-2025-46399 * CVE-2025-46400 CVSS scores: * CVE-2025-46397 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46397 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46398 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46398 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46399 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46399 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-46400 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for transfig fixes the following issues: Update to fig2dev version 3.2.9a * CVE-2025-46397: Fixed a stack buffer overflow in fig2dev in bezier_spline function (bsc#1243260). * CVE-2025-46398: Fixed a stack buffer overflow in fig2dev in read_objects function (bsc#1243262). * CVE-2025-46399: Fixed a segmentation fault in fig2dev in genge_itp_spline function (bsc#1243263). * CVE-2025-46400: Fixed a segmentation fault in fig2dev in read_arcobject function (bsc#1243261). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1890=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * transfig-debuginfo-3.2.8b-2.26.1 * transfig-debugsource-3.2.8b-2.26.1 * transfig-3.2.8b-2.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46397.html * https://www.suse.com/security/cve/CVE-2025-46398.html * https://www.suse.com/security/cve/CVE-2025-46399.html * https://www.suse.com/security/cve/CVE-2025-46400.html * https://bugzilla.suse.com/show_bug.cgi?id=1243260 * https://bugzilla.suse.com/show_bug.cgi?id=1243261 * https://bugzilla.suse.com/show_bug.cgi?id=1243262 * https://bugzilla.suse.com/show_bug.cgi?id=1243263 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:21 -0000 Subject: SUSE-SU-2025:01889-1: moderate: Security update for nbdkit Message-ID: <174963062193.627.13945422317937403579@smelt2.prg2.suse.org> # Security update for nbdkit Announcement ID: SUSE-SU-2025:01889-1 Release Date: 2025-06-11T05:43:41Z Rating: moderate References: * bsc#1243108 * bsc#1243110 Cross-References: * CVE-2025-47711 * CVE-2025-47712 CVSS scores: * CVE-2025-47711 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47711 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47711 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47712 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47712 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47712 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for nbdkit fixes the following issues: Update to version 1.36.5. Security fixes: * CVE-2025-47712: integer overflow in blocksize filter when processing client block status requests larger than 2**32 will trigger an assertion failure and cause a denial-of-service. (bsc#1243108). * CVE-2025-47711: off-by-one error when processing block status results from plugins on behalf of an NBD client may trigger an assertion failure and cause a denial of service (bsc#1243110). Other fixes and changes: * tests: Add test-blkio.sh to unconditional EXTRA_DIST rule. * Revert "valgrind: Add suppression for liblzma bug". * vddk: Move "Unknown error" information to the manual. * ocaml Add better comments to the example plugin. * ocaml: Simplify pread operation. * ocaml: Define a struct handle to hold the OCaml handle. * ocaml: Add OCaml version to --dump-plugin output. * ocaml: Print callback name when an exception is printed. * ocaml: Combine all exception printing into a single macro. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1889=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1889=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1889=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * nbdkit-example-plugins-1.36.5-150400.3.9.1 * nbdkit-xz-filter-1.36.5-150400.3.9.1 * nbdkit-tmpdisk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-debuginfo-1.36.5-150400.3.9.1 * nbdkit-python-plugin-1.36.5-150400.3.9.1 * nbdkit-example-plugins-debuginfo-1.36.5-150400.3.9.1 * nbdkit-nbd-plugin-1.36.5-150400.3.9.1 * nbdkit-server-1.36.5-150400.3.9.1 * nbdkit-linuxdisk-plugin-1.36.5-150400.3.9.1 * nbdkit-gzip-filter-1.36.5-150400.3.9.1 * nbdkit-ssh-plugin-1.36.5-150400.3.9.1 * nbdkit-basic-plugins-debuginfo-1.36.5-150400.3.9.1 * nbdkit-basic-plugins-1.36.5-150400.3.9.1 * nbdkit-server-debuginfo-1.36.5-150400.3.9.1 * nbdkit-tar-filter-debuginfo-1.36.5-150400.3.9.1 * nbdkit-xz-filter-debuginfo-1.36.5-150400.3.9.1 * nbdkit-nbd-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-curl-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-gzip-filter-debuginfo-1.36.5-150400.3.9.1 * nbdkit-linuxdisk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-python-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-1.36.5-150400.3.9.1 * nbdkit-tmpdisk-plugin-1.36.5-150400.3.9.1 * nbdkit-basic-filters-debuginfo-1.36.5-150400.3.9.1 * nbdkit-debugsource-1.36.5-150400.3.9.1 * nbdkit-curl-plugin-1.36.5-150400.3.9.1 * nbdkit-devel-1.36.5-150400.3.9.1 * nbdkit-tar-filter-1.36.5-150400.3.9.1 * nbdkit-basic-filters-1.36.5-150400.3.9.1 * nbdkit-ssh-plugin-debuginfo-1.36.5-150400.3.9.1 * openSUSE Leap 15.4 (noarch) * nbdkit-bash-completion-1.36.5-150400.3.9.1 * openSUSE Leap 15.4 (x86_64) * nbdkit-vddk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-vddk-plugin-1.36.5-150400.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * nbdkit-example-plugins-1.36.5-150400.3.9.1 * nbdkit-xz-filter-1.36.5-150400.3.9.1 * nbdkit-tmpdisk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-debuginfo-1.36.5-150400.3.9.1 * nbdkit-python-plugin-1.36.5-150400.3.9.1 * nbdkit-example-plugins-debuginfo-1.36.5-150400.3.9.1 * nbdkit-nbd-plugin-1.36.5-150400.3.9.1 * nbdkit-server-1.36.5-150400.3.9.1 * nbdkit-linuxdisk-plugin-1.36.5-150400.3.9.1 * nbdkit-gzip-filter-1.36.5-150400.3.9.1 * nbdkit-ssh-plugin-1.36.5-150400.3.9.1 * nbdkit-basic-plugins-debuginfo-1.36.5-150400.3.9.1 * nbdkit-basic-plugins-1.36.5-150400.3.9.1 * nbdkit-server-debuginfo-1.36.5-150400.3.9.1 * nbdkit-tar-filter-debuginfo-1.36.5-150400.3.9.1 * nbdkit-xz-filter-debuginfo-1.36.5-150400.3.9.1 * nbdkit-nbd-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-curl-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-gzip-filter-debuginfo-1.36.5-150400.3.9.1 * nbdkit-linuxdisk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-python-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-1.36.5-150400.3.9.1 * nbdkit-tmpdisk-plugin-1.36.5-150400.3.9.1 * nbdkit-basic-filters-debuginfo-1.36.5-150400.3.9.1 * nbdkit-debugsource-1.36.5-150400.3.9.1 * nbdkit-curl-plugin-1.36.5-150400.3.9.1 * nbdkit-devel-1.36.5-150400.3.9.1 * nbdkit-tar-filter-1.36.5-150400.3.9.1 * nbdkit-basic-filters-1.36.5-150400.3.9.1 * nbdkit-ssh-plugin-debuginfo-1.36.5-150400.3.9.1 * openSUSE Leap 15.6 (noarch) * nbdkit-bash-completion-1.36.5-150400.3.9.1 * openSUSE Leap 15.6 (x86_64) * nbdkit-vddk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-vddk-plugin-1.36.5-150400.3.9.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * nbdkit-debugsource-1.36.5-150400.3.9.1 * nbdkit-curl-plugin-1.36.5-150400.3.9.1 * nbdkit-basic-plugins-debuginfo-1.36.5-150400.3.9.1 * nbdkit-basic-plugins-1.36.5-150400.3.9.1 * nbdkit-debuginfo-1.36.5-150400.3.9.1 * nbdkit-curl-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-nbd-plugin-1.36.5-150400.3.9.1 * nbdkit-nbd-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-python-plugin-1.36.5-150400.3.9.1 * nbdkit-server-1.36.5-150400.3.9.1 * nbdkit-python-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-1.36.5-150400.3.9.1 * nbdkit-server-debuginfo-1.36.5-150400.3.9.1 * nbdkit-basic-filters-debuginfo-1.36.5-150400.3.9.1 * nbdkit-basic-filters-1.36.5-150400.3.9.1 * nbdkit-ssh-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-ssh-plugin-1.36.5-150400.3.9.1 * Server Applications Module 15-SP6 (x86_64) * nbdkit-vddk-plugin-debuginfo-1.36.5-150400.3.9.1 * nbdkit-vddk-plugin-1.36.5-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47711.html * https://www.suse.com/security/cve/CVE-2025-47712.html * https://bugzilla.suse.com/show_bug.cgi?id=1243108 * https://bugzilla.suse.com/show_bug.cgi?id=1243110 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:25 -0000 Subject: SUSE-SU-2025:01888-1: moderate: Security update for nbdkit Message-ID: <174963062527.627.12612045865176348693@smelt2.prg2.suse.org> # Security update for nbdkit Announcement ID: SUSE-SU-2025:01888-1 Release Date: 2025-06-11T05:43:28Z Rating: moderate References: * bsc#1243108 * bsc#1243110 Cross-References: * CVE-2025-47711 * CVE-2025-47712 CVSS scores: * CVE-2025-47711 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47711 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47711 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47712 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47712 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47712 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for nbdkit fixes the following issues: Update to version 1.40.6. Security fixes: * CVE-2025-47712: integer overflow in blocksize filter when processing client block status requests larger than 2**32 will trigger an assertion failure and cause a denial-of-service. (bsc#1243108). * CVE-2025-47711: off-by-one error when processing block status results from plugins on behalf of an NBD client may trigger an assertion failure and cause a denial of service (bsc#1243110). Other fixes and changes: * golang: Support GCC 15. * openbsd: curl: Include pthread.h. * rust: Fix "overindented" list in comment. * rust: Declare explicit extern "C" API. * plugins/rust: Use CStr literals for static strings. * vddk: do_extents: Avoid reading partial chunk beyond the end of the disk. * vddk: do_extents: Exit the function if we hit req_one condition. * vddk: do_extents: Mark some local variables const. * vddk: Cache the disk size in the handle. * vddk: Include . * python: examples: Fix comment above API_VERSION constant. * tcl: Fix for Tcl 9.0 compatibility. * plugins/ocaml/NBDKit.ml: Sort bindings into order. * ocaml: Don't call abort if caml_c_thread_unregister fails. * ocaml: Use real addresses instead of (void*)s. * evil: Link to nbdkit_parse_probability(3). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1888=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * nbdkit-basic-filters-debuginfo-1.40.6-150700.4.3.1 * nbdkit-server-1.40.6-150700.4.3.1 * nbdkit-server-debuginfo-1.40.6-150700.4.3.1 * nbdkit-nbd-plugin-debuginfo-1.40.6-150700.4.3.1 * nbdkit-basic-plugins-debuginfo-1.40.6-150700.4.3.1 * nbdkit-basic-filters-1.40.6-150700.4.3.1 * nbdkit-debuginfo-1.40.6-150700.4.3.1 * nbdkit-curl-plugin-1.40.6-150700.4.3.1 * nbdkit-nbd-plugin-1.40.6-150700.4.3.1 * nbdkit-debugsource-1.40.6-150700.4.3.1 * nbdkit-python-plugin-1.40.6-150700.4.3.1 * nbdkit-ssh-plugin-1.40.6-150700.4.3.1 * nbdkit-ssh-plugin-debuginfo-1.40.6-150700.4.3.1 * nbdkit-curl-plugin-debuginfo-1.40.6-150700.4.3.1 * nbdkit-1.40.6-150700.4.3.1 * nbdkit-python-plugin-debuginfo-1.40.6-150700.4.3.1 * nbdkit-basic-plugins-1.40.6-150700.4.3.1 * Server Applications Module 15-SP7 (x86_64) * nbdkit-vddk-plugin-1.40.6-150700.4.3.1 * nbdkit-vddk-plugin-debuginfo-1.40.6-150700.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47711.html * https://www.suse.com/security/cve/CVE-2025-47712.html * https://bugzilla.suse.com/show_bug.cgi?id=1243108 * https://bugzilla.suse.com/show_bug.cgi?id=1243110 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:28 -0000 Subject: SUSE-SU-2025:01887-1: moderate: Security update for perl-Crypt-OpenSSL-RSA Message-ID: <174963062853.627.12819632913573235606@smelt2.prg2.suse.org> # Security update for perl-Crypt-OpenSSL-RSA Announcement ID: SUSE-SU-2025:01887-1 Release Date: 2025-06-11T05:43:12Z Rating: moderate References: * bsc#1221446 Cross-References: * CVE-2024-2467 CVSS scores: * CVE-2024-2467 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for perl-Crypt-OpenSSL-RSA fixes the following issues: * CVE-2024-2467: Side-channel attack in PKCS#1 v1.5 padding mode (Marvin Attack) (bsc#1221446) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1887=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * perl-Crypt-OpenSSL-RSA-debuginfo-0.28-10.3.1 * perl-Crypt-OpenSSL-RSA-debugsource-0.28-10.3.1 * perl-Crypt-OpenSSL-RSA-0.28-10.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2467.html * https://bugzilla.suse.com/show_bug.cgi?id=1221446 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:31 -0000 Subject: SUSE-SU-2025:01886-1: important: Security update for perl-YAML-LibYAML Message-ID: <174963063196.627.3585420537755952499@smelt2.prg2.suse.org> # Security update for perl-YAML-LibYAML Announcement ID: SUSE-SU-2025:01886-1 Release Date: 2025-06-11T05:43:05Z Rating: important References: * bsc#1243902 Cross-References: * CVE-2025-40908 CVSS scores: * CVE-2025-40908 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-40908 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-40908 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for perl-YAML-LibYAML fixes the following issues: * CVE-2025-40908: YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified (bsc#1243902) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1886=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1886=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * perl-YAML-LibYAML-0.890.0-150000.3.11.1 * perl-YAML-LibYAML-debugsource-0.890.0-150000.3.11.1 * perl-YAML-LibYAML-debuginfo-0.890.0-150000.3.11.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-YAML-LibYAML-0.890.0-150000.3.11.1 * perl-YAML-LibYAML-debugsource-0.890.0-150000.3.11.1 * perl-YAML-LibYAML-debuginfo-0.890.0-150000.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40908.html * https://bugzilla.suse.com/show_bug.cgi?id=1243902 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:34 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:34 -0000 Subject: SUSE-SU-2025:01885-1: important: Security update for perl-YAML-LibYAML Message-ID: <174963063485.627.13074732699010205426@smelt2.prg2.suse.org> # Security update for perl-YAML-LibYAML Announcement ID: SUSE-SU-2025:01885-1 Release Date: 2025-06-11T05:42:49Z Rating: important References: * bsc#1243902 Cross-References: * CVE-2025-40908 CVSS scores: * CVE-2025-40908 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-40908 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-40908 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for perl-YAML-LibYAML fixes the following issues: * CVE-2025-40908: YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified (bsc#1243902) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1885=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * perl-YAML-LibYAML-debuginfo-0.38-11.3.1 * perl-YAML-LibYAML-0.38-11.3.1 * perl-YAML-LibYAML-debugsource-0.38-11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40908.html * https://bugzilla.suse.com/show_bug.cgi?id=1243902 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:37 -0000 Subject: SUSE-SU-2025:01884-1: moderate: Security update for perl-Crypt-OpenSSL-RSA Message-ID: <174963063713.627.175111323632950628@smelt2.prg2.suse.org> # Security update for perl-Crypt-OpenSSL-RSA Announcement ID: SUSE-SU-2025:01884-1 Release Date: 2025-06-11T05:42:43Z Rating: moderate References: * bsc#1221446 Cross-References: * CVE-2024-2467 CVSS scores: * CVE-2024-2467 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for perl-Crypt-OpenSSL-RSA fixes the following issues: * CVE-2024-2467: Side-channel attack in PKCS#1 v1.5 padding mode (Marvin Attack) (bsc#1221446) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1884=1 openSUSE-SLE-15.6-2025-1884=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1884=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1884=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * perl-Crypt-OpenSSL-RSA-debugsource-0.28-150600.19.3.1 * perl-Crypt-OpenSSL-RSA-debuginfo-0.28-150600.19.3.1 * perl-Crypt-OpenSSL-RSA-0.28-150600.19.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-Crypt-OpenSSL-RSA-debugsource-0.28-150600.19.3.1 * perl-Crypt-OpenSSL-RSA-debuginfo-0.28-150600.19.3.1 * perl-Crypt-OpenSSL-RSA-0.28-150600.19.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perl-Crypt-OpenSSL-RSA-debugsource-0.28-150600.19.3.1 * perl-Crypt-OpenSSL-RSA-debuginfo-0.28-150600.19.3.1 * perl-Crypt-OpenSSL-RSA-0.28-150600.19.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2467.html * https://bugzilla.suse.com/show_bug.cgi?id=1221446 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:39 -0000 Subject: SUSE-SU-2025:01883-1: moderate: Security update for libjxl Message-ID: <174963063980.627.7708678705689218091@smelt2.prg2.suse.org> # Security update for libjxl Announcement ID: SUSE-SU-2025:01883-1 Release Date: 2025-06-11T05:42:29Z Rating: moderate References: * bsc#1233768 Cross-References: * CVE-2024-11403 CVSS scores: * CVE-2024-11403 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2024-11403 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libjxl fixes the following issues: * CVE-2024-11403: Fix out of bounds memory read/write in libjxl (bsc#1233768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1883=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libjxl-devel-0.10.3-150700.4.3.1 * libjxl-tools-0.10.3-150700.4.3.1 * libjxl0_10-0.10.3-150700.4.3.1 * libjxl0_10-debuginfo-0.10.3-150700.4.3.1 * libjxl-tools-debuginfo-0.10.3-150700.4.3.1 * libjxl-debugsource-0.10.3-150700.4.3.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libjxl0_10-32bit-debuginfo-0.10.3-150700.4.3.1 * libjxl0_10-32bit-0.10.3-150700.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11403.html * https://bugzilla.suse.com/show_bug.cgi?id=1233768 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:42 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:42 -0000 Subject: SUSE-SU-2025:01882-1: important: Security update for tomcat Message-ID: <174963064247.627.3835831819539099046@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2025:01882-1 Release Date: 2025-06-11T05:42:17Z Rating: important References: * bsc#1242009 Cross-References: * CVE-2025-31651 CVSS scores: * CVE-2025-31651 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-31651 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-31651 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-31651 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tomcat fixes the following issues: * CVE-2025-31651: Better handling of URLs with literal ';' and '?' (bsc#1242009). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1882=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * tomcat-lib-9.0.36-3.142.1 * tomcat-docs-webapp-9.0.36-3.142.1 * tomcat-jsp-2_3-api-9.0.36-3.142.1 * tomcat-servlet-4_0-api-9.0.36-3.142.1 * tomcat-webapps-9.0.36-3.142.1 * tomcat-9.0.36-3.142.1 * tomcat-javadoc-9.0.36-3.142.1 * tomcat-admin-webapps-9.0.36-3.142.1 * tomcat-el-3_0-api-9.0.36-3.142.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31651.html * https://bugzilla.suse.com/show_bug.cgi?id=1242009 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:44 -0000 Subject: SUSE-SU-2025:01880-1: moderate: Security update for glib2 Message-ID: <174963064478.627.9614359824967202616@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:01880-1 Release Date: 2025-06-11T05:41:48Z Rating: moderate References: * bsc#1242844 Cross-References: * CVE-2025-4373 CVSS scores: * CVE-2025-4373 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-4373 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-4373 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-4373: integer overflow in the `g_string_insert_unichar()` function can lead to buffer underwrite and memory corruption (bsc#1242844). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1880=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1880=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1880=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.30.1 * libgobject-2_0-0-2.62.6-150200.3.30.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.30.1 * glib2-debugsource-2.62.6-150200.3.30.1 * libglib-2_0-0-2.62.6-150200.3.30.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.30.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.30.1 * glib2-tools-debuginfo-2.62.6-150200.3.30.1 * libgmodule-2_0-0-2.62.6-150200.3.30.1 * glib2-tools-2.62.6-150200.3.30.1 * libgio-2_0-0-2.62.6-150200.3.30.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.30.1 * libgobject-2_0-0-2.62.6-150200.3.30.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.30.1 * glib2-debugsource-2.62.6-150200.3.30.1 * libglib-2_0-0-2.62.6-150200.3.30.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.30.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.30.1 * glib2-tools-debuginfo-2.62.6-150200.3.30.1 * libgmodule-2_0-0-2.62.6-150200.3.30.1 * glib2-tools-2.62.6-150200.3.30.1 * libgio-2_0-0-2.62.6-150200.3.30.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.30.1 * libgobject-2_0-0-2.62.6-150200.3.30.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.30.1 * glib2-debugsource-2.62.6-150200.3.30.1 * libglib-2_0-0-2.62.6-150200.3.30.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.30.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.30.1 * glib2-tools-debuginfo-2.62.6-150200.3.30.1 * libgmodule-2_0-0-2.62.6-150200.3.30.1 * glib2-tools-2.62.6-150200.3.30.1 * libgio-2_0-0-2.62.6-150200.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4373.html * https://bugzilla.suse.com/show_bug.cgi?id=1242844 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:49 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:49 -0000 Subject: SUSE-SU-2025:01879-1: important: Security update for nodejs22 Message-ID: <174963064946.627.10714926927264127558@smelt2.prg2.suse.org> # Security update for nodejs22 Announcement ID: SUSE-SU-2025:01879-1 Release Date: 2025-06-11T05:41:29Z Rating: important References: * bsc#1239949 * bsc#1241050 * bsc#1243217 * bsc#1243218 Cross-References: * CVE-2025-23165 * CVE-2025-23166 CVSS scores: * CVE-2025-23165 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-23165 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23165 ( NVD ): 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23166 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23166 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23166 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP7 An update that solves two vulnerabilities and has two security fixes can now be installed. ## Description: This update for nodejs22 fixes the following issues: Update to version 22.15.1. Security issues fixed: * CVE-2025-23166: remotely triggerable process crash due to improper error handling in async cryptographic operations (bsc#1243218). * CVE-2025-23165: memory leak and unbounded memory growth due to corrupted pointer in `node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args)` when `args[0]` is a string (bsc#1243217). Other changes and issues fixed: * Changes from version 22.15.0 * dns: add TLSA record query and parsing * assert: improve partialDeepStrictEqual * process: add execve * tls: implement tls.getCACertificates() * v8: add v8.getCppHeapStatistics() method * Changes from version 22.14.0 * fs: allow exclude option in globs to accept glob patterns * lib: add typescript support to STDIN eval * module: add ERR_UNSUPPORTED_TYPESCRIPT_SYNTAX * module: add findPackageJSON util * process: add process.ref() and process.unref() methods * sqlite: support TypedArray and DataView in StatementSync * src: add --disable-sigusr1 to prevent signal i/o thread * src,worker: add isInternalWorker * test_runner: add TestContext.prototype.waitFor() * test_runner: add t.assert.fileSnapshot() * test_runner: add assert.register() API * worker: add eval ts input * Build with PIE (bsc#1239949). * Fix builds with OpenSSL 3.5.0 (bsc#1241050). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-1879=1 ## Package List: * Web and Scripting Module 15-SP7 (aarch64 ppc64le s390x x86_64) * nodejs22-debuginfo-22.15.1-150700.3.3.1 * nodejs22-devel-22.15.1-150700.3.3.1 * nodejs22-debugsource-22.15.1-150700.3.3.1 * nodejs22-22.15.1-150700.3.3.1 * npm22-22.15.1-150700.3.3.1 * Web and Scripting Module 15-SP7 (noarch) * nodejs22-docs-22.15.1-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23165.html * https://www.suse.com/security/cve/CVE-2025-23166.html * https://bugzilla.suse.com/show_bug.cgi?id=1239949 * https://bugzilla.suse.com/show_bug.cgi?id=1241050 * https://bugzilla.suse.com/show_bug.cgi?id=1243217 * https://bugzilla.suse.com/show_bug.cgi?id=1243218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:54 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:54 -0000 Subject: SUSE-SU-2025:01878-1: important: Security update for nodejs22 Message-ID: <174963065404.627.20103531156284415@smelt2.prg2.suse.org> # Security update for nodejs22 Announcement ID: SUSE-SU-2025:01878-1 Release Date: 2025-06-11T05:41:17Z Rating: important References: * bsc#1239949 * bsc#1241050 * bsc#1243217 * bsc#1243218 Cross-References: * CVE-2025-23165 * CVE-2025-23166 CVSS scores: * CVE-2025-23165 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-23165 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23165 ( NVD ): 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23166 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23166 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23166 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that solves two vulnerabilities and has two security fixes can now be installed. ## Description: This update for nodejs22 fixes the following issues: Update to version 22.15.1. Security issues fixed: * CVE-2025-23166: remotely triggerable process crash due to improper error handling in async cryptographic operations (bsc#1243218). * CVE-2025-23165: memory leak and unbounded memory growth due to corrupted pointer in `node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args)` when `args[0]` is a string (bsc#1243217). Other changes and issues fixed: * Changes from version 22.15.0 * dns: add TLSA record query and parsing * assert: improve partialDeepStrictEqual * process: add execve * tls: implement tls.getCACertificates() * v8: add v8.getCppHeapStatistics() method * Changes from version 22.14.0 * fs: allow exclude option in globs to accept glob patterns * lib: add typescript support to STDIN eval * module: add ERR_UNSUPPORTED_TYPESCRIPT_SYNTAX * module: add findPackageJSON util * process: add process.ref() and process.unref() methods * sqlite: support TypedArray and DataView in StatementSync * src: add --disable-sigusr1 to prevent signal i/o thread * src,worker: add isInternalWorker * test_runner: add TestContext.prototype.waitFor() * test_runner: add t.assert.fileSnapshot() * test_runner: add assert.register() API * worker: add eval ts input * Build with PIE (bsc#1239949). * Fix builds with OpenSSL 3.5.0 (bsc#1241050). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1878=1 openSUSE-SLE-15.6-2025-1878=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1878=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * nodejs22-debuginfo-22.15.1-150600.13.9.1 * nodejs22-22.15.1-150600.13.9.1 * npm22-22.15.1-150600.13.9.1 * nodejs22-devel-22.15.1-150600.13.9.1 * nodejs22-debugsource-22.15.1-150600.13.9.1 * corepack22-22.15.1-150600.13.9.1 * openSUSE Leap 15.6 (noarch) * nodejs22-docs-22.15.1-150600.13.9.1 * Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64) * nodejs22-debuginfo-22.15.1-150600.13.9.1 * nodejs22-22.15.1-150600.13.9.1 * npm22-22.15.1-150600.13.9.1 * nodejs22-devel-22.15.1-150600.13.9.1 * nodejs22-debugsource-22.15.1-150600.13.9.1 * Web and Scripting Module 15-SP6 (noarch) * nodejs22-docs-22.15.1-150600.13.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23165.html * https://www.suse.com/security/cve/CVE-2025-23166.html * https://bugzilla.suse.com/show_bug.cgi?id=1239949 * https://bugzilla.suse.com/show_bug.cgi?id=1241050 * https://bugzilla.suse.com/show_bug.cgi?id=1243217 * https://bugzilla.suse.com/show_bug.cgi?id=1243218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 08:30:56 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 08:30:56 -0000 Subject: SUSE-SU-2025:01877-1: moderate: Security update for python3 Message-ID: <174963065667.627.6424646466145451284@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2025:01877-1 Release Date: 2025-06-11T05:41:08Z Rating: moderate References: * bsc#1243273 Cross-References: * CVE-2025-4516 CVSS scores: * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that solves one vulnerability can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2025-4516: use-after-free in the unicode-escape decoder when using the error handler (bsc#1243273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1877=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python3-core-debugsource-3.6.15-150000.3.176.1 * python3-debuginfo-3.6.15-150000.3.176.1 * python3-base-3.6.15-150000.3.176.1 * python3-base-debuginfo-3.6.15-150000.3.176.1 * libpython3_6m1_0-3.6.15-150000.3.176.1 * python3-debugsource-3.6.15-150000.3.176.1 * python3-3.6.15-150000.3.176.1 * libpython3_6m1_0-debuginfo-3.6.15-150000.3.176.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4516.html * https://bugzilla.suse.com/show_bug.cgi?id=1243273 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 12:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 12:30:07 -0000 Subject: SUSE-SU-2025:01892-1: important: Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) Message-ID: <174964500704.1260.17071998946052497544@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:01892-1 Release Date: 2025-06-11T11:33:35Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_185 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1892=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1892=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_185-default-6-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_51-debugsource-6-150300.2.2 * kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-6-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-6-150300.2.2 * kernel-livepatch-5_3_18-150300_59_185-preempt-6-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_185-default-6-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 12:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 12:30:08 -0000 Subject: SUSE-OU-2025:01891-1: low: Optional update for update-test-trivial Message-ID: <174964500881.1260.8140923281885735027@smelt2.prg2.suse.org> # Optional update for update-test-trivial Announcement ID: SUSE-OU-2025:01891-1 Release Date: 2025-06-11T09:45:23Z Rating: low References: Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for update-test-trivial fixes the following issue: * Test maintenance workflow for 15-SP7 products. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1891=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * update-test-optional-5.1-150200.41.2 * update-test-broken-5.1-150200.41.2 * update-test-interactive-5.1-150200.41.2 * update-test-feature-5.1-150200.41.2 * update-test-reboot-needed-5.1-150200.41.2 * update-test-affects-package-manager-5.1-150200.41.2 * update-test-32bit-pkg-5.1-150200.41.2 * update-test-retracted-5.1-150200.41.2 * update-test-trivial-5.1-150200.41.2 * update-test-security-5.1-150200.41.2 * update-test-relogin-suggested-5.1-150200.41.2 * Basesystem Module 15-SP7 (x86_64) * update-test-32bit-pkg-32bit-5.1-150200.41.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:09 -0000 Subject: SUSE-SU-2025:01899-1: important: Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Message-ID: <174965940950.651.7765823700666466450@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:01899-1 Release Date: 2025-06-11T14:34:05Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_216 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1899=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_216-default-17-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:15 -0000 Subject: SUSE-SU-2025:01894-1: important: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5) Message-ID: <174965941581.651.2552008846605869215@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:01894-1 Release Date: 2025-06-11T12:04:30Z Rating: important References: * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_97 fixes several issues. The following security issues were fixed: * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1894=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1894=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_24-debugsource-2-150500.2.2 * kernel-livepatch-5_14_21-150500_55_97-default-2-150500.2.2 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-2-150500.2.2 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_24-debugsource-2-150500.2.2 * kernel-livepatch-5_14_21-150500_55_97-default-2-150500.2.2 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-2-150500.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:20 -0000 Subject: SUSE-SU-2025:01893-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) Message-ID: <174965942066.651.2231767608606173236@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:01893-1 Release Date: 2025-06-11T12:04:17Z Rating: important References: * bsc#1238324 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2022-49080 * CVE-2024-57996 * CVE-2024-58013 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_94 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1893=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1893=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-2-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-2-150500.2.2 * kernel-livepatch-5_14_21-150500_55_94-default-2-150500.2.2 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-2-150500.2.2 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-2-150500.2.2 * kernel-livepatch-5_14_21-150500_55_94-default-2-150500.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:31 -0000 Subject: SUSE-RU-2025:01896-1: moderate: Recommended update for crmsh Message-ID: <174965943145.651.4289685175388188694@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2025:01896-1 Release Date: 2025-06-11T14:17:42Z Rating: moderate References: * bsc#1243498 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for crmsh fixes the following issue: * Version update 4.5.1+20250526.a9db5fe: * report: Don't collect cib.txt separately (bsc#1243498). * doc: Add examples for the 'failcount' command * bootstrap: Add log info when starting pacemaker.service ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1896=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-1896=1 ## Package List: * openSUSE Leap 15.5 (noarch) * crmsh-test-4.5.1+20250526.a9db5fe-150500.3.48.2 * crmsh-scripts-4.5.1+20250526.a9db5fe-150500.3.48.2 * crmsh-4.5.1+20250526.a9db5fe-150500.3.48.2 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * crmsh-scripts-4.5.1+20250526.a9db5fe-150500.3.48.2 * crmsh-4.5.1+20250526.a9db5fe-150500.3.48.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243498 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:33 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:33 -0000 Subject: SUSE-RU-2025:01895-1: moderate: Recommended update for crmsh Message-ID: <174965943370.651.7576498897723479780@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2025:01895-1 Release Date: 2025-06-11T14:17:34Z Rating: moderate References: * bsc#1243498 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for crmsh fixes the following issue: * Version update 4.4.2+20250526.46896f4 * report: Don't collect cib.txt separately (bsc#1243498). * doc: Add examples for the 'failcount' command * bootstrap: Add log info when starting pacemaker.service ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1895=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1895=1 ## Package List: * openSUSE Leap 15.4 (noarch) * crmsh-test-4.4.2+20250526.46896f4-150400.3.40.2 * crmsh-4.4.2+20250526.46896f4-150400.3.40.2 * crmsh-scripts-4.4.2+20250526.46896f4-150400.3.40.2 * SUSE Linux Enterprise High Availability Extension 15 SP4 (noarch) * crmsh-4.4.2+20250526.46896f4-150400.3.40.2 * crmsh-scripts-4.4.2+20250526.46896f4-150400.3.40.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243498 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:36 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:36 -0000 Subject: SUSE-SU-2025:01466-1: moderate: Security update for rabbitmq-server Message-ID: <174965943638.651.7203243242131802095@smelt2.prg2.suse.org> # Security update for rabbitmq-server Announcement ID: SUSE-SU-2025:01466-1 Release Date: 2025-06-11T12:47:36Z Rating: moderate References: * bsc#1240071 Cross-References: * CVE-2025-30219 CVSS scores: * CVE-2025-30219 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30219 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L * CVE-2025-30219 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for rabbitmq-server fixes the following issues: * CVE-2025-30219: Fixed XSS in an error message in Management UI (bsc#1240071) Other fixes: \- Disable parallel make, this causes build failures ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1466=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * erlang-rabbitmq-client-3.8.11-150300.3.19.1 * rabbitmq-server-3.8.11-150300.3.19.1 * rabbitmq-server-plugins-3.8.11-150300.3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30219.html * https://bugzilla.suse.com/show_bug.cgi?id=1240071 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 16:30:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 16:30:39 -0000 Subject: SUSE-SU-2025:01548-1: moderate: Security update for rabbitmq-server313 Message-ID: <174965943992.651.7111710393535961246@smelt2.prg2.suse.org> # Security update for rabbitmq-server313 Announcement ID: SUSE-SU-2025:01548-1 Release Date: 2025-06-11T12:47:31Z Rating: moderate References: * bsc#1231656 * bsc#1234763 * bsc#1240071 Cross-References: * CVE-2025-30219 CVSS scores: * CVE-2025-30219 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30219 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L * CVE-2025-30219 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for rabbitmq-server313 fixes the following issues: * CVE-2025-30219: incorrectly escaped virtual hostname present in error message could lead to XSS attack. (bsc#1240071) Non-security fixes: * Require rabbitmq-server313-plugins rather then rabbitmq-server-plugins. (bsc#1231656, bsc#1234763) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1548=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * rabbitmq-server313-3.13.1-150600.13.8.1 * rabbitmq-server313-plugins-3.13.1-150600.13.8.1 * erlang-rabbitmq-client313-3.13.1-150600.13.8.1 * Server Applications Module 15-SP7 (noarch) * rabbitmq-server313-bash-completion-3.13.1-150600.13.8.1 * rabbitmq-server313-zsh-completion-3.13.1-150600.13.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30219.html * https://bugzilla.suse.com/show_bug.cgi?id=1231656 * https://bugzilla.suse.com/show_bug.cgi?id=1234763 * https://bugzilla.suse.com/show_bug.cgi?id=1240071 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 20:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 20:30:07 -0000 Subject: SUSE-SU-2025:01901-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Message-ID: <174967380720.2644.15848698798055012864@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:01901-1 Release Date: 2025-06-11T19:04:03Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_188 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1901=1 SUSE-SLE-Live- Patching-12-SP5-2025-1902=1 SUSE-SLE-Live-Patching-12-SP5-2025-1903=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1900=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1900=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_222-default-12-2.1 * kgraft-patch-4_12_14-122_234-default-9-2.1 * kgraft-patch-4_12_14-122_237-default-5-2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_188-default-debuginfo-5-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_52-debugsource-5-150300.2.2 * kernel-livepatch-5_3_18-150300_59_188-default-5-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_188-preempt-5-150300.2.2 * kernel-livepatch-5_3_18-150300_59_188-preempt-debuginfo-5-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_188-default-5-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 11 20:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 11 Jun 2025 20:30:10 -0000 Subject: SUSE-SU-2025:01904-1: moderate: Security update for yelp Message-ID: <174967381014.2644.14806652291701229987@smelt2.prg2.suse.org> # Security update for yelp Announcement ID: SUSE-SU-2025:01904-1 Release Date: 2025-06-11T19:43:53Z Rating: moderate References: * bsc#1240688 Cross-References: * CVE-2025-3155 CVSS scores: * CVE-2025-3155 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-3155 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-3155 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability can now be installed. ## Description: This update for yelp fixes the following issues: * CVE-2025-3155: JavaScript code execution and arbitrary file read through specially crafted help files and ghelp scheme URLs (bsc#1240688). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1904=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * yelp-devel-41.2-150400.3.3.1 * yelp-41.2-150400.3.3.1 * libyelp0-debuginfo-41.2-150400.3.3.1 * libyelp0-41.2-150400.3.3.1 * yelp-debugsource-41.2-150400.3.3.1 * yelp-debuginfo-41.2-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * yelp-lang-41.2-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3155.html * https://bugzilla.suse.com/show_bug.cgi?id=1240688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 08:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 08:30:07 -0000 Subject: SUSE-SU-2025:01908-1: important: Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) Message-ID: <174971700707.655.2251980637381569542@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:01908-1 Release Date: 2025-06-11T23:21:24Z Rating: important References: * bsc#1238788 * bsc#1238790 * bsc#1239077 Cross-References: * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-57996 CVSS scores: * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_250 fixes several issues. The following security issues were fixed: * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1908=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_250-default-2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 08:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 08:30:12 -0000 Subject: SUSE-SU-2025:01907-1: important: Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) Message-ID: <174971701233.655.8243525666207273522@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:01907-1 Release Date: 2025-06-11T21:47:43Z Rating: important References: * bsc#1238324 * bsc#1238788 * bsc#1238790 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_247 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1907=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_247-default-2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 08:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 08:30:17 -0000 Subject: SUSE-SU-2025:01906-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) Message-ID: <174971701729.655.9007388425280822823@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01906-1 Release Date: 2025-06-12T05:33:38Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_125 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1906=1 SUSE-SLE-Live- Patching-12-SP5-2025-1909=1 SUSE-SLE-Live-Patching-12-SP5-2025-1910=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1912=1 SUSE-2025-1911=1 SUSE-2025-1913=1 SUSE-2025-1914=1 SUSE-2025-1915=1 SUSE-2025-1905=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1912=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-1911=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-1913=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-1914=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-1915=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-1905=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1916=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1916=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_244-default-4-2.1 * kgraft-patch-4_12_14-122_225-default-11-2.1 * kgraft-patch-4_12_14-122_231-default-9-2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_174-default-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-8-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_50-debugsource-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-15-150300.2.2 * kernel-livepatch-5_3_18-150300_59_167-default-debuginfo-14-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_44-debugsource-18-150300.2.2 * kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-11-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_48-debugsource-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_164-default-15-150300.2.2 * kernel-livepatch-5_3_18-150300_59_182-default-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-18-150300.2.2 * kernel-livepatch-5_3_18-150300_59_161-default-18-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_46-debugsource-14-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_45-debugsource-15-150300.2.2 * kernel-livepatch-5_3_18-150300_59_167-default-14-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_170-default-12-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_182-preempt-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_167-preempt-14-150300.2.2 * kernel-livepatch-5_3_18-150300_59_164-preempt-15-150300.2.2 * kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-18-150300.2.2 * kernel-livepatch-5_3_18-150300_59_170-preempt-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-15-150300.2.2 * kernel-livepatch-5_3_18-150300_59_174-preempt-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_161-preempt-18-150300.2.2 * kernel-livepatch-5_3_18-150300_59_170-preempt-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_167-preempt-debuginfo-14-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_174-default-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_164-default-15-150300.2.2 * kernel-livepatch-5_3_18-150300_59_182-default-8-150300.2.2 * kernel-livepatch-5_3_18-150300_59_161-default-18-150300.2.2 * kernel-livepatch-5_3_18-150300_59_167-default-14-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_170-default-12-150300.2.2 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-13-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-13-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-13-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-13-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 08:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 08:30:20 -0000 Subject: SUSE-SU-2025:01921-1: moderate: Security update for wget Message-ID: <174971702013.655.12265289654583675236@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2025:01921-1 Release Date: 2025-06-12T06:29:35Z Rating: moderate References: * bsc#1233773 Cross-References: * CVE-2024-10524 CVSS scores: * CVE-2024-10524 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10524 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N * CVE-2024-10524 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-10524: Dropped support for shorthand URLs that enabled SSRF attacks (bsc#1233773). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1921=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * wget-1.14-21.25.1 * wget-debuginfo-1.14-21.25.1 * wget-debugsource-1.14-21.25.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10524.html * https://bugzilla.suse.com/show_bug.cgi?id=1233773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 08:37:44 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 08:37:44 -0000 Subject: SUSE-SU-2025:01919-1: important: Security update for the Linux Kernel Message-ID: <174971746413.655.10577179404651104900@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01919-1 Release Date: 2025-06-12T06:29:09Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1221651 * bsc#1222649 * bsc#1223047 * bsc#1223096 * bsc#1223809 * bsc#1224013 * bsc#1224489 * bsc#1224597 * bsc#1224610 * bsc#1224757 * bsc#1225533 * bsc#1225606 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228653 * bsc#1228659 * bsc#1229311 * bsc#1229361 * bsc#1229491 * bsc#1230497 * bsc#1230581 * bsc#1230728 * bsc#1230764 * bsc#1230769 * bsc#1230832 * bsc#1231016 * bsc#1231103 * bsc#1231293 * bsc#1231432 * bsc#1231910 * bsc#1231912 * bsc#1231949 * bsc#1232299 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232493 * bsc#1232649 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232882 * bsc#1232895 * bsc#1233033 * bsc#1233060 * bsc#1233075 * bsc#1233098 * bsc#1233192 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233483 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234074 * bsc#1234154 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1234936 * bsc#1235149 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235526 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235599 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235862 * bsc#1235870 * bsc#1235973 * bsc#1236086 * bsc#1236099 * bsc#1236111 * bsc#1236142 * bsc#1236206 * bsc#1236208 * bsc#1236333 * bsc#1236692 * bsc#1236704 * bsc#1236752 * bsc#1237029 * bsc#1237111 * bsc#1237164 * bsc#1237312 * bsc#1237313 * bsc#1237356 * bsc#1237504 * bsc#1237521 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237565 * bsc#1237571 * bsc#1237848 * bsc#1237849 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237874 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237879 * bsc#1237881 * bsc#1237882 * bsc#1237885 * bsc#1237889 * bsc#1237890 * bsc#1237891 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237901 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238052 * bsc#1238212 * bsc#1238214 * bsc#1238303 * bsc#1238347 * bsc#1238368 * bsc#1238471 * bsc#1238473 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238509 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238525 * bsc#1238526 * bsc#1238527 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238565 * bsc#1238570 * bsc#1238714 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238737 * bsc#1238738 * bsc#1238739 * bsc#1238742 * bsc#1238745 * bsc#1238746 * bsc#1238747 * bsc#1238751 * bsc#1238753 * bsc#1238754 * bsc#1238757 * bsc#1238759 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238774 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238860 * bsc#1238862 * bsc#1238863 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238877 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238961 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238970 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238983 * bsc#1238984 * bsc#1238986 * bsc#1238990 * bsc#1238992 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239066 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239079 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239108 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239470 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239476 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239487 * bsc#1239508 * bsc#1239510 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239684 * bsc#1239691 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239986 * bsc#1239994 * bsc#1239997 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240181 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240557 * bsc#1240575 * bsc#1240576 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240593 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240709 * bsc#1240712 * bsc#1240713 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240717 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240740 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240785 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240802 * bsc#1240806 * bsc#1240808 * bsc#1240809 * bsc#1240811 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240835 * bsc#1240873 * bsc#1240934 * bsc#1240936 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240944 * bsc#1240966 * bsc#1240978 * bsc#1240979 * bsc#1241010 * bsc#1241038 * bsc#1241051 * bsc#1241123 * bsc#1241148 * bsc#1241151 * bsc#1241167 * bsc#1241175 * bsc#1241204 * bsc#1241250 * bsc#1241265 * bsc#1241266 * bsc#1241280 * bsc#1241282 * bsc#1241305 * bsc#1241332 * bsc#1241333 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241351 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241371 * bsc#1241373 * bsc#1241376 * bsc#1241378 * bsc#1241394 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241416 * bsc#1241424 * bsc#1241426 * bsc#1241433 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241448 * bsc#1241451 * bsc#1241452 * bsc#1241456 * bsc#1241458 * bsc#1241459 * bsc#1241492 * bsc#1241525 * bsc#1241526 * bsc#1241528 * bsc#1241533 * bsc#1241537 * bsc#1241541 * bsc#1241545 * bsc#1241547 * bsc#1241548 * bsc#1241550 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241578 * bsc#1241590 * bsc#1241593 * bsc#1241596 * bsc#1241597 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241626 * bsc#1241627 * bsc#1241638 * bsc#1241640 * bsc#1241648 * bsc#1241657 * bsc#1242006 * bsc#1242012 * bsc#1242044 * bsc#1242172 * bsc#1242203 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242417 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242513 * bsc#1242523 * bsc#1242526 * bsc#1242528 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242585 * bsc#1242596 * bsc#1242710 * bsc#1242762 * bsc#1242763 * bsc#1242778 * bsc#1242786 * bsc#1242831 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242875 * bsc#1242924 * bsc#1242944 * bsc#1242951 * bsc#1242962 * bsc#1242985 * bsc#1242993 * bsc#1243044 * bsc#1243056 * bsc#1243077 * bsc#1243090 * bsc#1243342 * bsc#1243519 * bsc#1243539 * bsc#1243541 * bsc#1243547 * bsc#1243657 * bsc#1243658 * bsc#1243737 * bsc#1243805 * bsc#1243963 * jsc#PED-10028 * jsc#PED-10701 * jsc#PED-11253 * jsc#PED-12251 * jsc#PED-12309 * jsc#PED-12416 * jsc#PED-348 Cross-References: * CVE-2023-52831 * CVE-2023-52926 * CVE-2023-52927 * CVE-2023-53034 * CVE-2024-26634 * CVE-2024-26873 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35826 * CVE-2024-35840 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-46736 * CVE-2024-46763 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-46865 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49994 * CVE-2024-50029 * CVE-2024-50036 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50083 * CVE-2024-50106 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50152 * CVE-2024-50162 * CVE-2024-50163 * CVE-2024-50223 * CVE-2024-50290 * CVE-2024-50294 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53124 * CVE-2024-53135 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53176 * CVE-2024-53177 * CVE-2024-53178 * CVE-2024-53680 * CVE-2024-54458 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57900 * CVE-2024-57924 * CVE-2024-57947 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57994 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57998 * CVE-2024-57999 * CVE-2024-58001 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58068 * CVE-2024-58069 * CVE-2024-58070 * CVE-2024-58071 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2024-58088 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21648 * CVE-2025-21659 * CVE-2025-21671 * CVE-2025-21683 * CVE-2025-21693 * CVE-2025-21696 * CVE-2025-21701 * CVE-2025-21702 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21705 * CVE-2025-21706 * CVE-2025-21707 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21715 * CVE-2025-21716 * CVE-2025-21718 * CVE-2025-21719 * CVE-2025-21723 * CVE-2025-21724 * CVE-2025-21725 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21728 * CVE-2025-21729 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21755 * CVE-2025-21756 * CVE-2025-21758 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21767 * CVE-2025-21768 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21787 * CVE-2025-21790 * CVE-2025-21791 * CVE-2025-21792 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21795 * CVE-2025-21796 * CVE-2025-21799 * CVE-2025-21802 * CVE-2025-21804 * CVE-2025-21806 * CVE-2025-21808 * CVE-2025-21810 * CVE-2025-21812 * CVE-2025-21814 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21833 * CVE-2025-21835 * CVE-2025-21836 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21854 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21867 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21904 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21919 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21925 * CVE-2025-21926 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21931 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21980 * CVE-2025-21981 * CVE-2025-21985 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-21999 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22004 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-22015 * CVE-2025-22016 * CVE-2025-22017 * CVE-2025-22018 * CVE-2025-22020 * CVE-2025-22021 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22029 * CVE-2025-22030 * CVE-2025-22033 * CVE-2025-22036 * CVE-2025-22044 * CVE-2025-22045 * CVE-2025-22050 * CVE-2025-22053 * CVE-2025-22055 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22062 * CVE-2025-22063 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22070 * CVE-2025-22075 * CVE-2025-22080 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22090 * CVE-2025-22093 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22103 * CVE-2025-22104 * CVE-2025-22105 * CVE-2025-22106 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22115 * CVE-2025-22116 * CVE-2025-22121 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-22128 * CVE-2025-2312 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23133 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23140 * CVE-2025-23145 * CVE-2025-23150 * CVE-2025-23160 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37755 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37785 * CVE-2025-37787 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37809 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37842 * CVE-2025-37860 * CVE-2025-37870 * CVE-2025-37879 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37949 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37960 * CVE-2025-37974 * CVE-2025-38152 * CVE-2025-38637 * CVE-2025-39728 * CVE-2025-40325 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50162 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50163 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22029 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22029 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22115 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22115 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Confidential Computing Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 433 vulnerabilities, contains seven features and has 138 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-43869: perf: Fix hang while freeing sigtrap event (bsc#1229491). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync (bsc#1231949). * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP (bsc#1233075). * CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not overlap (bsc#1233098). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls (bsc#1233483). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57994: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() (bsc#1237901). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961). * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862). * CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889). * CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump() (bsc#1237891). * CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries (bsc#1238860). * CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (bsc#1238863). * CVE-2025-21725: smb: client: fix oops due to unset link speed (bsc#1238877). * CVE-2025-21728: bpf: Send signals asynchronously if !preemptible (bsc#1237879). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context (bsc#1238509). * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value (bsc#1238753). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745). * CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759). * CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() (bsc#1238739). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713). * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712). * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655). * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717). * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740). * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835). * CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944). * CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934). * CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936). * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426). * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433). * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373). * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416). * CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537). * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550). * CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548). * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575). * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573). * CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578). * CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). * CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414). * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). * CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626). The following non-security bugs were fixed: * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes). * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes). * ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes). * ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git- fixes). * ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes). * ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes). * ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes). * ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes). * ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Avoid module auto-load handling at event delivery (stable-fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: ump: Fix buffer overflow at UMP SysEx message conversion (bsc#1242044). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable- fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable- fixes). * ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git- fixes). * ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes). * ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable- fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes). * ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable- fixes). * ASoC: Use of_property_read_bool() (stable-fixes). * ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes). * ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: es8328: fix route from DAC to output (git-fixes). * ASoC: fsl_audmix: register card device depends on 'dais' property (stable- fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes). * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git- fixes). * Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes). * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git- fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address (git-fixes). * Bluetooth: hci_uart: Fix another race during initialization (git-fixes). * Bluetooth: hci_uart: fix race during initialization (stable-fixes). * Bluetooth: l2cap: Check encryption key size on incoming connection (git- fixes). * Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes). * Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes). * GHES: Fatal hardware error (GHES panic timeout) (bsc#1239615). * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * PCI: Drop PCI patch that caused a regression (bsc#1241123). * memory: Fix memory-hotplug regression (bsc#1237504). * net/ipv6: Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: hid-steam: Fix use-after-free when detaching device (git-fixes). * HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * IB/mad: Check available slots before posting receive WRs (git-fixes) * IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * Input: xpad - fix two controller table values (git-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature (bsc#1235862). * KVM: SVM: Do not change target vCPU state on AP Creation VMGEXIT error (git- fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest had an invalid VMSA (git-fixes). * KVM: SVM: Save host DR masks on CPUs with DebugSwap (jsc#PED-348). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/mmu: Check and free obsolete roots in kvm_mmu_reload() (git-fixes). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Check that the high 32bits are clear in kvm_arch_vcpu_ioctl_run() (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected (git-fixes). * Move upstreamed ACPI patch into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * Move upstreamed smb patch into sorted section Also move other out-of-tree patches into the proper section * Move upstreamed sound patch into sorted section * Move upstreamed tpm patch into sorted section * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * OPP: add index check to assert to avoid buffer overflow in _read_freq() (bsc#1238961) * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * PCI/DOE: Support discovery version 2 (bsc#1237853) * PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git- fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). Replace our patch with the upstream version. * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers (git-fixes) * RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes) * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/core: Silence oversized kvmalloc() warning (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong maximum DMA segment size (git-fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes). * RDMA/mana_ib: Ensure variable err is initialized (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix AH static rate parsing (git-fixes) * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes) * RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git- fixes) * RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes) * mm: Revert patch mm-various-give-up-if-pte_offset_map-_lock-fails.patch (bsc#1241051). * SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes). * SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes). * SUNRPC: convert RPC_TASK_* constants to enum (git-fixes). * Squashfs: check return result of sb_min_blocksize (git-fixes). * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes). * USB: VLI disk crashes if LPM is used (stable-fixes). * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable- fixes). * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes). * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes). * USB: wdm: add annotation (git-fixes). * USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes). * USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes). * USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes). * RDMA: Update patch RDMA-core-Don-t-expose-hw_counters-outside-of- init-n.patch (git-fixes bsc#1239925). * kABI: Update patch kABI-fix-for-RDMA-core-Don-t-expose-hw_counters- outs.patch (git-fixes bsc#1239925). * nvme: Update patch nvme-fixup-scan-failure-for-non-ANA-multipath- contro.patch (git-fixes bsc#1235149). * nvme: Update patch nvme-re-read-ANA-log-page-after-ns-scan-completes.patch (git-fixes bsc#1235149). * s390: Update patch s390-pci-Fix-SR-IOV-for-PFs-initially-in-standby.patch (git-fixes bsc#1236752 bsc#1238368). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * af_packet: do not call packet_read_pending() from tpacket_destruct_skb() (bsc#1237849). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes). * amdgpu/pm/legacy: fix suspend/resume issues (git-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level (git-fixes) * arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git- fixes) * arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * asus-laptop: Fix an uninitialized variable (git-fixes). * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-sata: Save all fields from sense data descriptor (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git- fixes). * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes). * ata: libata-scsi: Improve CDL control (git-fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes). * auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes). * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * badblocks: Fix error shitf ops (git-fixes). * badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes). * badblocks: fix missing bad blocks on retry in _badblocks_check() (git- fixes). * badblocks: fix the using of MAX_BADBLOCKS (git-fixes). * badblocks: return error directly when setting badblocks exceeds 512 (git- fixes). * badblocks: return error if any badblock set fails (git-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-cgroup: Properly propagate the iostat update up the hierarchy (bsc#1225606). * blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes). * block: change blk_mq_add_to_batch() third argument type to bool (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes). * block: fix conversion of GPT partition name to 7-bit (git-fixes). * block: fix resource leak in blk_register_queue() error path (git-fixes). * block: integrity: Do not call set_page_dirty_lock() (git-fixes). * block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (git-fixes). * bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git- fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes). * bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes). * bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes). * bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: add find_containing_subprog() utility function (bsc#1241590). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: check changes_pkt_data property for extension programs (bsc#1241590). * bpf: consider that tail calls invalidate packet pointers (bsc#1241590). * bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590). * bpf: fix potential error return (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590). * bpf: track changes_pkt_data property for global functions (bsc#1241590). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: add and use helper to verify the calling task has locked the inode (bsc#1241204). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix hole expansion when writing at an offset beyond EOF (bsc#1241151). * btrfs: fix missing snapshot drew unlock when root is dead during swap activation (bsc#1241204). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * btrfs: fix race with memory mapped writes when activating swap file (bsc#1241204). * btrfs: fix swap file activation failure due to extents that used to be shared (bsc#1241204). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes). * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git- fixes). * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes). * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git- fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: slcan: allow reception of short error messages (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * char: misc: register chrdev region with all possible minors (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: Fix integer overflow while processing actimeo mount option (git- fixes). * cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE session (git-fixes). * cifs: Remove intermediate object of failed create reparse call (git-fixes). * cifs: commands that are retried should have replay flag set (bsc#1231432). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (bsc#1231432). * cifs: helper function to check replayable error codes (bsc#1231432). * cifs: new mount option called retrans (bsc#1231432). * cifs: open_cached_dir should not rely on primary channel (bsc#1231432). * cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * cifs: update desired access while requesting for directory lease (git- fixes). * cifs: update the same create_guid on replay (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes). * crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes). * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git- fixes). * devlink: fix port new reply cmd type (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-bufio: do not schedule in atomic context (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-ebs: fix prefetch-vs-suspend race (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * dm-integrity: set ti->error on memory allocation failure (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm-verity: fix prefetch-vs-suspend race (git-fixes). * dm: Fix typo in error message (git-fixes). * dm: add missing unlock on in dm_keyslot_evict() (git-fixes). * dm: always update the array size in realloc_argv on success (git-fixes). * dm: fix copying after src array boundaries (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable- fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * drivers: base: devres: Allow to release group on device release (stable- fixes). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix gpu reset in multidisplay config (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params (git-fixes). * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes). * drm/amd/display: Force full update in gpu reset (stable-fixes). * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amd: Handle being compiled without SI or CIK support better (stable- fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() (stable-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: Fix mode1 reset crash issue (stable-fixes). * drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes). * drm/amdkfd: clamp queue size to minimum (stable-fixes). * drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: panel: forbid initializing a panel with unknown connector type (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/fdinfo: Protect against driver unbind (git-fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dg2: wait for HuC load completion before running selftests (stable- fixes). * drm/i915/dp: Fix error handling during 128b/132b link training (stable- fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes). * drm/i915: Disable RPG during live selftest (git-fixes). * drm/i915: Make sure all planes in use by the joiner have their crtc included (stable-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable- fixes). * drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable- fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes). * drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() (git-fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/sched: Fix preprocessor guard (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/tests: Add helper to create mock crtc (stable-fixes). * drm/tests: Add helper to create mock plane (stable-fixes). * drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git- fixes). * drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes). * drm/tests: helpers: Add atomic helpers (stable-fixes). * drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable- fixes). * drm/tests: helpers: Create kunit helper to destroy a drm_display_mode (stable-fixes). * drm/tests: helpers: Fix compiler warning (git-fixes). * drm/tests: modes: Fix drm_display_mode memory leak (git-fixes). * drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes). * drm: allow encoder mode_set even when connectors change for crtc (stable- fixes). * drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel) (stable-fixes). * drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB (stable-fixes). * drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * e1000e: change k1 configuration on MTP and later platforms (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * eth: bnxt: fix missing ring index trim on error path (git-fixes). * ethtool: Fix context creation with no parameters (git-fixes). * ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes). * ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git- fixes). * ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes). * ethtool: fix setting key and resetting indir at once (git-fixes). * ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes). * ethtool: netlink: do not return SQI value if link is down (git-fixes). * ethtool: plca: fix plca enable data type while parsing the value (git- fixes). * ethtool: rss: echo the context number back (git-fixes). * exfat: do not fallback to buffered write (git-fixes). * exfat: do not zero the extended part (bsc#1237356). * exfat: drop ->i_size_ondisk (git-fixes). * exfat: fix appending discontinuous clusters to empty file (bsc#1237356). * exfat: fix potential wrong error return from get_block (git-fixes). * exfat: fix soft lockup in exfat_clear_bitmap (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: fix timing of synchronizing bitmap and inode (bsc#1237356). * exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes). * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342). * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540). * ext4: do not over-report free space or inodes in statvfs (bsc#1242345). * ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347). * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557). * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556). * ext4: make block validity check resistent to sb bh corruption (bsc#1242348). * ext4: partial zero eof block on unaligned inode size extension (bsc#1242336). * ext4: protect ext4_release_dquot against freezing (bsc#1242335). * ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536). * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539). * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omapfb: Add 'plane' value check (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git- fixes). * firmware: arm_scmi: Balance device refcount when destroying devices (git- fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * fs/jfs: Prevent integer overflow in AG size calculation (git-fixes). * fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes). * fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250). * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528). * fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535). * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526). * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gup: make the stack expansion warning a bit more targeted (bsc#1238214). * gve: handle overflow when reporting TX consumed descriptors (git-fixes). * gve: set xdp redirect target only when it is available (git-fixes). * hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes). * i2c: ls2x: Fix frequency division register access (git-fixes). * i2c: npcm: disable interrupt enable bit before devm_request_irq (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * ice: Add check for devm_kzalloc() (git-fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: fix reservation of resources for RDMA when disabled (git-fixes). * ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497). * ice: stop truncating queue ids when checking (git-fixes). * idpf: check error for register_netdev() on init (git-fixes). * idpf: fix adapter NULL pointer dereference on reboot (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * igb: reject invalid external timestamp requests for 82580-based HW (git- fixes). * igc: add lock preventing multiple simultaneous PTM transactions (git-fixes). * igc: cleanup PTP module if probe fails (git-fixes). * igc: fix PTM cycle trigger logic (git-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes). * igc: increase wait time before retrying PTM (git-fixes). * igc: move ktime snapshot into PTM retry loop (git-fixes). * iio: accel: adxl367: fix setting odr for activity time update (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: ad7606: fix serial register access (git-fixes). * iio: adc: ad7768-1: Fix conversion result sign (git-fixes). * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: adis16201: Correct inclinometer channel resolution (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git- fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes). * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git- fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * irqchip/davinci: Remove leftover header (git-fixes). * irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes). * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git- fixes). * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307). * jbd2: add a missing data flush during file and fs synchronization (bsc#1242346). * jbd2: fix off-by-one while erasing journal (bsc#1242344). * jbd2: flush filesystem device before updating tail sequence (bsc#1242333). * jbd2: increase IO priority for writing revoke records (bsc#1242332). * jbd2: increase the journal IO's priority (bsc#1242537). * jbd2: remove wrong sb->s_sequence check (bsc#1242343). * jfs: Fix uninit-value access of imap allocated in the diMount() function (git-fixes). * jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: add sanity check for agwidth in dbMount (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for sctp: detect and prevent references to a freed transport in sendmsg (git-fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for powercap update (bsc#1241010). * kABI workaround for soc_mixer_control changes (git-fixes). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-obs-qa: Use srchash for dependency as well * kernel-source: Also replace bin/env * ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes). * kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes). * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * loop: Add sanity check for read/write_iter (git-fixes). * loop: LOOP_SET_FD: send uevents for partitions (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes). * loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes). * md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes). * md/md-bitmap: add 'sync_size' into struct md_bitmap_stats (git-fixes). * md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb (bsc#1238212). * md/md-bitmap: replace md_bitmap_status() with a new helper md_bitmap_get_stats() (git-fixes). * md/md-cluster: fix spares warnings for __le64 (git-fixes). * md/raid0: do not free conf on raid0_run failure (git-fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: do not free conf on raid0_run failure (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: Wait sync io to finish before changing group cnt (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: Do not flush sync_work in md_write_start() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: convert comma to semicolon (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * mdacon: rework dependency list (git-fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake H DID (stable-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration (git-fixes). * misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack (git-fixes). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm/readahead: fix large folio support in async readahead (bsc#1242321). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326). * mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327). * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546). * mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git- fixes) * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable- fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes). * mptcp: refine opt_mp_capable determination (git-fixes). * mptcp: relax check on MPC passive fallback (git-fixes). * mptcp: strict validation before using mp_opt->hmac (git-fixes). * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes). * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * neighbour: delete redundant judgment statements (git-fixes). * net l2tp: drop flow hash on forward (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5: Fill out devlink dev info only for PFs (git-fixes). * net/mlx5: IRQ, Fix null string in debug print (git-fixes). * net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git- fixes). * net/mlx5: Start health poll after enable hca (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes). * net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices (git-fixes). * net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/tcp: refactor tcp_inet6_sk() (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: add dev_net_rcu() helper (bsc#1239994). * net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes). * net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes). * net: avoid UAF on deleted altname (bsc#1233749). * net: blackhole_dev: fix build warning for ethh set but not used (git-fixes). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not dump stack on queue timeout (git-fixes). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes). * net: ethtool: Fix RSS setting (git-fixes). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: Switch to page pool for jumbo frames (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: mark racy access on sk->sk_rcvbuf (git-fixes). * net: move altnames together with the netdevice (bsc#1233749). * net: phy: leds: fix memory leak (git-fixes). * net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: sctp: fix skb leak in sctp_inq_free() (git-fixes). * net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: drr: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: ets: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes). * net_sched: qfq: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes). * nfs: add missing selections of CONFIG_CRC32 (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: reduce stack usage in idt_scan_mws (stable-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-fc: use ctrl state getter (git-fixes). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes). * nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes). * nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes). * nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme/ioctl: add missing space in err message (git-fixes). * nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git- fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: handle connectivity loss in nvme_set_queue_count (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: make nvme_tls_attrs_group static (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: tcp: Fix compilation warning with W=1 (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-fcloop: swap list_add_tail arguments (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * nvmet: Fix crash when a namespace is disabled (git-fixes). * nvmet: remove old function prototype (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ("Use gcc-13 for build on SLE16 (jsc#PED-10028).") * padata: do not leak refcount in reorder_work (git-fixes). * padata: fix sysfs store callback check (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172) * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172) * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172) * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172) * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk (git-fixes). * phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git- fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable- fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes). * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes). * platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug (git-fixes). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/boot: Check for ld-option support (bsc#1215199). * powerpc/boot: Fix dash warning (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc: Do not use --- in kernel logs (git-fixes). * powerpc: Stop using no_llseek (bsc#1239573). * printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX (bsc#1237950). * pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes). * pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes). * pwm: rcar: Improve register calculation (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * regulator: max20086: fix invalid memory access (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986). * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/package-descriptions: Add rt and rt_debug descriptions * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * rtc: pcf85063: do a SW reset if POR failed (stable-fixes). * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git- fixes bsc#1238368). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * scsi: Improve CDL control (git-fixes). * scsi: core: Clear driver private data when retrying request (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: core: Do not retry I/Os during depopulation (git-fixes). * scsi: core: Handle depopulation and restoration in progress (git-fixes). * scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes). * scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes). * scsi: hisi_sas: Directly call register snapshot instead of using workqueue (git-fixes). * scsi: hisi_sas: Enable all PHYs that are not disabled by user during controller reset (git-fixes). * scsi: hisi_sas: Enable force phy when SATA disk directly connected (git- fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes). * scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git- fixes). * scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes). * scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request (git-fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector() fails (bsc#1238347). * scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine (bsc#1238347). * scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk (bsc#1238347). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Reduce log message generation during ELS ring clean up (bsc#1238347). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes). * scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: megaraid_sas: Fix for a potential deadlock (git-fixes). * scsi: mpi3mr: Fix locking in an error path (git-fixes). * scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes). * scsi: mpi3mr: Start controller indexing from 0 (git-fixes). * scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes). * scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver load time (jsc#PED-11253). * scsi: mpt3sas: Fix a locking bug in an error path (git-fixes). * scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO (git-fixes). * scsi: myrb: Remove dead code (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes). * scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes). * scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes). * scsi: sg: Enable runtime power management (git-fixes). * scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset (git- fixes). * scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes). * sctp: Fix undefined behavior in left shift operation (git-fixes). * sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes). * sctp: detect and prevent references to a freed transport in sendmsg (git- fixes). * sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start (git-fixes). * sctp: fix association labeling in the duplicate COOKIE-ECHO case (git- fixes). * sctp: fix busy polling (git-fixes). * sctp: prefer struct_size over open coded arithmetic (git-fixes). * sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftests/bpf: Add a few tests to cover (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590). * selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590). * selftests/bpf: test for changing packet data from global functions (bsc#1241590). * selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590). * selftests/futex: futex_waitv wouldblock test should fail (git-fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: generate a temporary mountpoint for cgroup filesystem (git- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: msm: Configure correct working mode before starting earlycon (git- fixes). * serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes). * series.conf: temporarily disable patches.suse/md-md-bitmap-fix-writing-non- bitmap-pages-ab99.patch (bsc#1238212) * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb3: fix creating FIFOs when mounting with "sfu" mount option (git-fixes). * smb3: request handle caching when caching directories (bsc#1231432). * smb3: retrying on failed server close (bsc#1231432). * smb: cached directories can be more than root file handle (bsc#1231432). * smb: cilent: set reparse mount points as automounts (git-fixes). * smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes). * smb: client: Fix minor whitespace errors and warnings (git-fixes). * smb: client: Fix netns refcount imbalance causing leaks and use-after-free (git-fixes). * smb: client: add support for WSL reparse points (git-fixes). * smb: client: allow creating special files via reparse points (git-fixes). * smb: client: allow creating symlinks via reparse points (git-fixes). * smb: client: cleanup smb2_query_reparse_point() (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: do not query reparse points twice on symlinks (git-fixes). * smb: client: extend smb2_compound_op() to accept more commands (bsc#1231432). * smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432). * smb: client: fix OOB in smb2_query_reparse_point() (git-fixes). * smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes). * smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes). * smb: client: fix folio leaks and perf improvements (bsc#1239997, bsc1241265). * smb: client: fix hardlinking of reparse points (git-fixes). * smb: client: fix missing mode bits for SMB symlinks (git-fixes). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smb: client: fix possible double free in smb2_set_ea() (git-fixes). * smb: client: fix potential broken compound request (git-fixes). * smb: client: fix renaming of reparse points (git-fixes). * smb: client: get rid of smb311_posix_query_path_info() (git-fixes). * smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes). * smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes). * smb: client: handle path separator of created SMB symlinks (git-fixes). * smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes). * smb: client: ignore unhandled reparse tags (git-fixes). * smb: client: implement ->query_reparse_point() for SMB1 (git-fixes). * smb: client: instantiate when creating SFU files (git-fixes). * smb: client: introduce ->parse_reparse_point() (git-fixes). * smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes). * smb: client: introduce cifs_sfu_make_node() (git-fixes). * smb: client: introduce reparse mount option (git-fixes). * smb: client: make smb2_compound_op() return resp buffer on success (bsc#1231432). * smb: client: move most of reparse point handling code to common file (git- fixes). * smb: client: move some params to cifs_open_info_data (bsc#1231432). * smb: client: optimise reparse point querying (git-fixes). * smb: client: parse owner/group when creating reparse points (git-fixes). * smb: client: parse reparse point flag in create response (bsc#1231432). * smb: client: parse uid, gid, mode and dev from WSL reparse points (git- fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb: client: reduce number of parameters in smb2_compound_op() (git-fixes). * smb: client: reduce stack usage in smb2_query_info_compound() (bsc#1231432). * smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes). * smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432). * smb: client: retry compound request without reusing lease (git-fixes). * smb: client: return reparse type in /proc/mounts (git-fixes). * smb: client: reuse file lease key in compound operations (git-fixes). * smb: client: set correct d_type for reparse DFS/DFSR and mount point (git- fixes). * smb: client: set correct file type from NFS reparse points (git-fixes). * smb: client: stop revalidating reparse points unnecessarily (git-fixes). * smb: use kernel_connect() and kernel_bind() (git-fixes). * soc/mediatek: mtk-devapc: Convert to platform remove callback returning void (stable-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes). * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328). * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes). * staging: axis-fifo: Remove hardware resets for user errors (git-fixes). * staging: iio: adc: ad7816: Correct conditional logic for store mode (git- fixes). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * string: Add load_unaligned_zeropad() code path to sized_strscpy() (git- fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Scan retimers after device router has been enumerated (stable- fixes). * tools/hv: update route parsing in kvp daemon (git-fixes). * tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175). * tools/power turbostat: report CoreThr per measurement interval (git-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: n_tty: use uint for space returned by tty_write_room() (git-fixes). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: set_params: properly check if parameters can be applied (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * udf: Fix inode_getblk() return value (bsc#1242313). * udf: Skip parent dir link count update if corrupted (bsc#1242315). * udf: Verify inode link counts before performing rename (bsc#1242314). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: cdns3: Fix deadlock when using NCM gadget (git-fixes). * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git- fixes). * usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git- fixes). * usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git- fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes). * usb: dwc3: gadget: check that event count does not exceed event buffer length (git-fixes). * usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: Use get_status callback to set remote wakeup capability (git- fixes). * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable- fixes). * usb: gadget: f_ecm: Add get_status callback (git-fixes). * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes). * usb: host: tegra: Prevent host controller crash when OTG port is used (git- fixes). * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable- fixes). * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable- fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: uhci-platform: Make the clock really optional (git-fixes). * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes). * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes). * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes). * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtchnl: make proto and filter action count unsigned (git-fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * vmxnet3: Fix tx queue race condition with XDP (bsc#1241394). * vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394). * wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes). * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (stable-fixes). * wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable- fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: limit printed string from FW file (git-fixes). * wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: nl80211: reject cooked mode if it is set along with other flags (git- fixes). * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). * x86/bugs: Add RSB mitigation document (git-fixes). * x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes). * x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes). * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git- fixes). * x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes). * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/dumpstack: Fix inaccurate unwinding from exception stacks due to misplaced assignment (git-fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (git-fixes). * x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes). * x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes). * x86/microcode/AMD: Split load_microcode_amd() (git-fixes). * x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Set new revision only after a successful update (git- fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Remove the driver announcement and version (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Rework early revisions reporting (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git- fixes). * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes). * x86/uaccess: Improve performance by aligning writes to 8 bytes in copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xfs: flush inodegc before swapon (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). * zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING (bsc#1241167). * zram: clear IDLE flag after recompression (git-fixes). * zram: clear IDLE flag in mark_idle() (git-fixes). * zram: do not mark idle slots that cannot be idle (git-fixes). * zram: fix potential UAF of zram table (git-fixes). * zram: fix uninitialized ZRAM not releasing backing device (git-fixes). * zram: refuse to use zero sized block device as backing device (git-fixes). * zram: split memory-tracking and ac-time tracking (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Confidential Computing Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2025-1919=1 ## Package List: * Confidential Computing Module 15-SP6 (nosrc x86_64) * kernel-coco_debug-6.4.0-15061.21.coco15sp6.1 * kernel-coco-6.4.0-15061.21.coco15sp6.1 * Confidential Computing Module 15-SP6 (x86_64) * kernel-coco_debug-debuginfo-6.4.0-15061.21.coco15sp6.1 * kernel-syms-coco-6.4.0-15061.21.coco15sp6.1 * kernel-coco-devel-6.4.0-15061.21.coco15sp6.1 * kernel-coco_debug-devel-6.4.0-15061.21.coco15sp6.1 * kernel-coco-debugsource-6.4.0-15061.21.coco15sp6.1 * reiserfs-kmp-coco-6.4.0-15061.21.coco15sp6.1 * kernel-coco_debug-debugsource-6.4.0-15061.21.coco15sp6.1 * kernel-coco_debug-devel-debuginfo-6.4.0-15061.21.coco15sp6.1 * kernel-coco-debuginfo-6.4.0-15061.21.coco15sp6.1 * kernel-coco-vdso-debuginfo-6.4.0-15061.21.coco15sp6.1 * reiserfs-kmp-coco-debuginfo-6.4.0-15061.21.coco15sp6.1 * Confidential Computing Module 15-SP6 (noarch) * kernel-devel-coco-6.4.0-15061.21.coco15sp6.1 * kernel-source-coco-6.4.0-15061.21.coco15sp6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50029.html * https://www.suse.com/security/cve/CVE-2024-50036.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50162.html * https://www.suse.com/security/cve/CVE-2024-50163.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50294.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57924.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57994.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58068.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2024-58088.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21696.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21705.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21715.html * https://www.suse.com/security/cve/CVE-2025-21716.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21719.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21724.html * https://www.suse.com/security/cve/CVE-2025-21725.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21728.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21767.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21790.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21795.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21799.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21808.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21833.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21854.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21867.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21904.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21925.html * https://www.suse.com/security/cve/CVE-2025-21926.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21931.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21980.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21985.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22004.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-22015.html * https://www.suse.com/security/cve/CVE-2025-22016.html * https://www.suse.com/security/cve/CVE-2025-22017.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22029.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22036.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22053.html * https://www.suse.com/security/cve/CVE-2025-22055.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22080.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22090.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22105.html * https://www.suse.com/security/cve/CVE-2025-22106.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22115.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23133.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37860.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39728.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225606 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1231912 * https://bugzilla.suse.com/show_bug.cgi?id=1231949 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233075 * https://bugzilla.suse.com/show_bug.cgi?id=1233098 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233483 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235862 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236086 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1236752 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237111 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237356 * https://bugzilla.suse.com/show_bug.cgi?id=1237504 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237848 * https://bugzilla.suse.com/show_bug.cgi?id=1237849 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237879 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237889 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237891 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237901 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238214 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238347 * https://bugzilla.suse.com/show_bug.cgi?id=1238368 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238509 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238525 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238739 * https://bugzilla.suse.com/show_bug.cgi?id=1238742 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238753 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238759 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238860 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238863 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238877 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239108 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239470 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239510 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1239997 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240181 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240576 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240709 * https://bugzilla.suse.com/show_bug.cgi?id=1240712 * https://bugzilla.suse.com/show_bug.cgi?id=1240713 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240809 * https://bugzilla.suse.com/show_bug.cgi?id=1240811 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240835 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240934 * https://bugzilla.suse.com/show_bug.cgi?id=1240936 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240944 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241010 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241051 * https://bugzilla.suse.com/show_bug.cgi?id=1241123 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241151 * https://bugzilla.suse.com/show_bug.cgi?id=1241167 * https://bugzilla.suse.com/show_bug.cgi?id=1241175 * https://bugzilla.suse.com/show_bug.cgi?id=1241204 * https://bugzilla.suse.com/show_bug.cgi?id=1241250 * https://bugzilla.suse.com/show_bug.cgi?id=1241265 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241371 * https://bugzilla.suse.com/show_bug.cgi?id=1241373 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241378 * https://bugzilla.suse.com/show_bug.cgi?id=1241394 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241416 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241426 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241451 * https://bugzilla.suse.com/show_bug.cgi?id=1241452 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241537 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241547 * https://bugzilla.suse.com/show_bug.cgi?id=1241548 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241578 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241626 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242985 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-11253 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-348 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 08:39:55 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 08:39:55 -0000 Subject: SUSE-SU-2025:01918-1: important: Security update for the Linux Kernel Message-ID: <174971759590.655.3739490465980701370@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01918-1 Release Date: 2025-06-12T06:29:01Z Rating: important References: * bsc#1184350 * bsc#1193629 * bsc#1204569 * bsc#1204619 * bsc#1204705 * bsc#1205282 * bsc#1206051 * bsc#1206073 * bsc#1206649 * bsc#1206886 * bsc#1206887 * bsc#1208542 * bsc#1209292 * bsc#1209556 * bsc#1209684 * bsc#1210337 * bsc#1210763 * bsc#1210767 * bsc#1211465 * bsc#1213012 * bsc#1213013 * bsc#1213094 * bsc#1213096 * bsc#1213946 * bsc#1214991 * bsc#1218470 * bsc#1232649 * bsc#1234887 * bsc#1235100 * bsc#1237981 * bsc#1238032 * bsc#1240177 * bsc#1240802 * bsc#1241525 * bsc#1241526 * bsc#1241640 * bsc#1241648 * bsc#1242147 * bsc#1242150 * bsc#1242151 * bsc#1242154 * bsc#1242157 * bsc#1242158 * bsc#1242164 * bsc#1242165 * bsc#1242169 * bsc#1242215 * bsc#1242218 * bsc#1242219 * bsc#1242222 * bsc#1242226 * bsc#1242227 * bsc#1242228 * bsc#1242229 * bsc#1242230 * bsc#1242231 * bsc#1242232 * bsc#1242237 * bsc#1242239 * bsc#1242241 * bsc#1242244 * bsc#1242245 * bsc#1242248 * bsc#1242261 * bsc#1242264 * bsc#1242265 * bsc#1242270 * bsc#1242276 * bsc#1242279 * bsc#1242280 * bsc#1242281 * bsc#1242282 * bsc#1242284 * bsc#1242285 * bsc#1242289 * bsc#1242294 * bsc#1242305 * bsc#1242312 * bsc#1242320 * bsc#1242338 * bsc#1242352 * bsc#1242353 * bsc#1242355 * bsc#1242357 * bsc#1242358 * bsc#1242361 * bsc#1242365 * bsc#1242366 * bsc#1242369 * bsc#1242370 * bsc#1242371 * bsc#1242372 * bsc#1242377 * bsc#1242378 * bsc#1242380 * bsc#1242382 * bsc#1242385 * bsc#1242387 * bsc#1242389 * bsc#1242391 * bsc#1242392 * bsc#1242394 * bsc#1242398 * bsc#1242399 * bsc#1242402 * bsc#1242403 * bsc#1242409 * bsc#1242411 * bsc#1242415 * bsc#1242416 * bsc#1242421 * bsc#1242422 * bsc#1242426 * bsc#1242428 * bsc#1242440 * bsc#1242443 * bsc#1242449 * bsc#1242452 * bsc#1242453 * bsc#1242454 * bsc#1242455 * bsc#1242456 * bsc#1242458 * bsc#1242464 * bsc#1242467 * bsc#1242469 * bsc#1242473 * bsc#1242478 * bsc#1242481 * bsc#1242484 * bsc#1242489 * bsc#1242493 * bsc#1242497 * bsc#1242527 * bsc#1242542 * bsc#1242544 * bsc#1242545 * bsc#1242547 * bsc#1242548 * bsc#1242549 * bsc#1242550 * bsc#1242551 * bsc#1242558 * bsc#1242570 * bsc#1242580 * bsc#1242586 * bsc#1242589 * bsc#1242596 * bsc#1242597 * bsc#1242685 * bsc#1242686 * bsc#1242688 * bsc#1242689 * bsc#1242695 * bsc#1242716 * bsc#1242733 * bsc#1242734 * bsc#1242735 * bsc#1242736 * bsc#1242739 * bsc#1242743 * bsc#1242744 * bsc#1242745 * bsc#1242746 * bsc#1242747 * bsc#1242749 * bsc#1242752 * bsc#1242753 * bsc#1242756 * bsc#1242759 * bsc#1242762 * bsc#1242765 * bsc#1242767 * bsc#1242778 * bsc#1242779 * bsc#1242790 * bsc#1242791 * bsc#1243047 * bsc#1243133 * bsc#1243649 * bsc#1243660 * bsc#1243737 * bsc#1243919 Cross-References: * CVE-2022-3564 * CVE-2022-3619 * CVE-2022-3640 * CVE-2022-49110 * CVE-2022-49139 * CVE-2022-49767 * CVE-2022-49769 * CVE-2022-49770 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49775 * CVE-2022-49776 * CVE-2022-49777 * CVE-2022-49779 * CVE-2022-49783 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49790 * CVE-2022-49792 * CVE-2022-49793 * CVE-2022-49794 * CVE-2022-49796 * CVE-2022-49797 * CVE-2022-49799 * CVE-2022-49800 * CVE-2022-49801 * CVE-2022-49802 * CVE-2022-49807 * CVE-2022-49809 * CVE-2022-49810 * CVE-2022-49812 * CVE-2022-49813 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49822 * CVE-2022-49823 * CVE-2022-49824 * CVE-2022-49825 * CVE-2022-49826 * CVE-2022-49827 * CVE-2022-49830 * CVE-2022-49832 * CVE-2022-49834 * CVE-2022-49835 * CVE-2022-49836 * CVE-2022-49839 * CVE-2022-49841 * CVE-2022-49842 * CVE-2022-49845 * CVE-2022-49846 * CVE-2022-49850 * CVE-2022-49853 * CVE-2022-49858 * CVE-2022-49860 * CVE-2022-49861 * CVE-2022-49863 * CVE-2022-49864 * CVE-2022-49865 * CVE-2022-49868 * CVE-2022-49869 * CVE-2022-49870 * CVE-2022-49871 * CVE-2022-49874 * CVE-2022-49879 * CVE-2022-49880 * CVE-2022-49881 * CVE-2022-49885 * CVE-2022-49887 * CVE-2022-49888 * CVE-2022-49889 * CVE-2022-49890 * CVE-2022-49891 * CVE-2022-49892 * CVE-2022-49900 * CVE-2022-49905 * CVE-2022-49906 * CVE-2022-49908 * CVE-2022-49909 * CVE-2022-49910 * CVE-2022-49915 * CVE-2022-49916 * CVE-2022-49922 * CVE-2022-49923 * CVE-2022-49924 * CVE-2022-49925 * CVE-2022-49927 * CVE-2022-49928 * CVE-2022-49931 * CVE-2023-1990 * CVE-2023-53035 * CVE-2023-53038 * CVE-2023-53039 * CVE-2023-53040 * CVE-2023-53041 * CVE-2023-53044 * CVE-2023-53045 * CVE-2023-53049 * CVE-2023-53051 * CVE-2023-53052 * CVE-2023-53054 * CVE-2023-53056 * CVE-2023-53058 * CVE-2023-53059 * CVE-2023-53060 * CVE-2023-53062 * CVE-2023-53064 * CVE-2023-53065 * CVE-2023-53066 * CVE-2023-53068 * CVE-2023-53075 * CVE-2023-53077 * CVE-2023-53078 * CVE-2023-53079 * CVE-2023-53081 * CVE-2023-53084 * CVE-2023-53087 * CVE-2023-53089 * CVE-2023-53090 * CVE-2023-53091 * CVE-2023-53092 * CVE-2023-53093 * CVE-2023-53096 * CVE-2023-53098 * CVE-2023-53099 * CVE-2023-53100 * CVE-2023-53101 * CVE-2023-53106 * CVE-2023-53108 * CVE-2023-53111 * CVE-2023-53114 * CVE-2023-53116 * CVE-2023-53118 * CVE-2023-53119 * CVE-2023-53123 * CVE-2023-53124 * CVE-2023-53125 * CVE-2023-53131 * CVE-2023-53134 * CVE-2023-53137 * CVE-2023-53139 * CVE-2023-53140 * CVE-2023-53142 * CVE-2023-53143 * CVE-2023-53145 * CVE-2024-53168 * CVE-2024-56558 * CVE-2025-21888 * CVE-2025-21999 * CVE-2025-22056 * CVE-2025-22060 * CVE-2025-23138 * CVE-2025-23145 * CVE-2025-37785 * CVE-2025-37789 * CVE-2025-37948 * CVE-2025-37963 CVSS scores: * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-3619 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3619 ( NVD ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-3640 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-3640 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49110 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49776 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49776 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49779 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49783 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49792 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49792 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-49793 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49794 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49801 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49813 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49822 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49823 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49830 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49834 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49834 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49845 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49850 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49850 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49868 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49869 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49869 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49908 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53035 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53038 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53038 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53039 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53041 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53052 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53077 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53077 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53089 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53089 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53100 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53100 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves 157 vulnerabilities and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981). * CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032). * CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493). * CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245). * CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887). * CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100). * CVE-2025-21888: RDMA/mlx5: Fix a WARN during dereg_mr for DM type (bsc#1240177). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). The following non-security bugs were fixed: * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737). * Refresh fixes for cBPF issue (bsc#1242778) * Remove debug flavor (bsc#1243919) * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778). * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778). * arm64: insn: Add support for encoding DSB (bsc#1242778). * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778). * arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778). * arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737). * hv_netvsc: Remove rmsg_pgcnt (bsc#1243737). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737). * mtd: phram: Add the kernel lock down check (bsc#1232649). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1918=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1918=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1918=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1918=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.121.1 * kernel-rt-debuginfo-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.121.1 * kernel-rt-debuginfo-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.121.1 * kernel-rt-debuginfo-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.121.1 * kernel-rt-debuginfo-5.14.21-150400.15.121.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.121.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-3619.html * https://www.suse.com/security/cve/CVE-2022-3640.html * https://www.suse.com/security/cve/CVE-2022-49110.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49767.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49776.html * https://www.suse.com/security/cve/CVE-2022-49777.html * https://www.suse.com/security/cve/CVE-2022-49779.html * https://www.suse.com/security/cve/CVE-2022-49783.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49790.html * https://www.suse.com/security/cve/CVE-2022-49792.html * https://www.suse.com/security/cve/CVE-2022-49793.html * https://www.suse.com/security/cve/CVE-2022-49794.html * https://www.suse.com/security/cve/CVE-2022-49796.html * https://www.suse.com/security/cve/CVE-2022-49797.html * https://www.suse.com/security/cve/CVE-2022-49799.html * https://www.suse.com/security/cve/CVE-2022-49800.html * https://www.suse.com/security/cve/CVE-2022-49801.html * https://www.suse.com/security/cve/CVE-2022-49802.html * https://www.suse.com/security/cve/CVE-2022-49807.html * https://www.suse.com/security/cve/CVE-2022-49809.html * https://www.suse.com/security/cve/CVE-2022-49810.html * https://www.suse.com/security/cve/CVE-2022-49812.html * https://www.suse.com/security/cve/CVE-2022-49813.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49822.html * https://www.suse.com/security/cve/CVE-2022-49823.html * https://www.suse.com/security/cve/CVE-2022-49824.html * https://www.suse.com/security/cve/CVE-2022-49825.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49827.html * https://www.suse.com/security/cve/CVE-2022-49830.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49834.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49836.html * https://www.suse.com/security/cve/CVE-2022-49839.html * https://www.suse.com/security/cve/CVE-2022-49841.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49845.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49850.html * https://www.suse.com/security/cve/CVE-2022-49853.html * https://www.suse.com/security/cve/CVE-2022-49858.html * https://www.suse.com/security/cve/CVE-2022-49860.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49863.html * https://www.suse.com/security/cve/CVE-2022-49864.html * https://www.suse.com/security/cve/CVE-2022-49865.html * https://www.suse.com/security/cve/CVE-2022-49868.html * https://www.suse.com/security/cve/CVE-2022-49869.html * https://www.suse.com/security/cve/CVE-2022-49870.html * https://www.suse.com/security/cve/CVE-2022-49871.html * https://www.suse.com/security/cve/CVE-2022-49874.html * https://www.suse.com/security/cve/CVE-2022-49879.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49881.html * https://www.suse.com/security/cve/CVE-2022-49885.html * https://www.suse.com/security/cve/CVE-2022-49887.html * https://www.suse.com/security/cve/CVE-2022-49888.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49890.html * https://www.suse.com/security/cve/CVE-2022-49891.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49900.html * https://www.suse.com/security/cve/CVE-2022-49905.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49908.html * https://www.suse.com/security/cve/CVE-2022-49909.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49916.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49923.html * https://www.suse.com/security/cve/CVE-2022-49924.html * https://www.suse.com/security/cve/CVE-2022-49925.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2022-49928.html * https://www.suse.com/security/cve/CVE-2022-49931.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-53035.html * https://www.suse.com/security/cve/CVE-2023-53038.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53040.html * https://www.suse.com/security/cve/CVE-2023-53041.html * https://www.suse.com/security/cve/CVE-2023-53044.html * https://www.suse.com/security/cve/CVE-2023-53045.html * https://www.suse.com/security/cve/CVE-2023-53049.html * https://www.suse.com/security/cve/CVE-2023-53051.html * https://www.suse.com/security/cve/CVE-2023-53052.html * https://www.suse.com/security/cve/CVE-2023-53054.html * https://www.suse.com/security/cve/CVE-2023-53056.html * https://www.suse.com/security/cve/CVE-2023-53058.html * https://www.suse.com/security/cve/CVE-2023-53059.html * https://www.suse.com/security/cve/CVE-2023-53060.html * https://www.suse.com/security/cve/CVE-2023-53062.html * https://www.suse.com/security/cve/CVE-2023-53064.html * https://www.suse.com/security/cve/CVE-2023-53065.html * https://www.suse.com/security/cve/CVE-2023-53066.html * https://www.suse.com/security/cve/CVE-2023-53068.html * https://www.suse.com/security/cve/CVE-2023-53075.html * https://www.suse.com/security/cve/CVE-2023-53077.html * https://www.suse.com/security/cve/CVE-2023-53078.html * https://www.suse.com/security/cve/CVE-2023-53079.html * https://www.suse.com/security/cve/CVE-2023-53081.html * https://www.suse.com/security/cve/CVE-2023-53084.html * https://www.suse.com/security/cve/CVE-2023-53087.html * https://www.suse.com/security/cve/CVE-2023-53089.html * https://www.suse.com/security/cve/CVE-2023-53090.html * https://www.suse.com/security/cve/CVE-2023-53091.html * https://www.suse.com/security/cve/CVE-2023-53092.html * https://www.suse.com/security/cve/CVE-2023-53093.html * https://www.suse.com/security/cve/CVE-2023-53096.html * https://www.suse.com/security/cve/CVE-2023-53098.html * https://www.suse.com/security/cve/CVE-2023-53099.html * https://www.suse.com/security/cve/CVE-2023-53100.html * https://www.suse.com/security/cve/CVE-2023-53101.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2023-53108.html * https://www.suse.com/security/cve/CVE-2023-53111.html * https://www.suse.com/security/cve/CVE-2023-53114.html * https://www.suse.com/security/cve/CVE-2023-53116.html * https://www.suse.com/security/cve/CVE-2023-53118.html * https://www.suse.com/security/cve/CVE-2023-53119.html * https://www.suse.com/security/cve/CVE-2023-53123.html * https://www.suse.com/security/cve/CVE-2023-53124.html * https://www.suse.com/security/cve/CVE-2023-53125.html * https://www.suse.com/security/cve/CVE-2023-53131.html * https://www.suse.com/security/cve/CVE-2023-53134.html * https://www.suse.com/security/cve/CVE-2023-53137.html * https://www.suse.com/security/cve/CVE-2023-53139.html * https://www.suse.com/security/cve/CVE-2023-53140.html * https://www.suse.com/security/cve/CVE-2023-53142.html * https://www.suse.com/security/cve/CVE-2023-53143.html * https://www.suse.com/security/cve/CVE-2023-53145.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1204569 * https://bugzilla.suse.com/show_bug.cgi?id=1204619 * https://bugzilla.suse.com/show_bug.cgi?id=1204705 * https://bugzilla.suse.com/show_bug.cgi?id=1205282 * https://bugzilla.suse.com/show_bug.cgi?id=1206051 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1208542 * https://bugzilla.suse.com/show_bug.cgi?id=1209292 * https://bugzilla.suse.com/show_bug.cgi?id=1209556 * https://bugzilla.suse.com/show_bug.cgi?id=1209684 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1210767 * https://bugzilla.suse.com/show_bug.cgi?id=1211465 * https://bugzilla.suse.com/show_bug.cgi?id=1213012 * https://bugzilla.suse.com/show_bug.cgi?id=1213013 * https://bugzilla.suse.com/show_bug.cgi?id=1213094 * https://bugzilla.suse.com/show_bug.cgi?id=1213096 * https://bugzilla.suse.com/show_bug.cgi?id=1213946 * https://bugzilla.suse.com/show_bug.cgi?id=1214991 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1237981 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242150 * https://bugzilla.suse.com/show_bug.cgi?id=1242151 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242157 * https://bugzilla.suse.com/show_bug.cgi?id=1242158 * https://bugzilla.suse.com/show_bug.cgi?id=1242164 * https://bugzilla.suse.com/show_bug.cgi?id=1242165 * https://bugzilla.suse.com/show_bug.cgi?id=1242169 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242218 * https://bugzilla.suse.com/show_bug.cgi?id=1242219 * https://bugzilla.suse.com/show_bug.cgi?id=1242222 * https://bugzilla.suse.com/show_bug.cgi?id=1242226 * https://bugzilla.suse.com/show_bug.cgi?id=1242227 * https://bugzilla.suse.com/show_bug.cgi?id=1242228 * https://bugzilla.suse.com/show_bug.cgi?id=1242229 * https://bugzilla.suse.com/show_bug.cgi?id=1242230 * https://bugzilla.suse.com/show_bug.cgi?id=1242231 * https://bugzilla.suse.com/show_bug.cgi?id=1242232 * https://bugzilla.suse.com/show_bug.cgi?id=1242237 * https://bugzilla.suse.com/show_bug.cgi?id=1242239 * https://bugzilla.suse.com/show_bug.cgi?id=1242241 * https://bugzilla.suse.com/show_bug.cgi?id=1242244 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242248 * https://bugzilla.suse.com/show_bug.cgi?id=1242261 * https://bugzilla.suse.com/show_bug.cgi?id=1242264 * https://bugzilla.suse.com/show_bug.cgi?id=1242265 * https://bugzilla.suse.com/show_bug.cgi?id=1242270 * https://bugzilla.suse.com/show_bug.cgi?id=1242276 * https://bugzilla.suse.com/show_bug.cgi?id=1242279 * https://bugzilla.suse.com/show_bug.cgi?id=1242280 * https://bugzilla.suse.com/show_bug.cgi?id=1242281 * https://bugzilla.suse.com/show_bug.cgi?id=1242282 * https://bugzilla.suse.com/show_bug.cgi?id=1242284 * https://bugzilla.suse.com/show_bug.cgi?id=1242285 * https://bugzilla.suse.com/show_bug.cgi?id=1242289 * https://bugzilla.suse.com/show_bug.cgi?id=1242294 * https://bugzilla.suse.com/show_bug.cgi?id=1242305 * https://bugzilla.suse.com/show_bug.cgi?id=1242312 * https://bugzilla.suse.com/show_bug.cgi?id=1242320 * https://bugzilla.suse.com/show_bug.cgi?id=1242338 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242355 * https://bugzilla.suse.com/show_bug.cgi?id=1242357 * https://bugzilla.suse.com/show_bug.cgi?id=1242358 * https://bugzilla.suse.com/show_bug.cgi?id=1242361 * https://bugzilla.suse.com/show_bug.cgi?id=1242365 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242369 * https://bugzilla.suse.com/show_bug.cgi?id=1242370 * https://bugzilla.suse.com/show_bug.cgi?id=1242371 * https://bugzilla.suse.com/show_bug.cgi?id=1242372 * https://bugzilla.suse.com/show_bug.cgi?id=1242377 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242380 * https://bugzilla.suse.com/show_bug.cgi?id=1242382 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242387 * https://bugzilla.suse.com/show_bug.cgi?id=1242389 * https://bugzilla.suse.com/show_bug.cgi?id=1242391 * https://bugzilla.suse.com/show_bug.cgi?id=1242392 * https://bugzilla.suse.com/show_bug.cgi?id=1242394 * https://bugzilla.suse.com/show_bug.cgi?id=1242398 * https://bugzilla.suse.com/show_bug.cgi?id=1242399 * https://bugzilla.suse.com/show_bug.cgi?id=1242402 * https://bugzilla.suse.com/show_bug.cgi?id=1242403 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242411 * https://bugzilla.suse.com/show_bug.cgi?id=1242415 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242421 * https://bugzilla.suse.com/show_bug.cgi?id=1242422 * https://bugzilla.suse.com/show_bug.cgi?id=1242426 * https://bugzilla.suse.com/show_bug.cgi?id=1242428 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242443 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242453 * https://bugzilla.suse.com/show_bug.cgi?id=1242454 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242456 * https://bugzilla.suse.com/show_bug.cgi?id=1242458 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242467 * https://bugzilla.suse.com/show_bug.cgi?id=1242469 * https://bugzilla.suse.com/show_bug.cgi?id=1242473 * https://bugzilla.suse.com/show_bug.cgi?id=1242478 * https://bugzilla.suse.com/show_bug.cgi?id=1242481 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242489 * https://bugzilla.suse.com/show_bug.cgi?id=1242493 * https://bugzilla.suse.com/show_bug.cgi?id=1242497 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242544 * https://bugzilla.suse.com/show_bug.cgi?id=1242545 * https://bugzilla.suse.com/show_bug.cgi?id=1242547 * https://bugzilla.suse.com/show_bug.cgi?id=1242548 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242550 * https://bugzilla.suse.com/show_bug.cgi?id=1242551 * https://bugzilla.suse.com/show_bug.cgi?id=1242558 * https://bugzilla.suse.com/show_bug.cgi?id=1242570 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242586 * https://bugzilla.suse.com/show_bug.cgi?id=1242589 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242597 * https://bugzilla.suse.com/show_bug.cgi?id=1242685 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242688 * https://bugzilla.suse.com/show_bug.cgi?id=1242689 * https://bugzilla.suse.com/show_bug.cgi?id=1242695 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242733 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242735 * https://bugzilla.suse.com/show_bug.cgi?id=1242736 * https://bugzilla.suse.com/show_bug.cgi?id=1242739 * https://bugzilla.suse.com/show_bug.cgi?id=1242743 * https://bugzilla.suse.com/show_bug.cgi?id=1242744 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242746 * https://bugzilla.suse.com/show_bug.cgi?id=1242747 * https://bugzilla.suse.com/show_bug.cgi?id=1242749 * https://bugzilla.suse.com/show_bug.cgi?id=1242752 * https://bugzilla.suse.com/show_bug.cgi?id=1242753 * https://bugzilla.suse.com/show_bug.cgi?id=1242756 * https://bugzilla.suse.com/show_bug.cgi?id=1242759 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242765 * https://bugzilla.suse.com/show_bug.cgi?id=1242767 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242779 * https://bugzilla.suse.com/show_bug.cgi?id=1242790 * https://bugzilla.suse.com/show_bug.cgi?id=1242791 * https://bugzilla.suse.com/show_bug.cgi?id=1243047 * https://bugzilla.suse.com/show_bug.cgi?id=1243133 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:07 -0000 Subject: SUSE-SU-2025:01922-1: important: Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP4) Message-ID: <174973140705.629.3731827132960979035@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01922-1 Release Date: 2025-06-12T09:04:27Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_147 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1925=1 SUSE-2025-1922=1 SUSE-2025-1923=1 SUSE-2025-1924=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1924=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-1925=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-1922=1 SUSE-SLE-Module-Live-Patching-15-SP4-2025-1923=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_31-debugsource-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_147-default-6-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-18-150400.2.2 * kernel-livepatch-5_14_21-150400_24_144-default-7-150400.2.2 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-6-150400.2.2 * kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_133-default-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_119-default-18-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-6-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-7-150400.2.2 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-18-150400.2.2 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-7-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_31-debugsource-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_147-default-6-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-18-150400.2.2 * kernel-livepatch-5_14_21-150400_24_144-default-7-150400.2.2 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-6-150400.2.2 * kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_133-default-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_119-default-18-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-6-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-7-150400.2.2 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-18-150400.2.2 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-7-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:12 -0000 Subject: SUSE-SU-2025:20389-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <174973141264.629.8667754043005272697@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20389-1 Release Date: 2025-06-10T13:33:40Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-38=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_5-debugsource-3-1.2 * kernel-livepatch-6_4_0-25-default-3-1.2 * kernel-livepatch-6_4_0-25-default-debuginfo-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:16 -0000 Subject: SUSE-SU-2025:20388-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <174973141678.629.724024497759676479@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20388-1 Release Date: 2025-06-10T13:19:44Z Rating: moderate References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900) * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-36=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-20-default-6-1.2 * kernel-livepatch-6_4_0-20-default-debuginfo-6-1.2 * kernel-livepatch-MICRO-6-0_Update_3-debugsource-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:20 -0000 Subject: SUSE-SU-2025:20387-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174973142083.629.8281074427501149711@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20387-1 Release Date: 2025-06-10T13:19:39Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-37=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-4-1.2 * kernel-livepatch-6_4_0-24-default-4-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-4-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:25 -0000 Subject: SUSE-SU-2025:20386-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174973142503.629.2588662751634803157@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20386-1 Release Date: 2025-06-10T13:19:39Z Rating: moderate References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900) * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-35=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-debuginfo-6-1.1 * kernel-livepatch-6_4_0-19-default-6-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-6-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:28 -0000 Subject: SUSE-SU-2025:20385-1: moderate: Security update for docker-compose Message-ID: <174973142814.629.4548303335011177053@smelt2.prg2.suse.org> # Security update for docker-compose Announcement ID: SUSE-SU-2025:20385-1 Release Date: 2025-06-10T11:32:07Z Rating: moderate References: * bsc#1217070 Cross-References: * CVE-2023-47108 CVSS scores: * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for docker-compose fixes the following issues: Update to version 2.33.1: * Improvements * Add support for gw_priority, enable_ipv4 (requires docker v28.0) by @thaJeztah in #12570 * Fixes * Run watch standalone if menu fails to start by @ndeloof in #12536 * Report error using non-file secret|config with read-only service by @ndeloof in #12531 * Don't display bake suggestion when using --progress with quiet or json option by @glours in #12561 * Fix pull --parallel and --no-parallel deprecation warnings missing by @maxproske in #12555 * Fix error message when detach is implied by wait by @ndeloof in #12566 * Dependencies * build(deps): bump github.com/spf13/cobra from 1.8.1 to 1.9.1 by @dependabot in #12556 * build(deps): bump google.golang.org/grpc from 1.68.1 to 1.70.0 by @dependabot in #12494 * go.mod: update to docker v28.0.0 by @thaJeztah in #12545 Update to version 2.33.0: * Important * This release introduce support for Bake to manage builds as an alternative to the internal buildkit client. This new feature can be enabled by setting COMPOSE_BAKE=1 variable. Bake will become the default builder in a future release. * Improvements * let user know bake is now supported by @ndeloof in #12524 * support additional_context reference to another service by @ndeloof in #12485 * add support for BUILDKIT_PROGRESS by @ndeloof in #12458 * add --with-env flag to publish command by @glours in #12482 * Update ls --quiet help description by @maxproske in #12541 * Publish warn display env vars by @glours in #12486 * Fixes * Fix bake support by @ndeloof in #12507 * Update link in stats --help output by @maxproske in #12523 * Properly handle "builtin" seccomp profile by @r-bk in #12478 * manage watch applied to mulitple services by @ndeloof in #12469 * Internal * use main branch for docs upstream validation workflow by @crazy-max in #12487 * fix provenance for binaries and generate sbom by @crazy-max in #12479 * add codeowners file by @glours in #12480 * remove exit code per error type used by legacy metrics system by @ndeloof in #12502 * Dockerfile: update golangci-lint to v1.63.4 by @thaJeztah in #12546 * Full test coverage for compatibility cmd by @maxproske in #12528 * don't send raw os.Args to opentelemetry but a pseudo command line by @ndeloof in #12530 * add docker engine v28.x to the test-matrix by @thaJeztah in #12539 * enable copyloopvar linter by @thaJeztah in #12542 * go.mod: remove toolchain directive by @thaJeztah in #12551 * Dependencies * bump buildx v0.20.1 by @ndeloof in #12488 * bump docker to v27.5.1 by @ndeloof in #12491 * bump compose-go v2.4.8 by @ndeloof in #12543 * bump golang.org/x/sys from 0.28.0 to 0.30.0 by @dependabot in #12529 * bump github.com/moby/term v0.5.2 by @thaJeztah in #12540 * bump github.com/otiai10/copy from 1.14.0 to 1.14.1 by @dependabot in #12493 * bump github.com/jonboulle/clockwork from 0.4.0 to 0.5.0 by @dependabot in #12430 * bump github.com/spf13/pflag from 1.0.5 to 1.0.6 by @dependabot in #12548 * bump golang.org/x/sync from 0.10.0 to 0.11.0 by @dependabot in #12547 * bump gotest.tools/v3 from 3.5.1 to 3.5.2 by @dependabot in #12549 Update to version 2.32.4: * add missing tag for build during merge workflow * ci: re-use local source to build binary images * ci: use local source for binary builds Update to version 2.32.3: * ci: update bake-action to v6 * simplification * image can be set to a local ID, that isn't a valid docker ref * can't render progress concurrently with buildkit * exclude one-off container running convergence * Only override service mac if set on the main network. Update to version 2.32.2: * remove engine v25 from e2e test matrix The 1st version available for Ubuntu 24.x is Docker Engine v26 * fix relative path in compose file * bump compose-go to v2.4.7 * replace tibdex/github-app-token by official GitHub create-github-app-token * bump golang.org/x/net to v0.33.0 to fix potential security issue https://github.com/golang/go/issues/70906 * checkExpectedVolumes must ignore anonymous volumes * When retrying to resolveOrCreateNetwork, retry with a valid network name * only check bind mount conflict if sync action is involved * use the 3 latest major versions of the engine to run e2e step * bump Golang version to v1.22.10 and update CI actions * add --pull to run command * CI to validate fmt * `make fmt` so any contributor can enforce formatting * format code with gofumpt Update to version 2.32.1: * e2e test to prevent future regression * only check volume mounts for updated config Update to version 2.32.0: * e2e test for recreate volume * build(deps): bump google.golang.org/grpc from 1.68.0 to 1.68.1 * build(deps): bump golang.org/x/crypto from 0.27.0 to 0.31.0 * build(deps): bump golang.org/x/sys from 0.27.0 to 0.28.0 * prompt user to confirm volume recreation * Recreate container on volume configuration change * introduce watch restart action * bump otel dependencies to v1.28.0 and v0.53.0 to align with buildx, buildkit and engine versions * bump docker/buildx to latest release * fix support for service.mac_address * update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ * build(deps): bump golang.org/x/sync from 0.9.0 to 0.10.0 * Update pkg/e2e/watch_test.go * first watch action for a file event wins * fix * revisit TestDebounceBatching * introduce sync+exec watch action * log configuration error as a watch log event * do not require a build section but for `rebuild` action * pull --quiet should not drop status message, only progress * use latest engine tags * Bump buildx to 0.19.1 * be sure everything has been cleanup at the end of each tests * add local config.json to test configuration dir if exists * disable failing TestBuildSSH test * fix build with bake Update to version 2.31.0: * bump containerd to v1.7,24 * bump google.golang.org/grpc to v1.68.0 * build(deps): bump github.com/moby/buildkit from 0.17.1 to 0.17.2 * build(deps): bump github.com/compose-spec/compose-go/v2 * only stop dependent containers ... if there's some * disable TestNetworkConfigChanged which is unstable on CI * only check attached networks on running containers * fix: commit tests * feat: add commit command * run build tests against bake * delegate build to buildx bake * build(deps): bump github.com/stretchr/testify from 1.9.0 to 1.10.0 * use service.stop to stop dependent containers * Update wait-timeout flag usage to include the unit * go.mod: github.com/docker/cli v27.4.0-rc.2 * go.mod: github.com/docker/docker v27.4.0-rc.2 * go.mod: github.com/docker/cli 8d1bacae3e49 (v27.4.0-rc.2-dev) * go.mod: github.com/docker/cli v27.4.0-rc.1 * go.mod: github.com/docker/docker v27.4.0-rc.1 * Update pkg/compose/convergence.go * detect network config changes and recreate if needed * go.mod: github.com/docker/buildx v0.18.0 * go.mod: github.com/moby/buildkit v0.17.1 * gha: test against docker engine v27.4.0 * push empty descriptor layer when using OCI version 1.1 for Compose artifact it fixes a repository creation issue when pushing the 1st time a Compose OCI artifact on the Hub * remove ddev e2e tests * implement remove-orphans on run * ci: enable testifylint linter * Emit events for building images * Fix compose images that reutn a different image with the same ID * remove obsolete containers first on scale down * pass stal bot inactivity limit from 6 to 3 months * fix(config): Print service names with --no-interpolate * build(deps): bump golang.org/x/sys from 0.26.0 to 0.27.0 * build(deps): bump golang.org/x/sync from 0.8.0 to 0.9.0 Update to version 2.30.3: * bump compose-go v2.4.4 * Avoid starting all services on rebuild Update to version 2.30.2: * remove ArtifactType from Config in OCI v1.1 definition of the artifact * build(deps): bump github.com/compose-spec/compose-go/v2 * Service being declared in a profile must not trigger re-creation * Add profile e2e test case to document in compose * Update `MAINTAINERS` file Update to version 2.30.1: * bump compose-go to version v2.4.2 Update to version 2.30.0: * Improvements * Introduce service hooks by @ndeloof (12166) * Introduce generate command as alpha command by @glours (12209) * Add export command by @jarqvi (12120) * Add support for CDI device request using devices by @ndeloof (12184) * Add support for bind recursive by @ndeloof (12210) * Allow usage of -f flag with OCI Compose artifacts by @glours (12220) * Fixes * Append unix-style relative path when computing container target path by @ndeloof (12145) * Wait for dependent service up to delay set by --wait-timeout by @ndeloof (12156) * Check secret source exists, as bind mount would create target by @ndeloof (12151) * After container restart register printer consumer by @jhrotko (12158) * Fix(down): Fix down command if specified services are not running by @idsulik (12164) * Show watch error message and open DD only when w is pressed by @jhrotko (12165) * Fix(push): Fix unexpected EOF on alpha publish by @idsulik (12169) * Fix(convergence): Serialize access to observed state by @anantadwi13 (12150) * Remove feature flag integration with Docker Desktop for ComposeUI and ComposeNav by @jhrotko (12192) * Support Dockerfile-specific ignore-file with watch by @ndeloof (12193) * Add support for raw env_file format by @ndeloof (12179) * Convert GPUs to DeviceRequests with implicit "gpu" capability by @ndeloof (12197) * Improve error message to include expected network label by @divinity76 (12213) * Don't use progress to render restart, which hides logs by @ndeloof (12226) * One-off containers are not indexed, and must be ignored by exec --index command by @ndeloof (12224) * Don't warn about uid/gid not being supported while ... they are by @ndeloof (12232) * Connect to external networks by name by @ndeloof (12234) * Fix push error message typo by @chris-crone (12237) * Fix(dockerignore): Add wildcard support to dockerignore.go by @idsulik (12239) * Internal * Remove bind options when creating a volume type by @jhrotko (12177) * pass device.options to engine by @ndeloof (12183) * Add security policy by @thaJeztah (12194) * Gha: set default permissions to "contents: read" by @thaJeztah (12195) * Desktop: allow this client to be identified via user-agent by @djs55 (12212) * Compose-go clean volume target to avoid ambiguous comparisons by @ndeloof (12208) * Dependencies * Bump docker v27.3.1 by @ndeloof (12178) * Build(deps): bump golang.org/x/sys from 0.25.0 to 0.26.0 by @dependabot (12189) * Bump compose-go to v2.3.0 by @glours (12198) * Bump compose-go to v2.4.0 by @glours (12231) * Bump compose-go to v2.4.1 by @glours (12243) * Build(deps): bump github.com/containerd/containerd from 1.7.22 to 1.7.23 by @dependabot (12211) * Bump golang minimal version to 1.22 in go.mod by @glours (12246) * Bump go.uber.org/mock to v0.5.0 and google.golang.org/grpc to v1.67.1 by @glours (12245) Update to version 2.29.7: * revert commits link to mount API over bind changes Update to version 2.29.6: * don't set propagation if target engine isn't linux * build(deps): bump github.com/docker/docker v27.3.0-rc.2 * build(deps): bump github.com/docker/cli v27.3.0-rc.2 Update to version 2.29.5: * set propagation default * Remove custom codeql workflow Update to version 2.29.4: * fix import * chore(watch): Add debug log when skipping service without build context * stop dependent containers before recreating diverged service * Fixed possible `nil` pointer dereference * bump github.com/docker/buildx v0.17.1 * build(deps): bump docker, docker/cli to v27.3.0-rc.1 * gha: test against docker engine v27.3.0 Update to version 2.29.3: * show sync files only in debug level * chore(watch): Add changed files path/count to log * build(deps): bump golang.org/x/sync from 0.7.0 to 0.8.0 * bump compose-go to version v2.2.0 * Restore compose v1 behavior to recreate containers when ran with -V * fix linting issues with golangci-lint 1.60.2 * bump golang to version 1.22.7 * bump dependencies versions, engine and cli v27.2.1 containerd v1.7.22 buildx v0.17.0 buildkit v0.16.0 * build(deps): bump golang.org/x/sys from 0.22.0 to 0.25.0 * Fix typos * Use logrus instead of direct output to stderr. * attach: close streams when done * Fix typo in pull.go * Allow combination of bind mounts and 'rebuild' watches * service hash must exlude depends_on * prefer mount API over bind * docs: duplicate documentation for root cmd * docs(wait): Fix wait command description * allow to add empty line in the logs when nav menu activated * upgrade docker versions Update to version 2.29.2: * initial sync files that modified after image creation * initial sync for root directory * Removes redundant condition from toAPIBuildOptions in build.go * docs: Update docker compose kill usage * Fix stop on file chane for sync-restart action * bump engine and cli to v27.1.1, buildx to v0.16.1 * remove all dependabot update PRs for OTel dependencies * gp.mod: github.com/gofrs/flock v0.12.1 * go.mod: golang.org/x/sys v0.22.0 * update to go1.21.12 Update to version 2.29.1: * Enhance JSON progress events with more fields. * bump compose-go v2.1.5 * bump github.com/docker/cli v27.1.0 * bump github.com/docker/docker v27.1.0 * bump github.com/containerd/containerd v1.7.20 * gha: add docker 27.1.0 * fix(containers): fix sorting logic by adding secondary sorting for one-off containers Update to version 2.29.0: * update docs generation to avoid man pages generation * bump compose-go to v2.1.4, buildx to v0.16.0, containerd to v1.7.19 and buildx to v0.15.0 * restore setEnvWithDotEnv * empty env variable with no value must be unset in container * exclude unnecessary resources after services have been selected * change time for stale bot * Remove debug mode and run twice a week * Add stale workflow * update docs * feat(watch): Add --prune option to docker-compose watch command * Remove COMPOSE_MENU env from e2e tests * Use rawjson for the build backend. * Set logging format to JSON. * Format errors as JSON when in JSON progress mode. * Pass 'plain' instead of 'json' to build backend * Add JSON stream progress writer * go.mod: docker/cli, docker/docker v27.0.3 * gha: test against docker v27.0.3 * go.mod: docker/cli, docker/docker v27.0.2 Update to version 2.28.1: * Remove `console.Terminal` check and use `IsTerminal` from `streams.Out` Update to version 2.28.0: * go.mod: github.com/compose-spec/compose-go v2.1.3 * go.mod: docker/docker and docker/cli v27.0.1-rc.1 Update to version 2.27.3: * build(deps): bump github.com/spf13/cobra from 1.8.0 to 1.8.1 * build(deps): bump github.com/docker/buildx from 0.15.0 to 0.15.1 Update to version 2.27.2: * using as flag of the up command, watch was blocking process shutdown This happened when sunsetting the application from docker compose down command * Add open watch docs in up menu * bump buildkit to v0.14.0 and buildx to v0.15.0 * stop watch process when associated up process is stopped * build(deps): bump github.com/docker/docker * build(deps): bump github.com/containerd/containerd from 1.7.17 to 1.7.18 * build(deps): bump golang.org/x/sys from 0.20.0 to 0.21.0 * build(deps): bump github.com/hashicorp/go-version from 1.6.0 to 1.7.0 * build: replace uses of archive.CanonicalTarNameForPath * update gh actions versions, update engine matrix, bump golang to 1.21.11 * enforce keyboard.Close is always executed to restore terminal * config --environment * Readd event * remove unreachable code * Fix dot env file to define COMPOSE_* variables * return an error when --detach and --watch are used together in up command * Correct 'cancellation' typo in comment * Fix: change append to use slice index in ps.go * COMPOSE_PROFILES can be set by .env file * prevent concurrent map write relying on project immutability Update to version 2.27.1: * build(deps): bump github.com/containerd/containerd from 1.7.16 to 1.7.17 * build(deps): bump github.com/docker/buildx from 0.14.0 to 0.14.1 * drop COMPOSE_EXPERIMENTAL_OTEL as docker/cli has opentelemetry in * add gui/composeview as part of available commands * fix opentelemetry * bump compose-go to version v2.1.1 * Set endpoint-specific DriverOpts * Bump compose- go version to latest main * Backport OpenBSD patches * add new navigation menu to open Compose app configuration in Docker Desktop * build(deps): bump github.com/fsnotify/fsevents from 0.1.1 to 0.2.0 * build(deps): bump golang.org/x/sys from 0.19.0 to 0.20.0 * fix --resolve-image-digests * allow a local .env file to override compose.yaml sibling .env * Bump docker engine and cli to version 26.1.3 * Bump docker to v26.1.2 * Add documentation for --menu up option and COMPOSE_MENU environemnt variable * chore(deps): bump docker to v26.1.1 (#11794) Update to version 2.27.0: * fix: overlapping logs and menu navigation (#11765) * build(deps): bump github.com/moby/buildkit * chore(e2e): fix flaky cascade failure test * use v2.26.1 tag for moby and Docker cli * chore(deps): update to Moby v26.1 & buildx v0.14 * bump compose-go version to v2.1.0 * fix support for --context=foo * Fix #11710: Avoid to try to close channel twice after hitting Ctrl-C on compose up (#11719) * fix(desktop): remove overly-aggressive feature flag check (#11748) * chore: fix typo in comment * bump dependencies * fix: do not try to create file shares for non-directories * check container_name is not in use by another service we will create * don't clear line when navigation is disabled * fix: return correct exit code with `--exit-code-from` (#11715) * progress for resource can be restarted after more Working event comes * Revert "Stop the resource timer after last expected event" * Revert change to allow trying to kill again if a kill fails * Handle errors and allow to send multiple kills if one failed * Ignore errors when killing on second Ctrl-C * docker compose up always kills the containers on second Ctrl-C * read COMPOSE_REMOVE_ORPHANS from .env * Set Required false to depends_on containers for compose -p stop/down * Ignore missing containers when compose stop -p * Ignore missing containers when compose down -p * Introduce support for build.entitlements * Remove dead url reference. * e2e test for --all-resources * introduce --all-resources to _not_ exclude resources not used by services * Introduce --abort-on-container-failure * bump golang version to 1.21.9 * don't use ansi espace sequence when disabled Update to version 2.26.1: * Does not start keyboard manager if there is no tty * Change menu information text to dim * Handle --no-build and --watch args * build(deps): bump github.com/opencontainers/image-spec * Unwrap error message. * Include error message in pull warning/errors Update to version 2.26.0: * chore(desktop): revised feature detection for file shares * Add Navigation Menu to compose up * Add support for volume Subpath option * Bump docker v26.0.0 * introduce config --variables to list compose model variables * Fix docs on default build image name * Bump compose-go to v2.0.2 * add support for annotations * Revert "Bump compose-go to v2.0.1" * Bump compose-go to v2.0.1 * feat(desktop): synchronized file share integration (#11614) * feat(experiments): add experimental feature state (#11633) * reduce timeout of the Otel tracing command * fix `compose config --format json` Update to version 2.25.0: * Bump compose-go v2.0.0 * services shell completion bugfix * fix TestBuildPlatformsWithCorrectBuildxConfig * only use ToModel when --no-interpolate is set * feat(desktop): add Docker Desktop detection and client skeleton (#11593) Update to version 2.24.7: * chore(deps): upgrade go to 1.21.8 (#11578) * ci(deps): bump moby/moby & docker/cli to v25.0.4 (#11566) * Add test summary for test jobs in ci * make code simpler * avoid duplicated "xx exited with code 0" message * introduce --watch * move code into small functions for better readability * restore support for `config --no-interpolate` * remove docker cli step in ci.yml * get log to manage `attach` * bump compose-go to version v2.0.0-rc.8 * use an dedicated compose file --quiet-pull e2e test * Add a fallback check of Watch pid on Windows False positives were detected when checking the previous watch process state * add support of QuietOption to create command * pass QuietOption when starting dependencies from run command * when ran with ANSI disabled, force progress=plain * Issue-11374: Modified compose up command to respect COMPOSE_REMOVE_ORPHANS environment variable * ci: bump engine version to `25.0.3` * sort containers to optimize scale down * discard stdout for laaarge log test Update to version 2.24.6: * use listeners to collect include metrics * docs: update cli reference link * docs: unify no trailing dots in docstrings and help (#11301) * Use listener for file metadata * fix deadlock collecting large logs * chore(watch): remove old `docker cp` implementation * ci(deps): bump docker/cli to v25.0.3 (#11481) * pass All option to backend api.Service when length statuses is not equal to zero * Add OTEL specs: build, depends_on, capabilities (gpu/tpu) * build(deps): bump github.com/opencontainers/image-spec * feat(tracing): add project hash attr * chore(load): ensure context passed to load * Include all networks in ContainerCreate call if API >= 1.44 * bump compose-go to v2.0.0-rc.4 * CI: docker engine version matrix * build(deps): bump github.com/docker/cli * Fix load .env from project directory when project file is set by COMPOSE_FILE ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-348=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-compose-2.33.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-47108.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:33 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:33 -0000 Subject: SUSE-SU-2025:20384-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <174973143361.629.3024011739224105677@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20384-1 Release Date: 2025-06-10T11:23:02Z Rating: moderate References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900) * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-32=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-11-rt-6-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-6-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:37 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:37 -0000 Subject: SUSE-SU-2025:20383-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <174973143708.629.17694017993288228791@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20383-1 Release Date: 2025-06-10T11:22:13Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-34=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-3-1.1 * kernel-livepatch-6_4_0-25-rt-3-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:41 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:41 -0000 Subject: SUSE-SU-2025:20382-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <174973144114.629.9051874949109182258@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20382-1 Release Date: 2025-06-10T11:22:04Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-33=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-22-rt-3-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-3-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:47 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:47 -0000 Subject: SUSE-SU-2025:20381-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174973144792.629.11422263873340743343@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20381-1 Release Date: 2025-06-10T11:17:39Z Rating: moderate References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900) * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-31=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-10-rt-debuginfo-6-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-6-1.1 * kernel-livepatch-6_4_0-10-rt-6-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:51 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:51 -0000 Subject: SUSE-SU-2025:20380-1: moderate: Security update for iputils Message-ID: <174973145184.629.12270172472722114430@smelt2.prg2.suse.org> # Security update for iputils Announcement ID: SUSE-SU-2025:20380-1 Release Date: 2025-06-08T13:25:41Z Rating: moderate References: * bsc#1242300 Cross-References: * CVE-2025-47268 CVSS scores: * CVE-2025-47268 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-47268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-47268 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for iputils fixes the following issues: * CVE-2025-47268: Fixed integer overflow in RTT calculation leading to undefined behavior (bsc#1242300) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-346=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * iputils-debuginfo-20221126-4.1 * iputils-20221126-4.1 * iputils-debugsource-20221126-4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47268.html * https://bugzilla.suse.com/show_bug.cgi?id=1242300 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:30:56 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:30:56 -0000 Subject: SUSE-SU-2025:20379-1: moderate: Security update for open-vm-tools Message-ID: <174973145640.629.9382966825516725642@smelt2.prg2.suse.org> # Security update for open-vm-tools Announcement ID: SUSE-SU-2025:20379-1 Release Date: 2025-06-08T13:23:03Z Rating: moderate References: * bsc#1237147 * bsc#1241938 * bsc#1243106 Cross-References: * CVE-2025-22247 CVSS scores: * CVE-2025-22247 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-22247 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N * CVE-2025-22247 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Updated to 12.5.2: * CVE-2025-22247: Fixed insecure file handling (bsc#1243106) * Fixed gcc15 compile time error (bsc#1241938) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-345=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * libvmtools0-debuginfo-12.5.2-1.1 * open-vm-tools-debuginfo-12.5.2-1.1 * open-vm-tools-12.5.2-1.1 * libvmtools0-12.5.2-1.1 * open-vm-tools-debugsource-12.5.2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22247.html * https://bugzilla.suse.com/show_bug.cgi?id=1237147 * https://bugzilla.suse.com/show_bug.cgi?id=1241938 * https://bugzilla.suse.com/show_bug.cgi?id=1243106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:31:00 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:31:00 -0000 Subject: SUSE-RU-2025:20378-1: moderate: Recommended update for cloud-netconfig Message-ID: <174973146066.629.16520482715002591644@smelt2.prg2.suse.org> # Recommended update for cloud-netconfig Announcement ID: SUSE-RU-2025:20378-1 Release Date: 2025-06-05T12:18:24Z Rating: moderate References: * bsc#1221757 * bsc#1240869 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for cloud-netconfig fixes the following issues: Update to version 1.15 * Add support for creating IPv6 default route in GCE (bsc#1240869) * Minor fix when looking up IPv6 default route Update to version 1.14 * Use '-s' instead of '\--no-progress-meter' for curl (bsc#1221757) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-343=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * cloud-netconfig-ec2-1.15-1.1 * cloud-netconfig-azure-1.15-1.1 * cloud-netconfig-gce-1.15-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221757 * https://bugzilla.suse.com/show_bug.cgi?id=1240869 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:31:02 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:31:02 -0000 Subject: SUSE-SU-2025:20377-1: moderate: Security update for docker Message-ID: <174973146257.629.18203746703521445453@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20377-1 Release Date: 2025-06-05T08:24:57Z Rating: moderate References: * bsc#1244035 Cross-References: * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for docker fixes the following issues: Always clear SUSEConnect suse_* secrets when starting containers regardless of whether the daemon was built with SUSEConnect support. Not doing this causes containers from SUSEConnect-enabled daemons to fail to start when running with SUSEConnect-disabled (i.e. upstream) daemons. (bsc#1244035) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-342=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * docker-debuginfo-27.5.1_ce-3.1 * docker-27.5.1_ce-3.1 * docker-buildx-0.22.0-3.1 * docker-buildx-debuginfo-0.22.0-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1244035 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:31:07 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:31:07 -0000 Subject: SUSE-RU-2025:20376-1: moderate: Recommended update for pcr-oracle Message-ID: <174973146708.629.7236088863573867300@smelt2.prg2.suse.org> # Recommended update for pcr-oracle Announcement ID: SUSE-RU-2025:20376-1 Release Date: 2025-05-30T14:55:20Z Rating: moderate References: * bsc#1241957 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for pcr-oracle fixes the following issues: * Fix the strcmp statement for the alternative event (bsc#1241957) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-341=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * pcr-oracle-debuginfo-0.4.6-5.1 * pcr-oracle-0.4.6-5.1 * pcr-oracle-debugsource-0.4.6-5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241957 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 12:31:20 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 12:31:20 -0000 Subject: SUSE-SU-2025:20375-1: important: Security update for libsoup Message-ID: <174973148060.629.17432633474719646544@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20375-1 Release Date: 2025-05-29T09:18:30Z Rating: important References: * bsc#1240750 * bsc#1240752 * bsc#1240754 * bsc#1240756 * bsc#1240757 * bsc#1241162 * bsc#1241164 * bsc#1241214 * bsc#1241222 * bsc#1241223 * bsc#1241226 * bsc#1241238 * bsc#1241252 * bsc#1241263 * bsc#1241686 * bsc#1241688 Cross-References: * CVE-2025-2784 * CVE-2025-32050 * CVE-2025-32051 * CVE-2025-32052 * CVE-2025-32053 * CVE-2025-32906 * CVE-2025-32907 * CVE-2025-32908 * CVE-2025-32909 * CVE-2025-32910 * CVE-2025-32911 * CVE-2025-32912 * CVE-2025-32913 * CVE-2025-32914 * CVE-2025-46420 * CVE-2025-46421 CVSS scores: * CVE-2025-2784 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-2784 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-2784 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32050 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32050 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32050 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32051 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32051 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32051 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32052 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32052 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32052 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32053 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32053 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32053 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-32906 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-32906 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32907 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32907 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32907 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32908 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32908 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32908 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32909 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-32909 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-32909 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32910 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32910 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32910 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32911 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32911 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-32912 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32912 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-32913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32914 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-32914 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46420 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46420 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-46420 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-46421 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46421 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves 16 vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-2784: Fixed Heap buffer over-read in `skip_insignificant_space` when sniffing content (bsc#1240750) * CVE-2025-32050: Fixed Integer overflow in append_param_quoted (bsc#1240752) * CVE-2025-32051: Fixed Segmentation fault when parsing malformed data URI (bsc#1240754) * CVE-2025-32052: Fixed Heap buffer overflow in sniff_unknown() (bsc#1240756) * CVE-2025-32053: Fixed Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757) * CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) * CVE-2025-32914: Fixed out of bounds read in `soup_multipart_new_from_message()` (bsc#1241164) * CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) * CVE-2025-32907: Fixed xcessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222) * CVE-2025-32906: Fixed Out of bounds reads in soup_headers_parse_request() (bsc#1241263) * CVE-2025-32908: Fixed HTTP request may lead to server crash due to HTTP/2 server not fully validating the values of pseudo-headers (bsc#1241223) * CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) * CVE-2025-32911: Fixed Double free on soup_message_headers_get_content_disposition() via "params" (bsc#1241238) * CVE-2025-32910: Fixed null pointer deference on client when server omits the 'realm' parameter in an Unauthorized response with Digest authentication (bsc#1241252) * CVE-2025-46420: Fixed Memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686) * CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-340=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.2-6.1 * libsoup-3_0-0-3.4.2-6.1 * libsoup-debugsource-3.4.2-6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2784.html * https://www.suse.com/security/cve/CVE-2025-32050.html * https://www.suse.com/security/cve/CVE-2025-32051.html * https://www.suse.com/security/cve/CVE-2025-32052.html * https://www.suse.com/security/cve/CVE-2025-32053.html * https://www.suse.com/security/cve/CVE-2025-32906.html * https://www.suse.com/security/cve/CVE-2025-32907.html * https://www.suse.com/security/cve/CVE-2025-32908.html * https://www.suse.com/security/cve/CVE-2025-32909.html * https://www.suse.com/security/cve/CVE-2025-32910.html * https://www.suse.com/security/cve/CVE-2025-32911.html * https://www.suse.com/security/cve/CVE-2025-32912.html * https://www.suse.com/security/cve/CVE-2025-32913.html * https://www.suse.com/security/cve/CVE-2025-32914.html * https://www.suse.com/security/cve/CVE-2025-46420.html * https://www.suse.com/security/cve/CVE-2025-46421.html * https://bugzilla.suse.com/show_bug.cgi?id=1240750 * https://bugzilla.suse.com/show_bug.cgi?id=1240752 * https://bugzilla.suse.com/show_bug.cgi?id=1240754 * https://bugzilla.suse.com/show_bug.cgi?id=1240756 * https://bugzilla.suse.com/show_bug.cgi?id=1240757 * https://bugzilla.suse.com/show_bug.cgi?id=1241162 * https://bugzilla.suse.com/show_bug.cgi?id=1241164 * https://bugzilla.suse.com/show_bug.cgi?id=1241214 * https://bugzilla.suse.com/show_bug.cgi?id=1241222 * https://bugzilla.suse.com/show_bug.cgi?id=1241223 * https://bugzilla.suse.com/show_bug.cgi?id=1241226 * https://bugzilla.suse.com/show_bug.cgi?id=1241238 * https://bugzilla.suse.com/show_bug.cgi?id=1241252 * https://bugzilla.suse.com/show_bug.cgi?id=1241263 * https://bugzilla.suse.com/show_bug.cgi?id=1241686 * https://bugzilla.suse.com/show_bug.cgi?id=1241688 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 16:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 16:30:05 -0000 Subject: SUSE-SU-2025:01927-1: important: Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) Message-ID: <174974580515.655.1419402281398249546@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01927-1 Release Date: 2025-06-12T15:33:34Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_150 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1927=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1927=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_150-default-2-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-2-150400.2.2 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-2-150400.2.2 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_150-default-2-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-2-150400.2.2 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-2-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 16:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 16:30:07 -0000 Subject: SUSE-SU-2025:01596-2: moderate: Security update for helm Message-ID: <174974580766.655.7124653740036306984@smelt2.prg2.suse.org> # Security update for helm Announcement ID: SUSE-SU-2025:01596-2 Release Date: 2025-06-12T14:50:36Z Rating: moderate References: Affected Products: * Containers Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that can now be installed. ## Description: This update for helm fixes the following issues: help was updated to version 3.17.3: Helm v3.17.3 is a security (patch) release. Users are strongly recommended to update to this release. * Changelog * Unarchiving fix e4da497 (Matt Farina) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-1596=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1596=1 ## Package List: * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * helm-debuginfo-3.17.3-150000.1.47.1 * helm-3.17.3-150000.1.47.1 * Containers Module 15-SP7 (noarch) * helm-zsh-completion-3.17.3-150000.1.47.1 * helm-bash-completion-3.17.3-150000.1.47.1 * SUSE Package Hub 15 15-SP7 (noarch) * helm-fish-completion-3.17.3-150000.1.47.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 16:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 16:30:12 -0000 Subject: SUSE-SU-2025:01559-1: moderate: Security update for audiofile Message-ID: <174974581292.655.17542312106433048834@smelt2.prg2.suse.org> # Security update for audiofile Announcement ID: SUSE-SU-2025:01559-1 Release Date: 2025-06-12T14:50:19Z Rating: moderate References: * bsc#1140031 * bsc#1196487 Cross-References: * CVE-2019-13147 * CVE-2022-24599 CVSS scores: * CVE-2019-13147 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-13147 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-13147 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2022-24599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2022-24599 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for audiofile fixes the following issues: * CVE-2019-13147: Fixed NULL pointer dereference in ulaw2linear_buf that could lead to DOS (bsc#1140031). * CVE-2022-24599: unverified user input when processing audio files can lead to information leak (bsc#1196487). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1559=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * audiofile-devel-0.3.6-150000.3.12.1 * audiofile-debugsource-0.3.6-150000.3.12.1 * libaudiofile1-debuginfo-0.3.6-150000.3.12.1 * libaudiofile1-0.3.6-150000.3.12.1 * audiofile-debuginfo-0.3.6-150000.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2019-13147.html * https://www.suse.com/security/cve/CVE-2022-24599.html * https://bugzilla.suse.com/show_bug.cgi?id=1140031 * https://bugzilla.suse.com/show_bug.cgi?id=1196487 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 16:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 16:30:16 -0000 Subject: SUSE-SU-2025:01748-2: moderate: Security update for postgresql15 Message-ID: <174974581659.655.3534838508524112722@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2025:01748-2 Release Date: 2025-06-12T14:50:09Z Rating: moderate References: * bsc#1242931 Cross-References: * CVE-2025-4207 CVSS scores: * CVE-2025-4207 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4207 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Legacy Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql15 fixes the following issues: Upgrade to 15.13: * CVE-2025-4207: Fixed PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation (bsc#1242931) Changelog: https://www.postgresql.org/docs/release/15.13/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1748=1 ## Package List: * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql15-15.13-150600.16.17.1 * postgresql15-debugsource-15.13-150600.16.17.1 * postgresql15-contrib-15.13-150600.16.17.1 * postgresql15-devel-debuginfo-15.13-150600.16.17.1 * postgresql15-server-15.13-150600.16.17.1 * postgresql15-devel-15.13-150600.16.17.1 * postgresql15-server-debuginfo-15.13-150600.16.17.1 * postgresql15-debuginfo-15.13-150600.16.17.1 * postgresql15-contrib-debuginfo-15.13-150600.16.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4207.html * https://bugzilla.suse.com/show_bug.cgi?id=1242931 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 20:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 20:30:08 -0000 Subject: SUSE-SU-2025:01930-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) Message-ID: <174976020858.629.16443354062826242125@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01930-1 Release Date: 2025-06-12T19:33:35Z Rating: important References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_22 fixes several issues. The following security issues were fixed: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1931=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1930=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1930=1 SUSE-2025-1931=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_17-default-15-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-15-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-11-150600.2.2 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-11-150600.2.2 * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_22-default-11-150600.2.2 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_3-debugsource-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_17-default-15-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-11-150600.2.2 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-11-150600.2.2 * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_22-default-11-150600.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 20:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 20:30:12 -0000 Subject: SUSE-SU-2025:01929-1: important: Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) Message-ID: <174976021225.629.8910223616865087583@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01929-1 Release Date: 2025-06-12T18:33:35Z Rating: important References: * bsc#1239077 Cross-References: * CVE-2024-57996 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_153 fixes one issue. The following security issue was fixed: * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1929=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1929=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_37-debugsource-2-150400.2.2 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-2-150400.2.2 * kernel-livepatch-5_14_21-150400_24_153-default-2-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_37-debugsource-2-150400.2.2 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-2-150400.2.2 * kernel-livepatch-5_14_21-150400_24_153-default-2-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 12 20:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 12 Jun 2025 20:30:15 -0000 Subject: SUSE-SU-2025:01928-1: important: Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) Message-ID: <174976021546.629.3348499372065896621@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01928-1 Release Date: 2025-06-12T17:03:54Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_136 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1928=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1928=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-9-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-9-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-9-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-9-150400.2.2 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-9-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 08:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 08:30:10 -0000 Subject: SUSE-SU-2025:01935-1: important: Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) Message-ID: <174980341016.11966.14418991454171990361@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01935-1 Release Date: 2025-06-12T23:00:05Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_141 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1935=1 SUSE-2025-1936=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1935=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-1936=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-8-150400.2.2 * kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2 * kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-8-150400.2.2 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-16-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-16-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-8-150400.2.2 * kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2 * kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-8-150400.2.2 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-16-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-16-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 08:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 08:30:16 -0000 Subject: SUSE-SU-2025:01932-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) Message-ID: <174980341623.11966.16059076041780670498@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01932-1 Release Date: 2025-06-13T03:33:55Z Rating: important References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_25 fixes several issues. The following security issues were fixed: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900). * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1934=1 SUSE-2025-1932=1 SUSE-2025-1933=1 SUSE-2025-1937=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1937=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1934=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1932=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1933=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_2-debugsource-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-15-150600.2.2 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-17-150600.4.43.2 * kernel-livepatch-6_4_0-150600_23_7-default-15-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_5-debugsource-10-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_0-debugsource-17-150600.4.43.2 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-10-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_1-debugsource-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_25-default-10-150600.2.2 * kernel-livepatch-6_4_0-150600_23_14-default-15-150600.2.2 * kernel-livepatch-6_4_0-150600_21-default-17-150600.4.43.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_2-debugsource-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-15-150600.2.2 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-17-150600.4.43.2 * kernel-livepatch-6_4_0-150600_23_7-default-15-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_5-debugsource-10-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_0-debugsource-17-150600.4.43.2 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-10-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_1-debugsource-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-15-150600.2.2 * kernel-livepatch-6_4_0-150600_23_25-default-10-150600.2.2 * kernel-livepatch-6_4_0-150600_23_14-default-15-150600.2.2 * kernel-livepatch-6_4_0-150600_21-default-17-150600.4.43.2 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 08:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 08:30:19 -0000 Subject: SUSE-SU-2025:01941-1: moderate: Security update for kubernetes1.24 Message-ID: <174980341974.11966.3223149942487781433@smelt2.prg2.suse.org> # Security update for kubernetes1.24 Announcement ID: SUSE-SU-2025:01941-1 Release Date: 2025-06-13T07:20:59Z Rating: moderate References: * bsc#1241865 Cross-References: * CVE-2025-22872 CVSS scores: * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for kubernetes1.24 fixes the following issues: * CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1941=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1941=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kubernetes1.24-kubeadm-1.24.17-150500.3.28.1 * kubernetes1.24-client-1.24.17-150500.3.28.1 * kubernetes1.24-controller-manager-1.24.17-150500.3.28.1 * kubernetes1.24-kubelet-1.24.17-150500.3.28.1 * kubernetes1.24-scheduler-1.24.17-150500.3.28.1 * kubernetes1.24-proxy-1.24.17-150500.3.28.1 * kubernetes1.24-apiserver-1.24.17-150500.3.28.1 * kubernetes1.24-client-common-1.24.17-150500.3.28.1 * kubernetes1.24-kubelet-common-1.24.17-150500.3.28.1 * openSUSE Leap 15.5 (noarch) * kubernetes1.24-client-bash-completion-1.24.17-150500.3.28.1 * kubernetes1.24-client-fish-completion-1.24.17-150500.3.28.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.24-kubeadm-1.24.17-150500.3.28.1 * kubernetes1.24-client-1.24.17-150500.3.28.1 * kubernetes1.24-controller-manager-1.24.17-150500.3.28.1 * kubernetes1.24-kubelet-1.24.17-150500.3.28.1 * kubernetes1.24-scheduler-1.24.17-150500.3.28.1 * kubernetes1.24-proxy-1.24.17-150500.3.28.1 * kubernetes1.24-apiserver-1.24.17-150500.3.28.1 * kubernetes1.24-client-common-1.24.17-150500.3.28.1 * kubernetes1.24-kubelet-common-1.24.17-150500.3.28.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.24-client-bash-completion-1.24.17-150500.3.28.1 * kubernetes1.24-client-fish-completion-1.24.17-150500.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22872.html * https://bugzilla.suse.com/show_bug.cgi?id=1241865 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 08:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 08:30:23 -0000 Subject: SUSE-SU-2025:01940-1: moderate: Security update for kubernetes1.23 Message-ID: <174980342370.11966.8547729571549321493@smelt2.prg2.suse.org> # Security update for kubernetes1.23 Announcement ID: SUSE-SU-2025:01940-1 Release Date: 2025-06-13T07:20:49Z Rating: moderate References: * bsc#1241865 Cross-References: * CVE-2025-22872 CVSS scores: * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for kubernetes1.23 fixes the following issues: * CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1940=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1940=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.23-apiserver-1.23.17-150500.3.21.1 * kubernetes1.23-client-1.23.17-150500.3.21.1 * kubernetes1.23-client-common-1.23.17-150500.3.21.1 * kubernetes1.23-kubeadm-1.23.17-150500.3.21.1 * kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1 * kubernetes1.23-scheduler-1.23.17-150500.3.21.1 * kubernetes1.23-kubelet-1.23.17-150500.3.21.1 * kubernetes1.23-proxy-1.23.17-150500.3.21.1 * kubernetes1.23-controller-manager-1.23.17-150500.3.21.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.23-client-bash-completion-1.23.17-150500.3.21.1 * kubernetes1.23-client-fish-completion-1.23.17-150500.3.21.1 * openSUSE Leap 15.6 (ppc64le) * kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-client-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.21.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kubernetes1.23-apiserver-1.23.17-150500.3.21.1 * kubernetes1.23-client-1.23.17-150500.3.21.1 * kubernetes1.23-client-common-1.23.17-150500.3.21.1 * kubernetes1.23-kubeadm-1.23.17-150500.3.21.1 * kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1 * kubernetes1.23-scheduler-1.23.17-150500.3.21.1 * kubernetes1.23-kubelet-1.23.17-150500.3.21.1 * kubernetes1.23-proxy-1.23.17-150500.3.21.1 * kubernetes1.23-controller-manager-1.23.17-150500.3.21.1 * openSUSE Leap 15.5 (noarch) * kubernetes1.23-client-bash-completion-1.23.17-150500.3.21.1 * kubernetes1.23-client-fish-completion-1.23.17-150500.3.21.1 * openSUSE Leap 15.5 (ppc64le) * kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-client-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.21.1 * kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22872.html * https://bugzilla.suse.com/show_bug.cgi?id=1241865 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 08:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 08:30:26 -0000 Subject: SUSE-SU-2025:01939-1: important: Security update for libcryptopp Message-ID: <174980342635.11966.13538332516976182545@smelt2.prg2.suse.org> # Security update for libcryptopp Announcement ID: SUSE-SU-2025:01939-1 Release Date: 2025-06-13T07:20:37Z Rating: important References: * bsc#1224280 Cross-References: * CVE-2024-28285 CVSS scores: * CVE-2024-28285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for libcryptopp fixes the following issues: * CVE-2024-28285: Fixed potential leak of secret key of ElGamal encryption via fault injection (bsc#bsc#1224280). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1939=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1939=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1939=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1939=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libcryptopp-debugsource-5.6.5-150000.1.15.1 * libcryptopp5_6_5-5.6.5-150000.1.15.1 * libcryptopp5_6_5-debuginfo-5.6.5-150000.1.15.1 * libcryptopp-devel-5.6.5-150000.1.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libcryptopp-debugsource-5.6.5-150000.1.15.1 * libcryptopp5_6_5-5.6.5-150000.1.15.1 * libcryptopp5_6_5-debuginfo-5.6.5-150000.1.15.1 * libcryptopp-devel-5.6.5-150000.1.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libcryptopp-debugsource-5.6.5-150000.1.15.1 * libcryptopp5_6_5-5.6.5-150000.1.15.1 * libcryptopp5_6_5-debuginfo-5.6.5-150000.1.15.1 * libcryptopp-devel-5.6.5-150000.1.15.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libcryptopp-debugsource-5.6.5-150000.1.15.1 * libcryptopp5_6_5-5.6.5-150000.1.15.1 * libcryptopp5_6_5-debuginfo-5.6.5-150000.1.15.1 * libcryptopp-devel-5.6.5-150000.1.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28285.html * https://bugzilla.suse.com/show_bug.cgi?id=1224280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 08:30:27 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 08:30:27 -0000 Subject: SUSE-RU-2025:01938-1: moderate: Recommended update for apache-commons-text Message-ID: <174980342763.11966.10730319838300265833@smelt2.prg2.suse.org> # Recommended update for apache-commons-text Announcement ID: SUSE-RU-2025:01938-1 Release Date: 2025-06-13T04:01:35Z Rating: moderate References: Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that can now be installed. ## Description: This update for apache-commons-text fixes the following issues: * Deliver apache-commons-text to openSUSE Leap 15.6 from SLES (no source changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1938=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1938=1 ## Package List: * openSUSE Leap 15.6 (noarch) * apache-commons-text-javadoc-1.10.0-150200.5.11.1 * apache-commons-text-1.10.0-150200.5.11.1 * Development Tools Module 15-SP6 (noarch) * apache-commons-text-1.10.0-150200.5.11.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:10 -0000 Subject: SUSE-SU-2025:01944-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) Message-ID: <174981781017.655.12177166937590288740@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01944-1 Release Date: 2025-06-13T10:04:02Z Rating: important References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_30 fixes several issues. The following security issues were fixed: * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1944=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1944=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-6-150600.2.2 * kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-6-150600.2.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-6-150600.2.2 * kernel-livepatch-6_4_0-150600_23_30-default-6-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-6-150600.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:12 -0000 Subject: SUSE-RU-2025:01730-2: moderate: Recommended update for lifecycle-data-sle-module-python3 Message-ID: <174981781200.655.3940462181493050933@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-python3 Announcement ID: SUSE-RU-2025:01730-2 Release Date: 2025-06-13T10:19:30Z Rating: moderate References: * jsc#PED-12726 Affected Products: * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for lifecycle-data-sle-module-python3 fixes the following issues: * document python312 and python313 lifecycle (jsc#PED-12726) * extend python311 lifecycle (jsc#PED-12726) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-1730=1 ## Package List: * Python 3 Module 15-SP7 (noarch) * lifecycle-data-sle-module-python3-1-150400.9.6.1 ## References: * https://jira.suse.com/browse/PED-12726 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:13 -0000 Subject: SUSE-RU-2025:01947-1: moderate: Recommended update for kubernetes client Message-ID: <174981781330.655.16748715963071473355@smelt2.prg2.suse.org> # Recommended update for kubernetes client Announcement ID: SUSE-RU-2025:01947-1 Release Date: 2025-06-13T10:17:40Z Rating: moderate References: * jsc#PED-11106 Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for kubernetes fixes the following issues: kubernetes client version 1.33.1,(jsc#PED-11106) * Find full changelog ? https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.33.md#v1331 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1947=1 openSUSE-SLE-15.6-2025-1947=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1947=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-1947=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-apiserver-1.33.1-150600.13.10.1 * kubernetes1.33-controller-manager-1.33.1-150600.13.10.1 * kubernetes1.33-kubelet-1.33.1-150600.13.10.1 * kubernetes1.33-kubelet-common-1.33.1-150600.13.10.1 * kubernetes1.33-proxy-1.33.1-150600.13.10.1 * kubernetes1.33-scheduler-1.33.1-150600.13.10.1 * kubernetes1.33-kubeadm-1.33.1-150600.13.10.1 * kubernetes1.33-client-common-1.33.1-150600.13.10.1 * kubernetes1.33-client-1.33.1-150600.13.10.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.33-client-fish-completion-1.33.1-150600.13.10.1 * kubernetes1.33-client-bash-completion-1.33.1-150600.13.10.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-client-1.33.1-150600.13.10.1 * kubernetes1.33-client-common-1.33.1-150600.13.10.1 * Containers Module 15-SP6 (noarch) * kubernetes1.33-client-bash-completion-1.33.1-150600.13.10.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-client-1.33.1-150600.13.10.1 * kubernetes1.33-client-common-1.33.1-150600.13.10.1 * Containers Module 15-SP7 (noarch) * kubernetes1.33-client-bash-completion-1.33.1-150600.13.10.1 ## References: * https://jira.suse.com/browse/PED-11106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:15 -0000 Subject: SUSE-SU-2025:01946-1: important: Security update for MozillaThunderbird Message-ID: <174981781560.655.15888017767324163582@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2025:01946-1 Release Date: 2025-06-13T10:17:13Z Rating: important References: * bsc#1243353 Cross-References: * CVE-2025-5262 * CVE-2025-5263 * CVE-2025-5264 * CVE-2025-5265 * CVE-2025-5266 * CVE-2025-5267 * CVE-2025-5268 * CVE-2025-5269 CVSS scores: * CVE-2025-5262 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-5263 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5263 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-5264 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5264 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5265 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5265 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-5266 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5266 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5267 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-5267 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-5268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5268 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5269 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-5269 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 128.11 (MFSA 2025-46, bsc#1243353): * CVE-2025-5262: Double-free in libvpx encoder (bmo#1962421) * CVE-2025-5263: Error handling for script execution was incorrectly isolated from web content (bmo#1960745) * CVE-2025-5264: Potential local code execution in "Copy as cURL" command (bmo#1950001) * CVE-2025-5265: Potential local code execution in "Copy as cURL" command (bmo#1962301) * CVE-2025-5266: Script element events leaked cross-origin resource status (bmo#1965628) * CVE-2025-5267: Clickjacking vulnerability could have led to leaking saved payment card details (bmo#1954137) * CVE-2025-5268: Memory safety bugs fixed in Firefox 139, Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11 (bmo#1950136, bmo#1958121, bmo#1960499, bmo#1962634) * CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird 128.11 (bmo#1924108) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1946=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1946=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1946=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1946=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1946=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-128.11.0-150200.8.221.1 * MozillaThunderbird-translations-other-128.11.0-150200.8.221.1 * MozillaThunderbird-debugsource-128.11.0-150200.8.221.1 * MozillaThunderbird-128.11.0-150200.8.221.1 * MozillaThunderbird-debuginfo-128.11.0-150200.8.221.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-translations-common-128.11.0-150200.8.221.1 * MozillaThunderbird-translations-other-128.11.0-150200.8.221.1 * MozillaThunderbird-debugsource-128.11.0-150200.8.221.1 * MozillaThunderbird-128.11.0-150200.8.221.1 * MozillaThunderbird-debuginfo-128.11.0-150200.8.221.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * MozillaThunderbird-translations-common-128.11.0-150200.8.221.1 * MozillaThunderbird-translations-other-128.11.0-150200.8.221.1 * MozillaThunderbird-debugsource-128.11.0-150200.8.221.1 * MozillaThunderbird-128.11.0-150200.8.221.1 * MozillaThunderbird-debuginfo-128.11.0-150200.8.221.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-common-128.11.0-150200.8.221.1 * MozillaThunderbird-translations-other-128.11.0-150200.8.221.1 * MozillaThunderbird-debugsource-128.11.0-150200.8.221.1 * MozillaThunderbird-128.11.0-150200.8.221.1 * MozillaThunderbird-debuginfo-128.11.0-150200.8.221.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-128.11.0-150200.8.221.1 * MozillaThunderbird-translations-other-128.11.0-150200.8.221.1 * MozillaThunderbird-debugsource-128.11.0-150200.8.221.1 * MozillaThunderbird-128.11.0-150200.8.221.1 * MozillaThunderbird-debuginfo-128.11.0-150200.8.221.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5262.html * https://www.suse.com/security/cve/CVE-2025-5263.html * https://www.suse.com/security/cve/CVE-2025-5264.html * https://www.suse.com/security/cve/CVE-2025-5265.html * https://www.suse.com/security/cve/CVE-2025-5266.html * https://www.suse.com/security/cve/CVE-2025-5267.html * https://www.suse.com/security/cve/CVE-2025-5268.html * https://www.suse.com/security/cve/CVE-2025-5269.html * https://bugzilla.suse.com/show_bug.cgi?id=1243353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:18 -0000 Subject: SUSE-SU-2025:01945-1: moderate: Security update for kubernetes-old Message-ID: <174981781821.655.16792871098783607603@smelt2.prg2.suse.org> # Security update for kubernetes-old Announcement ID: SUSE-SU-2025:01945-1 Release Date: 2025-06-13T10:16:42Z Rating: moderate References: * bsc#1241781 * jsc#PED-11105 Cross-References: * CVE-2025-22872 CVSS scores: * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for kubernetes-old fixes the following issues: * CVE-2025-22872: Fixed golang.org/x/net/html: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241781) This update to version 1.31.9 (jsc#PED-11105) * Find full changelog https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.31.md#v1319 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1945=1 openSUSE-SLE-15.6-2025-1945=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1945=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-1945=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.31-scheduler-1.31.9-150600.13.10.1 * kubernetes1.31-kubelet-common-1.31.9-150600.13.10.1 * kubernetes1.31-controller-manager-1.31.9-150600.13.10.1 * kubernetes1.31-apiserver-1.31.9-150600.13.10.1 * kubernetes1.31-proxy-1.31.9-150600.13.10.1 * kubernetes1.31-client-1.31.9-150600.13.10.1 * kubernetes1.31-kubeadm-1.31.9-150600.13.10.1 * kubernetes1.31-client-common-1.31.9-150600.13.10.1 * kubernetes1.31-kubelet-1.31.9-150600.13.10.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.31-client-fish-completion-1.31.9-150600.13.10.1 * kubernetes1.31-client-bash-completion-1.31.9-150600.13.10.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kubernetes1.31-client-common-1.31.9-150600.13.10.1 * kubernetes1.31-client-1.31.9-150600.13.10.1 * Containers Module 15-SP6 (noarch) * kubernetes1.31-client-bash-completion-1.31.9-150600.13.10.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.31-client-common-1.31.9-150600.13.10.1 * kubernetes1.31-client-1.31.9-150600.13.10.1 * Containers Module 15-SP7 (noarch) * kubernetes1.31-client-bash-completion-1.31.9-150600.13.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22872.html * https://bugzilla.suse.com/show_bug.cgi?id=1241781 * https://jira.suse.com/browse/PED-11105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:21 -0000 Subject: SUSE-RU-2025:01943-1: moderate: Recommended update for container-suseconnect Message-ID: <174981782119.655.17203624203800138323@smelt2.prg2.suse.org> # Recommended update for container-suseconnect Announcement ID: SUSE-RU-2025:01943-1 Release Date: 2025-06-13T08:34:04Z Rating: moderate References: * bsc#1243960 Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for container-suseconnect fixes the following issues: * Fix the issue with retrieving the repository index file for service 'container-suseconnect-zypp' (bsc#1243960) * Switch to sha256 from md5 * use go's native fips module on tumbleweed ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1943=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-1943=1 ## Package List: * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.4-150000.4.64.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.5.4-150000.4.64.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243960 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 12:30:29 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 12:30:29 -0000 Subject: SUSE-SU-2025:01942-1: important: Security update for valkey Message-ID: <174981782958.655.12029898203658066187@smelt2.prg2.suse.org> # Security update for valkey Announcement ID: SUSE-SU-2025:01942-1 Release Date: 2025-06-13T08:33:49Z Rating: important References: * bsc#1241708 * bsc#1243061 * bsc#1243804 * bsc#1243913 Cross-References: * CVE-2025-21605 * CVE-2025-27151 * CVE-2025-49112 CVSS scores: * CVE-2025-21605 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21605 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21605 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27151 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-27151 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49112 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-49112 ( SUSE ): 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-49112 ( NVD ): 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for valkey fixes the following issues: * CVE-2025-27151: Absence of filename size check may cause a stack overflow (bsc#1243804) * CVE-2025-49112: setDeferredReply integer underflow (bsc#1243913) * CVE-2025-21605: Output buffer denial of service (bsc#1241708) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1942=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * valkey-devel-8.0.2-150700.3.5.1 * valkey-debugsource-8.0.2-150700.3.5.1 * valkey-debuginfo-8.0.2-150700.3.5.1 * valkey-8.0.2-150700.3.5.1 * Server Applications Module 15-SP7 (noarch) * valkey-compat-redis-8.0.2-150700.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21605.html * https://www.suse.com/security/cve/CVE-2025-27151.html * https://www.suse.com/security/cve/CVE-2025-49112.html * https://bugzilla.suse.com/show_bug.cgi?id=1241708 * https://bugzilla.suse.com/show_bug.cgi?id=1243061 * https://bugzilla.suse.com/show_bug.cgi?id=1243804 * https://bugzilla.suse.com/show_bug.cgi?id=1243913 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:09 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:09 -0000 Subject: SUSE-SU-2025:01951-1: important: Security update for the Linux Kernel Message-ID: <174983256902.10074.16159385834399619813@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01951-1 Release Date: 2025-06-13T13:54:50Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1220419 * bsc#1222649 * bsc#1222656 * bsc#1223096 * bsc#1223809 * bsc#1224013 * bsc#1224489 * bsc#1224597 * bsc#1224757 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228659 * bsc#1229311 * bsc#1230497 * bsc#1230581 * bsc#1230764 * bsc#1230769 * bsc#1231016 * bsc#1231103 * bsc#1231293 * bsc#1231910 * bsc#1232364 * bsc#1232389 * bsc#1232493 * bsc#1232649 * bsc#1232848 * bsc#1232882 * bsc#1232895 * bsc#1233060 * bsc#1233192 * bsc#1233479 * bsc#1233551 * bsc#1233557 * bsc#1234074 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234936 * bsc#1235149 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235526 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235621 * bsc#1235637 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235870 * bsc#1235973 * bsc#1236086 * bsc#1236111 * bsc#1236142 * bsc#1236206 * bsc#1236208 * bsc#1236333 * bsc#1236394 * bsc#1236704 * bsc#1237111 * bsc#1237164 * bsc#1237312 * bsc#1237313 * bsc#1237530 * bsc#1237545 * bsc#1237546 * bsc#1237704 * bsc#1237757 * bsc#1237874 * bsc#1237875 * bsc#1237882 * bsc#1237885 * bsc#1237897 * bsc#1237906 * bsc#1238052 * bsc#1238212 * bsc#1238471 * bsc#1238473 * bsc#1238506 * bsc#1238527 * bsc#1238528 * bsc#1238532 * bsc#1238565 * bsc#1238585 * bsc#1238714 * bsc#1238716 * bsc#1238737 * bsc#1238738 * bsc#1238742 * bsc#1238743 * bsc#1238745 * bsc#1238746 * bsc#1238754 * bsc#1238763 * bsc#1238774 * bsc#1238775 * bsc#1238780 * bsc#1238782 * bsc#1238862 * bsc#1238866 * bsc#1238911 * bsc#1238961 * bsc#1238970 * bsc#1238972 * bsc#1238983 * bsc#1238990 * bsc#1238992 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239036 * bsc#1239045 * bsc#1239064 * bsc#1239066 * bsc#1239079 * bsc#1239105 * bsc#1239108 * bsc#1239117 * bsc#1239174 * bsc#1239314 * bsc#1239346 * bsc#1239349 * bsc#1239467 * bsc#1239468 * bsc#1239470 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239476 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239487 * bsc#1239508 * bsc#1239510 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239644 * bsc#1239684 * bsc#1239691 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239934 * bsc#1239986 * bsc#1239994 * bsc#1239997 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240174 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240181 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240187 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240419 * bsc#1240427 * bsc#1240557 * bsc#1240575 * bsc#1240576 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240593 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240655 * bsc#1240691 * bsc#1240696 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240709 * bsc#1240711 * bsc#1240712 * bsc#1240713 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240717 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240740 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240785 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240800 * bsc#1240801 * bsc#1240802 * bsc#1240803 * bsc#1240804 * bsc#1240805 * bsc#1240806 * bsc#1240808 * bsc#1240809 * bsc#1240811 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240873 * bsc#1240934 * bsc#1240936 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240944 * bsc#1240966 * bsc#1240978 * bsc#1240979 * bsc#1241010 * bsc#1241038 * bsc#1241051 * bsc#1241123 * bsc#1241148 * bsc#1241151 * bsc#1241166 * bsc#1241167 * bsc#1241175 * bsc#1241193 * bsc#1241204 * bsc#1241250 * bsc#1241265 * bsc#1241266 * bsc#1241280 * bsc#1241282 * bsc#1241305 * bsc#1241319 * bsc#1241332 * bsc#1241333 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241351 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241373 * bsc#1241376 * bsc#1241388 * bsc#1241394 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241416 * bsc#1241419 * bsc#1241424 * bsc#1241426 * bsc#1241433 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241448 * bsc#1241451 * bsc#1241452 * bsc#1241456 * bsc#1241458 * bsc#1241459 * bsc#1241492 * bsc#1241512 * bsc#1241525 * bsc#1241526 * bsc#1241528 * bsc#1241533 * bsc#1241535 * bsc#1241537 * bsc#1241541 * bsc#1241545 * bsc#1241547 * bsc#1241548 * bsc#1241550 * bsc#1241568 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241581 * bsc#1241590 * bsc#1241591 * bsc#1241593 * bsc#1241596 * bsc#1241597 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241626 * bsc#1241627 * bsc#1241628 * bsc#1241638 * bsc#1241640 * bsc#1241648 * bsc#1241657 * bsc#1242006 * bsc#1242012 * bsc#1242044 * bsc#1242119 * bsc#1242125 * bsc#1242172 * bsc#1242203 * bsc#1242205 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242417 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242513 * bsc#1242520 * bsc#1242523 * bsc#1242526 * bsc#1242528 * bsc#1242533 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242585 * bsc#1242596 * bsc#1242710 * bsc#1242762 * bsc#1242763 * bsc#1242778 * bsc#1242786 * bsc#1242831 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242875 * bsc#1242924 * bsc#1242944 * bsc#1242951 * bsc#1242962 * bsc#1242985 * bsc#1242993 * bsc#1243020 * bsc#1243044 * bsc#1243056 * bsc#1243077 * bsc#1243090 * bsc#1243115 * bsc#1243116 * bsc#1243215 * bsc#1243341 * bsc#1243342 * bsc#1243513 * bsc#1243519 * bsc#1243539 * bsc#1243541 * bsc#1243547 * bsc#1243657 * bsc#1243658 * bsc#1243737 * bsc#1243805 * bsc#1243817 * bsc#1243919 * bsc#1243963 * jsc#PED-10190 * jsc#PED-10213 * jsc#PED-11518 * jsc#PED-11761 * jsc#PED-12309 * jsc#PED-12372 * jsc#PED-12416 Cross-References: * CVE-2023-52927 * CVE-2023-53034 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35840 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-43820 * CVE-2024-46713 * CVE-2024-46763 * CVE-2024-46782 * CVE-2024-46865 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49570 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49994 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50083 * CVE-2024-50106 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50223 * CVE-2024-50290 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53680 * CVE-2024-54458 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57900 * CVE-2024-57924 * CVE-2024-57947 * CVE-2024-57974 * CVE-2024-57998 * CVE-2024-58001 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58068 * CVE-2024-58070 * CVE-2024-58071 * CVE-2024-58074 * CVE-2024-58083 * CVE-2024-58088 * CVE-2024-58091 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2025-21635 * CVE-2025-21648 * CVE-2025-21659 * CVE-2025-21683 * CVE-2025-21696 * CVE-2025-21701 * CVE-2025-21702 * CVE-2025-21703 * CVE-2025-21706 * CVE-2025-21707 * CVE-2025-21717 * CVE-2025-21729 * CVE-2025-21739 * CVE-2025-21753 * CVE-2025-21755 * CVE-2025-21758 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21768 * CVE-2025-21772 * CVE-2025-21782 * CVE-2025-21787 * CVE-2025-21792 * CVE-2025-21796 * CVE-2025-21800 * CVE-2025-21806 * CVE-2025-21808 * CVE-2025-21812 * CVE-2025-21814 * CVE-2025-21821 * CVE-2025-21832 * CVE-2025-21833 * CVE-2025-21836 * CVE-2025-21837 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21854 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21867 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21882 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21893 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21904 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21919 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21925 * CVE-2025-21926 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21929 * CVE-2025-21930 * CVE-2025-21931 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21973 * CVE-2025-21974 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21980 * CVE-2025-21981 * CVE-2025-21985 * CVE-2025-21989 * CVE-2025-21990 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-21999 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-22015 * CVE-2025-22016 * CVE-2025-22017 * CVE-2025-22018 * CVE-2025-22020 * CVE-2025-22021 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22030 * CVE-2025-22033 * CVE-2025-22036 * CVE-2025-22044 * CVE-2025-22045 * CVE-2025-22050 * CVE-2025-22053 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22062 * CVE-2025-22063 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22070 * CVE-2025-22075 * CVE-2025-22080 * CVE-2025-22085 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22090 * CVE-2025-22091 * CVE-2025-22093 * CVE-2025-22094 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22103 * CVE-2025-22104 * CVE-2025-22105 * CVE-2025-22106 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22112 * CVE-2025-22116 * CVE-2025-22121 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-22128 * CVE-2025-2312 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23133 * CVE-2025-23134 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23140 * CVE-2025-23145 * CVE-2025-23150 * CVE-2025-23154 * CVE-2025-23160 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37755 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37785 * CVE-2025-37787 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37809 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37842 * CVE-2025-37860 * CVE-2025-37870 * CVE-2025-37879 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37949 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37960 * CVE-2025-37974 * CVE-2025-38152 * CVE-2025-38637 * CVE-2025-39728 * CVE-2025-40325 CVSS scores: * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21893 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21974 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22112 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22112 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-23134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves 321 vulnerabilities, contains seven features and has 137 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1951=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-1951=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1951=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-1951=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1951=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1951=1 ## Package List: * Legacy Module 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.3.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150700.53.3.1 * reiserfs-kmp-default-debuginfo-6.4.0-150700.53.3.1 * kernel-default-debugsource-6.4.0-150700.53.3.1 * kernel-default-debuginfo-6.4.0-150700.53.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-6.4.0-150700.53.3.1 * dlm-kmp-default-debuginfo-6.4.0-150700.53.3.1 * cluster-md-kmp-default-6.4.0-150700.53.3.1 * kernel-default-debugsource-6.4.0-150700.53.3.1 * ocfs2-kmp-default-6.4.0-150700.53.3.1 * kernel-default-debuginfo-6.4.0-150700.53.3.1 * cluster-md-kmp-default-debuginfo-6.4.0-150700.53.3.1 * dlm-kmp-default-6.4.0-150700.53.3.1 * gfs2-kmp-default-debuginfo-6.4.0-150700.53.3.1 * ocfs2-kmp-default-debuginfo-6.4.0-150700.53.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * kernel-default-extra-6.4.0-150700.53.3.1 * kernel-default-debugsource-6.4.0-150700.53.3.1 * kernel-default-extra-debuginfo-6.4.0-150700.53.3.1 * kernel-default-debuginfo-6.4.0-150700.53.3.1 * SUSE Linux Enterprise Live Patching 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.3.1 * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150700.53.3.1 * kernel-default-livepatch-6.4.0-150700.53.3.1 * kernel-default-debuginfo-6.4.0-150700.53.3.1 * kernel-default-livepatch-devel-6.4.0-150700.53.3.1 * kernel-livepatch-SLE15-SP7_Update_1-debugsource-1-150700.15.3.1 * kernel-livepatch-6_4_0-150700_53_3-default-debuginfo-1-150700.15.3.1 * kernel-livepatch-6_4_0-150700_53_3-default-1-150700.15.3.1 * Basesystem Module 15-SP7 (aarch64 nosrc) * kernel-64kb-6.4.0-150700.53.3.1 * Basesystem Module 15-SP7 (aarch64) * kernel-64kb-devel-6.4.0-150700.53.3.1 * kernel-64kb-debugsource-6.4.0-150700.53.3.1 * kernel-64kb-debuginfo-6.4.0-150700.53.3.1 * kernel-64kb-devel-debuginfo-6.4.0-150700.53.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150700.53.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150700.53.3.1.150700.17.2.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150700.53.3.1 * kernel-default-debugsource-6.4.0-150700.53.3.1 * kernel-default-devel-6.4.0-150700.53.3.1 * kernel-default-debuginfo-6.4.0-150700.53.3.1 * Basesystem Module 15-SP7 (noarch) * kernel-devel-6.4.0-150700.53.3.1 * kernel-macros-6.4.0-150700.53.3.1 * Basesystem Module 15-SP7 (nosrc s390x) * kernel-zfcpdump-6.4.0-150700.53.3.1 * Basesystem Module 15-SP7 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150700.53.3.1 * kernel-zfcpdump-debugsource-6.4.0-150700.53.3.1 * Development Tools Module 15-SP7 (noarch nosrc) * kernel-docs-6.4.0-150700.53.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-6.4.0-150700.53.3.1 * kernel-syms-6.4.0-150700.53.3.1 * kernel-obs-build-6.4.0-150700.53.3.1 * Development Tools Module 15-SP7 (noarch) * kernel-source-6.4.0-150700.53.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49570.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57924.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58068.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58074.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58088.html * https://www.suse.com/security/cve/CVE-2024-58091.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21696.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21717.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21800.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21808.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21833.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21837.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21854.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21867.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21882.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21893.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21904.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21925.html * https://www.suse.com/security/cve/CVE-2025-21926.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21929.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21931.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21973.html * https://www.suse.com/security/cve/CVE-2025-21974.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21980.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21985.html * https://www.suse.com/security/cve/CVE-2025-21989.html * https://www.suse.com/security/cve/CVE-2025-21990.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-22015.html * https://www.suse.com/security/cve/CVE-2025-22016.html * https://www.suse.com/security/cve/CVE-2025-22017.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22036.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22053.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22080.html * https://www.suse.com/security/cve/CVE-2025-22085.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22090.html * https://www.suse.com/security/cve/CVE-2025-22091.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22094.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22105.html * https://www.suse.com/security/cve/CVE-2025-22106.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22112.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23133.html * https://www.suse.com/security/cve/CVE-2025-23134.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23154.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37860.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39728.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222656 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236086 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236394 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1237111 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237545 * https://bugzilla.suse.com/show_bug.cgi?id=1237546 * https://bugzilla.suse.com/show_bug.cgi?id=1237704 * https://bugzilla.suse.com/show_bug.cgi?id=1237757 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238585 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238742 * https://bugzilla.suse.com/show_bug.cgi?id=1238743 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238782 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238866 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239064 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239108 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239314 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239470 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239510 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239934 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1239997 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240174 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240181 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240187 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240419 * https://bugzilla.suse.com/show_bug.cgi?id=1240427 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240576 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240655 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240709 * https://bugzilla.suse.com/show_bug.cgi?id=1240711 * https://bugzilla.suse.com/show_bug.cgi?id=1240712 * https://bugzilla.suse.com/show_bug.cgi?id=1240713 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240800 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1240803 * https://bugzilla.suse.com/show_bug.cgi?id=1240804 * https://bugzilla.suse.com/show_bug.cgi?id=1240805 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240809 * https://bugzilla.suse.com/show_bug.cgi?id=1240811 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240934 * https://bugzilla.suse.com/show_bug.cgi?id=1240936 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240944 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241010 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241051 * https://bugzilla.suse.com/show_bug.cgi?id=1241123 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241151 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241167 * https://bugzilla.suse.com/show_bug.cgi?id=1241175 * https://bugzilla.suse.com/show_bug.cgi?id=1241193 * https://bugzilla.suse.com/show_bug.cgi?id=1241204 * https://bugzilla.suse.com/show_bug.cgi?id=1241250 * https://bugzilla.suse.com/show_bug.cgi?id=1241265 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241319 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241373 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241388 * https://bugzilla.suse.com/show_bug.cgi?id=1241394 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241416 * https://bugzilla.suse.com/show_bug.cgi?id=1241419 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241426 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241451 * https://bugzilla.suse.com/show_bug.cgi?id=1241452 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241512 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241535 * https://bugzilla.suse.com/show_bug.cgi?id=1241537 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241547 * https://bugzilla.suse.com/show_bug.cgi?id=1241548 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241568 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241581 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241591 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241626 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241628 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242119 * https://bugzilla.suse.com/show_bug.cgi?id=1242125 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242205 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242533 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242985 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243020 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243115 * https://bugzilla.suse.com/show_bug.cgi?id=1243116 * https://bugzilla.suse.com/show_bug.cgi?id=1243215 * https://bugzilla.suse.com/show_bug.cgi?id=1243341 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243817 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://jira.suse.com/browse/PED-10190 * https://jira.suse.com/browse/PED-10213 * https://jira.suse.com/browse/PED-11518 * https://jira.suse.com/browse/PED-11761 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12372 * https://jira.suse.com/browse/PED-12416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:14 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:14 -0000 Subject: SUSE-SU-2025:01950-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) Message-ID: <174983257484.10074.955259734043090148@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:01950-1 Release Date: 2025-06-13T12:33:33Z Rating: important References: * bsc#1238324 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_128 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1950=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1950=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_29-debugsource-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_128-default-11-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_29-debugsource-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_128-default-11-150400.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:19 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:19 -0000 Subject: SUSE-SU-2025:01949-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) Message-ID: <174983257903.10074.16146763397622636702@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01949-1 Release Date: 2025-06-13T12:03:58Z Rating: important References: * bsc#1239077 Cross-References: * CVE-2024-57996 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_42 fixes one issue. The following security issue was fixed: * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1949=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1949=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-2-150600.2.2 * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-2-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-2-150600.2.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-2-150600.2.2 * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-2-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-2-150600.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:22 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:22 -0000 Subject: SUSE-SU-2025:01948-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) Message-ID: <174983258288.10074.1588148159701503366@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01948-1 Release Date: 2025-06-13T12:03:49Z Rating: important References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_38 fixes several issues. The following security issues were fixed: * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1948=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1948=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-2-150600.2.2 * kernel-livepatch-6_4_0-150600_23_38-default-2-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-2-150600.2.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-2-150600.2.2 * kernel-livepatch-6_4_0-150600_23_38-default-2-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-2-150600.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:24 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:24 -0000 Subject: SUSE-RU-2025:01955-1: moderate: Recommended update for saphana-checks Message-ID: <174983258483.10074.3668383819077598901@smelt2.prg2.suse.org> # Recommended update for saphana-checks Announcement ID: SUSE-RU-2025:01955-1 Release Date: 2025-06-13T15:32:19Z Rating: moderate References: Affected Products: * openSUSE Leap 15.6 * SAP Applications Module 15-SP6 * SAP Applications Module 15-SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for saphana-checks fixes the following issues: * Version update 2505+1.g930737b * IBM Power8 removal since out of support end of 2024 * Azure instances * add new emerald rapid E96* * remove old baremetal-sku * Azure azcopy version update v10.29.1 * SLES kernel issues 15.5/15.6 * Azure mana, /proc/cpuinfo * clock_gettime @ IBM Power * hanging HANA callstacks * fixing SLES kernel information and SAPNote * hostname - ignore upper and lower case during comparison * HANA client - new version * Indexserver Crash on virtualized Intel Ice Lake hosts ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1955=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2025-1955=1 * SAP Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP7-2025-1955=1 ## Package List: * openSUSE Leap 15.6 (noarch) * saphana-checks-2505+1.g930737b-150600.13.15.2 * SAP Applications Module 15-SP6 (noarch) * saphana-checks-2505+1.g930737b-150600.13.15.2 * SAP Applications Module 15-SP7 (noarch) * saphana-checks-2505+1.g930737b-150600.13.15.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:32 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:32 -0000 Subject: SUSE-SU-2025:01954-1: important: Security update for java-1_8_0-openj9 Message-ID: <174983259267.10074.6420895874111732270@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2025:01954-1 Release Date: 2025-06-13T13:56:14Z Rating: important References: * bsc#1235844 * bsc#1241274 * bsc#1241275 * bsc#1241276 * bsc#1243429 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 * CVE-2025-4447 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-4447 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4447 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4447 ( NVD ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: * CVE-2025-4447: Fixed buffer overflow in Eclipse OpenJ9 (bsc#1243429). * CVE-2025-30698: Fixed 2D unauthorized data access and DoS (bsc#1241276). * CVE-2025-30691: Fixed Compiler Unauthorized Data Access (bsc#1241275). * CVE-2025-21587: Fixed unauthorized access, deletion or modification of critical data (bsc#1241274). Other bugfixes: * Fixed wrong execstack flag in libj9jit (bsc#1235844) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1954=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1954=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1954=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-devel-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-debugsource-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-devel-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-demo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-src-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-accessibility-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-headless-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-demo-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-headless-debuginfo-1.8.0.452-150200.3.54.2 * openSUSE Leap 15.6 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.452-150200.3.54.2 * SUSE Package Hub 15 15-SP6 (ppc64le s390x) * java-1_8_0-openj9-devel-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-debugsource-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-devel-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-demo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-src-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-accessibility-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-headless-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-demo-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-headless-debuginfo-1.8.0.452-150200.3.54.2 * SUSE Package Hub 15 15-SP7 (ppc64le s390x) * java-1_8_0-openj9-devel-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-debugsource-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-devel-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-demo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-src-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-accessibility-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-headless-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-demo-debuginfo-1.8.0.452-150200.3.54.2 * java-1_8_0-openj9-headless-debuginfo-1.8.0.452-150200.3.54.2 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://www.suse.com/security/cve/CVE-2025-4447.html * https://bugzilla.suse.com/show_bug.cgi?id=1235844 * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 * https://bugzilla.suse.com/show_bug.cgi?id=1243429 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:36 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:36 -0000 Subject: SUSE-SU-2025:01953-1: important: Security update for apache2-mod_auth_openidc Message-ID: <174983259650.10074.7076204153403452017@smelt2.prg2.suse.org> # Security update for apache2-mod_auth_openidc Announcement ID: SUSE-SU-2025:01953-1 Release Date: 2025-06-13T13:55:39Z Rating: important References: * bsc#1242015 Cross-References: * CVE-2025-3891 CVSS scores: * CVE-2025-3891 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3891 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3891 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3891 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for apache2-mod_auth_openidc fixes the following issues: * CVE-2025-3891: Fixed denial of service via an empty POST request when OIDCPreservePost is enabled (bsc#1242015). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1953=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1953=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1953=1 openSUSE-SLE-15.6-2025-1953=1 ## Package List: * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150600.16.11.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150600.16.11.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150600.16.11.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150600.16.11.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150600.16.11.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150600.16.11.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * apache2-mod_auth_openidc-2.3.8-150600.16.11.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150600.16.11.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150600.16.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3891.html * https://bugzilla.suse.com/show_bug.cgi?id=1242015 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 16:36:39 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 16:36:39 -0000 Subject: SUSE-SU-2025:01952-1: moderate: Security update for python-Django Message-ID: <174983259916.10074.10204144289445391827@smelt2.prg2.suse.org> # Security update for python-Django Announcement ID: SUSE-SU-2025:01952-1 Release Date: 2025-06-13T13:55:13Z Rating: moderate References: * bsc#1244095 Cross-References: * CVE-2025-48432 CVSS scores: * CVE-2025-48432 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N * CVE-2025-48432 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-48432 ( NVD ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-Django fixes the following issues: * CVE-2025-48432: log injection or forgery due to unescaped control characters being added into logs (bsc#1244095). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1952=1 openSUSE-SLE-15.6-2025-1952=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1952=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1952=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-Django-4.2.11-150600.3.24.1 * SUSE Package Hub 15 15-SP6 (noarch) * python311-Django-4.2.11-150600.3.24.1 * SUSE Package Hub 15 15-SP7 (noarch) * python311-Django-4.2.11-150600.3.24.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48432.html * https://bugzilla.suse.com/show_bug.cgi?id=1244095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:07 -0000 Subject: SUSE-SU-2025:01958-1: important: Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3) Message-ID: <174984660759.16661.15823485132575261902@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:01958-1 Release Date: 2025-06-13T19:33:40Z Rating: important References: * bsc#1238788 * bsc#1238790 * bsc#1239077 Cross-References: * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-57996 CVSS scores: * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_198 fixes several issues. The following security issues were fixed: * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1958=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1958=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_198-default-debuginfo-2-150300.2.2 * kernel-livepatch-5_3_18-150300_59_198-default-2-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_55-debugsource-2-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_198-preempt-2-150300.2.2 * kernel-livepatch-5_3_18-150300_59_198-preempt-debuginfo-2-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_198-default-2-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:15 -0000 Subject: SUSE-SU-2025:01957-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) Message-ID: <174984661509.16661.9490946853364410846@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:01957-1 Release Date: 2025-06-13T18:33:39Z Rating: important References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_33 fixes several issues. The following security issues were fixed: * CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries (bsc#1236701). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1957=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1957=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_33-default-6-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-6-150600.2.2 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-6-150600.2.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_33-default-6-150600.2.2 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-6-150600.2.2 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-6-150600.2.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:19 -0000 Subject: SUSE-SU-2025:01956-1: important: Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) Message-ID: <174984661965.16661.4046631593615386797@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:01956-1 Release Date: 2025-06-13T16:04:12Z Rating: important References: * bsc#1238324 * bsc#1238788 * bsc#1238790 * bsc#1239077 Cross-References: * CVE-2022-49080 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-57996 CVSS scores: * CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_195 fixes several issues. The following security issues were fixed: * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1956=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1956=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_195-default-debuginfo-2-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_54-debugsource-2-150300.2.2 * kernel-livepatch-5_3_18-150300_59_195-default-2-150300.2.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_195-preempt-debuginfo-2-150300.2.2 * kernel-livepatch-5_3_18-150300_59_195-preempt-2-150300.2.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_195-default-2-150300.2.2 ## References: * https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://bugzilla.suse.com/show_bug.cgi?id=1238324 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:22 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:22 -0000 Subject: SUSE-SU-2025:20403-1: moderate: Security update for screen Message-ID: <174984662287.16661.14100321994384755975@smelt2.prg2.suse.org> # Security update for screen Announcement ID: SUSE-SU-2025:20403-1 Release Date: 2025-06-05T15:44:22Z Rating: moderate References: * bsc#1242269 Cross-References: * CVE-2025-46802 CVSS scores: * CVE-2025-46802 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-46802 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46802 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-46802 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Micro Extras 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for screen fixes the following issues: This update also ships screen to SL Micro 6.1 Extras. * also use tty fd passing after a suspend (MSG_CONT) * do not chmod the tty for multiattach, rely on tty fd passing instead [bsc#1242269] [CVE-2025-46802] * fix resume after suspend in multiuser mode ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-135=1 ## Package List: * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * utempter-debugsource-1.2.1-slfo.1.1_1.3 * screen-debuginfo-4.9.1-slfo.1.1_2.1 * screen-4.9.1-slfo.1.1_2.1 * libutempter0-debuginfo-1.2.1-slfo.1.1_1.3 * screen-debugsource-4.9.1-slfo.1.1_2.1 * libutempter0-1.2.1-slfo.1.1_1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-46802.html * https://bugzilla.suse.com/show_bug.cgi?id=1242269 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:26 -0000 Subject: SUSE-SU-2025:20402-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <174984662622.16661.5302800795600235135@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20402-1 Release Date: 2025-06-10T11:22:13Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-34=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-25-rt-debuginfo-3-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-3-1.1 * kernel-livepatch-6_4_0-25-rt-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:30 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:30 -0000 Subject: SUSE-SU-2025:20401-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <174984663037.16661.7733153926043150327@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20401-1 Release Date: 2025-06-10T11:22:04Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-33=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-22-rt-debuginfo-3-1.1 * kernel-livepatch-6_4_0-22-rt-3-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:35 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:35 -0000 Subject: SUSE-SU-2025:20400-1: moderate: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <174984663591.16661.7784227483576911910@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20400-1 Release Date: 2025-06-10T11:17:39Z Rating: moderate References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900) * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-31=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-10-rt-6-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-6-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-6-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:41 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:41 -0000 Subject: SUSE-SU-2025:20399-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <174984664141.16661.16554976627303864956@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20399-1 Release Date: 2025-06-10T13:34:03Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-38=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-3-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-3-1.2 * kernel-livepatch-6_4_0-25-default-3-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:44 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:44 -0000 Subject: SUSE-SU-2025:20398-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <174984664477.16661.5263842362315668286@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20398-1 Release Date: 2025-06-10T13:19:33Z Rating: moderate References: * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-37=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-24-default-debuginfo-4-1.2 * kernel-livepatch-6_4_0-24-default-4-1.2 * kernel-livepatch-MICRO-6-0_Update_4-debugsource-4-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:49 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:49 -0000 Subject: SUSE-SU-2025:20397-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <174984664909.16661.14680937477076415410@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20397-1 Release Date: 2025-06-10T13:19:24Z Rating: moderate References: * bsc#1232900 * bsc#1236701 * bsc#1239077 * bsc#1239096 Cross-References: * CVE-2024-49855 * CVE-2024-57996 * CVE-2024-58013 * CVE-2025-21680 CVSS scores: * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-49855: nbd: fix race between timeout and normal completion (bsc#1232900) * CVE-2025-21680: pktgen: avoid out-of-bounds access in get_imix_entries (bsc#1236701) * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239096) * CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit References: (bsc#1239077) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-35=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-6-1.1 * kernel-livepatch-6_4_0-19-default-debuginfo-6-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-6-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2025-21680.html * https://bugzilla.suse.com/show_bug.cgi?id=1232900 * https://bugzilla.suse.com/show_bug.cgi?id=1236701 * https://bugzilla.suse.com/show_bug.cgi?id=1239077 * https://bugzilla.suse.com/show_bug.cgi?id=1239096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:51 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:51 -0000 Subject: SUSE-RU-2025:20396-1: moderate: Recommended update for fde-tools Message-ID: <174984665114.16661.12702895939184402420@smelt2.prg2.suse.org> # Recommended update for fde-tools Announcement ID: SUSE-RU-2025:20396-1 Release Date: 2025-06-10T14:50:33Z Rating: moderate References: * bsc#1243877 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for fde-tools fixes the following issues: * Remove the dracut conf for the key file to avoid the error from dracut (bsc#1243877) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-142=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * fde-firstboot-0.7.3-slfo.1.1_2.1 * fde-tpm-helper-0.7.3-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * fde-tools-debugsource-0.7.3-slfo.1.1_2.1 * fde-tools-debuginfo-0.7.3-slfo.1.1_2.1 * fde-tools-0.7.3-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243877 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:55 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:55 -0000 Subject: SUSE-SU-2025:20395-1: moderate: Security update for sqlite3 Message-ID: <174984665597.16661.6664853806718809497@smelt2.prg2.suse.org> # Security update for sqlite3 Announcement ID: SUSE-SU-2025:20395-1 Release Date: 2025-06-10T11:50:09Z Rating: moderate References: * bsc#1241020 * bsc#1241078 Cross-References: * CVE-2025-29087 * CVE-2025-29088 CVSS scores: * CVE-2025-29087 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-29087 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2025-29087 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-29087 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-29087 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-29088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-29088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-29088 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-29088 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for sqlite3 fixes the following issues: * Update to release 3.49.1: * Improve portability of makefiles and configure scripts. * CVE-2025-29087: Fixed Integer Overflow in SQLite concat Function (bsc#1241020) * CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078) * Update to release 3.49.0: * Enhancements to the query planner: * Improve the query-time index optimization so that it works on WITHOUT ROWID tables. * Better query plans for large star-query joins. This fixes three different performance regressions that were reported on the SQLite Forum. * When two or more queries have the same estimated cost, use the one with the fewer bytes per row. * Enhance the iif() SQL function so that it can accept any number of arguments greater than or equal to two. * Enhance the session extension so that it works on databases that make use of generated columns. * Omit the SQLITE_USE_STDIO_FOR_CONSOLE compile-time option which was not implemented correctly and never worked right. In its place add the SQLITE_USE_W32_FOR_CONSOLE_IO compile-time option. This option applies to command-line tools like the CLI only, not to the SQLite core. It causes Win32 APIs to be used for console I/O instead of stdio. This option affects Windows builds only. * Three new options to sqlite3_db_config(). All default "on". SQLITE_DBCONFIG_ENABLE_ATTACH_CREATE SQLITE_DBCONFIG_ENABLE_ATTACH_WRITE SQLITE_DBCONFIG_ENABLE_COMMENTS * Re-enable SONAME which got disabled by default in 3.48.0. * Update to release 3.48.0: * Improved EXPLAIN QUERY PLAN output for covering indexes. * Allow a two-argument version of the iif() SQL function. * Also allow if() as an alternative spelling for iif(). * Add the ".dbtotxt" command to the CLI. * Add the SQLITE_IOCAP_SUBPAGE_READ property to the xDeviceCharacteristics method of the sqlite3_io_methods object. * Add the SQLITE_PREPARE_DONT_LOG option to sqlite3_prepare_v3() that prevents warning messages being sent to the error log if the SQL is ill-formed. This allows sqlite3_prepare_v3() to be used to do test compiles of SQL to check for validity without polluting the error log with false messages. * Increase the minimum allowed value of SQLITE_LIMIT_LENGTH from 1 to 30. * Added the SQLITE_FCNTL_NULL_IO file control. * Extend the FTS5 auxiliary API xInstToken() to work with prefix queries via the insttoken configuration option and the fts5_insttoken() SQL function. * Increase the maximum number of arguments to an SQL function from 127 to 1000. * Update to release 3.47.2: * Fix a problem in text-to-floating-point conversion that affects text values where the first 16 significant digits are '1844674407370955'. This issue was introduced in 3.47.0 and only arises on x64 and i386 hardware. * Other minor bug fixes. * Enable the session extension, because NodeJS 22 needs it. * Update to release 3.47.1: * Fix the makefiles so that they once again honored DESTDIR for the "install" target. * Add the SQLITE_IOCAP_SUBPAGE_READ capability to the VFS, to work around issues on some non-standard VFSes caused by making SQLITE_DIRECT_OVERFLOW_READ the default in version 3.45.0. * Fix incorrect answers to certain obscure IN queries caused by new query optimizations added in the 3.47.0 release. * Other minor bug fixes. * Update to release 3.47.0: * Allow arbitrary expressions in the second argument to the RAISE function. * If the RHS of the ->> operator is negative, then access array elements counting from the right. * Fix a problem with rolling back hot journal files in the seldom-used unix- dotfile VFS. * FTS5 tables can now be dropped even if they use a non-standard tokenizer that has not been registered. * Fix the group_concat() aggregate function so that it returns an empty string, not a NULL, if it receives a single input value which is an empty string. * Enhance the generate_series() table-valued function so that it is able to recognize and use constraints on its output value. Preupdate hooks now recognize when a column added by ALTER TABLE ADD COLUMN has a non-null default value. * Improved reuse of subqueries associated with the IN operator, especially when the IN operator has been duplicated due to predicate push-down. * Use a Bloom filter on subqueries on the right-hand side of the IN operator, in cases where that seems likely to improve performance. * Ensure that queries like "SELECT func(a) FROM tab GROUP BY 1" only invoke the func() function once per row. * No attempt is made to create automatic indexes on a column that is known to be non-selective because of its use in other indexes that have been analyzed. * Adjustments to the query planner so that it produces better plans for star queries with a large number of dimension tables. * Add the "order-by-subquery" optimization, that seeks to disable sort operations in outer queries if the desired order is obtained naturally due to ORDER BY clauses in subqueries. * The "indexed-subtype-expr" optimization strives to use expressions that are part of an index rather than recomputing the expression based on table values, as long as the query planner can prove that the subtype of the expression will never be used. * Miscellaneous coding tweaks for faster runtimes. * Add the experimental sqlite3_rsync program. * Add extension functions median(), percentile(), percentile_cont(), and percentile_disc() to the CLI. * Add the .www dot-command to the CLI. * The sqlite3_analyzer utility now provides a break-out of statistics for WITHOUT ROWID tables. * The sqldiff utility avoids creating an empty database if its second argument does not exist. * Enhance the sqlite_dbpage table-valued function such that INSERT can be used to increase or decrease the size of the database file. * SQLite no longer makes any use of the "long double" data type, as hardware support for long double is becoming less common and long double creates challenges for some compiler tool chains. Instead, SQLite uses Dekker's algorithm when extended precision is needed. * The TCL Interface for SQLite supports TCL9. Everything probably still works for TCL 8.5 and later, though this is not guaranteed. Users are encouraged to upgrade to TCL9. * Fix a corruption-causing bug in the JavaScript "opfs" VFS. Correct "mode=ro" handling for the "opfs" VFS. Work around a couple of browser-specific OPFS quirks. * Add the fts5_tokenizer_v2 API and the locale=1 option, for creating custom locale-aware tokenizers and fts5 tables that may take advantage of them. * Add the contentless_unindexed=1 option, for creating contentless fts5 tables that store the values of any UNINDEXED columns persistently in the database. * Allow an FTS5 table to be dropped even if it uses a custom tokenizer whose implementation is not available. * Update to release 3.46.1: * Improved robustness while parsing the tokenize= arguments in FTS5. * Enhancements to covering index prediction in the query planner. * Do not let the number of terms on a VALUES clause be limited by SQLITE_LIMIT_COMPOUND_SELECT, even if the VALUES clause contains elements that appear to be variables due to double-quoted string literals. * Fix the window function version of group_concat() so that it returns an empty string if it has one or more empty string inputs. * In FTS5 secure-delete mode, fix false-positive integrity-check reports about corrupt indexes. * Syntax errors in ALTER TABLE should always return SQLITE_ERROR. In some cases, they were formerly returning SQLITE_INTERNAL. * Other minor fixes. * Update to release 3.46.0: * Enhance PRAGMA optimize in multiple ways. * Enhancements to the date and time functions. * Add support for underscore ("_") characters between digits in numeric literals. * Add the json_pretty() SQL function. * Query planner improvements. * Allocate additional memory from the heap for the SQL parser stack if that stack overflows, rather than reporting a "parser stack overflow" error. * Allow ASCII control characters within JSON5 string literals. * Fix the -> and ->> JSON operators so that when the right-hand side operand is a string that looks like an integer it is still treated as a string, because that is what PostgreSQL does. * Update to release 3.45.3: * Fix a long-standing bug (going back to version 3.24.0) that might (rarely) cause the "old.*" values of an UPDATE trigger to be incorrect if that trigger fires in response to an UPSERT. * Reduce the scope of the NOT NULL strength reduction optimization that was added as item 8e in version 3.35.0. The optimization was being attempted in some contexts where it did not work, resulting in incorrect query results. * Add SQLITE_STRICT_SUBTYPE=1 as recommended by upstream. * Update to release 3.45.2: * Added the SQLITE_RESULT_SUBTYPE property for application- defined SQL functions. * Enhancements to the JSON SQL functions * Add the FTS5 tokendata option to the FTS5 virtual table. * The SQLITE_DIRECT_OVERFLOW_READ optimization is now enabled by default. * Query planner improvements * Increase the default value for SQLITE_MAX_PAGE_COUNT from 1073741824 to 4294967294. * Enhancements to the CLI * Restore the JSON BLOB input bug, and promise to support the anomaly in subsequent releases, for backward compatibility. * Fix the PRAGMA integrity_check command so that it works on read-only databases that contain FTS3 and FTS5 tables. * Fix issues associated with processing corrupt JSONB inputs. * Fix a long-standing bug in which a read of a few bytes past the end of a memory-mapped segment might occur when accessing a craftily corrupted database using memory-mapped database. * Fix a long-standing bug in which a NULL pointer dereference might occur in the bytecode engine due to incorrect bytecode being generated for a class of SQL statements that are deliberately designed to stress the query planner but which are otherwise pointless. * Fix an error in UPSERT, introduced in version 3.35.0. * Reduce the scope of the NOT NULL strength reduction optimization that was added in version 3.35.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-141=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * sqlite3-debugsource-3.49.1-slfo.1.1_1.1 * libsqlite3-0-3.49.1-slfo.1.1_1.1 * libsqlite3-0-debuginfo-3.49.1-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-29087.html * https://www.suse.com/security/cve/CVE-2025-29088.html * https://bugzilla.suse.com/show_bug.cgi?id=1241020 * https://bugzilla.suse.com/show_bug.cgi?id=1241078 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:30:59 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:30:59 -0000 Subject: SUSE-SU-2025:20394-1: important: Security update for less Message-ID: <174984665938.16661.15743193830488879719@smelt2.prg2.suse.org> # Security update for less Announcement ID: SUSE-SU-2025:20394-1 Release Date: 2025-06-08T13:39:11Z Rating: important References: * bsc#1047218 * bsc#1222849 * bsc#915387 Cross-References: * CVE-2024-32487 CVSS scores: * CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for less fixes the following issues: * Updated to version 668 * Fixed crash when using --header on command line * Fixed possible crash when scrolling left/right or toggling -S * Fixed bug when using #stop in a lesskey file * Fixed bug when using --shift or --match-shift on command line with a parameter starting with '.' * Fixed bug in R command when file size changes * Fixed bug using --header when file does not fill screen * Fixed ^X bug when output is not a terminal * Fixed bug where ^Z is not handled immediately * Fixed bug where first byte from a LESSOPEN filter is deleted if it is greater than 0x7F * Fixed uninitialized variable in edit_ifile * Fixed incorrect handling of UTF-8 chars in prompts * Change preprocessor dependencies from Requires to Recommends. It's disabled by default and they are not necessary for less. * Updated to version 661: * fixed crash - buffer overflow by one in fexpand * fixed free(): double free detected in tcache 2 * fixed segmentation fault on line-num-width & -N * Updated to version 656: * Add ^O^N, ^O^P, ^O^L and ^O^O commands and mouse clicks (with --mouse) to find and open OSC8 hyperlinks (github #251). * Add --match-shift option. * Add --lesskey-content option (github #447). * Add LESSKEY_CONTENT environment variable (github #447). * Add --no-search-header-lines and --no-search-header-columns options (github #397). * Add ctrl-L search modifier (github #367). * A ctrl-P at the start of a shell command suppresses the "done" message (github #462). * Add attribute characters ('*', '~', '_', '&') to --color parameter (github #471). * Allow expansion of environment variables in lesskey files. * Add LESSSECURE_ALLOW environment variable (github #449). * Add LESS_UNSUPPORT environment variable. * Add line number parameter to --header option (github #436). * Mouse right-click jumps to position marked by left-click (github #390). * Ensure that the target line is not obscured by a header line set by --header (github #444). * Change default character set to "utf-8", except remains "dos" on MS-DOS. * Add message when search with ^W wraps (github #459). * UCRT builds on Windows 10 and later now support Unicode file names (github #438). * Improve behavior of interrupt while reading non-terminated pipe (github #414). * Improve parsing of -j, -x and -# options (github #393). * Support files larger than 4GB on Windows (github #417). * Support entry of Unicode chars larger than U+FFFF on Windows (github #391). * Improve colors of bold, underline and standout text on Windows. * Allow --rscroll to accept non-ASCII characters (github #483). * Allow the parameter to certain options to be terminated with a space (--color, --quotes, --rscroll, --search-options and --intr) (github #495). * Fix bug where # substitution failed after viewing help (github #420). * Fix crash if files are deleted while less is viewing them (github #404). * Workaround unreliable ReadConsoleInputW behavior on Windows with non-ASCII input. * Fix -J display when searching for non-ASCII characters (github #422). * Don't filter header lines via the & command (github #423). * Fix bug when horizontally shifting long lines (github #425). * Add -x and -D options to lesstest, to make it easier to diagnose a failed lesstest run. * Fix bug searching long lines with --incsearch and -S (github #428). * Fix bug that made ESC-} fail if top line on screen was empty (github #429). * Fix bug with --mouse on Windows when used with pipes (github #440). * Fix bug in --+OPTION command line syntax. * Fix display bug when using -w with an empty line with a CR/LF line ending (github #474). * When substituting '#' or '%' with a filename, quote the filename if it contains a space (github #480). * Fix wrong sleep time when system has usleep but not nanosleep (github #489). * Fix bug when file name contains a newline (CVE-2024-32487, bsc#1222849). * Fix bug when file name contains nonprintable characters (github #503). * Fix DJGPP build (github #497). * Update Unicode tables. * add zstd support to lessopen * Updated to 643: * Fixed problem when a program piping into less reads from the tty, like sudo asking for password (github #368). * Fixed search modifier ^E after ^W. * Fixed bug using negated (^N) search (github #374). * Fixed bug setting colors with -D on Windows build (github #386). * Fixed reading special chars like PageDown on Windows (github #378). * Fixed mouse wheel scrolling on Windows (github #379). * Fixed erroneous EOF when terminal window size changes (github #372). * Fixed compile error with some definitions of ECHONL (github #395). * Fixed crash on Windows when writing logfile (github #405). * Fixed regression in exit code when stdin is /dev/null and output is a file (github #373). * Add lesstest test suite to production release (github #344). * Change lesstest output to conform with automake Simple Test Format (github #399). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-139=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * less-668-slfo.1.1_1.1 * less-debuginfo-668-slfo.1.1_1.1 * less-debugsource-668-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32487.html * https://bugzilla.suse.com/show_bug.cgi?id=1047218 * https://bugzilla.suse.com/show_bug.cgi?id=1222849 * https://bugzilla.suse.com/show_bug.cgi?id=915387 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:31:02 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:31:02 -0000 Subject: SUSE-SU-2025:20393-1: moderate: Security update for docker Message-ID: <174984666245.16661.12796865195005264030@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:20393-1 Release Date: 2025-06-05T08:36:32Z Rating: moderate References: * bsc#1244035 Cross-References: * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for docker fixes the following issues: Always clear SUSEConnect suse_* secrets when starting containers regardless of whether the daemon was built with SUSEConnect support. Not doing this causes containers from SUSEConnect-enabled daemons to fail to start when running with SUSEConnect-disabled (i.e. upstream) daemons. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-134=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-27.5.1_ce-slfo.1.1_3.1 * docker-buildx-debuginfo-0.22.0-slfo.1.1_3.1 * docker-27.5.1_ce-slfo.1.1_3.1 * docker-buildx-0.22.0-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1244035 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:31:03 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:31:03 -0000 Subject: SUSE-RU-2025:20392-1: moderate: Recommended update for scap-security-guide Message-ID: <174984666378.16661.7375569195460830977@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2025:20392-1 Release Date: 2025-06-04T10:19:33Z Rating: moderate References: * jsc#ECO-3319 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: Ship scap-security-guide in version 0.1.76 (jsc#ECO-3319). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-131=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * scap-security-guide-0.1.76-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:31:08 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:31:08 -0000 Subject: SUSE-RU-2025:20391-1: moderate: Recommended update for fde-tools Message-ID: <174984666809.16661.11028103790306179507@smelt2.prg2.suse.org> # Recommended update for fde-tools Announcement ID: SUSE-RU-2025:20391-1 Release Date: 2025-06-04T08:56:34Z Rating: moderate References: * bsc#1238593 * bsc#1243166 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for fde-tools fixes the following issues: Update to version 0.7.3: * Detect the supported RSA key size * Take snapshot when signing * Switch to "\--target-platform" when available * Allow RPM_MACRO_DIR to be defined during build time * Fix naming and disable ccid * tpm: fix tpm-present with the newer pcr-oracle * firstboot: make "Pass phrase" mandatory * firstboot: disable FDE/TPM2 when secure boot is off * Conditional helper * firstboot: replace the key file path in crypttab * firstboot: add more alias bootloader functions * firstboot: detect the early reencryption * Do not skip the encryption process when Secure Boot is off (bsc#1243166) * Define non-expanded functions for the firstboot script (bsc#1238593) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-133=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * fde-firstboot-0.7.3-slfo.1.1_1.1 * fde-tpm-helper-0.7.3-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * fde-tools-debuginfo-0.7.3-slfo.1.1_1.1 * fde-tools-debugsource-0.7.3-slfo.1.1_1.1 * fde-tools-0.7.3-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1238593 * https://bugzilla.suse.com/show_bug.cgi?id=1243166 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 13 20:31:11 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 13 Jun 2025 20:31:11 -0000 Subject: SUSE-RU-2025:20390-1: moderate: Recommended update for sssd, cifs-utils Message-ID: <174984667116.16661.10695202840995842823@smelt2.prg2.suse.org> # Recommended update for sssd, cifs-utils Announcement ID: SUSE-RU-2025:20390-1 Release Date: 2025-06-04T08:39:40Z Rating: moderate References: * bsc#1216739 * bsc#1235788 * bsc#1235789 Affected Products: * SUSE Linux Micro 6.1 An update that has three fixes can now be installed. ## Description: This update for sssd, cifs-utils fixes the following issues: cifs-utils: * Migrate away from update-alternatives, replaced by package conflicts (bsc#1235788); sssd: * Migrate away from update-alternatives, replaced by package conflicts; (bsc#1235789); (bsc#1216739); ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-132=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * cifs-utils-7.0-slfo.1.1_2.1 * libsss_certmap0-2.9.5-slfo.1.1_2.1 * sssd-ad-debuginfo-2.9.5-slfo.1.1_2.1 * libsss_certmap0-debuginfo-2.9.5-slfo.1.1_2.1 * sssd-krb5-common-2.9.5-slfo.1.1_2.1 * cifs-utils-debuginfo-7.0-slfo.1.1_2.1 * sssd-ldap-debuginfo-2.9.5-slfo.1.1_2.1 * libsss_idmap0-2.9.5-slfo.1.1_2.1 * sssd-2.9.5-slfo.1.1_2.1 * sssd-krb5-common-debuginfo-2.9.5-slfo.1.1_2.1 * wb-cifs-idmap-plugin-debuginfo-7.0-slfo.1.1_2.1 * sssd-debuginfo-2.9.5-slfo.1.1_2.1 * libsss_idmap0-debuginfo-2.9.5-slfo.1.1_2.1 * sssd-krb5-2.9.5-slfo.1.1_2.1 * sssd-ad-2.9.5-slfo.1.1_2.1 * sssd-debugsource-2.9.5-slfo.1.1_2.1 * wb-cifs-idmap-plugin-7.0-slfo.1.1_2.1 * cifs-utils-debugsource-7.0-slfo.1.1_2.1 * sssd-krb5-debuginfo-2.9.5-slfo.1.1_2.1 * libsss_nss_idmap0-debuginfo-2.9.5-slfo.1.1_2.1 * sssd-ldap-2.9.5-slfo.1.1_2.1 * libsss_nss_idmap0-2.9.5-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216739 * https://bugzilla.suse.com/show_bug.cgi?id=1235788 * https://bugzilla.suse.com/show_bug.cgi?id=1235789 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 12:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 12:30:05 -0000 Subject: SUSE-SU-2025:01962-1: important: Security update for apache2-mod_auth_openidc Message-ID: <175007700594.651.949656186747981881@smelt2.prg2.suse.org> # Security update for apache2-mod_auth_openidc Announcement ID: SUSE-SU-2025:01962-1 Release Date: 2025-06-16T10:04:25Z Rating: important References: * bsc#1242015 Cross-References: * CVE-2025-3891 CVSS scores: * CVE-2025-3891 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3891 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3891 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3891 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for apache2-mod_auth_openidc fixes the following issues: * CVE-2025-3891: Fixed denial of service via an empty POST request when OIDCPreservePost is enabled (bsc#1242015). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1962=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1962=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1962=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1962=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1962=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1962=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1962=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1962=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1962=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1962=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1962=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1962=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1962=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1962=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1962=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Manager Proxy 4.3 (x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.34.1 * apache2-mod_auth_openidc-2.3.8-150100.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3891.html * https://bugzilla.suse.com/show_bug.cgi?id=1242015 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 12:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 12:30:28 -0000 Subject: SUSE-SU-2025:01961-1: important: Security update for grub2 Message-ID: <175007702852.651.17110860696389738791@smelt2.prg2.suse.org> # Security update for grub2 Announcement ID: SUSE-SU-2025:01961-1 Release Date: 2025-06-16T10:03:23Z Rating: important References: * bsc#1215935 * bsc#1215936 * bsc#1233606 * bsc#1233608 * bsc#1233609 * bsc#1233610 * bsc#1233612 * bsc#1233613 * bsc#1233614 * bsc#1233615 * bsc#1233616 * bsc#1233617 * bsc#1234958 * bsc#1236316 * bsc#1236317 * bsc#1237002 * bsc#1237006 * bsc#1237008 * bsc#1237009 * bsc#1237010 * bsc#1237011 * bsc#1237012 * bsc#1237013 * bsc#1237014 Cross-References: * CVE-2023-4692 * CVE-2023-4693 * CVE-2024-45774 * CVE-2024-45775 * CVE-2024-45776 * CVE-2024-45777 * CVE-2024-45778 * CVE-2024-45779 * CVE-2024-45780 * CVE-2024-45781 * CVE-2024-45782 * CVE-2024-45783 * CVE-2024-56737 * CVE-2025-0622 * CVE-2025-0624 * CVE-2025-0677 * CVE-2025-0678 * CVE-2025-0684 * CVE-2025-0685 * CVE-2025-0686 * CVE-2025-0689 * CVE-2025-0690 * CVE-2025-1118 * CVE-2025-1125 CVSS scores: * CVE-2023-4692 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4692 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-4693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-4693 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-4693 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45774 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45774 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45775 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45775 ( NVD ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2024-45776 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45776 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45777 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45778 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45778 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45779 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45779 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-45780 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45780 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45781 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45781 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45783 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45783 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56737 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56737 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56737 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-0622 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0622 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0624 ( SUSE ): 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-0624 ( NVD ): 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-0677 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-0677 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0677 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0678 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-0678 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0684 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0684 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0685 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-0685 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0685 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0686 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-0686 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0686 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0689 ( SUSE ): 8.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-0689 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0689 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0690 ( SUSE ): 7.3 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-0690 ( SUSE ): 6.1 CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-0690 ( NVD ): 6.1 CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1118 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1118 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-1118 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-1125 ( SUSE ): 8.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-1125 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-1125 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that solves 24 vulnerabilities can now be installed. ## Description: This update for grub2 fixes the following issues: * CVE-2023-4692: nfs: out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (bsc#1215935). * CVE-2023-4693: nfs: out-of-bounds read at fs/ntfs.c (bsc#1215936). * CVE-2024-45774: heap overflows in JPEG parser (bsc#1233609). * CVE-2024-45775: missing NULL check in extcmd parser (bsc#1233610). * CVE-2024-45776: overflow in .MO file (gettext) handling (bsc#1233612). * CVE-2024-45777: integer overflow in gettext (bsc#1233613). * CVE-2024-45778: bfs filesystem not fuzzing stable (bsc#1233606). * CVE-2024-45779: bfs: heap overflow (bsc#1233608). * CVE-2024-45780: overflow in tar/cpio (bsc#1233614). * CVE-2024-45781: ufs: strcpy overflow (bsc#1233617). * CVE-2024-45782: hfs: strcpy overflow (bsc#1233615). * CVE-2024-45783: hfsplus: refcount overflow (bsc#1233616). * CVE-2024-56737: heap-based buffer overflow in fs/hfs.c via crafted sblock data in an HFS filesystem (bsc#1234958). * CVE-2025-0622: command/gpg: Use-after-free due to hooks not being removed on module unload (bsc#1236317). * CVE-2025-0624: net: Out-of-bounds write in grub_net_search_config_file() (bsc#1236316). * CVE-2025-0677: ufs: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (bsc#1237002). * CVE-2025-0678: squash4: Integer overflow may lead to heap based out-of- bounds write when reading data (bsc#1237006). * CVE-2025-0684: reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data (bsc#1237008). * CVE-2025-0685: jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data (bsc#1237009). * CVE-2025-0686: romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data (bsc#1237010). * CVE-2025-0689: udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution (bsc#1237011). * CVE-2025-0690: read: Integer overflow may lead to out-of-bounds write (bsc#1237012). * CVE-2025-1118: commands/dump: The dump command is not in lockdown when secure boot is enabled (bsc#1237013). * CVE-2025-1125: fs/hfs: Interger overflow may lead to heap based out-of- bounds write (bsc#1237014). Other bugfixes: * Bump upstream SBAT generation to 5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1961=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * grub2-debugsource-2.04-150300.3.11.1 * grub2-debuginfo-2.04-150300.3.11.1 * grub2-2.04-150300.3.11.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * grub2-x86_64-xen-2.04-150300.3.11.1 * grub2-i386-pc-2.04-150300.3.11.1 * grub2-arm64-efi-2.04-150300.3.11.1 * grub2-x86_64-efi-2.04-150300.3.11.1 * grub2-snapper-plugin-2.04-150300.3.11.1 * SUSE Linux Enterprise Micro 5.1 (s390x) * grub2-s390x-emu-2.04-150300.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4692.html * https://www.suse.com/security/cve/CVE-2023-4693.html * https://www.suse.com/security/cve/CVE-2024-45774.html * https://www.suse.com/security/cve/CVE-2024-45775.html * https://www.suse.com/security/cve/CVE-2024-45776.html * https://www.suse.com/security/cve/CVE-2024-45777.html * https://www.suse.com/security/cve/CVE-2024-45778.html * https://www.suse.com/security/cve/CVE-2024-45779.html * https://www.suse.com/security/cve/CVE-2024-45780.html * https://www.suse.com/security/cve/CVE-2024-45781.html * https://www.suse.com/security/cve/CVE-2024-45782.html * https://www.suse.com/security/cve/CVE-2024-45783.html * https://www.suse.com/security/cve/CVE-2024-56737.html * https://www.suse.com/security/cve/CVE-2025-0622.html * https://www.suse.com/security/cve/CVE-2025-0624.html * https://www.suse.com/security/cve/CVE-2025-0677.html * https://www.suse.com/security/cve/CVE-2025-0678.html * https://www.suse.com/security/cve/CVE-2025-0684.html * https://www.suse.com/security/cve/CVE-2025-0685.html * https://www.suse.com/security/cve/CVE-2025-0686.html * https://www.suse.com/security/cve/CVE-2025-0689.html * https://www.suse.com/security/cve/CVE-2025-0690.html * https://www.suse.com/security/cve/CVE-2025-1118.html * https://www.suse.com/security/cve/CVE-2025-1125.html * https://bugzilla.suse.com/show_bug.cgi?id=1215935 * https://bugzilla.suse.com/show_bug.cgi?id=1215936 * https://bugzilla.suse.com/show_bug.cgi?id=1233606 * https://bugzilla.suse.com/show_bug.cgi?id=1233608 * https://bugzilla.suse.com/show_bug.cgi?id=1233609 * https://bugzilla.suse.com/show_bug.cgi?id=1233610 * https://bugzilla.suse.com/show_bug.cgi?id=1233612 * https://bugzilla.suse.com/show_bug.cgi?id=1233613 * https://bugzilla.suse.com/show_bug.cgi?id=1233614 * https://bugzilla.suse.com/show_bug.cgi?id=1233615 * https://bugzilla.suse.com/show_bug.cgi?id=1233616 * https://bugzilla.suse.com/show_bug.cgi?id=1233617 * https://bugzilla.suse.com/show_bug.cgi?id=1234958 * https://bugzilla.suse.com/show_bug.cgi?id=1236316 * https://bugzilla.suse.com/show_bug.cgi?id=1236317 * https://bugzilla.suse.com/show_bug.cgi?id=1237002 * https://bugzilla.suse.com/show_bug.cgi?id=1237006 * https://bugzilla.suse.com/show_bug.cgi?id=1237008 * https://bugzilla.suse.com/show_bug.cgi?id=1237009 * https://bugzilla.suse.com/show_bug.cgi?id=1237010 * https://bugzilla.suse.com/show_bug.cgi?id=1237011 * https://bugzilla.suse.com/show_bug.cgi?id=1237012 * https://bugzilla.suse.com/show_bug.cgi?id=1237013 * https://bugzilla.suse.com/show_bug.cgi?id=1237014 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 16:50:03 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 16:50:03 -0000 Subject: SUSE-SU-2025:01964-1: important: Security update for the Linux Kernel Message-ID: <175009260389.655.4027187688742634643@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01964-1 Release Date: 2025-06-16T14:54:14Z Rating: important References: * bsc#1215199 * bsc#1220112 * bsc#1223096 * bsc#1223809 * bsc#1224013 * bsc#1224597 * bsc#1224757 * bsc#1226498 * bsc#1228659 * bsc#1229491 * bsc#1230581 * bsc#1230764 * bsc#1231016 * bsc#1231103 * bsc#1231910 * bsc#1232493 * bsc#1232649 * bsc#1232882 * bsc#1233075 * bsc#1233098 * bsc#1233192 * bsc#1234074 * bsc#1234154 * bsc#1234157 * bsc#1234698 * bsc#1235149 * bsc#1235501 * bsc#1235526 * bsc#1235550 * bsc#1235870 * bsc#1235968 * bsc#1236086 * bsc#1236142 * bsc#1236208 * bsc#1236704 * bsc#1237111 * bsc#1237312 * bsc#1237874 * bsc#1237882 * bsc#1238052 * bsc#1238212 * bsc#1238471 * bsc#1238473 * bsc#1238527 * bsc#1238565 * bsc#1238714 * bsc#1238737 * bsc#1238742 * bsc#1238745 * bsc#1238746 * bsc#1238774 * bsc#1238862 * bsc#1238961 * bsc#1238970 * bsc#1238983 * bsc#1238990 * bsc#1238992 * bsc#1239066 * bsc#1239079 * bsc#1239108 * bsc#1239470 * bsc#1239475 * bsc#1239476 * bsc#1239487 * bsc#1239510 * bsc#1239684 * bsc#1239691 * bsc#1239906 * bsc#1239925 * bsc#1239997 * bsc#1240167 * bsc#1240168 * bsc#1240171 * bsc#1240176 * bsc#1240181 * bsc#1240184 * bsc#1240185 * bsc#1240375 * bsc#1240557 * bsc#1240575 * bsc#1240576 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240593 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240655 * bsc#1240691 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240709 * bsc#1240712 * bsc#1240713 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240717 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240740 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240785 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240801 * bsc#1240802 * bsc#1240806 * bsc#1240808 * bsc#1240809 * bsc#1240811 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240835 * bsc#1240866 * bsc#1240873 * bsc#1240934 * bsc#1240936 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240944 * bsc#1240966 * bsc#1240978 * bsc#1240979 * bsc#1241010 * bsc#1241038 * bsc#1241051 * bsc#1241123 * bsc#1241148 * bsc#1241151 * bsc#1241167 * bsc#1241175 * bsc#1241204 * bsc#1241250 * bsc#1241265 * bsc#1241266 * bsc#1241280 * bsc#1241282 * bsc#1241305 * bsc#1241332 * bsc#1241333 * bsc#1241340 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241351 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241371 * bsc#1241373 * bsc#1241376 * bsc#1241378 * bsc#1241394 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241416 * bsc#1241424 * bsc#1241426 * bsc#1241433 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241448 * bsc#1241451 * bsc#1241452 * bsc#1241456 * bsc#1241457 * bsc#1241458 * bsc#1241459 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241526 * bsc#1241528 * bsc#1241533 * bsc#1241537 * bsc#1241538 * bsc#1241541 * bsc#1241545 * bsc#1241547 * bsc#1241548 * bsc#1241550 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241576 * bsc#1241578 * bsc#1241590 * bsc#1241593 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241625 * bsc#1241626 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241640 * bsc#1241644 * bsc#1241648 * bsc#1241654 * bsc#1241657 * bsc#1242006 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242172 * bsc#1242203 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242526 * bsc#1242528 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242596 * bsc#1242709 * bsc#1242710 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242831 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242944 * bsc#1242945 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242985 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243805 * bsc#1243963 * jsc#PED-12309 Cross-References: * CVE-2023-53034 * CVE-2023-53146 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35840 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-46763 * CVE-2024-46865 * CVE-2024-50038 * CVE-2024-50083 * CVE-2024-50106 * CVE-2024-50162 * CVE-2024-50163 * CVE-2024-50223 * CVE-2024-53124 * CVE-2024-53135 * CVE-2024-53139 * CVE-2024-54458 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-57924 * CVE-2024-57998 * CVE-2024-58001 * CVE-2024-58018 * CVE-2024-58068 * CVE-2024-58070 * CVE-2024-58071 * CVE-2024-58088 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21683 * CVE-2025-21696 * CVE-2025-21702 * CVE-2025-21707 * CVE-2025-21729 * CVE-2025-21755 * CVE-2025-21758 * CVE-2025-21768 * CVE-2025-21787 * CVE-2025-21792 * CVE-2025-21806 * CVE-2025-21808 * CVE-2025-21812 * CVE-2025-21814 * CVE-2025-21833 * CVE-2025-21836 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21854 * CVE-2025-21863 * CVE-2025-21867 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21881 * CVE-2025-21884 * CVE-2025-21887 * CVE-2025-21889 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21904 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21919 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21925 * CVE-2025-21926 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21930 * CVE-2025-21931 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21980 * CVE-2025-21981 * CVE-2025-21985 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-21999 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22004 * CVE-2025-22005 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-22015 * CVE-2025-22016 * CVE-2025-22017 * CVE-2025-22018 * CVE-2025-22020 * CVE-2025-22021 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22029 * CVE-2025-22030 * CVE-2025-22033 * CVE-2025-22036 * CVE-2025-22044 * CVE-2025-22045 * CVE-2025-22050 * CVE-2025-22053 * CVE-2025-22055 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22062 * CVE-2025-22063 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22075 * CVE-2025-22080 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22089 * CVE-2025-22090 * CVE-2025-22093 * CVE-2025-22095 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22103 * CVE-2025-22104 * CVE-2025-22105 * CVE-2025-22106 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22115 * CVE-2025-22116 * CVE-2025-22119 * CVE-2025-22121 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-22128 * CVE-2025-2312 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23133 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23145 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37785 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37860 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39728 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50162 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50162 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50163 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22029 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22029 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22115 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22115 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Real Time Module 15-SP6 An update that solves 339 vulnerabilities, contains one feature and has 88 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP (bsc#1233075). * CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not overlap (bsc#1233098). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961). * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704). * CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737). * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713). * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712). * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655). * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717). * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740). * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835). * CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944). * CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934). * CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936). * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426). * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433). * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373). * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416). * CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537). * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550). * CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548). * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575). * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573). * CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578). * CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). * CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks (bsc#1243664). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). * CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626). The following non-security bugs were fixed: * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes). * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes). * ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git- fixes). * ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes). * ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: ump: Fix buffer overflow at UMP SysEx message conversion (bsc#1242044). * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable- fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable- fixes). * ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes). * ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable- fixes). * ASoC: Use of_property_read_bool() (stable-fixes). * ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes). * ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes). * ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes). * ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes). * ASoC: fsl_audmix: register card device depends on 'dais' property (stable- fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes). * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes). * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git- fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address (git-fixes). * Bluetooth: hci_uart: Fix another race during initialization (git-fixes). * Bluetooth: hci_uart: fix race during initialization (stable-fixes). * Bluetooth: l2cap: Check encryption key size on incoming connection (git- fixes). * Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes). * Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes). * pci: Drop PCI patch that caused a regression (bsc#1241123) * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes). * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * Input: xpad - fix two controller table values (git-fixes). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * OPP: add index check to assert to avoid buffer overflow in _read_freq() (bsc#1238961) * PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git- fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes). * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/core: Silence oversized kvmalloc() warning (git-fixes) * RDMA/hns: Fix wrong maximum DMA segment size (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mana_ib: Ensure variable err is initialized (git-fixes). * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes) * mm: Revert commit (bsc#1241051) * Squashfs: check return result of sb_min_blocksize (git-fixes). * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes). * USB: VLI disk crashes if LPM is used (stable-fixes). * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes). * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes). * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable- fixes). * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes). * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes). * USB: wdm: add annotation (git-fixes). * USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes). * USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes). * USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes). * RDMA: Update patch RDMA-core-Don-t-expose-hw_counters-outside-of- init-n.patch (git-fixes bsc#1239925). * kABI: Update patch kABI-fix-for-RDMA-core-Don-t-expose-hw_counters- outs.patch (git-fixes bsc#1239925). * nvme: Update patch nvme-fixup-scan-failure-for-non-ANA-multipath- contro.patch (git-fixes bsc#1235149). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * asus-laptop: Fix an uninitialized variable (git-fixes). * ata: libata-sata: Save all fields from sense data descriptor (git-fixes). * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git- fixes). * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes). * ata: libata-scsi: Improve CDL control (git-fixes). * ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() (git-fixes). * ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes). * auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes). * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes). * badblocks: Fix error shitf ops (git-fixes). * badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes). * badblocks: fix missing bad blocks on retry in _badblocks_check() (git- fixes). * badblocks: fix the using of MAX_BADBLOCKS (git-fixes). * badblocks: return error directly when setting badblocks exceeds 512 (git- fixes). * badblocks: return error if any badblock set fails (git-fixes). * blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes). * block: change blk_mq_add_to_batch() third argument type to bool (git-fixes). * block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes). * block: fix conversion of GPT partition name to 7-bit (git-fixes). * block: fix resource leak in blk_register_queue() error path (git-fixes). * block: integrity: Do not call set_page_dirty_lock() (git-fixes). * block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (git-fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes). * bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes). * bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes). * bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * bpf: add find_containing_subprog() utility function (bsc#1241590). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: check changes_pkt_data property for extension programs (bsc#1241590). * bpf: consider that tail calls invalidate packet pointers (bsc#1241590). * bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590). * bpf: fix potential error return (git-fixes). * bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590). * bpf: track changes_pkt_data property for global functions (bsc#1241590). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * btrfs: add and use helper to verify the calling task has locked the inode (bsc#1241204). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix hole expansion when writing at an offset beyond EOF (bsc#1241151). * btrfs: fix missing snapshot drew unlock when root is dead during swap activation (bsc#1241204). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * btrfs: fix race with memory mapped writes when activating swap file (bsc#1241204). * btrfs: fix swap file activation failure due to extents that used to be shared (bsc#1241204). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes). * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git- fixes). * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes). * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git- fixes). * can: slcan: allow reception of short error messages (git-fixes). * cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes). * char: misc: register chrdev region with all possible minors (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: Fix integer overflow while processing actimeo mount option (git- fixes). * cifs: change tcon status when need_reconnect is set on it (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes). * crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes). * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes). * cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git- fixes). * devlink: fix port new reply cmd type (git-fixes). * dm-bufio: do not schedule in atomic context (git-fixes). * dm-ebs: fix prefetch-vs-suspend race (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * dm-integrity: set ti->error on memory allocation failure (git-fixes). * dm-verity: fix prefetch-vs-suspend race (git-fixes). * dm: add missing unlock on in dm_keyslot_evict() (git-fixes). * dm: always update the array size in realloc_argv on success (git-fixes). * dm: fix copying after src array boundaries (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable- fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * drivers: base: devres: Allow to release group on device release (stable- fixes). * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Fix gpu reset in multidisplay config (git-fixes). * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes). * drm/amd/display: Force full update in gpu reset (stable-fixes). * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes). * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amd: Handle being compiled without SI or CIK support better (stable- fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() (stable-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdkfd: Fix mode1 reset crash issue (stable-fixes). * drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes). * drm/amdkfd: clamp queue size to minimum (stable-fixes). * drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes). * drm/bridge: panel: forbid initializing a panel with unknown connector type (stable-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/fdinfo: Protect against driver unbind (git-fixes). * drm/i915/dg2: wait for HuC load completion before running selftests (stable- fixes). * drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes). * drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes). * drm/i915: Disable RPG during live selftest (git-fixes). * drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable- fixes). * drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable- fixes). * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/tests: Add helper to create mock crtc (stable-fixes). * drm/tests: Add helper to create mock plane (stable-fixes). * drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git- fixes). * drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes). * drm/tests: helpers: Add atomic helpers (stable-fixes). * drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable- fixes). * drm/tests: helpers: Create kunit helper to destroy a drm_display_mode (stable-fixes). * drm/tests: helpers: Fix compiler warning (git-fixes). * drm/tests: modes: Fix drm_display_mode memory leak (git-fixes). * drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes). * drm: allow encoder mode_set even when connectors change for crtc (stable- fixes). * drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel) (stable-fixes). * drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB (stable-fixes). * drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes). * e1000e: change k1 configuration on MTP and later platforms (git-fixes). * eth: bnxt: fix missing ring index trim on error path (git-fixes). * ethtool: Fix context creation with no parameters (git-fixes). * ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes). * ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git- fixes). * ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes). * ethtool: fix setting key and resetting indir at once (git-fixes). * ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes). * ethtool: netlink: do not return SQI value if link is down (git-fixes). * ethtool: plca: fix plca enable data type while parsing the value (git- fixes). * ethtool: rss: echo the context number back (git-fixes). * exfat: do not fallback to buffered write (git-fixes). * exfat: drop ->i_size_ondisk (git-fixes). * exfat: fix potential wrong error return from get_block (git-fixes). * exfat: fix soft lockup in exfat_clear_bitmap (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes). * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342). * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540). * ext4: do not over-report free space or inodes in statvfs (bsc#1242345). * ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347). * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557). * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556). * ext4: make block validity check resistent to sb bh corruption (bsc#1242348). * ext4: partial zero eof block on unaligned inode size extension (bsc#1242336). * ext4: protect ext4_release_dquot against freezing (bsc#1242335). * ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536). * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539). * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538). * fbdev: omapfb: Add 'plane' value check (stable-fixes). * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git- fixes). * firmware: arm_scmi: Balance device refcount when destroying devices (git- fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * fs/jfs: Prevent integer overflow in AG size calculation (git-fixes). * fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes). * fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250). * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528). * fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535). * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526). * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes). * gve: handle overflow when reporting TX consumed descriptors (git-fixes). * gve: set xdp redirect target only when it is available (git-fixes). * hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes). * ice: Add check for devm_kzalloc() (git-fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * ice: fix reservation of resources for RDMA when disabled (git-fixes). * ice: stop truncating queue ids when checking (git-fixes). * idpf: check error for register_netdev() on init (git-fixes). * idpf: fix adapter NULL pointer dereference on reboot (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * igb: reject invalid external timestamp requests for 82580-based HW (git- fixes). * igc: add lock preventing multiple simultaneous PTM transactions (git-fixes). * igc: cleanup PTP module if probe fails (git-fixes). * igc: fix PTM cycle trigger logic (git-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes). * igc: increase wait time before retrying PTM (git-fixes). * igc: move ktime snapshot into PTM retry loop (git-fixes). * iio: accel: adxl367: fix setting odr for activity time update (git-fixes). * iio: adc: ad7606: fix serial register access (git-fixes). * iio: adc: ad7768-1: Fix conversion result sign (git-fixes). * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes). * iio: adis16201: Correct inclinometer channel resolution (git-fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git- fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes). * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git- fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * irqchip/davinci: Remove leftover header (git-fixes). * irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes). * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git- fixes). * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307). * jbd2: add a missing data flush during file and fs synchronization (bsc#1242346). * jbd2: fix off-by-one while erasing journal (bsc#1242344). * jbd2: flush filesystem device before updating tail sequence (bsc#1242333). * jbd2: increase IO priority for writing revoke records (bsc#1242332). * jbd2: increase the journal IO's priority (bsc#1242537). * jbd2: remove wrong sb->s_sequence check (bsc#1242343). * jfs: Fix uninit-value access of imap allocated in the diMount() function (git-fixes). * jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes). * jfs: add sanity check for agwidth in dbMount (git-fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI fix for sctp: detect and prevent references to a freed transport in sendmsg (git-fixes). * kABI workaround for powercap update (bsc#1241010). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-obs-qa: Use srchash for dependency as well * ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes). * kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * loop: Add sanity check for read/write_iter (git-fixes). * loop: LOOP_SET_FD: send uevents for partitions (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes). * loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes). * md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb (bsc#1238212) * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * mei: me: add panther lake H DID (stable-fixes). * misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration (git-fixes). * misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack (git-fixes). * mm/readahead: fix large folio support in async readahead (bsc#1242321). * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326). * mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327). * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546). * mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable- fixes). * mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes). * mptcp: refine opt_mp_capable determination (git-fixes). * mptcp: relax check on MPC passive fallback (git-fixes). * mptcp: strict validation before using mp_opt->hmac (git-fixes). * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * neighbour: delete redundant judgment statements (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5: Fill out devlink dev info only for PFs (git-fixes). * net/mlx5: IRQ, Fix null string in debug print (git-fixes). * net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git- fixes). * net/mlx5: Start health poll after enable hca (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes). * net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices (git-fixes). * net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes). * net/tcp: refactor tcp_inet6_sk() (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes). * net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes). * net: blackhole_dev: fix build warning for ethh set but not used (git-fixes). * net: do not dump stack on queue timeout (git-fixes). * net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes). * net: ethtool: Fix RSS setting (git-fixes). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: mana: Switch to page pool for jumbo frames (git-fixes). * net: mark racy access on sk->sk_rcvbuf (git-fixes). * net: phy: leds: fix memory leak (git-fixes). * net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: sctp: fix skb leak in sctp_inq_free() (git-fixes). * net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net_sched: drr: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: ets: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes). * net_sched: qfq: Fix double list add in class with netem as child qdisc (git- fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes). * nfs: add missing selections of CONFIG_CRC32 (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: reduce stack usage in idt_scan_mws (stable-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes). * nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes). * nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git- fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-fcloop: swap list_add_tail arguments (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172) * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172) * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172) * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172) * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git- fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable- fixes). * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes). * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes). * platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug (git-fixes). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/boot: Check for ld-option support (bsc#1215199). * powerpc/boot: Fix dash warning (bsc#1215199). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes). * pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes). * pwm: rcar: Improve register calculation (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: max20086: fix invalid memory access (git-fixes). * rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038). * rtc: pcf85063: do a SW reset if POR failed (stable-fixes). * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * scsi: Improve CDL control (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes). * scsi: hisi_sas: Enable force phy when SATA disk directly connected (git- fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: mpi3mr: Fix locking in an error path (git-fixes). * scsi: mpt3sas: Fix a locking bug in an error path (git-fixes). * scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes). * sctp: Fix undefined behavior in left shift operation (git-fixes). * sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes). * sctp: detect and prevent references to a freed transport in sendmsg (git- fixes). * sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start (git-fixes). * sctp: fix association labeling in the duplicate COOKIE-ECHO case (git- fixes). * sctp: fix busy polling (git-fixes). * sctp: prefer struct_size over open coded arithmetic (git-fixes). * sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftests/bpf: Add a few tests to cover (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590). * selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590). * selftests/bpf: test for changing packet data from global functions (bsc#1241590). * selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590). * selftests/futex: futex_waitv wouldblock test should fail (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: generate a temporary mountpoint for cgroup filesystem (git- fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: msm: Configure correct working mode before starting earlycon (git- fixes). * serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes). * smb3: fix Open files on server counter going negative (git-fixes). * smb: client: Use str_yes_no() helper function (git-fixes). * smb: client: allow more DFS referrals to be cached (git-fixes). * smb: client: avoid unnecessary reconnects when refreshing referrals (git- fixes). * smb: client: change return value in open_cached_dir_by_dentry() if !cfids (git-fixes). * smb: client: do not retry DFS targets on server shutdown (git-fixes). * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes). * smb: client: do not try following DFS links in cifs_tree_connect() (git- fixes). * smb: client: fix DFS interlink failover (git-fixes). * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes). * smb: client: fix folio leaks and perf improvements (bsc#1239997, bsc1241265). * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smb: client: fix potential race in cifs_put_tcon() (git-fixes). * smb: client: fix return value of parse_dfs_referrals() (git-fixes). * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes). * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes). * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes). * smb: client: improve purging of cached referrals (git-fixes). * smb: client: introduce av_for_each_entry() helper (git-fixes). * smb: client: optimize referral walk on failed link targets (git-fixes). * smb: client: parse DNS domain name from domain= option (git-fixes). * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes). * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes). * smb: client: refresh referral without acquiring refpath_lock (git-fixes). * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes). * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes). * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes). * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328). * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes). * staging: axis-fifo: Remove hardware resets for user errors (git-fixes). * staging: iio: adc: ad7816: Correct conditional logic for store mode (git- fixes). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * string: Add load_unaligned_zeropad() code path to sized_strscpy() (git- fixes). * tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Scan retimers after device router has been enumerated (stable- fixes). * tools/hv: update route parsing in kvp daemon (git-fixes). * tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175). * tools/power turbostat: report CoreThr per measurement interval (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: n_tty: use uint for space returned by tty_write_room() (git-fixes). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * ublk: set_params: properly check if parameters can be applied (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * udf: Fix inode_getblk() return value (bsc#1242313). * udf: Skip parent dir link count update if corrupted (bsc#1242315). * udf: Verify inode link counts before performing rename (bsc#1242314). * usb: cdns3: Fix deadlock when using NCM gadget (git-fixes). * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git- fixes). * usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git- fixes). * usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git- fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes). * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes). * usb: dwc3: gadget: check that event count does not exceed event buffer length (git-fixes). * usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes). * usb: gadget: Use get_status callback to set remote wakeup capability (git- fixes). * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable- fixes). * usb: gadget: f_ecm: Add get_status callback (git-fixes). * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes). * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes). * usb: host: tegra: Prevent host controller crash when OTG port is used (git- fixes). * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes). * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable- fixes). * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable- fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes). * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes). * usb: uhci-platform: Make the clock really optional (git-fixes). * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes). * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes). * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes). * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtchnl: make proto and filter action count unsigned (git-fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * vmxnet3: Fix tx queue race condition with XDP (bsc#1241394). * vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394). * wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (stable-fixes). * wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable- fixes). * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable- fixes). * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes). * wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). * x86/bugs: Add RSB mitigation document (git-fixes). * x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes). * x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes). * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git- fixes). * x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes). * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes). * x86/dumpstack: Fix inaccurate unwinding from exception stacks due to misplaced assignment (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (git-fixes). * x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes). * x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes). * x86/microcode/AMD: Split load_microcode_amd() (git-fixes). * x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (git-fixes). * x86/microcode/intel: Set new revision only after a successful update (git- fixes). * x86/microcode: Remove the driver announcement and version (git-fixes). * x86/microcode: Rework early revisions reporting (git-fixes). * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes). * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git- fixes). * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes). * x86/uaccess: Improve performance by aligning writes to 8 bytes in copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xfs: flush inodegc before swapon (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). * zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING (bsc#1241167). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1964=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1964=1 * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-1964=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * kernel-rt-livepatch-devel-6.4.0-150600.10.39.1 * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.39.1 * gfs2-kmp-rt-6.4.0-150600.10.39.1 * reiserfs-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.39.1 * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * kernel-rt-optional-debuginfo-6.4.0-150600.10.39.1 * kernel-rt-vdso-debuginfo-6.4.0-150600.10.39.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * cluster-md-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt-debugsource-6.4.0-150600.10.39.1 * kernel-rt-extra-6.4.0-150600.10.39.1 * kernel-rt-vdso-6.4.0-150600.10.39.1 * kernel-rt_debug-devel-6.4.0-150600.10.39.1 * kselftests-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.39.1 * dlm-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt-optional-6.4.0-150600.10.39.1 * ocfs2-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt-debuginfo-6.4.0-150600.10.39.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.39.1 * kernel-rt_debug-vdso-6.4.0-150600.10.39.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.39.1 * kernel-syms-rt-6.4.0-150600.10.39.1 * kernel-rt-extra-debuginfo-6.4.0-150600.10.39.1 * kernel-rt-devel-6.4.0-150600.10.39.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-rt-6.4.0-150600.10.39.1 * kernel-source-rt-6.4.0-150600.10.39.1 * openSUSE Leap 15.6 (nosrc x86_64) * kernel-rt-6.4.0-150600.10.39.1 * kernel-rt_debug-6.4.0-150600.10.39.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_39-rt-1-150600.1.3.2 * kernel-livepatch-6_4_0-150600_10_39-rt-debuginfo-1-150600.1.3.2 * kernel-livepatch-SLE15-SP6-RT_Update_11-debugsource-1-150600.1.3.2 * SUSE Real Time Module 15-SP6 (x86_64) * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * kernel-rt_debug-devel-6.4.0-150600.10.39.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.39.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.39.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.39.1 * dlm-kmp-rt-6.4.0-150600.10.39.1 * cluster-md-kmp-rt-6.4.0-150600.10.39.1 * gfs2-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt-debugsource-6.4.0-150600.10.39.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.39.1 * kernel-syms-rt-6.4.0-150600.10.39.1 * ocfs2-kmp-rt-6.4.0-150600.10.39.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.39.1 * kernel-rt-debuginfo-6.4.0-150600.10.39.1 * kernel-rt-devel-6.4.0-150600.10.39.1 * SUSE Real Time Module 15-SP6 (noarch) * kernel-devel-rt-6.4.0-150600.10.39.1 * kernel-source-rt-6.4.0-150600.10.39.1 * SUSE Real Time Module 15-SP6 (nosrc x86_64) * kernel-rt-6.4.0-150600.10.39.1 * kernel-rt_debug-6.4.0-150600.10.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50162.html * https://www.suse.com/security/cve/CVE-2024-50163.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-57924.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58068.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58088.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21696.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21808.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21833.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21854.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21867.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21904.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21925.html * https://www.suse.com/security/cve/CVE-2025-21926.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21931.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21980.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21985.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22004.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-22015.html * https://www.suse.com/security/cve/CVE-2025-22016.html * https://www.suse.com/security/cve/CVE-2025-22017.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22029.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22036.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22053.html * https://www.suse.com/security/cve/CVE-2025-22055.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22080.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22090.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22105.html * https://www.suse.com/security/cve/CVE-2025-22106.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22115.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23133.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37860.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39728.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233075 * https://bugzilla.suse.com/show_bug.cgi?id=1233098 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236086 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1237111 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238742 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239108 * https://bugzilla.suse.com/show_bug.cgi?id=1239470 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239510 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239997 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240181 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240576 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240655 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240709 * https://bugzilla.suse.com/show_bug.cgi?id=1240712 * https://bugzilla.suse.com/show_bug.cgi?id=1240713 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240809 * https://bugzilla.suse.com/show_bug.cgi?id=1240811 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240835 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240934 * https://bugzilla.suse.com/show_bug.cgi?id=1240936 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240944 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241010 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241051 * https://bugzilla.suse.com/show_bug.cgi?id=1241123 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241151 * https://bugzilla.suse.com/show_bug.cgi?id=1241167 * https://bugzilla.suse.com/show_bug.cgi?id=1241175 * https://bugzilla.suse.com/show_bug.cgi?id=1241204 * https://bugzilla.suse.com/show_bug.cgi?id=1241250 * https://bugzilla.suse.com/show_bug.cgi?id=1241265 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241371 * https://bugzilla.suse.com/show_bug.cgi?id=1241373 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241378 * https://bugzilla.suse.com/show_bug.cgi?id=1241394 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241416 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241426 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241451 * https://bugzilla.suse.com/show_bug.cgi?id=1241452 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241537 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241547 * https://bugzilla.suse.com/show_bug.cgi?id=1241548 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241578 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241626 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242985 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://jira.suse.com/browse/PED-12309 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 16:51:50 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 16:51:50 -0000 Subject: SUSE-RU-2025:01969-1: moderate: Recommended update for release-notes-sle_hpc Message-ID: <175009271009.655.4601045986834000782@smelt2.prg2.suse.org> # Recommended update for release-notes-sle_hpc Announcement ID: SUSE-RU-2025:01969-1 Release Date: 2025-06-16T15:18:39Z Rating: moderate References: * bsc#933411 * jsc#PED-12383 Affected Products: * HPC Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP7 * SUSE Linux Enterprise Server 15 SP7 An update that contains one feature and has one fix can now be installed. ## Description: This update for release-notes-sle_hpc fixes the following issues: * Update to 15.7.20250616 (tracked in bsc#933411) * Added note about hdf5 removal (jsc#PED-12383) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 15-SP7 zypper in -t patch SUSE-SLE-Module-HPC-15-SP7-2025-1969=1 * SUSE Linux Enterprise High Performance Computing 15 SP7 zypper in -t patch SUSE-SLE-Product-HPC-15-SP7-2025-1969=1 ## Package List: * HPC Module 15-SP7 (noarch) * release-notes-sle_hpc-15.700000000.20250616-150700.3.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP7 (noarch) * release-notes-sle_hpc-15.700000000.20250616-150700.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-12383 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 16:52:22 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 16:52:22 -0000 Subject: SUSE-SU-2025:01968-1: moderate: Security update for wireshark Message-ID: <175009274278.655.3083927128904358417@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2025:01968-1 Release Date: 2025-06-16T14:56:59Z Rating: moderate References: * bsc#1244081 Cross-References: * CVE-2025-5601 CVSS scores: * CVE-2025-5601 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-5601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for wireshark fixes the following issues: * CVE-2025-5601: Dissection engine crash (bsc#1244081). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1968=1 openSUSE-SLE-15.6-2025-1968=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1968=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1968=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1968=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1968=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wireshark-debuginfo-4.2.12-150600.18.23.1 * wireshark-debugsource-4.2.12-150600.18.23.1 * wireshark-ui-qt-debuginfo-4.2.12-150600.18.23.1 * libwireshark17-4.2.12-150600.18.23.1 * libwsutil15-debuginfo-4.2.12-150600.18.23.1 * libwsutil15-4.2.12-150600.18.23.1 * libwiretap14-debuginfo-4.2.12-150600.18.23.1 * libwiretap14-4.2.12-150600.18.23.1 * wireshark-4.2.12-150600.18.23.1 * wireshark-ui-qt-4.2.12-150600.18.23.1 * libwireshark17-debuginfo-4.2.12-150600.18.23.1 * wireshark-devel-4.2.12-150600.18.23.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-4.2.12-150600.18.23.1 * wireshark-debugsource-4.2.12-150600.18.23.1 * libwireshark17-4.2.12-150600.18.23.1 * libwsutil15-debuginfo-4.2.12-150600.18.23.1 * libwsutil15-4.2.12-150600.18.23.1 * libwiretap14-debuginfo-4.2.12-150600.18.23.1 * libwiretap14-4.2.12-150600.18.23.1 * wireshark-4.2.12-150600.18.23.1 * libwireshark17-debuginfo-4.2.12-150600.18.23.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-4.2.12-150600.18.23.1 * wireshark-debugsource-4.2.12-150600.18.23.1 * libwireshark17-4.2.12-150600.18.23.1 * libwsutil15-debuginfo-4.2.12-150600.18.23.1 * libwsutil15-4.2.12-150600.18.23.1 * libwiretap14-debuginfo-4.2.12-150600.18.23.1 * libwiretap14-4.2.12-150600.18.23.1 * wireshark-4.2.12-150600.18.23.1 * libwireshark17-debuginfo-4.2.12-150600.18.23.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-4.2.12-150600.18.23.1 * wireshark-debugsource-4.2.12-150600.18.23.1 * wireshark-ui-qt-debuginfo-4.2.12-150600.18.23.1 * wireshark-ui-qt-4.2.12-150600.18.23.1 * wireshark-devel-4.2.12-150600.18.23.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-4.2.12-150600.18.23.1 * wireshark-debugsource-4.2.12-150600.18.23.1 * wireshark-ui-qt-debuginfo-4.2.12-150600.18.23.1 * wireshark-ui-qt-4.2.12-150600.18.23.1 * wireshark-devel-4.2.12-150600.18.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5601.html * https://bugzilla.suse.com/show_bug.cgi?id=1244081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 16:59:42 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 16:59:42 -0000 Subject: SUSE-SU-2025:01967-1: important: Security update for the Linux Kernel Message-ID: <175009318224.655.5510630161384727681@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01967-1 Release Date: 2025-06-16T14:56:02Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1220419 * bsc#1222649 * bsc#1222656 * bsc#1223096 * bsc#1223809 * bsc#1224013 * bsc#1224489 * bsc#1224597 * bsc#1224757 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228659 * bsc#1229311 * bsc#1230497 * bsc#1230581 * bsc#1230764 * bsc#1230769 * bsc#1231016 * bsc#1231103 * bsc#1231293 * bsc#1231910 * bsc#1232364 * bsc#1232389 * bsc#1232493 * bsc#1232649 * bsc#1232848 * bsc#1232882 * bsc#1232895 * bsc#1233060 * bsc#1233192 * bsc#1233479 * bsc#1233551 * bsc#1233557 * bsc#1234074 * bsc#1234157 * bsc#1234222 * bsc#1234480 * bsc#1234698 * bsc#1234828 * bsc#1234936 * bsc#1235149 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235526 * bsc#1235550 * bsc#1235589 * bsc#1235591 * bsc#1235621 * bsc#1235637 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235870 * bsc#1235973 * bsc#1236086 * bsc#1236111 * bsc#1236142 * bsc#1236206 * bsc#1236208 * bsc#1236333 * bsc#1236394 * bsc#1236704 * bsc#1237029 * bsc#1237111 * bsc#1237164 * bsc#1237312 * bsc#1237313 * bsc#1237530 * bsc#1237545 * bsc#1237546 * bsc#1237704 * bsc#1237757 * bsc#1237874 * bsc#1237875 * bsc#1237882 * bsc#1237885 * bsc#1237897 * bsc#1237906 * bsc#1238052 * bsc#1238212 * bsc#1238471 * bsc#1238473 * bsc#1238506 * bsc#1238512 * bsc#1238527 * bsc#1238528 * bsc#1238532 * bsc#1238565 * bsc#1238585 * bsc#1238714 * bsc#1238716 * bsc#1238737 * bsc#1238738 * bsc#1238742 * bsc#1238743 * bsc#1238745 * bsc#1238746 * bsc#1238754 * bsc#1238763 * bsc#1238774 * bsc#1238775 * bsc#1238780 * bsc#1238782 * bsc#1238862 * bsc#1238866 * bsc#1238911 * bsc#1238961 * bsc#1238970 * bsc#1238972 * bsc#1238983 * bsc#1238990 * bsc#1238992 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239036 * bsc#1239045 * bsc#1239064 * bsc#1239066 * bsc#1239079 * bsc#1239105 * bsc#1239108 * bsc#1239117 * bsc#1239174 * bsc#1239314 * bsc#1239346 * bsc#1239349 * bsc#1239467 * bsc#1239468 * bsc#1239470 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239475 * bsc#1239476 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239487 * bsc#1239508 * bsc#1239510 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239684 * bsc#1239691 * bsc#1239707 * bsc#1239906 * bsc#1239925 * bsc#1239934 * bsc#1239986 * bsc#1239991 * bsc#1239994 * bsc#1239997 * bsc#1240167 * bsc#1240168 * bsc#1240169 * bsc#1240171 * bsc#1240172 * bsc#1240173 * bsc#1240174 * bsc#1240175 * bsc#1240176 * bsc#1240177 * bsc#1240179 * bsc#1240181 * bsc#1240182 * bsc#1240183 * bsc#1240184 * bsc#1240185 * bsc#1240186 * bsc#1240187 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * bsc#1240375 * bsc#1240419 * bsc#1240427 * bsc#1240557 * bsc#1240575 * bsc#1240576 * bsc#1240581 * bsc#1240582 * bsc#1240583 * bsc#1240584 * bsc#1240585 * bsc#1240587 * bsc#1240590 * bsc#1240591 * bsc#1240592 * bsc#1240593 * bsc#1240594 * bsc#1240595 * bsc#1240596 * bsc#1240600 * bsc#1240612 * bsc#1240616 * bsc#1240617 * bsc#1240639 * bsc#1240643 * bsc#1240647 * bsc#1240655 * bsc#1240691 * bsc#1240696 * bsc#1240700 * bsc#1240701 * bsc#1240703 * bsc#1240708 * bsc#1240709 * bsc#1240711 * bsc#1240712 * bsc#1240713 * bsc#1240714 * bsc#1240715 * bsc#1240716 * bsc#1240717 * bsc#1240718 * bsc#1240719 * bsc#1240720 * bsc#1240722 * bsc#1240727 * bsc#1240739 * bsc#1240740 * bsc#1240742 * bsc#1240779 * bsc#1240783 * bsc#1240784 * bsc#1240785 * bsc#1240795 * bsc#1240796 * bsc#1240797 * bsc#1240799 * bsc#1240800 * bsc#1240801 * bsc#1240802 * bsc#1240803 * bsc#1240804 * bsc#1240805 * bsc#1240806 * bsc#1240808 * bsc#1240809 * bsc#1240811 * bsc#1240812 * bsc#1240813 * bsc#1240815 * bsc#1240816 * bsc#1240819 * bsc#1240821 * bsc#1240825 * bsc#1240829 * bsc#1240835 * bsc#1240873 * bsc#1240934 * bsc#1240936 * bsc#1240937 * bsc#1240938 * bsc#1240940 * bsc#1240942 * bsc#1240943 * bsc#1240944 * bsc#1240966 * bsc#1240978 * bsc#1240979 * bsc#1241010 * bsc#1241038 * bsc#1241051 * bsc#1241095 * bsc#1241123 * bsc#1241148 * bsc#1241151 * bsc#1241166 * bsc#1241167 * bsc#1241175 * bsc#1241193 * bsc#1241204 * bsc#1241250 * bsc#1241265 * bsc#1241266 * bsc#1241280 * bsc#1241282 * bsc#1241305 * bsc#1241319 * bsc#1241332 * bsc#1241333 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241351 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241371 * bsc#1241373 * bsc#1241376 * bsc#1241378 * bsc#1241388 * bsc#1241394 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241416 * bsc#1241419 * bsc#1241424 * bsc#1241426 * bsc#1241433 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241448 * bsc#1241451 * bsc#1241452 * bsc#1241456 * bsc#1241458 * bsc#1241459 * bsc#1241492 * bsc#1241512 * bsc#1241525 * bsc#1241526 * bsc#1241528 * bsc#1241533 * bsc#1241535 * bsc#1241537 * bsc#1241541 * bsc#1241545 * bsc#1241547 * bsc#1241548 * bsc#1241550 * bsc#1241562 * bsc#1241568 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241578 * bsc#1241581 * bsc#1241590 * bsc#1241591 * bsc#1241593 * bsc#1241596 * bsc#1241597 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241626 * bsc#1241627 * bsc#1241628 * bsc#1241633 * bsc#1241638 * bsc#1241640 * bsc#1241648 * bsc#1241657 * bsc#1241689 * bsc#1242006 * bsc#1242012 * bsc#1242044 * bsc#1242119 * bsc#1242125 * bsc#1242172 * bsc#1242203 * bsc#1242205 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242417 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242513 * bsc#1242520 * bsc#1242523 * bsc#1242526 * bsc#1242528 * bsc#1242533 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242585 * bsc#1242596 * bsc#1242710 * bsc#1242762 * bsc#1242763 * bsc#1242778 * bsc#1242786 * bsc#1242831 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242875 * bsc#1242924 * bsc#1242944 * bsc#1242951 * bsc#1242962 * bsc#1242993 * bsc#1243020 * bsc#1243044 * bsc#1243056 * bsc#1243077 * bsc#1243090 * bsc#1243115 * bsc#1243116 * bsc#1243215 * bsc#1243341 * bsc#1243342 * bsc#1243513 * bsc#1243519 * bsc#1243539 * bsc#1243541 * bsc#1243547 * bsc#1243657 * bsc#1243658 * bsc#1243737 * bsc#1243805 * bsc#1243817 * bsc#1243919 * bsc#1243963 * jsc#PED-10190 * jsc#PED-10213 * jsc#PED-11518 * jsc#PED-11761 * jsc#PED-12309 * jsc#PED-12372 * jsc#PED-12405 * jsc#PED-12416 * jsc#PED-12622 Cross-References: * CVE-2023-52927 * CVE-2023-53034 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35840 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-43820 * CVE-2024-46713 * CVE-2024-46763 * CVE-2024-46782 * CVE-2024-46865 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49570 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49994 * CVE-2024-50038 * CVE-2024-50056 * CVE-2024-50083 * CVE-2024-50106 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50223 * CVE-2024-50290 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53124 * CVE-2024-53139 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53680 * CVE-2024-54458 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57900 * CVE-2024-57924 * CVE-2024-57947 * CVE-2024-57974 * CVE-2024-57998 * CVE-2024-58001 * CVE-2024-58018 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58068 * CVE-2024-58070 * CVE-2024-58071 * CVE-2024-58074 * CVE-2024-58083 * CVE-2024-58088 * CVE-2024-58091 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2025-21635 * CVE-2025-21648 * CVE-2025-21659 * CVE-2025-21683 * CVE-2025-21693 * CVE-2025-21696 * CVE-2025-21701 * CVE-2025-21702 * CVE-2025-21703 * CVE-2025-21706 * CVE-2025-21707 * CVE-2025-21717 * CVE-2025-21729 * CVE-2025-21739 * CVE-2025-21753 * CVE-2025-21755 * CVE-2025-21758 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21768 * CVE-2025-21772 * CVE-2025-21782 * CVE-2025-21787 * CVE-2025-21791 * CVE-2025-21792 * CVE-2025-21796 * CVE-2025-21800 * CVE-2025-21806 * CVE-2025-21808 * CVE-2025-21812 * CVE-2025-21814 * CVE-2025-21821 * CVE-2025-21832 * CVE-2025-21833 * CVE-2025-21836 * CVE-2025-21837 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21854 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21863 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21867 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21873 * CVE-2025-21875 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21881 * CVE-2025-21882 * CVE-2025-21883 * CVE-2025-21884 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21887 * CVE-2025-21888 * CVE-2025-21889 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 * CVE-2025-21893 * CVE-2025-21894 * CVE-2025-21895 * CVE-2025-21904 * CVE-2025-21905 * CVE-2025-21906 * CVE-2025-21908 * CVE-2025-21909 * CVE-2025-21910 * CVE-2025-21912 * CVE-2025-21913 * CVE-2025-21914 * CVE-2025-21915 * CVE-2025-21916 * CVE-2025-21917 * CVE-2025-21918 * CVE-2025-21919 * CVE-2025-21922 * CVE-2025-21923 * CVE-2025-21924 * CVE-2025-21925 * CVE-2025-21926 * CVE-2025-21927 * CVE-2025-21928 * CVE-2025-21929 * CVE-2025-21930 * CVE-2025-21931 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21936 * CVE-2025-21937 * CVE-2025-21941 * CVE-2025-21943 * CVE-2025-21948 * CVE-2025-21950 * CVE-2025-21951 * CVE-2025-21953 * CVE-2025-21956 * CVE-2025-21957 * CVE-2025-21960 * CVE-2025-21961 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-21966 * CVE-2025-21968 * CVE-2025-21969 * CVE-2025-21970 * CVE-2025-21971 * CVE-2025-21972 * CVE-2025-21973 * CVE-2025-21974 * CVE-2025-21975 * CVE-2025-21978 * CVE-2025-21979 * CVE-2025-21980 * CVE-2025-21981 * CVE-2025-21985 * CVE-2025-21989 * CVE-2025-21990 * CVE-2025-21991 * CVE-2025-21992 * CVE-2025-21993 * CVE-2025-21995 * CVE-2025-21996 * CVE-2025-21999 * CVE-2025-22001 * CVE-2025-22003 * CVE-2025-22004 * CVE-2025-22007 * CVE-2025-22008 * CVE-2025-22009 * CVE-2025-22010 * CVE-2025-22013 * CVE-2025-22014 * CVE-2025-22015 * CVE-2025-22016 * CVE-2025-22017 * CVE-2025-22018 * CVE-2025-22020 * CVE-2025-22021 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22029 * CVE-2025-22030 * CVE-2025-22033 * CVE-2025-22036 * CVE-2025-22044 * CVE-2025-22045 * CVE-2025-22050 * CVE-2025-22053 * CVE-2025-22055 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22062 * CVE-2025-22063 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22070 * CVE-2025-22075 * CVE-2025-22080 * CVE-2025-22085 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22090 * CVE-2025-22091 * CVE-2025-22093 * CVE-2025-22094 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22103 * CVE-2025-22104 * CVE-2025-22105 * CVE-2025-22106 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22112 * CVE-2025-22115 * CVE-2025-22116 * CVE-2025-22117 * CVE-2025-22118 * CVE-2025-22121 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-22128 * CVE-2025-2312 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23133 * CVE-2025-23134 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23140 * CVE-2025-23145 * CVE-2025-23150 * CVE-2025-23154 * CVE-2025-23160 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37755 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37785 * CVE-2025-37787 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37809 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37842 * CVE-2025-37860 * CVE-2025-37870 * CVE-2025-37879 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37949 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37960 * CVE-2025-37974 * CVE-2025-38152 * CVE-2025-38637 * CVE-2025-39728 * CVE-2025-40325 CVSS scores: * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49570 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53139 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58088 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58088 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21696 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21867 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21893 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21905 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21915 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21924 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21930 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21943 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21950 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21956 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21957 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21960 ( SUSE ): 0.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-21960 ( SUSE ): 0.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2025-21961 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21961 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21968 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21968 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21973 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21974 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21980 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21981 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21985 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21995 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22001 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22001 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22004 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22015 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22016 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22017 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22020 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22020 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22029 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22029 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22055 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22112 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22112 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22115 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22115 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22117 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22117 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22118 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23133 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-23133 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-23134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves 329 vulnerabilities, contains nine features and has 141 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP7 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49570: drm/xe/tracing: Fix a potential TP_printk UAF (bsc#1238782). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961). * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970). * CVE-2024-58074: drm/i915: Grab intel_display from the encoder to avoid potential (bsc#1238972). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510). * CVE-2024-58091: drm/fbdev-dma: Add shadow buffering for deferred I/O (bsc#1240174). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862). * CVE-2025-21717: net/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq (bsc#1238866). * CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882). * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745). * CVE-2025-21800: net/mlx5: HWS, fix definer's HWS_SET32 macro for negative offset (bsc#1238743). * CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746). * CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108). * CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066). * CVE-2025-21837: io_uring/uring_cmd: unconditionally copy SQEs at prep time (bsc#1239064). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184). * CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168). * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185). * CVE-2025-21882: net/mlx5: Fix vport QoS cleanup on error (bsc#1240187). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171). * CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176). * CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581). * CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585). * CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576). * CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587). * CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600). * CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720). * CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713). * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712). * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709). * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742). * CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815). * CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816). * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655). * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717). * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740). * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). * CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819). * CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813). * CVE-2025-21973: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx} (bsc#1240803). * CVE-2025-21974: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc() (bsc#1240800). * CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812). * CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809). * CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612). * CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811). * CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU- less NUMA nodes (bsc#1240795). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835). * CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944). * CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934). * CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936). * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426). * CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433). * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373). * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416). * CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537). * CVE-2025-22094: powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu' (bsc#1241512). * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550). * CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548). * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575). * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573). * CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578). * CVE-2025-22117: ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() (bsc#1241633). * CVE-2025-22118: ice: validate queue quanta parameters to prevent OOB access (bsc#1241562). * CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593). * CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684). * CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23154: io_uring/net: fix io_req_post_cqe abuse by send bundle (bsc#1242533). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37747: kABI workaround for perf-Fix-hang-while-freeing-sigtrap- event (References: bsc#1242520). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414). * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). * CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626). The following non-security bugs were fixed: * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes). * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * ACPI: resource: Skip IRQ override on ASUS Vivobook 14 X1404VAP (stable- fixes). * ACPI: x86: Extend Lenovo Yoga Tab 3 quirk with skip GPIO event-handlers (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes). * ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes). * ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes). * ALSA: hda/realtek: Bass speaker fixup for ASUS UM5606KA (stable-fixes). * ALSA: hda/realtek: Enable Mute LED on HP OMEN 16 Laptop xd000xx (stable- fixes). * ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * ALSA: hda/realtek: Fix built-in mic breakage on ASUS VivoBook X515JA (git- fixes). * ALSA: hda/realtek: Fix built-in mic on another ASUS VivoBook model (git- fixes). * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git- fixes). * ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * ALSA: hda/realtek: fix micmute LEDs on HP Laptops with ALC3315 (stable- fixes). * ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * ALSA: hda: intel: Add Lenovo IdeaPad Z570 to probe denylist (stable-fixes). * ALSA: hda: intel: Fix Optimus when GPU has no sound (stable-fixes). * ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: timer: Do not take register_mutex with copy_from/to_user() (git- fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: ump: Fix buffer overflow at UMP SysEx message conversion (bsc#1242044). * ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable- fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable- fixes). * ALSA: usb-audio: Fix CME quirk for UF series keyboards (stable-fixes). * ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() (git-fixes). * ASoC: Intel: sof_sdw: Fix unlikely uninitialized variable use in create_sdw_dailinks() (git-fixes). * ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoC: SOF: topology: Use krealloc_array() to replace krealloc() (stable- fixes). * ASoC: Use of_property_read_bool() (stable-fixes). * ASoC: amd: Add DMI quirk for ACP6X mic support (stable-fixes). * ASoC: amd: acp: Fix for enabling DMIC on acp platforms via _DSD entry (git- fixes). * ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * ASoC: amd: yc: update quirk data for new Lenovo model (stable-fixes). * ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * ASoC: codecs: rt5665: Fix some error handling paths in rt5665_probe() (git- fixes). * ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * ASoC: codecs:lpass-wsa-macro: Fix logic of enabling vi channels (git-fixes). * ASoC: codecs:lpass-wsa-macro: Fix vi feedback rate (git-fixes). * ASoC: cs35l41: check the return value from spi_setup() (git-fixes). * ASoC: cs42l43: Fix maximum ADC Volume (git-fixes). * ASoC: cs42l43: Reset clamp override on jack removal (git-fixes). * ASoC: dwc: always enable/disable i2s irqs (git-fixes). * ASoC: fsl: fsl_qmc_audio: Reset audio data pointers on TRIGGER_START event (git-fixes). * ASoC: fsl_audmix: register card device depends on 'dais' property (stable- fixes). * ASoC: imx-card: Add NULL check in imx_card_probe() (git-fixes). * ASoC: ops: Consistently treat platform_max as control value (git-fixes). * ASoC: q6apm-dai: make use of q6apm_get_hw_pointer (git-fixes). * ASoC: q6apm-dai: schedule all available frames to avoid dsp under-runs (git- fixes). * ASoC: q6apm: add q6apm_get_hw_pointer helper (git-fixes). * ASoC: qcom: Fix sc7280 lpass potential buffer overflow (git-fixes). * ASoC: qdsp6: q6apm-dai: fix capture pipeline overruns (git-fixes). * ASoC: qdsp6: q6apm-dai: set 10 ms period and buffer alignment (git-fixes). * ASoC: qdsp6: q6asm-dai: fix q6asm_dai_compr_set_params error path (git- fixes). * ASoC: rt722-sdca: add missing readable registers (git-fixes). * ASoC: simple-card-utils.c: add missing dlc->of_node (stable-fixes). * ASoC: simple-card-utils: Fix pointer check in graph_util_parse_link_direction (git-fixes). * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes). * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes). * ASoC: tas2764: Fix power control mask (stable-fixes). * ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes). * ASoC: tas2770: Fix volume scale (stable-fixes). * ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * Bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * Bluetooth: L2CAP: Fix corrupted list in hci_chan_del (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (stable- fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: btintel_pcie: Add additional to checks to clear TX/RX paths (git- fixes). * Bluetooth: btnxpuart: Fix kernel panic during FW release (git-fixes). * Bluetooth: btrtl: Prevent potential NULL dereference (git-fixes). * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git- fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * Bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * Bluetooth: hci_event: Fix sending MGMT_EV_DEVICE_FOUND for invalid address (git-fixes). * Bluetooth: hci_uart: Fix another race during initialization (git-fixes). * Bluetooth: hci_uart: fix race during initialization (stable-fixes). * Bluetooth: l2cap: Check encryption key size on incoming connection (git- fixes). * Bluetooth: l2cap: Process valid commands in too long frame (stable-fixes). * Bluetooth: qca: simplify WCN399x NVM loading (stable-fixes). * Bluetooth: vhci: Avoid needless snprintf() calls (git-fixes). * APEI: Delete patches.suse/APEI-GHES-Have-GHES-honor-the-panic-setting.patch (bsc#1239615) * Documentation: qat: fix auto_reset attribute details (git-fixes). * Documentation: qat: fix auto_reset section (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * pci: Drop PCI patch that caused a regression (bsc#1241123). * EDAC/i10nm: Add Intel Clearwater Forest server support (jsc#PED-10190). * Fix mismerge from SLE15-SP6 to SLE15-SP7 (bsc#1241591). * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: Enable playstation driver independently of sony driver (git-fixes). * HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * HID: hid-plantronics: Add mic mute mapping and generalize quirks (stable- fixes). * HID: i2c-hid: improve i2c_hid_get_report error message (stable-fixes). * HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (git- fixes). * HID: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * HID: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * IB/mad: Check available slots before posting receive WRs (git-fixes) * Input: ads7846 - fix gpiod allocation (git-fixes). * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes). * Input: cyttsp5 - fix power control issue on wakeup (git-fixes). * Input: i8042 - add required quirks for missing old boardnames (stable- fixes). * Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * Input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * Input: iqs7222 - preserve system status register (git-fixes). * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes). * Input: pm8941-pwrkey - fix dev_dbg() output in pm8941_pwrkey_irq() (git- fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics - hide unused smbus_pnp_ids[] array (git-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * Input: xpad - add multiple supported devices (stable-fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - add support for TECNO Pocket Go (stable-fixes). * Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * Input: xpad - fix two controller table values (git-fixes). * Input: xpad - rename QH controller to Legion Go S (stable-fixes). * KVM: PPC: Book3S HV: Fix IRQ map warnings with XICS on pSeries KVM Guest (bsc#1242205 ltc#212592). * KVM: PPC: Enable CAP_SPAPR_TCE_VFIO on pSeries KVM guests (jsc#PED-10539 git-fixes). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Do not change target vCPU state on AP Creation VMGEXIT error (git- fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest had an invalid VMSA (git-fixes). * KVM: SVM: Save host DR masks on CPUs with DebugSwap (jsc#PED-348). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/mmu: Check and free obsolete roots in kvm_mmu_reload() (git-fixes). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Check that the high 32bits are clear in kvm_arch_vcpu_ioctl_run() (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * OPP: add index check to assert to avoid buffer overflow in _read_freq() (bsc#1238961) * PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * PCI/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * PCI/MSI: Add an option to write MSIX ENTRY_DATA before any reads (git- fixes). * PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * PCI: Avoid reset when disabled via sysfs (git-fixes). * PCI: Fix BAR resizing when VF BARs are assigned (git-fixes). * PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes). * PCI: Fix reference leak in pci_register_host_bridge() (git-fixes). * PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * PCI: brcmstb: Fix potential premature regulator disabling (git-fixes). * PCI: brcmstb: Set generation limit before PCIe link up (git-fixes). * PCI: brcmstb: Use internal register to change link capability (git-fixes). * PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * PCI: histb: Fix an error handling path in histb_pcie_probe() (git-fixes). * PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type (stable-fixes). * PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * PM: sleep: Adjust check before setting power.must_resume (git-fixes). * PM: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * RDMA/bnxt_re: Fix allocation of QP table (git-fixes) * RDMA/bnxt_re: Fix budget handling of notification queue (git-fixes) * RDMA/bnxt_re: Fix reporting maximum SRQs on P7 chips (git-fixes) * RDMA/bnxt_re: Remove unusable nq variable (git-fixes) * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/cma: Fix workqueue crash in cma_netevent_work_handler (git-fixes) * RDMA/core: Do not expose hw_counters outside of init net namespace (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/core: Fix use-after-free when rename device name (git-fixes) * RDMA/core: Silence oversized kvmalloc() warning (git-fixes) * RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * RDMA/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * RDMA/hns: Fix invalid sq params not being blocked (git-fixes) * RDMA/hns: Fix missing xa_destroy() (git-fixes) * RDMA/hns: Fix soft lockup during bt pages loop (git-fixes) * RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * RDMA/hns: Fix wrong maximum DMA segment size (git-fixes) * RDMA/hns: Fix wrong value of max_sge_rd (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mana_ib: Ensure variable err is initialized (git-fixes). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mlx5: Fix MR cache initialization error flow (git-fixes) * RDMA/mlx5: Fix cache entry update on dereg error (git-fixes) * RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * RDMA/mlx5: Fix page_size variable overflow (git-fixes) * RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * RDMA/usnic: Fix passing zero to PTR_ERR in usnic_ib_pci_probe() (git-fixes) * RFC cgroup/cpuset-v1: Add deprecation messages to sched_relax_domain_level (jsc#PED-12405). * kernel: Remove debug flavor (bsc#1243919). * Squashfs: check return result of sb_min_blocksize (git-fixes). * UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes). * USB: VLI disk crashes if LPM is used (stable-fixes). * USB: gadget: core: create sysfs link between udc and gadget (git-fixes). * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes). * USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes). * USB: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * USB: serial: option: match on interface class for Telit FN990B (stable- fixes). * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable- fixes). * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes). * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes). * USB: wdm: add annotation (git-fixes). * USB: wdm: close race between wdm_open and wdm_wwan_port_stop (git-fixes). * USB: wdm: handle IO errors in wdm_wwan_port_start (git-fixes). * USB: wdm: wdm_wwan_port_tx_complete mutex in atomic context (git-fixes). * Update config. Enable HiSi accel VFIO PCI (jsc#PED-12622 bsc#1241095) - Update config files. CONFIG_HISI_ACC_VFIO_PCI=m - supported.conf: + drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci * Update config. Enable HiSi accel VFIO PCI (jsc#PED-12622) - Update config files. CONFIG_HISI_ACC_VFIO_PCI=m - supported.conf: + drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci * Update config. Enable SPI DW mmio driver (jsc#PED-12622 bsc#1241095) - CONFIG_SPI_DW_MMIO=m - supported.conf + drivers/spi/spi-dw + drivers/spi/spi-dw-mmio * Update config. Enable SPI DW mmio driver (jsc#PED-12622) - CONFIG_SPI_DW_MMIO=m - supported.conf + drivers/spi/spi-dw + drivers/spi/spi-dw-mmio * Update patches.suse/KVM-PPC-Enable-CAP_SPAPR_TCE_VFIO-on-pSeries-KVM- gue.patch (jsc#PED-10539 git-fixes bsc#1240419 ltc#212279). * Update patches.suse/RDMA-core-Don-t-expose-hw_counters-outside-of- init-n.patch (git-fixes bsc#1239925). * Update patches.suse/kABI-fix-for-RDMA-core-Don-t-expose-hw_counters- outs.patch (git-fixes bsc#1239925). Add bug reference. * Update patches.suse/net-smc-Introduce-IPPROTO_SMC.patch (jsc#PED-10299 bsc#1241689). * Update patches.suse/net-smc-do-not-leave-a-dangling-sk-pointer-in- __smc_create.patch (jsc#PED-10299 bsc#1241689). * Update patches.suse/net-smc-expose-smc-proto-operations.patch (jsc#PED-10299 bsc#1241689). * Update patches.suse/net-smc-fix-lacks-of-icsk_syn_mss-with-IPPROTO_SMC.patch (jsc#PED-10299 bsc#1241689). * Update patches.suse/net-smc-prevent-UAF-in-inet_create.patch (jsc#PED-10299 bsc#1241689). * Update patches.suse/net-smc-refactoring-initialization-of-smc-sock.patch (jsc#PED-10299 bsc#1241689). * Update patches.suse/nvme-fixup-scan-failure-for-non-ANA-multipath- contro.patch (git-fixes bsc#1235149). * Update patches.suse/nvme-re-read-ANA-log-page-after-ns-scan-completes.patch (git-fixes bsc#1235149). * Update patches.suse/smc-Fix-lockdep-false-positive-for-IPPROTO_SMC.patch (bsc#1241689 jsc#PED-10299 bsc#1241689). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * accel/ivpu: Fix PM related deadlocks in MS IOCTLs (git-fixes). * accel/ivpu: Fix deadlock in ivpu_ms_cleanup() (git-fixes). * accel/ivpu: Fix warning in ivpu_ipc_send_receive_internal() (git-fixes). * accel/ivpu: Increase DMA address range (PED-12367). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acpi: nfit: fix narrowing conversion in acpi_nfit_ctl (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * affs: do not write overlarge OFS data block size fields (git-fixes). * affs: generate OFS sequence numbers starting at 1 (git-fixes). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * ahci: add PCI ID for Marvell 88SE9215 SATA Controller (stable-fixes). * arch_topology: Make register_cpu_capacity_sysctl() tolerant to late (bsc#1238052) * arch_topology: init capacity_freq_ref to 0 (bsc#1238052) * arm64/amu: Use capacity_ref_freq() to set AMU ratio (bsc#1238052) * arm64: Do not call NULL in do_compat_alignment_fixup() (git-fixes) * arm64: Provide an AMU-based version of arch_freq_get_on_cpu (bsc#1238052) * arm64: Update AMU-based freq scale factor on entering idle (bsc#1238052) * arm64: Utilize for_each_cpu_wrap for reference lookup (bsc#1238052) * arm64: amu: Delay allocating cpumask for AMU FIE support (bsc#1238052) * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778). * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: insn: Add support for encoding DSB (bsc#1242778). * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: mm: Correct the update of max_pfn (git-fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778). * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778). * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778). * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * asus-laptop: Fix an uninitialized variable (git-fixes). * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-sata: Save all fields from sense data descriptor (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git- fixes). * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes). * ata: libata-scsi: Improve CDL control (git-fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * ata: sata_sx4: Add error handling in pdc20621_i2c_read() (git-fixes). * auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes). * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * badblocks: Fix error shitf ops (git-fixes). * badblocks: fix merge issue when new badblocks align with pre+1 (git-fixes). * badblocks: fix missing bad blocks on retry in _badblocks_check() (git- fixes). * badblocks: fix the using of MAX_BADBLOCKS (git-fixes). * badblocks: return error directly when setting badblocks exceeds 512 (git- fixes). * badblocks: return error if any badblock set fails (git-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * bitmap: Align documentation between bitmap_gather() and bitmap_scatter() (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * blk-throttle: fix lower bps rate by throtl_trim_slice() (git-fixes). * block: change blk_mq_add_to_batch() third argument type to bool (git-fixes). * block: fix 'kmem_cache of name 'bio-108' already exists' (git-fixes). * block: fix conversion of GPT partition name to 7-bit (git-fixes). * block: fix resource leak in blk_register_queue() error path (git-fixes). * block: integrity: Do not call set_page_dirty_lock() (git-fixes). * block: make sure ->nr_integrity_segments is cloned in blk_rq_prep_clone (git-fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix ethtool selftest output in one of the failure cases (git- fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bnxt_en: Linearize TX SKB if the fragments exceed the max (git-fixes). * bnxt_en: Mask the bd_cnt field in the TX BD properly (git-fixes). * bnxt_en: call pci_alloc_irq_vectors() after bnxt_reserve_rings() (git- fixes). * bnxt_en: fix module unload sequence (git-fixes). * bnxt_en: improve TX timestamping FIFO configuration (git-fixes). * bonding: fix incorrect MAC address setting to receive NS messages (git- fixes). * bpf: Add missed var_off setting in coerce_subreg_to_size_sx() (git-fixes). * bpf: Add missed var_off setting in set_sext32_default_val() (git-fixes). * bpf: Check size for BTF-based ctx access of pointer members (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * bpf: add find_containing_subprog() utility function (bsc#1241590). * bpf: avoid holding freeze_mutex during mmap operation (git-fixes). * bpf: check changes_pkt_data property for extension programs (bsc#1241590). * bpf: consider that tail calls invalidate packet pointers (bsc#1241590). * bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590). * bpf: fix potential error return (git-fixes). * bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590). * bpf: track changes_pkt_data property for global functions (bsc#1241590). * bpf: unify VM_WRITE vs VM_MAYWRITE use in BPF map mmaping logic (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: add and use helper to verify the calling task has locked the inode (bsc#1241204). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix hole expansion when writing at an offset beyond EOF (bsc#1241151). * btrfs: fix missing snapshot drew unlock when root is dead during swap activation (bsc#1241204). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * btrfs: fix race with memory mapped writes when activating swap file (bsc#1241204). * btrfs: fix swap file activation failure due to extents that used to be shared (bsc#1241204). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes). * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git- fixes). * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes). * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git- fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: slcan: allow reception of short error messages (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdc_ether|r8152: ThinkPad Hybrid USB-C/A Dock quirk (stable-fixes). * cgroup/blkio: Add deprecation messages to reset_stats (jsc#PED-12405). * cgroup/cpuset-v1: Add deprecation messages to mem_exclusive and mem_hardwall (jsc#PED-12405). * cgroup/cpuset-v1: Add deprecation messages to memory_migrate (jsc#PED-12405). * cgroup/cpuset-v1: Add deprecation messages to memory_spread_page and memory_spread_slab (jsc#PED-12405). * cgroup/cpuset-v1: Add deprecation messages to sched_load_balance and memory_pressure_enabled (jsc#PED-12405). * cgroup/cpuset: Fix error handling in remote_partition_disable() (bsc#1241166). * cgroup/cpuset: Fix incorrect isolated_cpus update in update_parent_effective_cpumask() (bsc#1241166). * cgroup/cpuset: Fix spelling errors in file kernel/cgroup/cpuset.c (bsc#1241166). * cgroup: Add deprecation message to legacy freezer controller (jsc#PED-12405). * cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405). * char: misc: register chrdev region with all possible minors (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: Fix integer overflow while processing actimeo mount option (git- fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * config: Re-enable rbd (bsc#1239991) * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * counter: fix privdata alignment (git-fixes). * counter: microchip-tcb-capture: Fix undefined counter channel state on probe (git-fixes). * counter: stm32-lptimer-cnt: fix error handling when enabling (git-fixes). * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Set the frequency used for computing the capacity (bsc#1238052) * cpufreq: Allow arch_freq_get_on_cpu to return an error (bsc#1238052) * cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry (bsc#1238052) Keep the feature disabled by default on x86_64 * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: atmel-sha204a - Set hwrng quality to lowest possible (git-fixes). * crypto: caam/qi - Fix drv_ctx refcount bug (git-fixes). * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add shutdown handler to qat_420xx (bsc#1239934). * crypto: qat - add shutdown handler to qat_4xxx (bsc#1239934). * crypto: qat - add shutdown handler to qat_c3xxx (bsc#1239934). * crypto: qat - add shutdown handler to qat_c62x (bsc#1239934). * crypto: qat - add shutdown handler to qat_dh895xcc (bsc#1239934). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). - Refresh patches.suse/crypto-qat-disable-IOV-in-adf_dev_stop.patch. - Refresh patches.suse/crypto-qat-remove-check-after-debugfs_create_dir.patch. * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove redundant prototypes in qat_c3xxx (bsc#1239934). * crypto: qat - remove redundant prototypes in qat_c62x (bsc#1239934). * crypto: qat - remove redundant prototypes in qat_dh895xcc (bsc#1239934). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path (git- fixes). * cxl/core/regs.c: Skip Memory Space Enable check for RCD and RCH Ports (bsc#1242125). * devlink: fix port new reply cmd type (git-fixes). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-bufio: do not schedule in atomic context (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-ebs: fix prefetch-vs-suspend race (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * dm-integrity: set ti->error on memory allocation failure (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). mwilck: some hand editing because d95e2c34a3ca ("dm verity: Fix IO priority lost when reading FEC and hash") is missing * dm-verity: fix prefetch-vs-suspend race (git-fixes). * dm: Fix typo in error message (git-fixes). * dm: add missing unlock on in dm_keyslot_evict() (git-fixes). * dm: always update the array size in realloc_argv on success (git-fixes). * dm: fix copying after src array boundaries (git-fixes). * dma-buf/sw_sync: Decrement refcount on error in sw_sync_ioctl_get_deadline() (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable- fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * docs: perf: Fix build warning of hisi-pcie-pmu.rst (bsc#1237704 bsc#1241095) * docs: perf: Fix build warning of hisi-pcie-pmu.rst (bsc#1237704) * docs: perf: Update usage for target filter of hisi-pcie-pmu (bsc#1237704 bsc#1241095) * docs: perf: Update usage for target filter of hisi-pcie-pmu (bsc#1237704) * docs: thermal: sync hardware protection doc with code (git-fixes). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * drivers/perf: hisi_pcie: Add more events for counting TLP bandwidth (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Add more events for counting TLP bandwidth (bsc#1237704) * drivers/perf: hisi_pcie: Check the target filter properly (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Check the target filter properly (bsc#1237704) * drivers/perf: hisi_pcie: Fix incorrect counting under metric mode (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Fix incorrect counting under metric mode (bsc#1237704) * drivers/perf: hisi_pcie: Introduce hisi_pcie_pmu_get_event_ctrl_val() (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Introduce hisi_pcie_pmu_get_event_ctrl_val() (bsc#1237704) * drivers/perf: hisi_pcie: Merge find_related_event() and (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Merge find_related_event() and (bsc#1237704) * drivers/perf: hisi_pcie: Relax the check on related events (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Relax the check on related events (bsc#1237704) * drivers/perf: hisi_pcie: Rename hisi_pcie_pmu_{config,clear}_filter() (bsc#1237704 bsc#1241095) * drivers/perf: hisi_pcie: Rename hisi_pcie_pmu_{config,clear}_filter() (bsc#1237704) * drivers: base: devres: Allow to release group on device release (stable- fixes). * drm/amd/amdkfd: Evict all queues even HWS remove queue failed (stable- fixes). * drm/amd/display/dml2: use vzalloc rather than kzalloc (bsc#1241568). * drm/amd/display: Actually do immediate vblank disable (git-fixes). * drm/amd/display: Add HP Elitebook 645 to the quirk list for eDP on DP1 (stable-fixes). * drm/amd/display: Add HP Probook 445 and 465 to the quirk list for eDP on DP1 (stable-fixes). * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Do not enable Replay and PSR while VRR is on in amdgpu_dm_commit_planes() (git-fixes). * drm/amd/display: Do not write DP_MSTM_CTRL after LT (stable-fixes). * drm/amd/display: Enable urgent latency adjustment on DCN35 (stable-fixes). * drm/amd/display: Exit idle optimizations before accessing PHY (git-fixes). * drm/amd/display: Fix gpu reset in multidisplay config (git-fixes). * drm/amd/display: Fix invalid context error in dml helper (git-fixes). * drm/amd/display: Fix message for support_edp0_on_dp1 (git-fixes). * drm/amd/display: Fix out-of-bound accesses (stable-fixes). * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes). * drm/amd/display: Force full update in gpu reset (stable-fixes). * drm/amd/display: Increase vblank offdelay for PSR panels (git-fixes). * drm/amd/display: Protect FPU in dml21_copy() (git-fixes). * drm/amd/display: Protect FPU in dml2_init()/dml21_init() (git-fixes). * drm/amd/display: Protect FPU in dml2_validate()/dml21_validate() (git- fixes). * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes). * drm/amd/display: Temporarily disable hostvm on DCN31 (stable-fixes). * drm/amd/display: Update Cursor request mode to the beginning prefetch always (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix an indent issue in DML21 (git-fixes). * drm/amd/display: fix default brightness (git-fixes). * drm/amd/display: fix missing .is_two_pixels_per_container (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/display: prevent hang on link training fail (stable-fixes). * drm/amd/display: stop DML2 from removing pipes based on planes (stable- fixes). * drm/amd/pm/smu11: Prevent division by zero (git-fixes). * drm/amd/pm: Prevent division by zero (git-fixes). * drm/amd/pm: add unique_id for gfx12 (stable-fixes). * drm/amd/pm: always allow ih interrupt from fw (stable-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amd: Handle being compiled without SI or CIK support better (stable- fixes). * drm/amd: Keep display off while going into S4 (stable-fixes). * drm/amdgpu/display: Allow DCC for video formats on GFX12 (stable-fixes). * drm/amdgpu/dma_buf: fix page_link check (git-fixes). * drm/amdgpu/gfx11: fix num_mec (git-fixes). * drm/amdgpu/gfx12: correct cleanup of 'me' field with gfx_v12_0_me_fini() (git-fixes). * drm/amdgpu/gfx12: fix num_mec (git-fixes). * drm/amdgpu/hdp4: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp5: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp6: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp7: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/mes11: optimize MES pipe FW version fetching (git-fixes). * drm/amdgpu/mes12: optimize MES pipe FW version fetching (git-fixes). * drm/amdgpu/pm: Handle SCLK offset correctly in overdrive for smu 14.0.2 (stable-fixes). * drm/amdgpu/pm: wire up hwmon fan speed for smu 14.0.2 (stable-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu/umsch: fix ucode check (git-fixes). * drm/amdgpu/vcn: using separate VCN1_AON_SOC offset (stable-fixes). * drm/amdgpu: Add back JPEG to video caps for carrizo and newer (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Fix offset for HDP remap in nbio v7.11 (stable-fixes). * drm/amdgpu: Increase KIQ invalidate_tlbs timeout (stable-fixes). * drm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags (git-fixes). * drm/amdgpu: Prefer shadow rom when available (git-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: Remove JPEG from vega and carrizo video caps (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu: Restore uncached behaviour on GFX12 (stable-fixes). * drm/amdgpu: Unlocked unmap only clear page table leaves (stable-fixes). * drm/amdgpu: Use the right function for hdp flush (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: fix warning of drm_mm_clean (git-fixes). * drm/amdgpu: grab an additional reference on the gang fence v2 (stable- fixes). * drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() (stable-fixes). * drm/amdgpu: immediately use GTT for new allocations (git-fixes). * drm/amdgpu: refine smu send msg debug log format (git-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdgpu: use a dummy owner for sysfs triggered cleaner shaders v4 (stable-fixes). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/amdkfd: Fix mode1 reset crash issue (stable-fixes). * drm/amdkfd: Fix pqm_destroy_queue race with GPU reset (stable-fixes). * drm/amdkfd: Fix user queue validation on Gfx7/8 (git-fixes). * drm/amdkfd: clamp queue size to minimum (stable-fixes). * drm/amdkfd: debugfs hang_hws skip GPU with MES (stable-fixes). * drm/ast: Fix ast_dp connection status (git-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: panel: forbid initializing a panel with unknown connector type (stable-fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/debugfs: fix printk format for bridge index (stable-fixes). * drm/dp_mst: Add a helper to queue a topology probe (stable-fixes). * drm/dp_mst: Factor out function to queue a topology probe work (stable- fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/fdinfo: Protect against driver unbind (git-fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/color: Extract intel_color_modeset() (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dg2: wait for HuC load completion before running selftests (stable- fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/dsi: convert to struct intel_display (stable-fixes). * drm/i915/gvt: fix unterminated-string-initialization warning (stable-fixes). * drm/i915/huc: Fix fence not released on early probe errors (git-fixes). * drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes). * drm/i915/vrr: Add vrr.vsync_{start, end} in vrr_params_changed (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/i915/xelpg: Extend driver code of Xe_LPG to Xe_LPG+ (stable-fixes). * drm/i915: Disable RPG during live selftest (git-fixes). * drm/i915: Increase I915_PARAM_MMAP_GTT_VERSION version to indicate support for partial mmaps (git-fixes). * drm/i915: Plumb 'dsb' all way to the plane hooks (stable-fixes). * drm/imagination: fix firmware memory leaks (git-fixes). * drm/imagination: take paired job reference (git-fixes). * drm/mediatek: Fix config_updating flag never false when no mbox channel (git-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_dpi: Explicitly manage TVD clock in power on/off (stable- fixes). * drm/mediatek: mtk_dpi: Move the input_2p_en bit to platform data (stable- fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/mgag200: Fix value in <VBLKSTR> register (git-fixes). * drm/mipi-dbi: Fix blanking for non-16 bit formats (git-fixes). * drm/msm/a6xx+: Do not let IB_SIZE overflow (git-fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: do not set crtc_state->mode_changed from atomic_check() (git- fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi/phy: Program clock inverters in correct register (git-fixes). * drm/msm/dsi: Add check for devm_kstrdup() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes). * drm/nouveau: prime: fix ttm_bo_delayed_delete oops (git-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes). * drm/panic: fix overindented list items in documentation (git-fixes). * drm/panic: use `div_ceil` to clean Clippy warning (git-fixes). * drm/panthor: Update CS_STATUS_ defines to correct values (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/sti: remove duplicate object names (git-fixes). * drm/tests: Add helper to create mock crtc (stable-fixes). * drm/tests: Add helper to create mock plane (stable-fixes). * drm/tests: Build KMS helpers when DRM_KUNIT_TEST_HELPERS is enabled (git- fixes). * drm/tests: cmdline: Fix drm_display_mode memory leak (git-fixes). * drm/tests: hdmi: Remove redundant assignments (stable-fixes). * drm/tests: helpers: Add atomic helpers (stable-fixes). * drm/tests: helpers: Add helper for drm_display_mode_from_cea_vic() (stable- fixes). * drm/tests: helpers: Create kunit helper to destroy a drm_display_mode (stable-fixes). * drm/tests: helpers: Fix compiler warning (git-fixes). * drm/tests: modes: Fix drm_display_mode memory leak (git-fixes). * drm/tests: modeset: Fix drm_display_mode memory leak (git-fixes). * drm/tests: probe-helper: Fix drm_display_mode memory leak (git-fixes). * drm/tests: shmem: Fix memleak (git-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm/vmwgfx: Use VMware hypercall API (jsc#PED-11518). * drm/xe/dma_buf: stop relying on placement in unmap (git-fixes). * drm/xe/hw_engine: define sysfs_ops on all directories (git-fixes). * drm/xe/pm: Temporarily disable D3Cold on BMG (git-fixes). * drm/xe/tests/mocs: Hold XE_FORCEWAKE_ALL for LNCF regs (git-fixes). * drm/xe/tests/mocs: Update xe_force_wake_get() return handling (stable- fixes). * drm/xe/userptr: Fix an incorrect assert (git-fixes). * drm/xe/userptr: fix notifier vs folio deadlock (git-fixes). * drm/xe/vf: Do not try to trigger a full GT reset if VF (stable-fixes). * drm/xe/xe3lpg: Apply Wa_14022293748, Wa_22019794406 (stable-fixes). * drm/xe/xelp: Move Wa_16011163337 from tunings to workarounds (stable-fixes). * drm/xe: Add page queue multiplier (git-fixes). * drm/xe: Fix GT "for each engine" workarounds (stable-fixes). * drm/xe: Fix an out-of-bounds shift when invalidating TLB (git-fixes). * drm/xe: Fix exporting xe buffers multiple times (git-fixes). * drm/xe: Release guc ids before cancelling work (git-fixes). * drm/xe: Remove double pageflip (git-fixes). * drm/xe: Save CTX_TIMESTAMP mmio value instead of LRC value (git-fixes). * drm/xe: Set LRC addresses before guc load (git-fixes). * drm/xe: Use local fence in error path of xe_migrate_clear (git-fixes). * drm/xe: remove redundant check in xe_vm_create_ioctl() (git-fixes). * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes). * drm: allow encoder mode_set even when connectors change for crtc (stable- fixes). * drm: panel-orientation-quirks: Add new quirk for GPD Win 2 (stable-fixes). * drm: panel-orientation-quirks: Add quirk for AYA NEO Slide (stable-fixes). * drm: panel-orientation-quirks: Add quirk for OneXPlayer Mini (Intel) (stable-fixes). * drm: panel-orientation-quirks: Add quirks for AYA NEO Flip DS and KB (stable-fixes). * drm: panel-orientation-quirks: Add support for AYANEO 2S (stable-fixes). * drm: panel: jd9365da: fix reset signal polarity in unprepare (git-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * e1000e: change k1 configuration on MTP and later platforms (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * enable IMA (bsc#1240617) * eth: bnxt: do not use BNXT_VNIC_NTUPLE unconditionally in queue restart logic (git-fixes). * eth: bnxt: fix memory leak in queue reset (git-fixes). * eth: bnxt: fix missing ring index trim on error path (git-fixes). * eth: bnxt: fix out-of-range access of vnic_info array (git-fixes). * ethtool: Fix context creation with no parameters (git-fixes). * ethtool: Fix set RXNFC command with symmetric RSS hash (git-fixes). * ethtool: Fix wrong mod state in case of verbose and no_mask bitset (git- fixes). * ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll() (git- fixes). * ethtool: do not propagate EOPNOTSUPP from dumps (git-fixes). * ethtool: fix setting key and resetting indir at once (git-fixes). * ethtool: netlink: Add missing ethnl_ops_begin/complete (git-fixes). * ethtool: netlink: do not return SQI value if link is down (git-fixes). * ethtool: ntuple: fix rss + ring_cookie check (git-fixes). * ethtool: plca: fix plca enable data type while parsing the value (git- fixes). * ethtool: rss: echo the context number back (git-fixes). * ethtool: rss: fix hiding unsupported fields in dumps (git-fixes). * exfat: do not fallback to buffered write (git-fixes). * exfat: drop ->i_size_ondisk (git-fixes). * exfat: fix potential wrong error return from get_block (git-fixes). * exfat: fix soft lockup in exfat_clear_bitmap (git-fixes). * exfat: fix the infinite loop in exfat_find_last_cluster() (git-fixes). * exfat: short-circuit zero-byte writes in exfat_file_write_iter (git-fixes). * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342). * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540). * ext4: do not over-report free space or inodes in statvfs (bsc#1242345). * ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347). * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557). * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556). * ext4: make block validity check resistent to sb bh corruption (bsc#1242348). * ext4: partial zero eof block on unaligned inode size extension (bsc#1242336). * ext4: protect ext4_release_dquot against freezing (bsc#1242335). * ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536). Refresh patches.suse/ext4-move-setting-of- trimmed-bit-into-ext4_try_to_tr.patch Refresh patches.suse/ext4-fix- inconsistent-between-segment-fstrim-and-ful.patch * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539). * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538). Refresh: patches.suse/ext4-avoid-online-resizing-failures-due-to-oversized.patch * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: omapfb: Add 'plane' value check (stable-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git- fixes). * firmware: arm_scmi: Balance device refcount when destroying devices (git- fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Ensure cs_dsp_load_coeff returns 0 on success (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * fs/jfs: Prevent integer overflow in AG size calculation (git-fixes). * fs/jfs: cast inactags to s64 to prevent potential overflow (git-fixes). * fs/ntfs3: add prefix to bitmap_size() and use BITS_TO_U64() (bsc#1241250). * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528). Refresh patches.suse/dcache-keep-dentry_hashtable-or-d_hash_shift-even-when- not.patch * fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535). * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526). * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpio: tegra186: fix resource handling in ACPI probe path (git-fixes). * gpio: zynq: Fix wakeup source leaks on device unbind (stable-fixes). * gpu: cdns-mhdp8546: fix call balance of mhdp->clk handling routines (git- fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * gve: handle overflow when reporting TX consumed descriptors (git-fixes). * gve: set xdp redirect target only when it is available (git-fixes). * gve: unlink old napi only if page pool exists (git-fixes). * gve: unlink old napi when stopping a queue using queue API (git-fixes). * hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key (git-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (nct6775-core) Fix out of bounds access for NCT679{8,9} (stable- fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: atr: Fix wrong include (git-fixes). * i2c: cros-ec-tunnel: defer probe if parent EC is not present (git-fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * ice: Add check for devm_kzalloc() (git-fixes). * ice: Avoid setting default Rx VSI twice in switchdev setup (git-fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * ice: Fix switchdev slow-path in LAG (git-fixes). * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * ice: do not configure destination override for switchdev (git-fixes). * ice: ensure periodic output start time is in the future (git-fixes). * ice: fix ice_parser_rt::bst_key array size (git-fixes). * ice: fix input validation for virtchnl BW (git-fixes). * ice: fix reservation of resources for RDMA when disabled (git-fixes). * ice: remove invalid parameter of equalizer (git-fixes). * ice: stop truncating queue ids when checking (git-fixes). * idpf: Acquire the lock before accessing the xn->salt (git-fixes). * idpf: check error for register_netdev() on init (git-fixes). * idpf: fix adapter NULL pointer dereference on reboot (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: fix transaction timeouts on reset (git-fixes). * idpf: protect shutdown from reset (git-fixes). * idpf: record rx queue in skb for RSC packets (git-fixes). * igb: reject invalid external timestamp requests for 82580-based HW (git- fixes). * igc: add lock preventing multiple simultaneous PTM transactions (git-fixes). * igc: cleanup PTP module if probe fails (git-fixes). * igc: fix PTM cycle trigger logic (git-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * igc: handle the IGC_PTP_ENABLED flag correctly (git-fixes). * igc: increase wait time before retrying PTM (git-fixes). * igc: move ktime snapshot into PTM retry loop (git-fixes). * iio: accel: adxl367: fix setting odr for activity time update (git-fixes). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: ad7606: fix serial register access (git-fixes). * iio: adc: ad7768-1: Fix conversion result sign (git-fixes). * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes). * iio: adis16201: Correct inclinometer channel resolution (git-fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git- fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes). * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git- fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * input/vmmouse: Use VMware hypercall API (jsc#PED-11518). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * io_uring/sqpoll: Increase task_work submission batch size (bsc#1238585). * ioam6: improve checks on user data (git-fixes). * iommu/arm-smmu-v3: Fix pgsize_bit for sva domains (bsc#1243341) * iommu/vt-d: Assign owner to the static identity domain (bsc#1241193). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * iommu/vt-d: Remove device comparison in context_setup_pass_through_cb (git- fixes). * iommu: Allow attaching static domains in iommu_attach_device_pasid() (bsc#1241193). * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: fib: annotate races around nh->nh_saddr_genid and nh->nh_saddr (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * irqchip/davinci: Remove leftover header (git-fixes). * irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() (git-fixes). * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git- fixes). * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307). * iwlwifi: correct modinfo firmware ucode (bsc#1243020). * ixgbe: fix media type detection for E610 device (git-fixes). * jbd2: add a missing data flush during file and fs synchronization (bsc#1242346). * jbd2: fix off-by-one while erasing journal (bsc#1242344). * jbd2: flush filesystem device before updating tail sequence (bsc#1242333). * jbd2: increase IO priority for writing revoke records (bsc#1242332). * jbd2: increase the journal IO's priority (bsc#1242537). * jbd2: remove wrong sb->s_sequence check (bsc#1242343). * jfs: Fix uninit-value access of imap allocated in the diMount() function (git-fixes). * jfs: Prevent copying of nlink with value 0 from disk inode (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: add sanity check for agwidth in dbMount (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for sctp: detect and prevent references to a freed transport in sendmsg (git-fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for hci_core changes (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for l2cap_conn changes (git-fixes). * kABI workaround for powercap update (bsc#1241010). * kABI workaround for soc_mixer_control changes (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-obs-qa: Use srchash for dependency as well * keys: Fix UAF in key_put() (git-fixes). * ktest: Fix Test Failures Due to Missing LOG_FILE Directories (stable-fixes). * kunit: qemu_configs: SH: Respect kunit cmdline (git-fixes). * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lib: scatterlist: fix sg_split_phys to preserve original scatterlist offsets (git-fixes). * libperf cpumap: Be tolerant of newline at the end of a cpumask (bsc#1234698 jsc#PED-12309). * libperf cpumap: Ensure empty cpumap is NULL from alloc (bsc#1234698 jsc#PED-12309). * libperf cpumap: Grow array of read CPUs in smaller increments (bsc#1234698 jsc#PED-12309). * libperf cpumap: Hide/reduce scope of MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * libperf cpumap: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__default_new() to perf_cpu_map__new_online_cpus() and prefer sysfs (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__dummy_new() to perf_cpu_map__new_any_cpu() (bsc#1234698 jsc#PED-12309). * libperf cpumap: Rename perf_cpu_map__empty() to perf_cpu_map__has_any_cpu_or_is_empty() (bsc#1234698 jsc#PED-12309). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * loop: Add sanity check for read/write_iter (git-fixes). * loop: LOOP_SET_FD: send uevents for partitions (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * loop: properly send KOBJ_CHANGED uevent for disk device (git-fixes). * loop: stop using vfs_iter_{read,write} for buffered I/O (git-fixes). * md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb (bsc#1238212) Also reenable patches.suse/md-md-bitmap-fix-writing-non- bitmap-pages-ab99.patch * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). Added to mitigate md-add-a-new-callback-pers-bitmap_sector.patch, which was a git-fix. * mdacon: rework dependency list (git-fixes). * media: chips-media: wave5: Fix a hang after seeking (git-fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in probe (git- fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: imx214: Rectify probe error handling related to runtime PM (git- fixes). * media: i2c: imx219: Rectify runtime PM handling in probe and remove (git- fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: intel/ipu6: set the dev_parent of video device to pdev (git-fixes). * media: omap3isp: Handle ARM dma_iommu_mapping (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: uvcvideo: Add quirk for Actions UVC05 (stable-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake H DID (stable-fixes). * mei: me: add panther lake P DID (stable-fixes). * mei: vsc: Fix fortify-panic caused by invalid counted_by() use (git-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). Fix tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap: introduce generic optimized bitmap_size() (git-fixes)" * memcg: initiate deprecation of oom_control (jsc#PED-12405). * memcg: initiate deprecation of pressure_level (jsc#PED-12405). * memcg: initiate deprecation of v1 soft limit (jsc#PED-12405). * memcg: initiate deprecation of v1 tcp accounting (jsc#PED-12405). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration (git-fixes). * misc: microchip: pci1xxxx: Fix incorrect IRQ status handling during ack (git-fixes). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm/readahead: fix large folio support in async readahead (bsc#1242321). * mm: Add transformation message for per-memcg swappiness (jsc#PED-12405). * mm: Fix a build breakage in memcontrol.c (jsc#PED-12405). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326). * mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327). * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546). * mm: memcontrol: clarify swapaccount=0 deprecation warning (jsc#PED-12405). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: dw_mmc: add a quirk for accessing 64-bit FIFOs in two halves (stable- fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: renesas_sdhi: Fix error handling in renesas_sdhi_probe (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mmc: sdhci-pxav3: set NEED_RSP_BUSY capability (stable-fixes). * mptcp: fix rcv buffer auto-tuning (bsc#1220419 bsc#1222656 bsc#1236394). * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes). * mptcp: refine opt_mp_capable determination (git-fixes). * mptcp: relax check on MPC passive fallback (git-fixes). * mptcp: strict validation before using mp_opt->hmac (git-fixes). * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes). * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: inftlcore: Add error check for inftl_read_oob() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: Add status chack in r852_ready() (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * neighbour: delete redundant judgment statements (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5: Fill out devlink dev info only for PFs (git-fixes). * net/mlx5: Fix incorrect IRQ pool usage when releasing IRQs (git-fixes). * net/mlx5: Fix null-ptr-deref in mlx5_create_{inner_,}ttc_table() (git- fixes). * net/mlx5: HWS, Rightsize bwc matcher priority (git-fixes). * net/mlx5: IRQ, Fix null string in debug print (git-fixes). * net/mlx5: Lag, Check shared fdb before creating MultiPort E-Switch (git- fixes). * net/mlx5: Move ttc allocation after switch case to prevent leaks (git- fixes). * net/mlx5: Restore missing trace event when enabling vport QoS (git-fixes). * net/mlx5: Start health poll after enable hca (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/mlx5e: Fix ethtool -N flow-type ip4 to RSS context (git-fixes). * net/mlx5e: Fix lock order in mlx5e_tx_reporter_ptpsq_unhealthy_recover (git- fixes). * net/mlx5e: Prevent bridge link show failure for non-eswitch-allowed devices (git-fixes). * net/mlx5e: SHAMPO, Make reserved size independent of page size (git-fixes). * net/mlx5e: TC, Continue the attr process even if encap entry is invalid (git-fixes). * net/mlx5e: Use custom tunnel header for vxlan gbp (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net/smc: Introduce IPPROTO_SMC (jsc#PED-10299). * net/smc: do not leave a dangling sk pointer in __smc_create() (jsc#PED-10299). * net/smc: expose smc proto operations (jsc#PED-10299). * net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC (jsc#PED-10299). * net/smc: prevent UAF in inet_create() (jsc#PED-10299). * net/smc: refactoring initialization of smc sock (jsc#PED-10299). * net/tcp: refactor tcp_inet6_sk() (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: add dev_net_rcu() helper (bsc#1239994). * net: annotate data-races around sk->sk_dst_pending_confirm (git-fixes). * net: annotate data-races around sk->sk_tx_queue_mapping (git-fixes). * net: blackhole_dev: fix build warning for ethh set but not used (git-fixes). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: do not dump stack on queue timeout (git-fixes). * net: ethtool: Do not call .cleanup_data when prepare_data fails (git-fixes). * net: ethtool: Fix RSS setting (git-fixes). * net: free_netdev: exit earlier if dummy (bsc#1243215). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: Switch to page pool for jumbo frames (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: mark racy access on sk->sk_rcvbuf (git-fixes). * net: phy: leds: fix memory leak (git-fixes). * net: phy: microchip: force IRQ polling mode for lan88xx (git-fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: sctp: fix skb leak in sctp_inq_free() (git-fixes). * net: set SOCK_RCU_FREE before inserting socket into hashtable (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: usb: asix_devices: add FiberGecko DeviceID (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FE990B composition (stable-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990B composition (stable-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: drr: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: ets: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes). * net_sched: qfq: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netlink: specs: rt-link: add an attr layer around alt-ifname (git-fixes). * netlink: specs: rt-link: adjust mctp attribute naming (git-fixes). * netlink: specs: rtnetlink: attribute naming corrections (git-fixes). * netlink: specs: tc: all actions are indexed arrays (git-fixes). * netlink: specs: tc: fix a couple of attribute names (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * netpoll: Use rcu_access_pointer() in netpoll_poll_lock (git-fixes). * nfs: add missing selections of CONFIG_CRC32 (git-fixes). * nfs: clear SB_RDONLY before getting superblock (bsc#1238565). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfs: ignore SB_RDONLY when remounting nfs (bsc#1238565). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: decrease sc_count directly if fail to queue dl_recall (git-fixes). * nfsd: put dl_stid if fail to queue dl_recall (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * ntb: Force physically contiguous allocation of rx ring buffers (git-fixes). * ntb: intel: Fix using link status DB's (git-fixes). * ntb: reduce stack usage in idt_scan_mws (stable-fixes). * ntb: use 64-bit arithmetic for the MSI doorbell mask (git-fixes). * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes). * ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans (git-fixes). * ntb_perf: Delete duplicate dmaengine_unmap_put() call in perf_copy_chunk() (git-fixes). * ntb_perf: Fix printk format (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: clean up CMBMSC when registering CMB fails (git-fixes). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: fix stuck reset on concurrent DPC and HP (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-pci: skip CMB blocks incompatible with PCI P2P DMA (git-fixes). * nvme-pci: skip nvme_write_sq_db on empty rqlist (git-fixes). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix possible UAF in nvme_tcp_poll (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme/ioctl: do not warn on vectorized uring_cmd with fixed buffer (git- fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-fcloop: swap list_add_tail arguments (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * nvmet: remove old function prototype (git-fixes). * objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() (git- fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() (git-fixes). * objtool: Fix segfault in ignore_unreachable_insn() (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * octeontx2-pf: Do not reallocate all ntuple filters (git-fixes). * octeontx2-pf: Fix ethtool support for SDP representors (git-fixes). * octeontx2-pf: handle otx2_mbox_get_rsp errors (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * perf cpumap: Reduce transitive dependencies on libperf MAX_NR_CPUS (bsc#1234698 jsc#PED-12309). * perf pmu: Remove use of perf_cpu_map__read() (bsc#1234698 jsc#PED-12309). * perf tools: annotate asm_pure_loop.S (bsc#1239906). * perf: Increase MAX_NR_CPUS to 4096 (bsc#1234698 jsc#PED-12309). * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172) * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172) * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172) * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172) * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: freescale: imx8m-pcie: assert phy reset and perst in power off (git- fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable- fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes). * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes). * platform/x86/intel-uncore-freq: Fix missing uncore sysfs during CPU hotplug (git-fixes). * platform/x86/intel/ifs: Add Clearwater Forest to CPU support list (jsc#PED-10213). * platform/x86/intel/vsec: Add Diamond Rapids support (stable-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: ISST: Correct command storage data length (git-fixes). * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: intel-hid: fix volume buttons on Microsoft Surface Go 4 tablet (stable-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powercap: intel_rapl: Introduce APIs for PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Enable PMU support (bsc#1241010). * powercap: intel_rapl_tpmi: Fix System Domain probing (git-fixes). * powercap: intel_rapl_tpmi: Fix bogus register reading (git-fixes). * powercap: intel_rapl_tpmi: Ignore minor version change (git-fixes). * powerpc/boot: Check for ld-option support (bsc#1215199). * powerpc/boot: Fix dash warning (bsc#1215199). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: Fix kmemleak in TCE table userspace view (jsc#PED-10539 git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * powerpc: Do not use --- in kernel logs (git-fixes). * powerpc: Stop using no_llseek (bsc#1239573). * ptp/vmware: Use VMware hypercall API (jsc#PED-11518). * pwm: fsl-ftm: Handle clk_get_rate() returning 0 (git-fixes). * pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config() (git-fixes). * pwm: rcar: Improve register calculation (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * regulator: max20086: fix invalid memory access (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used * rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986). * rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). * rpm/package-descriptions: Add rt and rt_debug descriptions * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rtc: pcf85063: do a SW reset if POR failed (stable-fixes). * rtnetlink: Allocate vfinfo size for VF GUIDs when supported (bsc#1224013). * s390/ap: Fix CCA crypto card behavior within protected execution environment (git-fixes bsc#1243817 LTC#213623). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/cio: Fix CHPID "configure" attribute caching (git-fixes bsc#1240979). * s390/cpumf: Update CPU Measurement facility extended counter set support (bsc#1243115). * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes). * s390/pci: Fix zpci_bus_is_isolated_vf() for non-VFs (git-fixes bsc#1240978). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * s390: Add z17 elf platform (bsc#1243116). * sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (BSC#1241319). * sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (bsc#1241319). * sched/topology: Add a new arch_scale_freq_ref() method (bsc#1238052) * sched/topology: Refinement to topology_span_sane speedup (bsc#1242119). * sched/topology: improve topology_span_sane speed (bsc#1242119). * sched: Add deprecation warning for users of RT_GROUP_SCHED (jsc#PED-11761 jsc#PED-12405). * scsi: Improve CDL control (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: core: Use GFP_NOIO to avoid circular locking dependency (git-fixes). * scsi: fnic: Fix indentation and remove unnecessary parenthesis (git-fixes). * scsi: fnic: Remove unnecessary debug print (git-fixes). * scsi: fnic: Remove unnecessary spinlock locking and unlocking (git-fixes). * scsi: fnic: Replace fnic->lock_flags with local flags (git-fixes). * scsi: fnic: Replace use of sizeof with standard usage (git-fixes). * scsi: hisi_sas: Check whether debugfs is enabled before removing or (bsc#1237546 bsc#1241095) * scsi: hisi_sas: Check whether debugfs is enabled before removing or (bsc#1237546) * scsi: hisi_sas: Enable force phy when SATA disk directly connected (git- fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: hisi_sas: Remove hisi_hba->timer for v3 hw (bsc#1237545 bsc#1241095) * scsi: hisi_sas: Remove hisi_hba->timer for v3 hw (bsc#1237545) * scsi: iscsi: Fix missing scsi_host_put() in error path (git-fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Restore clearing of NLP_UNREG_INP in ndlp->nlp_flag (git-fixes). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (bsc#1241388 jsc#PED-11258). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: megaraid_sas: Driver version update to 07.734.00.00-rc1 (bsc#1241388 jsc#PED-11258). * scsi: megaraid_sas: Make most module parameters static (bsc#1241388 jsc#PED-11258). * scsi: mpi3mr: Add level check to control event logging (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Avoid reply queue full condition (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Check admin reply queue from Watchdog (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Fix locking in an error path (git-fixes). * scsi: mpi3mr: Fix pending I/O counter (git-fixes). * scsi: mpi3mr: Fix spelling mistake "skiping" -> "skipping" (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Handling of fault code for insufficient power (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Reset the pending interrupt flag (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Support for Segmented Hardware Trace buffer (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Synchronize access to ioctl data buffer (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Task Abort EH Support (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update MPI Headers to revision 35 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update driver version to 8.12.0.3.50 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update driver version to 8.12.1.0.50 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update driver version to 8.13.0.5.50 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update timestamp only for supervisor IOCs (bsc#1241388 jsc#PED-12372). * scsi: mpt3sas: Add details to EEDPTagMode error message (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Add support for MCTP Passthrough commands (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Fix a locking bug in an error path (git-fixes). * scsi: mpt3sas: Fix buffer overflow in mpt3sas_send_mctp_passthru_req() (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Fix spelling mistake "receveid" -> "received" (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Reduce log level of ignore_delay_remove message to KERN_INFO (git-fixes). * scsi: mpt3sas: Remove unused config functions (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Report driver capability as part of IOCINFO command (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Send a diag reset if target reset fails (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Update MPI headers to 02.00.62 version (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: update driver version to 52.100.00.00 (bsc#1241388 jsc#PED-11253). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * scsi: scsi_debug: Remove a reference to in_use_bm (git-fixes). * scsi: smartpqi: Use is_kdump_kernel() to check for kdump (git-fixes). * sctp: Fix undefined behavior in left shift operation (git-fixes). * sctp: add mutual exclusion in proc_sctp_do_udp_port() (git-fixes). * sctp: detect and prevent references to a freed transport in sendmsg (git- fixes). * sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start (git-fixes). * sctp: fix association labeling in the duplicate COOKIE-ECHO case (git- fixes). * sctp: fix busy polling (git-fixes). * sctp: prefer struct_size over open coded arithmetic (git-fixes). * sctp: support MSG_ERRQUEUE flag in recvmsg() (git-fixes). * security, lsm: Introduce security_mptcp_add_subflow() (bsc#1240375). * selftests/bpf: Add a few tests to cover (git-fixes). * selftests/bpf: Add test for narrow ctx load for pointer args (git-fixes). * selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590). * selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590). * selftests/bpf: test for changing packet data from global functions (bsc#1241590). * selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590). * selftests/futex: futex_waitv wouldblock test should fail (git-fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: generate a temporary mountpoint for cgroup filesystem (git- fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selinux: Implement mptcp_add_subflow hook (bsc#1240375). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * serial: 8250_dma: terminate correct DMA in tx_dma_flush() (git-fixes). * serial: msm: Configure correct working mode before starting earlycon (git- fixes). * serial: sifive: lock port in startup()/shutdown() callbacks (git-fixes). * series.conf: temporarily disable patches.suse/md-md-bitmap-fix-writing-non- bitmap-pages-ab99.patch (bsc#1238212) * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: fix folio leaks and perf improvements (bsc#1239997, bsc1241265). * smb: client: fix open_cached_dir retries with 'hard' mount option (bsc#1240616). * smc: Fix lockdep false-positive for IPPROTO_SMC (bsc#1241689 jsc#PED-10299). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes). * soundwire: bus: Fix race on the creation of the IRQ domain (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes). * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328). * sqpoll: increase tw batch size (bsc#1238585). * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes). * staging: axis-fifo: Remove hardware resets for user errors (git-fixes). * staging: iio: adc: ad7816: Correct conditional logic for store mode (git- fixes). * staging: rtl8723bs: select CONFIG_CRYPTO_LIB_AES (git-fixes). * string: Add load_unaligned_zeropad() code path to sized_strscpy() (git- fixes). * supported.conf: Mark HiSi DMA controller as supported (jsc#PED-12622 bsc#1241095) * supported.conf: Mark HiSi PMU drivers as supported (jsc#PED-12622 bsc#1241095) * supported.conf: Mark HiSi PMU drivers as supported (jsc#PED-12622) * supported.conf: Mark HiSi TRNG v2 as supported (jsc#PED-12622 bsc#1241095) * supported.conf: Mark HiSi TRNG v2 as supported (jsc#PED-12622) * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix mptcp DSS corruption due to large pmtu xmit (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: get rid of sysctl_tcp_adv_win_scale (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: increase the default TCP scaling ratio (bsc#1220419 bsc#1222656 bsc#1236394). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal/drivers/mediatek/lvts: Disable Stage 3 thermal threshold (git- fixes). * thermal/drivers/mediatek/lvts: Disable monitor mode during suspend (git- fixes). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Scan retimers after device router has been enumerated (stable- fixes). * tools/hv: update route parsing in kvp daemon (git-fixes). * tools/power turbostat: Increase CPU_SUBSET_MAXCPUS to 8192 (bsc#1241175). * tools/power turbostat: report CoreThr per measurement interval (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * topology: Set capacity_freq_ref in all cases (bsc#1238052) * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * tpm_tis: Move CRC check to generic send routine (bsc#1235870). * tpm_tis: Use responseRetry to recover from data transfer errors (bsc#1235870). * tty: Require CAP_SYS_ADMIN for all usages of TIOCL_SELMOUSEREPORT (git- fixes). * tty: n_tty: use uint for space returned by tty_write_room() (git-fixes). * tty: serial: 8250: Add Brainboxes XC devices (stable-fixes). * tty: serial: 8250: Add some more device IDs (stable-fixes). * tty: serial: fsl_lpuart: disable transmitter before changing RS485 related registers (git-fixes). * tty: serial: lpuart: only disable CTS instead of overwriting the whole UARTMODIR register (git-fixes). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * ublk: set_params: properly check if parameters can be applied (git-fixes). * ucsi_ccg: Do not show failed to get FW build information error (git-fixes). * udf: Fix inode_getblk() return value (bsc#1242313). * udf: Skip parent dir link count update if corrupted (bsc#1242315). * udf: Verify inode link counts before performing rename (bsc#1242314). * usb: cdns3: Fix deadlock when using NCM gadget (git-fixes). * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git- fixes). * usb: chipidea: ci_hdrc_imx: fix call balance of regulator routines (git- fixes). * usb: chipidea: ci_hdrc_imx: implement usb_phy_init() error handling (git- fixes). * usb: dwc3: Set SUSPENDENABLE soon after phy init (git-fixes). * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes). * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes). * usb: dwc3: gadget: check that event count does not exceed event buffer length (git-fixes). * usb: dwc3: xilinx: Prevent spike in reset signal (git-fixes). * usb: gadget: Use get_status callback to set remote wakeup capability (git- fixes). * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable- fixes). * usb: gadget: f_ecm: Add get_status callback (git-fixes). * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes). * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes). * usb: host: tegra: Prevent host controller crash when OTG port is used (git- fixes). * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable- fixes). * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable- fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes). * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes). * usb: uhci-platform: Make the clock really optional (git-fixes). * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes). * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes). * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running (stable-fixes). * usb: xhci: Do not skip on Stopped - Length Invalid (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (stable-fixes). * usb: xhci: Fix invalid pointer dereference in Etron workaround (git-fixes). * usb: xhci: correct debug message page size calculation (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * usbnet:fix NPE during rx_complete (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * vdpa/mlx5: Fix oversized null mkey longer than 32bit (git-fixes). * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * video: screen_info: Update framebuffers behind PCI bridges (bsc#1240696). * virtchnl: make proto and filter action count unsigned (git-fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * vmxnet3: Fix tx queue race condition with XDP (bsc#1241394). * vmxnet3: unregister xdp rxq info in the reset path (bsc#1241394). * wifi: at76c50x: fix use after free access in at76_disconnect (git-fixes). * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix memory leak in ath11k_xxx_remove() (git-fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (stable-fixes). * wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process (stable- fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes). * wifi: brcmfmac: keep power during suspend if board requires it (stable- fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: iwlwifi: do not warn if the NIC is gone in resume (git-fixes). * wifi: iwlwifi: fix the check for the SCRATCH register upon resume (git- fixes). * wifi: iwlwifi: fw: allocate chained SG tables for dump (stable-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: iwlwifi: mvm: use the right version of the rate API (stable-fixes). * wifi: iwlwifi: pcie: Fix TSO preparation (git-fixes). * wifi: iwlwifi: support BIOS override for 5G9 in CA also in LARI version 8 (stable-fixes). * wifi: mac80211, cfg80211: miscellaneous spelling fixes (git-fixes). * wifi: mac80211: Cleanup sta TXQs on flush (stable-fixes). * wifi: mac80211: Fix sparse warning for monitor_sdata (git-fixes). * wifi: mac80211: Purge vif txq in ieee80211_do_stop() (git-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue() (git-fixes). * wifi: mac80211: check basic rates validity in sta_link_apply_parameters (git-fixes). * wifi: mac80211: do not queue sdata::work for a non-running sdata (git- fixes). * wifi: mac80211: ensure sdata->work is canceled before initialized (stable- fixes). * wifi: mac80211: fix SA Query processing in MLO (stable-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mac80211: flush the station before moving it to UN-AUTHORIZED state (stable-fixes). * wifi: mac80211: remove debugfs dir for virtual monitor (stable-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt76x2u: add TP-Link TL-WDN6200 ID to device table (stable- fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * wifi: wl1251: fix memory leak in wl1251_tx_work (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). * x86/bugs: Add RSB mitigation document (git-fixes). * x86/bugs: Do not fill RSB on VMEXIT with eIBRS+retpoline (git-fixes). * x86/bugs: Do not fill RSB on context switch with eIBRS (git-fixes). * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git- fixes). * x86/bugs: Rename entry_ibpb() to write_ibpb() (git-fixes). * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/amd: Fix workaround for erratum 1054 (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/dumpstack: Fix inaccurate unwinding from exception stacks due to misplaced assignment (git-fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix check of return value from snp_set_vmsa() (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (git-fixes). * x86/microcode/AMD: Flush patch buffer mapping after application (git-fixes). * x86/microcode/AMD: Pay attention to the stepping dynamically (git-fixes). * x86/microcode/AMD: Split load_microcode_amd() (git-fixes). * x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Set new revision only after a successful update (git- fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Remove the driver announcement and version (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Rework early revisions reporting (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/sev: Move sev_setup_arch() to mem_encrypt.c (bsc#1239314). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git- fixes). * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes). * x86/uaccess: Improve performance by aligning writes to 8 bytes in copy_user_generic(), on non-FSRM/ERMS CPUs (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * x86/vmware: Add TDX hypercall support (jsc#PED-11518). * x86/vmware: Correct macro names (jsc#PED-11518). * x86/vmware: Introduce VMware hypercall API (jsc#PED-11518). * x86/vmware: Remove legacy VMWARE_HYPERCALL* macros (jsc#PED-11518). * x86/vmware: Use VMware hypercall API (jsc#PED-11518). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xfs: flush inodegc before swapon (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: Fix null pointer dereference during S4 resume when resetting ep0 (bsc#1235550). * xhci: Limit time spent with xHC interrupts disabled during bus resume (stable-fixes). * xhci: Reconfigure endpoint 0 max packet size only during endpoint reset (bsc#1235550). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: fix possible null pointer deref during xhci urb enqueue (bsc#1235550). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). * zap_pid_ns_processes: clear TIF_NOTIFY_SIGNAL along with TIF_SIGPENDING (bsc#1241167). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-1967=1 ## Package List: * Public Cloud Module 15-SP7 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150700.20.3.1 * Public Cloud Module 15-SP7 (aarch64 x86_64) * kernel-azure-devel-6.4.0-150700.20.3.1 * kernel-azure-devel-debuginfo-6.4.0-150700.20.3.1 * kernel-azure-debugsource-6.4.0-150700.20.3.1 * kernel-azure-debuginfo-6.4.0-150700.20.3.1 * kernel-syms-azure-6.4.0-150700.20.3.1 * Public Cloud Module 15-SP7 (noarch) * kernel-devel-azure-6.4.0-150700.20.3.1 * kernel-source-azure-6.4.0-150700.20.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49570.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50038.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53139.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57924.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58018.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58068.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58074.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58088.html * https://www.suse.com/security/cve/CVE-2024-58091.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21696.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21717.html * https://www.suse.com/security/cve/CVE-2025-21729.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21755.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21800.html * https://www.suse.com/security/cve/CVE-2025-21806.html * https://www.suse.com/security/cve/CVE-2025-21808.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21833.html * https://www.suse.com/security/cve/CVE-2025-21836.html * https://www.suse.com/security/cve/CVE-2025-21837.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21854.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21863.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21867.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21873.html * https://www.suse.com/security/cve/CVE-2025-21875.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21881.html * https://www.suse.com/security/cve/CVE-2025-21882.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21884.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21887.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21889.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://www.suse.com/security/cve/CVE-2025-21893.html * https://www.suse.com/security/cve/CVE-2025-21894.html * https://www.suse.com/security/cve/CVE-2025-21895.html * https://www.suse.com/security/cve/CVE-2025-21904.html * https://www.suse.com/security/cve/CVE-2025-21905.html * https://www.suse.com/security/cve/CVE-2025-21906.html * https://www.suse.com/security/cve/CVE-2025-21908.html * https://www.suse.com/security/cve/CVE-2025-21909.html * https://www.suse.com/security/cve/CVE-2025-21910.html * https://www.suse.com/security/cve/CVE-2025-21912.html * https://www.suse.com/security/cve/CVE-2025-21913.html * https://www.suse.com/security/cve/CVE-2025-21914.html * https://www.suse.com/security/cve/CVE-2025-21915.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21917.html * https://www.suse.com/security/cve/CVE-2025-21918.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21923.html * https://www.suse.com/security/cve/CVE-2025-21924.html * https://www.suse.com/security/cve/CVE-2025-21925.html * https://www.suse.com/security/cve/CVE-2025-21926.html * https://www.suse.com/security/cve/CVE-2025-21927.html * https://www.suse.com/security/cve/CVE-2025-21928.html * https://www.suse.com/security/cve/CVE-2025-21929.html * https://www.suse.com/security/cve/CVE-2025-21930.html * https://www.suse.com/security/cve/CVE-2025-21931.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21936.html * https://www.suse.com/security/cve/CVE-2025-21937.html * https://www.suse.com/security/cve/CVE-2025-21941.html * https://www.suse.com/security/cve/CVE-2025-21943.html * https://www.suse.com/security/cve/CVE-2025-21948.html * https://www.suse.com/security/cve/CVE-2025-21950.html * https://www.suse.com/security/cve/CVE-2025-21951.html * https://www.suse.com/security/cve/CVE-2025-21953.html * https://www.suse.com/security/cve/CVE-2025-21956.html * https://www.suse.com/security/cve/CVE-2025-21957.html * https://www.suse.com/security/cve/CVE-2025-21960.html * https://www.suse.com/security/cve/CVE-2025-21961.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-21966.html * https://www.suse.com/security/cve/CVE-2025-21968.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21970.html * https://www.suse.com/security/cve/CVE-2025-21971.html * https://www.suse.com/security/cve/CVE-2025-21972.html * https://www.suse.com/security/cve/CVE-2025-21973.html * https://www.suse.com/security/cve/CVE-2025-21974.html * https://www.suse.com/security/cve/CVE-2025-21975.html * https://www.suse.com/security/cve/CVE-2025-21978.html * https://www.suse.com/security/cve/CVE-2025-21979.html * https://www.suse.com/security/cve/CVE-2025-21980.html * https://www.suse.com/security/cve/CVE-2025-21981.html * https://www.suse.com/security/cve/CVE-2025-21985.html * https://www.suse.com/security/cve/CVE-2025-21989.html * https://www.suse.com/security/cve/CVE-2025-21990.html * https://www.suse.com/security/cve/CVE-2025-21991.html * https://www.suse.com/security/cve/CVE-2025-21992.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21995.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22001.html * https://www.suse.com/security/cve/CVE-2025-22003.html * https://www.suse.com/security/cve/CVE-2025-22004.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://www.suse.com/security/cve/CVE-2025-22008.html * https://www.suse.com/security/cve/CVE-2025-22009.html * https://www.suse.com/security/cve/CVE-2025-22010.html * https://www.suse.com/security/cve/CVE-2025-22013.html * https://www.suse.com/security/cve/CVE-2025-22014.html * https://www.suse.com/security/cve/CVE-2025-22015.html * https://www.suse.com/security/cve/CVE-2025-22016.html * https://www.suse.com/security/cve/CVE-2025-22017.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22020.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22029.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22036.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22045.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22053.html * https://www.suse.com/security/cve/CVE-2025-22055.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22080.html * https://www.suse.com/security/cve/CVE-2025-22085.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22090.html * https://www.suse.com/security/cve/CVE-2025-22091.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22094.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22105.html * https://www.suse.com/security/cve/CVE-2025-22106.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22112.html * https://www.suse.com/security/cve/CVE-2025-22115.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22117.html * https://www.suse.com/security/cve/CVE-2025-22118.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-2312.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23133.html * https://www.suse.com/security/cve/CVE-2025-23134.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23154.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37860.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39728.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1222656 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231910 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234157 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234698 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1235550 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236086 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236394 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237111 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237545 * https://bugzilla.suse.com/show_bug.cgi?id=1237546 * https://bugzilla.suse.com/show_bug.cgi?id=1237704 * https://bugzilla.suse.com/show_bug.cgi?id=1237757 * https://bugzilla.suse.com/show_bug.cgi?id=1237874 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237882 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1238052 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238565 * https://bugzilla.suse.com/show_bug.cgi?id=1238585 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238742 * https://bugzilla.suse.com/show_bug.cgi?id=1238743 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238746 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238782 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238866 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1238990 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239064 * https://bugzilla.suse.com/show_bug.cgi?id=1239066 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239108 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239314 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239470 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239475 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239510 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239684 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239906 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1239934 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239991 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1239997 * https://bugzilla.suse.com/show_bug.cgi?id=1240167 * https://bugzilla.suse.com/show_bug.cgi?id=1240168 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240171 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240174 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240176 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240181 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240184 * https://bugzilla.suse.com/show_bug.cgi?id=1240185 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240187 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://bugzilla.suse.com/show_bug.cgi?id=1240375 * https://bugzilla.suse.com/show_bug.cgi?id=1240419 * https://bugzilla.suse.com/show_bug.cgi?id=1240427 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240575 * https://bugzilla.suse.com/show_bug.cgi?id=1240576 * https://bugzilla.suse.com/show_bug.cgi?id=1240581 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240583 * https://bugzilla.suse.com/show_bug.cgi?id=1240584 * https://bugzilla.suse.com/show_bug.cgi?id=1240585 * https://bugzilla.suse.com/show_bug.cgi?id=1240587 * https://bugzilla.suse.com/show_bug.cgi?id=1240590 * https://bugzilla.suse.com/show_bug.cgi?id=1240591 * https://bugzilla.suse.com/show_bug.cgi?id=1240592 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240594 * https://bugzilla.suse.com/show_bug.cgi?id=1240595 * https://bugzilla.suse.com/show_bug.cgi?id=1240596 * https://bugzilla.suse.com/show_bug.cgi?id=1240600 * https://bugzilla.suse.com/show_bug.cgi?id=1240612 * https://bugzilla.suse.com/show_bug.cgi?id=1240616 * https://bugzilla.suse.com/show_bug.cgi?id=1240617 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240643 * https://bugzilla.suse.com/show_bug.cgi?id=1240647 * https://bugzilla.suse.com/show_bug.cgi?id=1240655 * https://bugzilla.suse.com/show_bug.cgi?id=1240691 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240701 * https://bugzilla.suse.com/show_bug.cgi?id=1240703 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240709 * https://bugzilla.suse.com/show_bug.cgi?id=1240711 * https://bugzilla.suse.com/show_bug.cgi?id=1240712 * https://bugzilla.suse.com/show_bug.cgi?id=1240713 * https://bugzilla.suse.com/show_bug.cgi?id=1240714 * https://bugzilla.suse.com/show_bug.cgi?id=1240715 * https://bugzilla.suse.com/show_bug.cgi?id=1240716 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240718 * https://bugzilla.suse.com/show_bug.cgi?id=1240719 * https://bugzilla.suse.com/show_bug.cgi?id=1240720 * https://bugzilla.suse.com/show_bug.cgi?id=1240722 * https://bugzilla.suse.com/show_bug.cgi?id=1240727 * https://bugzilla.suse.com/show_bug.cgi?id=1240739 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240742 * https://bugzilla.suse.com/show_bug.cgi?id=1240779 * https://bugzilla.suse.com/show_bug.cgi?id=1240783 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240795 * https://bugzilla.suse.com/show_bug.cgi?id=1240796 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240799 * https://bugzilla.suse.com/show_bug.cgi?id=1240800 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1240803 * https://bugzilla.suse.com/show_bug.cgi?id=1240804 * https://bugzilla.suse.com/show_bug.cgi?id=1240805 * https://bugzilla.suse.com/show_bug.cgi?id=1240806 * https://bugzilla.suse.com/show_bug.cgi?id=1240808 * https://bugzilla.suse.com/show_bug.cgi?id=1240809 * https://bugzilla.suse.com/show_bug.cgi?id=1240811 * https://bugzilla.suse.com/show_bug.cgi?id=1240812 * https://bugzilla.suse.com/show_bug.cgi?id=1240813 * https://bugzilla.suse.com/show_bug.cgi?id=1240815 * https://bugzilla.suse.com/show_bug.cgi?id=1240816 * https://bugzilla.suse.com/show_bug.cgi?id=1240819 * https://bugzilla.suse.com/show_bug.cgi?id=1240821 * https://bugzilla.suse.com/show_bug.cgi?id=1240825 * https://bugzilla.suse.com/show_bug.cgi?id=1240829 * https://bugzilla.suse.com/show_bug.cgi?id=1240835 * https://bugzilla.suse.com/show_bug.cgi?id=1240873 * https://bugzilla.suse.com/show_bug.cgi?id=1240934 * https://bugzilla.suse.com/show_bug.cgi?id=1240936 * https://bugzilla.suse.com/show_bug.cgi?id=1240937 * https://bugzilla.suse.com/show_bug.cgi?id=1240938 * https://bugzilla.suse.com/show_bug.cgi?id=1240940 * https://bugzilla.suse.com/show_bug.cgi?id=1240942 * https://bugzilla.suse.com/show_bug.cgi?id=1240943 * https://bugzilla.suse.com/show_bug.cgi?id=1240944 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240978 * https://bugzilla.suse.com/show_bug.cgi?id=1240979 * https://bugzilla.suse.com/show_bug.cgi?id=1241010 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241051 * https://bugzilla.suse.com/show_bug.cgi?id=1241095 * https://bugzilla.suse.com/show_bug.cgi?id=1241123 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241151 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241167 * https://bugzilla.suse.com/show_bug.cgi?id=1241175 * https://bugzilla.suse.com/show_bug.cgi?id=1241193 * https://bugzilla.suse.com/show_bug.cgi?id=1241204 * https://bugzilla.suse.com/show_bug.cgi?id=1241250 * https://bugzilla.suse.com/show_bug.cgi?id=1241265 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241280 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241319 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241371 * https://bugzilla.suse.com/show_bug.cgi?id=1241373 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241378 * https://bugzilla.suse.com/show_bug.cgi?id=1241388 * https://bugzilla.suse.com/show_bug.cgi?id=1241394 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241416 * https://bugzilla.suse.com/show_bug.cgi?id=1241419 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241426 * https://bugzilla.suse.com/show_bug.cgi?id=1241433 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241451 * https://bugzilla.suse.com/show_bug.cgi?id=1241452 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241512 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241535 * https://bugzilla.suse.com/show_bug.cgi?id=1241537 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241547 * https://bugzilla.suse.com/show_bug.cgi?id=1241548 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241562 * https://bugzilla.suse.com/show_bug.cgi?id=1241568 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241578 * https://bugzilla.suse.com/show_bug.cgi?id=1241581 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241591 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241626 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241628 * https://bugzilla.suse.com/show_bug.cgi?id=1241633 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1241689 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242119 * https://bugzilla.suse.com/show_bug.cgi?id=1242125 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242205 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242533 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243020 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243115 * https://bugzilla.suse.com/show_bug.cgi?id=1243116 * https://bugzilla.suse.com/show_bug.cgi?id=1243215 * https://bugzilla.suse.com/show_bug.cgi?id=1243341 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243817 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://jira.suse.com/browse/PED-10190 * https://jira.suse.com/browse/PED-10213 * https://jira.suse.com/browse/PED-11518 * https://jira.suse.com/browse/PED-11761 * https://jira.suse.com/browse/PED-12309 * https://jira.suse.com/browse/PED-12372 * https://jira.suse.com/browse/PED-12405 * https://jira.suse.com/browse/PED-12416 * https://jira.suse.com/browse/PED-12622 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 17:05:46 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 17:05:46 -0000 Subject: SUSE-SU-2025:01966-1: important: Security update for the Linux Kernel Message-ID: <175009354627.655.13908127483007676488@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01966-1 Release Date: 2025-06-16T14:55:51Z Rating: important References: * bsc#1184350 * bsc#1193629 * bsc#1204562 * bsc#1204569 * bsc#1204619 * bsc#1204705 * bsc#1205282 * bsc#1206051 * bsc#1206073 * bsc#1206649 * bsc#1206843 * bsc#1206886 * bsc#1206887 * bsc#1207361 * bsc#1208105 * bsc#1208542 * bsc#1209292 * bsc#1209556 * bsc#1209684 * bsc#1209780 * bsc#1209980 * bsc#1210337 * bsc#1210763 * bsc#1210767 * bsc#1211465 * bsc#1213012 * bsc#1213013 * bsc#1213094 * bsc#1213096 * bsc#1213233 * bsc#1213946 * bsc#1214991 * bsc#1218470 * bsc#1222629 * bsc#1223096 * bsc#1225903 * bsc#1232649 * bsc#1234395 * bsc#1234887 * bsc#1235100 * bsc#1235870 * bsc#1240802 * bsc#1241525 * bsc#1242146 * bsc#1242147 * bsc#1242150 * bsc#1242151 * bsc#1242154 * bsc#1242157 * bsc#1242158 * bsc#1242160 * bsc#1242164 * bsc#1242165 * bsc#1242169 * bsc#1242215 * bsc#1242217 * bsc#1242218 * bsc#1242219 * bsc#1242222 * bsc#1242224 * bsc#1242226 * bsc#1242227 * bsc#1242228 * bsc#1242229 * bsc#1242230 * bsc#1242231 * bsc#1242232 * bsc#1242237 * bsc#1242239 * bsc#1242240 * bsc#1242241 * bsc#1242244 * bsc#1242245 * bsc#1242248 * bsc#1242249 * bsc#1242261 * bsc#1242264 * bsc#1242265 * bsc#1242270 * bsc#1242276 * bsc#1242278 * bsc#1242279 * bsc#1242280 * bsc#1242281 * bsc#1242282 * bsc#1242285 * bsc#1242286 * bsc#1242289 * bsc#1242294 * bsc#1242295 * bsc#1242298 * bsc#1242302 * bsc#1242305 * bsc#1242311 * bsc#1242312 * bsc#1242320 * bsc#1242338 * bsc#1242349 * bsc#1242351 * bsc#1242352 * bsc#1242353 * bsc#1242355 * bsc#1242357 * bsc#1242358 * bsc#1242359 * bsc#1242360 * bsc#1242361 * bsc#1242365 * bsc#1242366 * bsc#1242369 * bsc#1242370 * bsc#1242371 * bsc#1242372 * bsc#1242377 * bsc#1242378 * bsc#1242380 * bsc#1242381 * bsc#1242382 * bsc#1242385 * bsc#1242387 * bsc#1242389 * bsc#1242391 * bsc#1242392 * bsc#1242393 * bsc#1242394 * bsc#1242398 * bsc#1242399 * bsc#1242400 * bsc#1242402 * bsc#1242403 * bsc#1242405 * bsc#1242406 * bsc#1242409 * bsc#1242410 * bsc#1242411 * bsc#1242415 * bsc#1242416 * bsc#1242421 * bsc#1242422 * bsc#1242425 * bsc#1242426 * bsc#1242428 * bsc#1242440 * bsc#1242443 * bsc#1242448 * bsc#1242449 * bsc#1242452 * bsc#1242453 * bsc#1242454 * bsc#1242455 * bsc#1242456 * bsc#1242458 * bsc#1242464 * bsc#1242465 * bsc#1242467 * bsc#1242469 * bsc#1242473 * bsc#1242474 * bsc#1242478 * bsc#1242481 * bsc#1242484 * bsc#1242489 * bsc#1242497 * bsc#1242527 * bsc#1242542 * bsc#1242544 * bsc#1242545 * bsc#1242547 * bsc#1242548 * bsc#1242549 * bsc#1242550 * bsc#1242551 * bsc#1242558 * bsc#1242570 * bsc#1242580 * bsc#1242586 * bsc#1242589 * bsc#1242596 * bsc#1242597 * bsc#1242685 * bsc#1242686 * bsc#1242688 * bsc#1242689 * bsc#1242695 * bsc#1242716 * bsc#1242733 * bsc#1242734 * bsc#1242735 * bsc#1242736 * bsc#1242739 * bsc#1242740 * bsc#1242743 * bsc#1242744 * bsc#1242745 * bsc#1242746 * bsc#1242747 * bsc#1242748 * bsc#1242749 * bsc#1242751 * bsc#1242752 * bsc#1242753 * bsc#1242756 * bsc#1242759 * bsc#1242762 * bsc#1242765 * bsc#1242767 * bsc#1242778 * bsc#1242779 * bsc#1242790 * bsc#1242791 * bsc#1243047 * bsc#1243133 * bsc#1243737 * bsc#1243919 Cross-References: * CVE-2022-3564 * CVE-2022-3619 * CVE-2022-3640 * CVE-2022-49762 * CVE-2022-49763 * CVE-2022-49769 * CVE-2022-49770 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49773 * CVE-2022-49775 * CVE-2022-49776 * CVE-2022-49777 * CVE-2022-49779 * CVE-2022-49781 * CVE-2022-49783 * CVE-2022-49784 * CVE-2022-49786 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49790 * CVE-2022-49792 * CVE-2022-49793 * CVE-2022-49794 * CVE-2022-49795 * CVE-2022-49796 * CVE-2022-49797 * CVE-2022-49799 * CVE-2022-49800 * CVE-2022-49801 * CVE-2022-49802 * CVE-2022-49807 * CVE-2022-49809 * CVE-2022-49810 * CVE-2022-49812 * CVE-2022-49813 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49822 * CVE-2022-49823 * CVE-2022-49824 * CVE-2022-49825 * CVE-2022-49826 * CVE-2022-49827 * CVE-2022-49830 * CVE-2022-49832 * CVE-2022-49834 * CVE-2022-49835 * CVE-2022-49836 * CVE-2022-49837 * CVE-2022-49839 * CVE-2022-49841 * CVE-2022-49842 * CVE-2022-49845 * CVE-2022-49846 * CVE-2022-49850 * CVE-2022-49853 * CVE-2022-49858 * CVE-2022-49860 * CVE-2022-49861 * CVE-2022-49863 * CVE-2022-49864 * CVE-2022-49865 * CVE-2022-49868 * CVE-2022-49869 * CVE-2022-49870 * CVE-2022-49871 * CVE-2022-49874 * CVE-2022-49879 * CVE-2022-49880 * CVE-2022-49881 * CVE-2022-49885 * CVE-2022-49886 * CVE-2022-49887 * CVE-2022-49888 * CVE-2022-49889 * CVE-2022-49890 * CVE-2022-49891 * CVE-2022-49892 * CVE-2022-49900 * CVE-2022-49901 * CVE-2022-49902 * CVE-2022-49905 * CVE-2022-49906 * CVE-2022-49908 * CVE-2022-49909 * CVE-2022-49910 * CVE-2022-49915 * CVE-2022-49916 * CVE-2022-49917 * CVE-2022-49918 * CVE-2022-49921 * CVE-2022-49922 * CVE-2022-49923 * CVE-2022-49924 * CVE-2022-49925 * CVE-2022-49927 * CVE-2022-49928 * CVE-2022-49929 * CVE-2022-49931 * CVE-2023-1990 * CVE-2023-28866 * CVE-2023-53035 * CVE-2023-53036 * CVE-2023-53038 * CVE-2023-53039 * CVE-2023-53040 * CVE-2023-53041 * CVE-2023-53042 * CVE-2023-53044 * CVE-2023-53045 * CVE-2023-53049 * CVE-2023-53052 * CVE-2023-53054 * CVE-2023-53056 * CVE-2023-53057 * CVE-2023-53058 * CVE-2023-53059 * CVE-2023-53060 * CVE-2023-53062 * CVE-2023-53064 * CVE-2023-53065 * CVE-2023-53066 * CVE-2023-53068 * CVE-2023-53070 * CVE-2023-53071 * CVE-2023-53073 * CVE-2023-53074 * CVE-2023-53075 * CVE-2023-53077 * CVE-2023-53078 * CVE-2023-53079 * CVE-2023-53081 * CVE-2023-53082 * CVE-2023-53084 * CVE-2023-53087 * CVE-2023-53089 * CVE-2023-53090 * CVE-2023-53091 * CVE-2023-53092 * CVE-2023-53093 * CVE-2023-53095 * CVE-2023-53096 * CVE-2023-53098 * CVE-2023-53099 * CVE-2023-53100 * CVE-2023-53101 * CVE-2023-53102 * CVE-2023-53105 * CVE-2023-53106 * CVE-2023-53108 * CVE-2023-53109 * CVE-2023-53111 * CVE-2023-53112 * CVE-2023-53114 * CVE-2023-53116 * CVE-2023-53118 * CVE-2023-53119 * CVE-2023-53123 * CVE-2023-53124 * CVE-2023-53125 * CVE-2023-53128 * CVE-2023-53131 * CVE-2023-53134 * CVE-2023-53137 * CVE-2023-53139 * CVE-2023-53140 * CVE-2023-53142 * CVE-2023-53143 * CVE-2023-53145 * CVE-2024-26804 * CVE-2024-53168 * CVE-2024-56558 * CVE-2025-21999 * CVE-2025-22056 * CVE-2025-23145 * CVE-2025-37789 CVSS scores: * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-3619 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3619 ( NVD ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-3640 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-3640 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49762 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49763 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49776 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49776 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49779 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49781 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49781 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49783 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49784 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49786 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49786 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49792 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49792 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-49793 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49794 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49801 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49813 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49822 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49823 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49830 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49834 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49834 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49837 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49845 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49850 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49850 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49868 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49869 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49869 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49908 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28866 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-28866 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-28866 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53035 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53036 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53036 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53038 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53038 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53039 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53041 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53042 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53042 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53052 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53074 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53074 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53077 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53077 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53089 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53089 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53100 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53100 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves 178 vulnerabilities and has 36 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245). * CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887). * CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). The following non-security bugs were fixed: * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737). * Remove debug flavor (bsc#1243919). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778). * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778). * arm64: insn: Add support for encoding DSB (bsc#1242778). * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778). * arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778). * arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737). * hv_netvsc: Remove rmsg_pgcnt (bsc#1243737). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737). * mtd: phram: Add the kernel lock down check (bsc#1232649). * net :mana :Add remaining GDMA stats for MANA to ethtool (bsc#1234395). * net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (bsc#1234395). * net: mana: Add gdma stats to ethtool output for mana (bsc#1234395). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (bsc#1223096). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * tcp: Dump bound-only sockets in inet_diag (bsc#1204562). * tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870). * tpm: tis: Double the timeout B to 4s (bsc#1235870). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1966=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1966=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-source-rt-5.14.21-150500.13.97.1 * kernel-devel-rt-5.14.21-150500.13.97.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt-optional-5.14.21-150500.13.97.1 * kernel-rt_debug-vdso-5.14.21-150500.13.97.1 * kernel-rt-vdso-5.14.21-150500.13.97.1 * kernel-rt-debuginfo-5.14.21-150500.13.97.1 * cluster-md-kmp-rt-5.14.21-150500.13.97.1 * gfs2-kmp-rt-5.14.21-150500.13.97.1 * ocfs2-kmp-rt-5.14.21-150500.13.97.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.97.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.97.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.97.1 * reiserfs-kmp-rt-5.14.21-150500.13.97.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.97.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.97.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.97.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.97.1 * kernel-rt-extra-5.14.21-150500.13.97.1 * kernel-rt-debugsource-5.14.21-150500.13.97.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.97.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.97.1 * kernel-rt-livepatch-5.14.21-150500.13.97.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.97.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.97.1 * dlm-kmp-rt-5.14.21-150500.13.97.1 * kernel-rt_debug-devel-5.14.21-150500.13.97.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.97.1 * kernel-syms-rt-5.14.21-150500.13.97.1 * kselftests-kmp-rt-5.14.21-150500.13.97.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.97.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.97.1 * kernel-rt-devel-5.14.21-150500.13.97.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.97.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.97.1 * kernel-rt_debug-5.14.21-150500.13.97.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-source-rt-5.14.21-150500.13.97.1 * kernel-devel-rt-5.14.21-150500.13.97.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.97.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.97.1 * kernel-rt-debugsource-5.14.21-150500.13.97.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-3619.html * https://www.suse.com/security/cve/CVE-2022-3640.html * https://www.suse.com/security/cve/CVE-2022-49762.html * https://www.suse.com/security/cve/CVE-2022-49763.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49773.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49776.html * https://www.suse.com/security/cve/CVE-2022-49777.html * https://www.suse.com/security/cve/CVE-2022-49779.html * https://www.suse.com/security/cve/CVE-2022-49781.html * https://www.suse.com/security/cve/CVE-2022-49783.html * https://www.suse.com/security/cve/CVE-2022-49784.html * https://www.suse.com/security/cve/CVE-2022-49786.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49790.html * https://www.suse.com/security/cve/CVE-2022-49792.html * https://www.suse.com/security/cve/CVE-2022-49793.html * https://www.suse.com/security/cve/CVE-2022-49794.html * https://www.suse.com/security/cve/CVE-2022-49795.html * https://www.suse.com/security/cve/CVE-2022-49796.html * https://www.suse.com/security/cve/CVE-2022-49797.html * https://www.suse.com/security/cve/CVE-2022-49799.html * https://www.suse.com/security/cve/CVE-2022-49800.html * https://www.suse.com/security/cve/CVE-2022-49801.html * https://www.suse.com/security/cve/CVE-2022-49802.html * https://www.suse.com/security/cve/CVE-2022-49807.html * https://www.suse.com/security/cve/CVE-2022-49809.html * https://www.suse.com/security/cve/CVE-2022-49810.html * https://www.suse.com/security/cve/CVE-2022-49812.html * https://www.suse.com/security/cve/CVE-2022-49813.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49822.html * https://www.suse.com/security/cve/CVE-2022-49823.html * https://www.suse.com/security/cve/CVE-2022-49824.html * https://www.suse.com/security/cve/CVE-2022-49825.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49827.html * https://www.suse.com/security/cve/CVE-2022-49830.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49834.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49836.html * https://www.suse.com/security/cve/CVE-2022-49837.html * https://www.suse.com/security/cve/CVE-2022-49839.html * https://www.suse.com/security/cve/CVE-2022-49841.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49845.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49850.html * https://www.suse.com/security/cve/CVE-2022-49853.html * https://www.suse.com/security/cve/CVE-2022-49858.html * https://www.suse.com/security/cve/CVE-2022-49860.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49863.html * https://www.suse.com/security/cve/CVE-2022-49864.html * https://www.suse.com/security/cve/CVE-2022-49865.html * https://www.suse.com/security/cve/CVE-2022-49868.html * https://www.suse.com/security/cve/CVE-2022-49869.html * https://www.suse.com/security/cve/CVE-2022-49870.html * https://www.suse.com/security/cve/CVE-2022-49871.html * https://www.suse.com/security/cve/CVE-2022-49874.html * https://www.suse.com/security/cve/CVE-2022-49879.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49881.html * https://www.suse.com/security/cve/CVE-2022-49885.html * https://www.suse.com/security/cve/CVE-2022-49886.html * https://www.suse.com/security/cve/CVE-2022-49887.html * https://www.suse.com/security/cve/CVE-2022-49888.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49890.html * https://www.suse.com/security/cve/CVE-2022-49891.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49900.html * https://www.suse.com/security/cve/CVE-2022-49901.html * https://www.suse.com/security/cve/CVE-2022-49902.html * https://www.suse.com/security/cve/CVE-2022-49905.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49908.html * https://www.suse.com/security/cve/CVE-2022-49909.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49916.html * https://www.suse.com/security/cve/CVE-2022-49917.html * https://www.suse.com/security/cve/CVE-2022-49918.html * https://www.suse.com/security/cve/CVE-2022-49921.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49923.html * https://www.suse.com/security/cve/CVE-2022-49924.html * https://www.suse.com/security/cve/CVE-2022-49925.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2022-49928.html * https://www.suse.com/security/cve/CVE-2022-49929.html * https://www.suse.com/security/cve/CVE-2022-49931.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-28866.html * https://www.suse.com/security/cve/CVE-2023-53035.html * https://www.suse.com/security/cve/CVE-2023-53036.html * https://www.suse.com/security/cve/CVE-2023-53038.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53040.html * https://www.suse.com/security/cve/CVE-2023-53041.html * https://www.suse.com/security/cve/CVE-2023-53042.html * https://www.suse.com/security/cve/CVE-2023-53044.html * https://www.suse.com/security/cve/CVE-2023-53045.html * https://www.suse.com/security/cve/CVE-2023-53049.html * https://www.suse.com/security/cve/CVE-2023-53052.html * https://www.suse.com/security/cve/CVE-2023-53054.html * https://www.suse.com/security/cve/CVE-2023-53056.html * https://www.suse.com/security/cve/CVE-2023-53057.html * https://www.suse.com/security/cve/CVE-2023-53058.html * https://www.suse.com/security/cve/CVE-2023-53059.html * https://www.suse.com/security/cve/CVE-2023-53060.html * https://www.suse.com/security/cve/CVE-2023-53062.html * https://www.suse.com/security/cve/CVE-2023-53064.html * https://www.suse.com/security/cve/CVE-2023-53065.html * https://www.suse.com/security/cve/CVE-2023-53066.html * https://www.suse.com/security/cve/CVE-2023-53068.html * https://www.suse.com/security/cve/CVE-2023-53070.html * https://www.suse.com/security/cve/CVE-2023-53071.html * https://www.suse.com/security/cve/CVE-2023-53073.html * https://www.suse.com/security/cve/CVE-2023-53074.html * https://www.suse.com/security/cve/CVE-2023-53075.html * https://www.suse.com/security/cve/CVE-2023-53077.html * https://www.suse.com/security/cve/CVE-2023-53078.html * https://www.suse.com/security/cve/CVE-2023-53079.html * https://www.suse.com/security/cve/CVE-2023-53081.html * https://www.suse.com/security/cve/CVE-2023-53082.html * https://www.suse.com/security/cve/CVE-2023-53084.html * https://www.suse.com/security/cve/CVE-2023-53087.html * https://www.suse.com/security/cve/CVE-2023-53089.html * https://www.suse.com/security/cve/CVE-2023-53090.html * https://www.suse.com/security/cve/CVE-2023-53091.html * https://www.suse.com/security/cve/CVE-2023-53092.html * https://www.suse.com/security/cve/CVE-2023-53093.html * https://www.suse.com/security/cve/CVE-2023-53095.html * https://www.suse.com/security/cve/CVE-2023-53096.html * https://www.suse.com/security/cve/CVE-2023-53098.html * https://www.suse.com/security/cve/CVE-2023-53099.html * https://www.suse.com/security/cve/CVE-2023-53100.html * https://www.suse.com/security/cve/CVE-2023-53101.html * https://www.suse.com/security/cve/CVE-2023-53102.html * https://www.suse.com/security/cve/CVE-2023-53105.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2023-53108.html * https://www.suse.com/security/cve/CVE-2023-53109.html * https://www.suse.com/security/cve/CVE-2023-53111.html * https://www.suse.com/security/cve/CVE-2023-53112.html * https://www.suse.com/security/cve/CVE-2023-53114.html * https://www.suse.com/security/cve/CVE-2023-53116.html * https://www.suse.com/security/cve/CVE-2023-53118.html * https://www.suse.com/security/cve/CVE-2023-53119.html * https://www.suse.com/security/cve/CVE-2023-53123.html * https://www.suse.com/security/cve/CVE-2023-53124.html * https://www.suse.com/security/cve/CVE-2023-53125.html * https://www.suse.com/security/cve/CVE-2023-53128.html * https://www.suse.com/security/cve/CVE-2023-53131.html * https://www.suse.com/security/cve/CVE-2023-53134.html * https://www.suse.com/security/cve/CVE-2023-53137.html * https://www.suse.com/security/cve/CVE-2023-53139.html * https://www.suse.com/security/cve/CVE-2023-53140.html * https://www.suse.com/security/cve/CVE-2023-53142.html * https://www.suse.com/security/cve/CVE-2023-53143.html * https://www.suse.com/security/cve/CVE-2023-53145.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1204562 * https://bugzilla.suse.com/show_bug.cgi?id=1204569 * https://bugzilla.suse.com/show_bug.cgi?id=1204619 * https://bugzilla.suse.com/show_bug.cgi?id=1204705 * https://bugzilla.suse.com/show_bug.cgi?id=1205282 * https://bugzilla.suse.com/show_bug.cgi?id=1206051 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1208105 * https://bugzilla.suse.com/show_bug.cgi?id=1208542 * https://bugzilla.suse.com/show_bug.cgi?id=1209292 * https://bugzilla.suse.com/show_bug.cgi?id=1209556 * https://bugzilla.suse.com/show_bug.cgi?id=1209684 * https://bugzilla.suse.com/show_bug.cgi?id=1209780 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1210767 * https://bugzilla.suse.com/show_bug.cgi?id=1211465 * https://bugzilla.suse.com/show_bug.cgi?id=1213012 * https://bugzilla.suse.com/show_bug.cgi?id=1213013 * https://bugzilla.suse.com/show_bug.cgi?id=1213094 * https://bugzilla.suse.com/show_bug.cgi?id=1213096 * https://bugzilla.suse.com/show_bug.cgi?id=1213233 * https://bugzilla.suse.com/show_bug.cgi?id=1213946 * https://bugzilla.suse.com/show_bug.cgi?id=1214991 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1234395 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1242146 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242150 * https://bugzilla.suse.com/show_bug.cgi?id=1242151 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242157 * https://bugzilla.suse.com/show_bug.cgi?id=1242158 * https://bugzilla.suse.com/show_bug.cgi?id=1242160 * https://bugzilla.suse.com/show_bug.cgi?id=1242164 * https://bugzilla.suse.com/show_bug.cgi?id=1242165 * https://bugzilla.suse.com/show_bug.cgi?id=1242169 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242217 * https://bugzilla.suse.com/show_bug.cgi?id=1242218 * https://bugzilla.suse.com/show_bug.cgi?id=1242219 * https://bugzilla.suse.com/show_bug.cgi?id=1242222 * https://bugzilla.suse.com/show_bug.cgi?id=1242224 * https://bugzilla.suse.com/show_bug.cgi?id=1242226 * https://bugzilla.suse.com/show_bug.cgi?id=1242227 * https://bugzilla.suse.com/show_bug.cgi?id=1242228 * https://bugzilla.suse.com/show_bug.cgi?id=1242229 * https://bugzilla.suse.com/show_bug.cgi?id=1242230 * https://bugzilla.suse.com/show_bug.cgi?id=1242231 * https://bugzilla.suse.com/show_bug.cgi?id=1242232 * https://bugzilla.suse.com/show_bug.cgi?id=1242237 * https://bugzilla.suse.com/show_bug.cgi?id=1242239 * https://bugzilla.suse.com/show_bug.cgi?id=1242240 * https://bugzilla.suse.com/show_bug.cgi?id=1242241 * https://bugzilla.suse.com/show_bug.cgi?id=1242244 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242248 * https://bugzilla.suse.com/show_bug.cgi?id=1242249 * https://bugzilla.suse.com/show_bug.cgi?id=1242261 * https://bugzilla.suse.com/show_bug.cgi?id=1242264 * https://bugzilla.suse.com/show_bug.cgi?id=1242265 * https://bugzilla.suse.com/show_bug.cgi?id=1242270 * https://bugzilla.suse.com/show_bug.cgi?id=1242276 * https://bugzilla.suse.com/show_bug.cgi?id=1242278 * https://bugzilla.suse.com/show_bug.cgi?id=1242279 * https://bugzilla.suse.com/show_bug.cgi?id=1242280 * https://bugzilla.suse.com/show_bug.cgi?id=1242281 * https://bugzilla.suse.com/show_bug.cgi?id=1242282 * https://bugzilla.suse.com/show_bug.cgi?id=1242285 * https://bugzilla.suse.com/show_bug.cgi?id=1242286 * https://bugzilla.suse.com/show_bug.cgi?id=1242289 * https://bugzilla.suse.com/show_bug.cgi?id=1242294 * https://bugzilla.suse.com/show_bug.cgi?id=1242295 * https://bugzilla.suse.com/show_bug.cgi?id=1242298 * https://bugzilla.suse.com/show_bug.cgi?id=1242302 * https://bugzilla.suse.com/show_bug.cgi?id=1242305 * https://bugzilla.suse.com/show_bug.cgi?id=1242311 * https://bugzilla.suse.com/show_bug.cgi?id=1242312 * https://bugzilla.suse.com/show_bug.cgi?id=1242320 * https://bugzilla.suse.com/show_bug.cgi?id=1242338 * https://bugzilla.suse.com/show_bug.cgi?id=1242349 * https://bugzilla.suse.com/show_bug.cgi?id=1242351 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242355 * https://bugzilla.suse.com/show_bug.cgi?id=1242357 * https://bugzilla.suse.com/show_bug.cgi?id=1242358 * https://bugzilla.suse.com/show_bug.cgi?id=1242359 * https://bugzilla.suse.com/show_bug.cgi?id=1242360 * https://bugzilla.suse.com/show_bug.cgi?id=1242361 * https://bugzilla.suse.com/show_bug.cgi?id=1242365 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242369 * https://bugzilla.suse.com/show_bug.cgi?id=1242370 * https://bugzilla.suse.com/show_bug.cgi?id=1242371 * https://bugzilla.suse.com/show_bug.cgi?id=1242372 * https://bugzilla.suse.com/show_bug.cgi?id=1242377 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242380 * https://bugzilla.suse.com/show_bug.cgi?id=1242381 * https://bugzilla.suse.com/show_bug.cgi?id=1242382 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242387 * https://bugzilla.suse.com/show_bug.cgi?id=1242389 * https://bugzilla.suse.com/show_bug.cgi?id=1242391 * https://bugzilla.suse.com/show_bug.cgi?id=1242392 * https://bugzilla.suse.com/show_bug.cgi?id=1242393 * https://bugzilla.suse.com/show_bug.cgi?id=1242394 * https://bugzilla.suse.com/show_bug.cgi?id=1242398 * https://bugzilla.suse.com/show_bug.cgi?id=1242399 * https://bugzilla.suse.com/show_bug.cgi?id=1242400 * https://bugzilla.suse.com/show_bug.cgi?id=1242402 * https://bugzilla.suse.com/show_bug.cgi?id=1242403 * https://bugzilla.suse.com/show_bug.cgi?id=1242405 * https://bugzilla.suse.com/show_bug.cgi?id=1242406 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242410 * https://bugzilla.suse.com/show_bug.cgi?id=1242411 * https://bugzilla.suse.com/show_bug.cgi?id=1242415 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242421 * https://bugzilla.suse.com/show_bug.cgi?id=1242422 * https://bugzilla.suse.com/show_bug.cgi?id=1242425 * https://bugzilla.suse.com/show_bug.cgi?id=1242426 * https://bugzilla.suse.com/show_bug.cgi?id=1242428 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242443 * https://bugzilla.suse.com/show_bug.cgi?id=1242448 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242453 * https://bugzilla.suse.com/show_bug.cgi?id=1242454 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242456 * https://bugzilla.suse.com/show_bug.cgi?id=1242458 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242465 * https://bugzilla.suse.com/show_bug.cgi?id=1242467 * https://bugzilla.suse.com/show_bug.cgi?id=1242469 * https://bugzilla.suse.com/show_bug.cgi?id=1242473 * https://bugzilla.suse.com/show_bug.cgi?id=1242474 * https://bugzilla.suse.com/show_bug.cgi?id=1242478 * https://bugzilla.suse.com/show_bug.cgi?id=1242481 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242489 * https://bugzilla.suse.com/show_bug.cgi?id=1242497 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242544 * https://bugzilla.suse.com/show_bug.cgi?id=1242545 * https://bugzilla.suse.com/show_bug.cgi?id=1242547 * https://bugzilla.suse.com/show_bug.cgi?id=1242548 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242550 * https://bugzilla.suse.com/show_bug.cgi?id=1242551 * https://bugzilla.suse.com/show_bug.cgi?id=1242558 * https://bugzilla.suse.com/show_bug.cgi?id=1242570 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242586 * https://bugzilla.suse.com/show_bug.cgi?id=1242589 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242597 * https://bugzilla.suse.com/show_bug.cgi?id=1242685 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242688 * https://bugzilla.suse.com/show_bug.cgi?id=1242689 * https://bugzilla.suse.com/show_bug.cgi?id=1242695 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242733 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242735 * https://bugzilla.suse.com/show_bug.cgi?id=1242736 * https://bugzilla.suse.com/show_bug.cgi?id=1242739 * https://bugzilla.suse.com/show_bug.cgi?id=1242740 * https://bugzilla.suse.com/show_bug.cgi?id=1242743 * https://bugzilla.suse.com/show_bug.cgi?id=1242744 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242746 * https://bugzilla.suse.com/show_bug.cgi?id=1242747 * https://bugzilla.suse.com/show_bug.cgi?id=1242748 * https://bugzilla.suse.com/show_bug.cgi?id=1242749 * https://bugzilla.suse.com/show_bug.cgi?id=1242751 * https://bugzilla.suse.com/show_bug.cgi?id=1242752 * https://bugzilla.suse.com/show_bug.cgi?id=1242753 * https://bugzilla.suse.com/show_bug.cgi?id=1242756 * https://bugzilla.suse.com/show_bug.cgi?id=1242759 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242765 * https://bugzilla.suse.com/show_bug.cgi?id=1242767 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242779 * https://bugzilla.suse.com/show_bug.cgi?id=1242790 * https://bugzilla.suse.com/show_bug.cgi?id=1242791 * https://bugzilla.suse.com/show_bug.cgi?id=1243047 * https://bugzilla.suse.com/show_bug.cgi?id=1243133 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 17:13:41 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 17:13:41 -0000 Subject: SUSE-SU-2025:01965-1: important: Security update for the Linux Kernel Message-ID: <175009402154.655.10739592672638638260@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01965-1 Release Date: 2025-06-16T14:54:38Z Rating: important References: * bsc#1220112 * bsc#1223096 * bsc#1226498 * bsc#1229491 * bsc#1230581 * bsc#1231016 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1234154 * bsc#1235149 * bsc#1235968 * bsc#1236142 * bsc#1236208 * bsc#1237312 * bsc#1238212 * bsc#1238473 * bsc#1238774 * bsc#1238992 * bsc#1239691 * bsc#1239925 * bsc#1240593 * bsc#1240866 * bsc#1240966 * bsc#1241148 * bsc#1241282 * bsc#1241305 * bsc#1241340 * bsc#1241351 * bsc#1241376 * bsc#1241448 * bsc#1241457 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241533 * bsc#1241538 * bsc#1241576 * bsc#1241590 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241625 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241644 * bsc#1241654 * bsc#1241657 * bsc#1242006 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242203 * bsc#1242343 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242709 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242944 * bsc#1242945 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243805 * bsc#1243963 Cross-References: * CVE-2023-53146 * CVE-2024-28956 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-53135 * CVE-2024-54458 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21919 * CVE-2025-22005 * CVE-2025-22021 * CVE-2025-22030 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22063 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22089 * CVE-2025-22095 * CVE-2025-22103 * CVE-2025-22119 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 171 vulnerabilities and has 28 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks (bsc#1243664). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). The following non-security bugs were fixed: * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * cBPF: Refresh fixes for cBPF issue (bsc#1242778) * Squashfs: check return result of sb_min_blocksize (git-fixes). * Update patches.suse/nvme-fixup-scan-failure-for-non-ANA-multipath- contro.patch (git-fixes bsc#1235149). * Update patches.suse/nvme-re-read-ANA-log-page-after-ns-scan-completes.patch (git-fixes bsc#1235149). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: slcan: allow reception of short error messages (git-fixes). * cifs: change tcon status when need_reconnect is set on it (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * devlink: fix port new reply cmd type (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * exfat: fix potential wrong error return from get_block (git-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kernel-obs-qa: Use srchash for dependency as well * loop: Add sanity check for read/write_iter (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * neighbour: delete redundant judgment statements (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: do not dump stack on queue timeout (git-fixes). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * qibfs: fix _another_ leak (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: max20086: fix invalid memory access (git-fixes). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * scsi: Improve CDL control (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * smb3: fix Open files on server counter going negative (git-fixes). * smb: client: Use str_yes_no() helper function (git-fixes). * smb: client: allow more DFS referrals to be cached (git-fixes). * smb: client: avoid unnecessary reconnects when refreshing referrals (git- fixes). * smb: client: change return value in open_cached_dir_by_dentry() if !cfids (git-fixes). * smb: client: do not retry DFS targets on server shutdown (git-fixes). * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes). * smb: client: do not try following DFS links in cifs_tree_connect() (git- fixes). * smb: client: fix DFS interlink failover (git-fixes). * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes). * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709). * smb: client: fix potential race in cifs_put_tcon() (git-fixes). * smb: client: fix return value of parse_dfs_referrals() (git-fixes). * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes). * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes). * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes). * smb: client: improve purging of cached referrals (git-fixes). * smb: client: introduce av_for_each_entry() helper (git-fixes). * smb: client: optimize referral walk on failed link targets (git-fixes). * smb: client: parse DNS domain name from domain= option (git-fixes). * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes). * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes). * smb: client: refresh referral without acquiring refpath_lock (git-fixes). * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1965=1 SUSE-2025-1965=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1965=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * dlm-kmp-azure-6.4.0-150600.8.40.1 * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-extra-debuginfo-6.4.0-150600.8.40.1 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.40.1 * kselftests-kmp-azure-6.4.0-150600.8.40.1 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.40.1 * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-debuginfo-6.4.0-150600.8.40.1 * reiserfs-kmp-azure-6.4.0-150600.8.40.1 * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.40.1 * cluster-md-kmp-azure-6.4.0-150600.8.40.1 * kernel-syms-azure-6.4.0-150600.8.40.1 * kernel-azure-extra-6.4.0-150600.8.40.1 * kernel-azure-debugsource-6.4.0-150600.8.40.1 * kernel-azure-optional-6.4.0-150600.8.40.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-optional-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-devel-6.4.0-150600.8.40.1 * gfs2-kmp-azure-6.4.0-150600.8.40.1 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.40.1 * ocfs2-kmp-azure-6.4.0-150600.8.40.1 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.40.1 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-vdso-6.4.0-150600.8.40.1 * openSUSE Leap 15.6 (noarch) * kernel-source-azure-6.4.0-150600.8.40.1 * kernel-devel-azure-6.4.0-150600.8.40.1 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.40.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-azure-devel-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-debuginfo-6.4.0-150600.8.40.1 * kernel-azure-devel-6.4.0-150600.8.40.1 * kernel-syms-azure-6.4.0-150600.8.40.1 * kernel-azure-debugsource-6.4.0-150600.8.40.1 * Public Cloud Module 15-SP6 (noarch) * kernel-source-azure-6.4.0-150600.8.40.1 * kernel-devel-azure-6.4.0-150600.8.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 17:15:17 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 17:15:17 -0000 Subject: SUSE-RU-2025:01963-1: important: Recommended update for clamav Message-ID: <175009411784.655.4938998352854639349@smelt2.prg2.suse.org> # Recommended update for clamav Announcement ID: SUSE-RU-2025:01963-1 Release Date: 2025-06-16T14:14:59Z Rating: important References: * bsc#1243565 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for clamav fixes the following issues: * Fix a race condition between the mockup servers started by different test cases in freshclam_test.py (bsc#1243565). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1963=1 openSUSE-SLE-15.6-2025-1963=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1963=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1963=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * clamav-debuginfo-1.4.2-150600.18.15.1 * libclammspack0-debuginfo-1.4.2-150600.18.15.1 * clamav-1.4.2-150600.18.15.1 * libfreshclam3-1.4.2-150600.18.15.1 * libfreshclam3-debuginfo-1.4.2-150600.18.15.1 * clamav-milter-debuginfo-1.4.2-150600.18.15.1 * libclammspack0-1.4.2-150600.18.15.1 * clamav-devel-1.4.2-150600.18.15.1 * clamav-milter-1.4.2-150600.18.15.1 * libclamav12-debuginfo-1.4.2-150600.18.15.1 * libclamav12-1.4.2-150600.18.15.1 * clamav-debugsource-1.4.2-150600.18.15.1 * openSUSE Leap 15.6 (noarch) * clamav-docs-html-1.4.2-150600.18.15.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * clamav-debuginfo-1.4.2-150600.18.15.1 * libclammspack0-debuginfo-1.4.2-150600.18.15.1 * clamav-1.4.2-150600.18.15.1 * libfreshclam3-1.4.2-150600.18.15.1 * libfreshclam3-debuginfo-1.4.2-150600.18.15.1 * clamav-milter-debuginfo-1.4.2-150600.18.15.1 * libclammspack0-1.4.2-150600.18.15.1 * clamav-devel-1.4.2-150600.18.15.1 * clamav-milter-1.4.2-150600.18.15.1 * libclamav12-debuginfo-1.4.2-150600.18.15.1 * libclamav12-1.4.2-150600.18.15.1 * clamav-debugsource-1.4.2-150600.18.15.1 * Basesystem Module 15-SP6 (noarch) * clamav-docs-html-1.4.2-150600.18.15.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * clamav-debuginfo-1.4.2-150600.18.15.1 * libclammspack0-debuginfo-1.4.2-150600.18.15.1 * clamav-1.4.2-150600.18.15.1 * libfreshclam3-1.4.2-150600.18.15.1 * libfreshclam3-debuginfo-1.4.2-150600.18.15.1 * clamav-milter-debuginfo-1.4.2-150600.18.15.1 * libclammspack0-1.4.2-150600.18.15.1 * clamav-devel-1.4.2-150600.18.15.1 * clamav-milter-1.4.2-150600.18.15.1 * libclamav12-debuginfo-1.4.2-150600.18.15.1 * libclamav12-1.4.2-150600.18.15.1 * clamav-debugsource-1.4.2-150600.18.15.1 * Basesystem Module 15-SP7 (noarch) * clamav-docs-html-1.4.2-150600.18.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243565 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 17:16:05 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 17:16:05 -0000 Subject: SUSE-RU-2025:01781-2: moderate: Recommended update for pipewire Message-ID: <175009416559.655.14750739864723961085@smelt2.prg2.suse.org> # Recommended update for pipewire Announcement ID: SUSE-RU-2025:01781-2 Release Date: 2025-06-16T14:03:27Z Rating: moderate References: * bsc#1222762 Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for pipewire fixes the following issue: * Add patch from upstream to make pipewire not run as root at all (bsc#1222762). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1781=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-1781=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1781=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * pipewire-modules-0_3-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-spa-plugins-0_2-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-spa-plugins-0_2-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-modules-0_3-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-debugsource-1.0.5+git36.60deeb2-150600.3.6.2 * libpipewire-0_3-0-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * libpipewire-0_3-0-1.0.5+git36.60deeb2-150600.3.6.2 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * gstreamer-plugin-pipewire-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-spa-tools-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-spa-tools-1.0.5+git36.60deeb2-150600.3.6.2 * gstreamer-plugin-pipewire-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-debugsource-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-tools-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-tools-1.0.5+git36.60deeb2-150600.3.6.2 * Desktop Applications Module 15-SP7 (noarch) * pipewire-lang-1.0.5+git36.60deeb2-150600.3.6.2 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * pipewire-spa-plugins-0_2-jack-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-doc-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-spa-plugins-0_2-jack-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-pulseaudio-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-libjack-0_3-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-libjack-0_3-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-debugsource-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-pulseaudio-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-alsa-debuginfo-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-libjack-0_3-devel-1.0.5+git36.60deeb2-150600.3.6.2 * pipewire-alsa-1.0.5+git36.60deeb2-150600.3.6.2 * SUSE Package Hub 15 15-SP7 (noarch) * pipewire-lang-1.0.5+git36.60deeb2-150600.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222762 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 16 17:16:39 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 16 Jun 2025 17:16:39 -0000 Subject: SUSE-SU-2025:01487-2: important: Security update for java-11-openjdk Message-ID: <175009419941.655.13495091296563184086@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2025:01487-2 Release Date: 2025-06-16T12:01:23Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Upgrade to upstream tag jdk-11.0.27+6 (April 2025 CPU) CVEs: * CVE-2025-21587: Fixed JSSE unauthorized access, deletion or modification of critical data (bsc#1241274) * CVE-2025-30691: Fixed Oracle Java SE Compiler Unauthorized Data Access (bsc#1241275) * CVE-2025-30698: Fixed Oracle Java 2D unauthorized data access and DoS (bsc#1241276) Changes: + JDK-8195675: Call to insertText with single character from custom Input Method ignored + JDK-8202926: Test java/awt/Focus/ /WindowUpdateFocusabilityTest/ /WindowUpdateFocusabilityTest.html fails + JDK-8216539: tools/jar/modularJar/Basic.java timed out + JDK-8268364: jmethod clearing should be done during unloading + JDK-8273914: Indy string concat changes order of operations + JDK-8294316: SA core file support is broken on macosx-x64 starting with macOS 12.x + JDK-8306408: Fix the format of several tables in building.md + JDK-8309841: Jarsigner should print a warning if an entry is removed + JDK-8312049: runtime/logging/ClassLoadUnloadTest can be improved + JDK-8320916: jdk/jfr/event/gc/stacktrace/ /TestParallelMarkSweepAllocationPendingStackTrace.java failed with "OutOfMemoryError: GC overhead limit exceeded" + JDK-8327650: Test java/nio/channels/DatagramChannel/ /StressNativeSignal.java timed out + JDK-8328242: Add a log area to the PassFailJFrame + JDK-8331863: DUIterator_Fast used before it is constructed + JDK-8336012: Fix usages of jtreg-reserved properties + JDK-8337494: Clarify JarInputStream behavior + JDK-8337692: Better TLS connection support + JDK-8338430: Improve compiler transformations + JDK-8339560: Unaddressed comments during code review of JDK-8337664 + JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract + JDK-8339931: Update problem list for WindowUpdateFocusabilityTest.java + JDK-8340387: Update OS detection code to recognize Windows Server 2025 + JDK-8341424: GHA: Collect hs_errs from build time failures + JDK-8342562: Enhance Deflater operations + JDK-8342704: GHA: Report truncation is broken after JDK-8341424 + JDK-8343007: Enhance Buffered Image handling + JDK-8343474: [updates] Customize README.md to specifics of update project + JDK-8343599: Kmem limit and max values swapped when printing container information + JDK-8343786: [11u] GHA: Bump macOS and Xcode versions to macos-13 and XCode 14.3.1 + JDK-8344589: Update IANA Language Subtag Registry to Version 2024-11-19 + JDK-8345509: Bump update version of OpenJDK: 11.0.27 + JDK-8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs + JDK-8347427: JTabbedPane/8134116/Bug8134116.java has no license header + JDK-8347847: Enhance jar file support + JDK-8347965: (tz) Update Timezone Data to 2025a + JDK-8349603: [21u, 17u, 11u] Update GHA JDKs after Jan/25 updates + JDK-8352097: (tz) zone.tab update missed in 2025a backport + JDK-8354087: [11u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.27 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1487=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1487=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1487=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1487=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1487=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1487=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-1487=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1487=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1487=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1487=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1487=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1487=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-1487=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1487=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * SUSE Manager Proxy 4.3 (x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Package Hub 15 15-SP7 (noarch) * java-11-openjdk-javadoc-11.0.27.0-150000.3.125.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-jmods-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-src-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * openSUSE Leap 15.6 (noarch) * java-11-openjdk-javadoc-11.0.27.0-150000.3.125.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 * SUSE Package Hub 15 15-SP6 (noarch) * java-11-openjdk-javadoc-11.0.27.0-150000.3.125.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-demo-11.0.27.0-150000.3.125.1 * java-11-openjdk-debugsource-11.0.27.0-150000.3.125.1 * java-11-openjdk-11.0.27.0-150000.3.125.1 * java-11-openjdk-headless-11.0.27.0-150000.3.125.1 * java-11-openjdk-debuginfo-11.0.27.0-150000.3.125.1 * java-11-openjdk-devel-11.0.27.0-150000.3.125.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 12:32:50 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 12:32:50 -0000 Subject: SUSE-SU-2025:01972-1: important: Security update for the Linux Kernel Message-ID: <175016357009.11267.2171243842425563780@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01972-1 Release Date: 2025-06-17T11:37:44Z Rating: important References: * bsc#1223096 * bsc#1223809 * bsc#1224013 * bsc#1224597 * bsc#1224757 * bsc#1230581 * bsc#1230764 * bsc#1231016 * bsc#1231103 * bsc#1232493 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1235149 * bsc#1235501 * bsc#1235526 * bsc#1236142 * bsc#1236208 * bsc#1236704 * bsc#1237312 * bsc#1238473 * bsc#1238527 * bsc#1238585 * bsc#1238714 * bsc#1238737 * bsc#1238745 * bsc#1238774 * bsc#1238862 * bsc#1238961 * bsc#1238983 * bsc#1238992 * bsc#1239079 * bsc#1239476 * bsc#1239487 * bsc#1239691 * bsc#1240557 * bsc#1240593 * bsc#1240655 * bsc#1240711 * bsc#1240717 * bsc#1240740 * bsc#1240966 * bsc#1241148 * bsc#1241266 * bsc#1241282 * bsc#1241305 * bsc#1241319 * bsc#1241332 * bsc#1241333 * bsc#1241341 * bsc#1241343 * bsc#1241344 * bsc#1241347 * bsc#1241351 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241376 * bsc#1241388 * bsc#1241402 * bsc#1241412 * bsc#1241413 * bsc#1241419 * bsc#1241424 * bsc#1241436 * bsc#1241441 * bsc#1241442 * bsc#1241443 * bsc#1241448 * bsc#1241456 * bsc#1241458 * bsc#1241459 * bsc#1241492 * bsc#1241512 * bsc#1241525 * bsc#1241528 * bsc#1241533 * bsc#1241535 * bsc#1241541 * bsc#1241545 * bsc#1241550 * bsc#1241573 * bsc#1241574 * bsc#1241575 * bsc#1241581 * bsc#1241590 * bsc#1241596 * bsc#1241597 * bsc#1241598 * bsc#1241599 * bsc#1241601 * bsc#1241627 * bsc#1241628 * bsc#1241638 * bsc#1241648 * bsc#1241657 * bsc#1242006 * bsc#1242012 * bsc#1242119 * bsc#1242125 * bsc#1242172 * bsc#1242203 * bsc#1242205 * bsc#1242283 * bsc#1242307 * bsc#1242313 * bsc#1242314 * bsc#1242315 * bsc#1242321 * bsc#1242326 * bsc#1242327 * bsc#1242328 * bsc#1242332 * bsc#1242333 * bsc#1242335 * bsc#1242336 * bsc#1242342 * bsc#1242343 * bsc#1242344 * bsc#1242345 * bsc#1242346 * bsc#1242347 * bsc#1242348 * bsc#1242414 * bsc#1242417 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242513 * bsc#1242520 * bsc#1242523 * bsc#1242526 * bsc#1242528 * bsc#1242533 * bsc#1242534 * bsc#1242535 * bsc#1242536 * bsc#1242537 * bsc#1242538 * bsc#1242539 * bsc#1242540 * bsc#1242546 * bsc#1242556 * bsc#1242585 * bsc#1242596 * bsc#1242710 * bsc#1242762 * bsc#1242763 * bsc#1242778 * bsc#1242786 * bsc#1242831 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242875 * bsc#1242924 * bsc#1242944 * bsc#1242951 * bsc#1242962 * bsc#1242985 * bsc#1242993 * bsc#1243020 * bsc#1243044 * bsc#1243056 * bsc#1243077 * bsc#1243090 * bsc#1243115 * bsc#1243116 * bsc#1243215 * bsc#1243341 * bsc#1243342 * bsc#1243513 * bsc#1243519 * bsc#1243539 * bsc#1243541 * bsc#1243547 * bsc#1243657 * bsc#1243658 * bsc#1243737 * bsc#1243805 * bsc#1243817 * bsc#1243919 * bsc#1243963 * jsc#PED-11761 * jsc#PED-12372 Cross-References: * CVE-2023-53034 * CVE-2024-27018 * CVE-2024-27415 * CVE-2024-28956 * CVE-2024-35840 * CVE-2024-46713 * CVE-2024-46763 * CVE-2024-46865 * CVE-2024-50083 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-54458 * CVE-2024-56641 * CVE-2024-56702 * CVE-2024-57998 * CVE-2024-58001 * CVE-2024-58070 * CVE-2024-58093 * CVE-2024-58094 * CVE-2024-58095 * CVE-2024-58096 * CVE-2024-58097 * CVE-2025-21648 * CVE-2025-21683 * CVE-2025-21702 * CVE-2025-21707 * CVE-2025-21758 * CVE-2025-21768 * CVE-2025-21787 * CVE-2025-21792 * CVE-2025-21814 * CVE-2025-21852 * CVE-2025-21853 * CVE-2025-21919 * CVE-2025-21929 * CVE-2025-21962 * CVE-2025-21963 * CVE-2025-21964 * CVE-2025-22018 * CVE-2025-22021 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22030 * CVE-2025-22033 * CVE-2025-22044 * CVE-2025-22050 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22058 * CVE-2025-22062 * CVE-2025-22063 * CVE-2025-22064 * CVE-2025-22065 * CVE-2025-22070 * CVE-2025-22075 * CVE-2025-22085 * CVE-2025-22086 * CVE-2025-22088 * CVE-2025-22091 * CVE-2025-22093 * CVE-2025-22094 * CVE-2025-22097 * CVE-2025-22102 * CVE-2025-22103 * CVE-2025-22104 * CVE-2025-22107 * CVE-2025-22108 * CVE-2025-22109 * CVE-2025-22112 * CVE-2025-22116 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-22128 * CVE-2025-23129 * CVE-2025-23131 * CVE-2025-23134 * CVE-2025-23136 * CVE-2025-23138 * CVE-2025-23140 * CVE-2025-23145 * CVE-2025-23150 * CVE-2025-23154 * CVE-2025-23160 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37755 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37787 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37799 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37809 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37842 * CVE-2025-37870 * CVE-2025-37879 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37949 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37960 * CVE-2025-37974 * CVE-2025-38152 * CVE-2025-38637 * CVE-2025-40325 CVSS scores: * CVE-2023-53034 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53034 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-27018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27018 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50083 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58001 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58001 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-58070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58096 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-58097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21683 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21683 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21962 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21962 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-21962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22065 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22086 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22097 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22097 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22102 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22102 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22107 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-22108 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-22108 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-22109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22112 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22112 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-22116 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22116 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Real Time Module 15-SP7 An update that solves 119 vulnerabilities, contains two features and has 72 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006). * CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862). * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737). * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655). * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717). * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740). * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22094: powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu' (bsc#1241512). * CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550). * CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575). * CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23154: io_uring/net: fix io_req_post_cqe abuse by send bundle (bsc#1242533). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37747: kABI workaround for perf-Fix-hang-while-freeing-sigtrap- event (References: bsc#1242520). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414). * CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). The following non-security bugs were fixed: * ACPI PPTT: Fix coding mistakes in a couple of sizeof() calls (stable-fixes). * ACPI: EC: Set ec_no_wakeup for Lenovo Go S (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek - Enable speaker for HP platform (git-fixes). * ALSA: hda/realtek: Fix built-mic regression on other ASUS models (git- fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: usb-audio: Add retry on -EPROTO from usb_set_interface() (stable- fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ALSA: usb-audio: Add second USB ID for Jabra Evolve 65 headset (stable- fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoC: Use of_property_read_bool() (stable-fixes). * ASoC: simple-card-utils: Fix pointer check in graph_util_parse_link_direction (git-fixes). * ASoC: soc-core: Stop using of_property_read_bool() for non-boolean properties (stable-fixes). * ASoC: soc-pcm: Fix hw_params() and DAPM widget sequence (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: btintel_pcie: Add additional to checks to clear TX/RX paths (git- fixes). * Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() (git- fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * Input: cyttsp5 - ensure minimum reset pulse width (git-fixes). * Input: cyttsp5 - fix power control issue on wakeup (git-fixes). * Input: mtk-pmic-keys - fix possible null pointer dereference (git-fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * Input: xpad - fix two controller table values (git-fixes). * KVM: PPC: Book3S HV: Fix IRQ map warnings with XICS on pSeries KVM Guest (bsc#1242205 ltc#212592). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Do not change target vCPU state on AP Creation VMGEXIT error (git- fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest had an invalid VMSA (git-fixes). * KVM: SVM: Save host DR masks on CPUs with DebugSwap (jsc#PED-348). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/mmu: Check and free obsolete roots in kvm_mmu_reload() (git-fixes). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Check that the high 32bits are clear in kvm_arch_vcpu_ioctl_run() (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected (git-fixes). * Move upstreamed sound patch into sorted section * Move upstreamed tpm patch into sorted section * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * Readd patches.kabi/md-md_personality-workaround-v2.patch dropped in merge by accident. * Refresh fixes for cBPF issue (bsc#1242778) * Remove debug flavor (bsc#1243919). This is only released in Leap, and we do not have Leap 15.7 * Revert "drm/amd/display: Hardware cursor changes color when switched to software cursor" (stable-fixes). * Revert "drm/amd: Keep display off while going into S4" (git-fixes). * Revert "drm/amd: Stop evicting resources on APUs in suspend" (stable-fixes). * Revert "rndis_host: Flag RNDIS modems as WWAN devices" (git-fixes). * Sort ITS patches * Squashfs: check return result of sb_min_blocksize (git-fixes). * USB: OHCI: Add quirk for LS7A OHCI controller (rev 0x02) (stable-fixes). * USB: VLI disk crashes if LPM is used (stable-fixes). * USB: serial: ftdi_sio: add support for Abacus Electrics Optical Probe (stable-fixes). * USB: serial: option: add Sierra Wireless EM9291 (stable-fixes). * USB: serial: simple: add OWON HDS200 series oscilloscope support (stable- fixes). * USB: storage: quirk for ADATA Portable HDD CH94 (stable-fixes). * USB: usbtmc: use interruptible sleep in usbtmc_read (git-fixes). * Update patches.suse/nvme-fixup-scan-failure-for-non-ANA-multipath- contro.patch (git-fixes bsc#1235149). * Update patches.suse/nvme-re-read-ANA-log-page-after-ns-scan-completes.patch (git-fixes bsc#1235149). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778). * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (bsc#1242778). * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778). * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778). * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778). * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * ata: libata-scsi: Fix ata_mselect_control_ata_feature() return type (git- fixes). * ata: libata-scsi: Fix ata_msense_control_ata_feature() (git-fixes). * ata: libata-scsi: Improve CDL control (git-fixes). * auxdisplay: hd44780: Convert to platform remove callback returning void (stable-fixes). * auxdisplay: hd44780: Fix an API misuse in hd44780.c (git-fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix ethtool selftest output in one of the failure cases (git- fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bnxt_en: call pci_alloc_irq_vectors() after bnxt_reserve_rings() (git- fixes). * bnxt_en: fix module unload sequence (git-fixes). * bnxt_en: improve TX timestamping FIFO configuration (git-fixes). * bonding: fix incorrect MAC address setting to receive NS messages (git- fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * bpf: add find_containing_subprog() utility function (bsc#1241590). Both spellings are actually used * bpf: check changes_pkt_data property for extension programs (bsc#1241590). * bpf: consider that tail calls invalidate packet pointers (bsc#1241590). * bpf: fix null dereference when computing changes_pkt_data of prog w/o subprogs (bsc#1241590). * bpf: refactor bpf_helper_changes_pkt_data to use helper number (bsc#1241590). * bpf: track changes_pkt_data property for global functions (bsc#1241590). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: always fallback to buffered write if the inode requires checksum (bsc#1242831 bsc#1242710). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: gw: fix RCU/BH usage in cgw_create_job() (git-fixes). * can: mcan: m_can_class_unregister(): fix order of unregistration calls (git- fixes). * can: mcp251xfd: fix TDC setting for low data bit rates (git-fixes). * can: mcp251xfd: mcp251xfd_remove(): fix order of unregistration calls (git- fixes). * can: slcan: allow reception of short error messages (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: Fix integer overflow while processing actimeo mount option (git- fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: ccp - Add support for PCI device 0x1134 (stable-fixes). * cxl/core/regs.c: Skip Memory Space Enable check for RCD and RCH Ports (bsc#1242125). * devlink: fix port new reply cmd type (git-fixes). * dm-bufio: do not schedule in atomic context (git-fixes). * dm-ebs: fix prefetch-vs-suspend race (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * dm-integrity: set ti->error on memory allocation failure (git-fixes). * dm-verity: fix prefetch-vs-suspend race (git-fixes). * dm: add missing unlock on in dm_keyslot_evict() (git-fixes). * dm: always update the array size in realloc_argv on success (git-fixes). * dm: fix copying after src array boundaries (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: dmatest: Fix dmatest waiting less when interrupted (stable- fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * drm/amd/display: Add scoped mutexes for amdgpu_dm_dhcp (stable-fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Copy AUX read reply data whenever length > 0 (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Fix invalid context error in dml helper (git-fixes). * drm/amd/display: Fix slab-use-after-free in hdcp (git-fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Fix wrong handling for AUX_DEFER case (git-fixes). * drm/amd/display: Force full update in gpu reset (stable-fixes). * drm/amd/display: Remove incorrect checking in dmub aux handler (git-fixes). * drm/amd/display: Shift DMUB AUX reply command if necessary (git-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amdgpu/hdp4: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp5.2: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp5: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp6: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/hdp7: use memcfg register to post the write for HDP flush (git- fixes). * drm/amdgpu/vcn: using separate VCN1_AON_SOC offset (stable-fixes). * drm/amdgpu: Fix offset for HDP remap in nbio v7.11 (stable-fixes). * drm/amdgpu: Increase KIQ invalidate_tlbs timeout (stable-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: Use the right function for hdp flush (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdgpu: use a dummy owner for sysfs triggered cleaner shaders v4 (stable-fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/fdinfo: Protect against driver unbind (git-fixes). * drm/i915/pxp: fix undefined reference to `intel_pxp_gsccs_is_ready_for_sessions' (git-fixes). * drm/mipi-dbi: Fix blanking for non-16 bit formats (git-fixes). * drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() (git-fixes). * drm/panel: simple: Update timings for AUO G101EVN010 (git-fixes). * drm/tests: shmem: Fix memleak (git-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/xe/tests/mocs: Hold XE_FORCEWAKE_ALL for LNCF regs (git-fixes). * drm/xe/tests/mocs: Update xe_force_wake_get() return handling (stable- fixes). * drm/xe/xe3lpg: Apply Wa_14022293748, Wa_22019794406 (stable-fixes). * drm/xe: Add page queue multiplier (git-fixes). * drm/xe: Save CTX_TIMESTAMP mmio value instead of LRC value (git-fixes). * drm: Select DRM_KMS_HELPER from DRM_DEBUG_DP_MST_TOPOLOGY_REFS (git-fixes). * ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll() (git- fixes). * ethtool: ntuple: fix rss + ring_cookie check (git-fixes). * ethtool: rss: fix hiding unsupported fields in dumps (git-fixes). * exfat: fix potential wrong error return from get_block (git-fixes). * ext4: add missing brelse() for bh2 in ext4_dx_add_entry() (bsc#1242342). * ext4: correct encrypted dentry name hash when not casefolded (bsc#1242540). * ext4: do not over-report free space or inodes in statvfs (bsc#1242345). * ext4: do not treat fhandle lookup of ea_inode as FS corruption (bsc#1242347). * ext4: fix FS_IOC_GETFSMAP handling (bsc#1240557). * ext4: goto right label 'out_mmap_sem' in ext4_setattr() (bsc#1242556). * ext4: make block validity check resistent to sb bh corruption (bsc#1242348). * ext4: partial zero eof block on unaligned inode size extension (bsc#1242336). * ext4: protect ext4_release_dquot against freezing (bsc#1242335). * ext4: replace the traditional ternary conditional operator with with max()/min() (bsc#1242536). * ext4: treat end of range as exclusive in ext4_zero_range() (bsc#1242539). * ext4: unify the type of flexbg_size to unsigned int (bsc#1242538). * firmware: arm_ffa: Skip Rx buffer ownership release if not acquired (git- fixes). * firmware: arm_scmi: Balance device refcount when destroying devices (git- fixes). * fs: better handle deep ancestor chains in is_subdir() (bsc#1242528). * fs: consistently deref the files table with rcu_dereference_raw() (bsc#1242535). * fs: do not allow non-init s_user_ns for filesystems without FS_USERNS_MOUNT (bsc#1242526). * fs: support relative paths with FSCONFIG_SET_STRING (git-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: imx-lpi2c: Fix clock count when probe defers (git-fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * iio: accel: adxl367: fix setting odr for activity time update (git-fixes). * iio: adc: ad7606: fix serial register access (git-fixes). * iio: adc: ad7768-1: Fix conversion result sign (git-fixes). * iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary return value check (stable-fixes). * iio: adis16201: Correct inclinometer channel resolution (git-fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo (git- fixes). * iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo (git-fixes). * iio: temp: maxim-thermocouple: Fix potential lack of DMA safe buffer (git- fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * io_uring/sqpoll: Increase task_work submission batch size (bsc#1238585). * iommu/arm-smmu-v3: Fix pgsize_bit for sva domains (bsc#1243341) * iommu: Fix two issues in iommu_copy_struct_from_user() (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs (git- fixes). * isofs: fix KMSAN uninit-value bug in do_isofs_readdir() (bsc#1242307). * iwlwifi: correct modinfo firmware ucode (bsc#1243020). * jbd2: add a missing data flush during file and fs synchronization (bsc#1242346). * jbd2: fix off-by-one while erasing journal (bsc#1242344). * jbd2: flush filesystem device before updating tail sequence (bsc#1242333). * jbd2: increase IO priority for writing revoke records (bsc#1242332). * jbd2: increase the journal IO's priority (bsc#1242537). * jbd2: remove wrong sb->s_sequence check (bsc#1242343). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kernel-obs-qa: Use srchash for dependency as well * loop: Add sanity check for read/write_iter (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * mei: me: add panther lake H DID (stable-fixes). * mm/readahead: fix large folio support in async readahead (bsc#1242321). * mm: fix error handling in __filemap_get_folio() with FGP_NOWAIT (bsc#1242326). * mm: fix filemap_get_folios_contig returning batches of identical folios (bsc#1242327). * mm: fix oops when filemap_map_pmd() without prealloc_pte (bsc#1242546). * mptcp: mptcp_parse_option() fix for MPTCPOPT_MP_JOIN (git-fixes). * mptcp: refine opt_mp_capable determination (git-fixes). * mptcp: relax check on MPC passive fallback (git-fixes). * mptcp: strict validation before using mp_opt->hmac (git-fixes). * mptcp: use OPTION_MPTCP_MPJ_SYN in subflow_check_req() (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * neighbour: delete redundant judgment statements (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/mlx5e: Fix lock order in mlx5e_tx_reporter_ptpsq_unhealthy_recover (git- fixes). * net/mlx5e: TC, Continue the attr process even if encap entry is invalid (git-fixes). * net/mlx5e: Use custom tunnel header for vxlan gbp (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: do not dump stack on queue timeout (git-fixes). * net: free_netdev: exit earlier if dummy (bsc#1243215). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv6: fix UDPv6 GSO segmentation with NAT (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net_sched: drr: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: ets: Fix double list add in class with netem as child qdisc (git- fixes). * net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (git-fixes). * net_sched: qfq: Fix double list add in class with netem as child qdisc (git- fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netlink: specs: tc: all actions are indexed arrays (git-fixes). * netlink: specs: tc: fix a couple of attribute names (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * ntb: reduce stack usage in idt_scan_mws (stable-fixes). * ntb_hw_amd: Add NTB PCI ID for new gen CPU (stable-fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: Do not reallocate all ntuple filters (git-fixes). * octeontx2-pf: Fix ethtool support for SDP representors (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering (bsc#1242172) * perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc (bsc#1242172) * perf: arm_cspmu: nvidia: monitor all ports by default (bsc#1242172) * perf: arm_cspmu: nvidia: remove unsupported SCF events (bsc#1242172) * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * pinctrl: renesas: rza2: Fix potential NULL pointer dereference (stable- fixes). * platform/x86/amd/pmc: Declare quirk_spurious_8042 for MECHREVO Wujie 14XA (GX4HRXL) (git-fixes). * platform/x86/amd: pmc: Require at least 2.5 seconds between HW sleep cycles (stable-fixes). * platform/x86: asus-wmi: Fix wlan_ctrl_by_user detection (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powerpc/pseries/iommu: Fix kmemleak in TCE table userspace view (jsc#PED-10539 git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * powerpc: Do not use --- in kernel logs (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: max20086: fix invalid memory access (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rtc: pcf85063: do a SW reset if POR failed (stable-fixes). * s390/ap: Fix CCA crypto card behavior within protected execution environment (git-fixes bsc#1243817 LTC#213623). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/cpumf: Update CPU Measurement facility extended counter set support (bsc#1243115). * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes). * s390: Add z17 elf platform (bsc#1243116). * sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (BSC#1241319). * sched/fair: Fix CPU bandwidth limit bypass during CPU hotplug (bsc#1241319). * sched/topology: Refinement to topology_span_sane speedup (bsc#1242119). * sched/topology: improve topology_span_sane speed (bsc#1242119). * sched: Add deprecation warning for users of RT_GROUP_SCHED (jsc#PED-11761 jsc#PED-12405). * scsi: Improve CDL control (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (bsc#1241388 jsc#PED-11258). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: megaraid_sas: Driver version update to 07.734.00.00-rc1 (bsc#1241388 jsc#PED-11258). * scsi: megaraid_sas: Make most module parameters static (bsc#1241388 jsc#PED-11258). * scsi: mpi3mr: Add level check to control event logging (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Avoid reply queue full condition (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Check admin reply queue from Watchdog (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Fix pending I/O counter (git-fixes). * scsi: mpi3mr: Fix spelling mistake "skiping" -> "skipping" (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Handling of fault code for insufficient power (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Reset the pending interrupt flag (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Support for Segmented Hardware Trace buffer (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Synchronize access to ioctl data buffer (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Task Abort EH Support (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update MPI Headers to revision 35 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update driver version to 8.12.0.3.50 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update driver version to 8.12.1.0.50 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update driver version to 8.13.0.5.50 (bsc#1241388 jsc#PED-12372). * scsi: mpi3mr: Update timestamp only for supervisor IOCs (bsc#1241388 jsc#PED-12372). * scsi: mpt3sas: Add details to EEDPTagMode error message (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Add support for MCTP Passthrough commands (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Fix buffer overflow in mpt3sas_send_mctp_passthru_req() (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Fix spelling mistake "receveid" -> "received" (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Remove unused config functions (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Report driver capability as part of IOCINFO command (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Send a diag reset if target reset fails (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: Update MPI headers to 02.00.62 version (bsc#1241388 jsc#PED-11253). * scsi: mpt3sas: update driver version to 52.100.00.00 (bsc#1241388 jsc#PED-11253). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * selftests/bpf: extend changes_pkt_data with cases w/o subprograms (bsc#1241590). * selftests/bpf: freplace tests for tracking of changes_packet_data (bsc#1241590). * selftests/bpf: test for changing packet data from global functions (bsc#1241590). * selftests/bpf: validate that tail call invalidates packet pointers (bsc#1241590). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * sound/virtio: Fix cancel_sync warnings on uninitialized work_structs (stable-fixes). * soundwire: bus: Fix race on the creation of the IRQ domain (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: tegra114: Do not fail set_cs_timing when delays are zero (git-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: add rate limiting and simplify timeout error message (stable-fixes). * spi: tegra210-quad: use WARN_ON_ONCE instead of WARN_ON for timeouts (stable-fixes). * splice: remove duplicate noinline from pipe_clear_nowait (bsc#1242328). * staging: axis-fifo: Correct handling of tx_fifo_depth for size validation (git-fixes). * staging: axis-fifo: Remove hardware resets for user errors (git-fixes). * staging: iio: adc: ad7816: Correct conditional logic for store mode (git- fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Scan retimers after device router has been enumerated (stable- fixes). * tools/hv: update route parsing in kvp daemon (git-fixes). * tty: Require CAP_SYS_ADMIN for all usages of TIOCL_SELMOUSEREPORT (git- fixes). * udf: Fix inode_getblk() return value (bsc#1242313). * udf: Skip parent dir link count update if corrupted (bsc#1242315). * udf: Verify inode link counts before performing rename (bsc#1242314). * usb: cdnsp: fix L1 resume issue for RTL_REVISION_NEW_LPM version (git- fixes). * usb: dwc3: gadget: Avoid using reserved endpoints on Intel Merrifield (stable-fixes). * usb: dwc3: gadget: Refactor loop to avoid NULL endpoints (stable-fixes). * usb: gadget: Use get_status callback to set remote wakeup capability (git- fixes). * usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() (stable- fixes). * usb: gadget: f_ecm: Add get_status callback (git-fixes). * usb: gadget: tegra-xudc: ACK ST_RC after clearing CTRL_RUN (git-fixes). * usb: host: max3421-hcd: Add missing spi_device_id table (stable-fixes). * usb: host: tegra: Prevent host controller crash when OTG port is used (git- fixes). * usb: host: xhci-plat: mvebu: use ->quirks instead of ->init_quirk() func (stable-fixes). * usb: quirks: Add delay init quirk for SanDisk 3.2Gen1 Flash Drive (stable- fixes). * usb: quirks: add DELAY_INIT quirk for Silicon Motion Flash Drive (stable- fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm: delay SNK_TRY_WAIT_DEBOUNCE to SRC_TRYWAIT transition (git-fixes). * usb: typec: ucsi: displayport: Fix NULL pointer access (git-fixes). * usb: uhci-platform: Make the clock really optional (git-fixes). * usb: usbtmc: Fix erroneous generic_read ioctl return (git-fixes). * usb: usbtmc: Fix erroneous get_stb ioctl error returns (git-fixes). * usb: usbtmc: Fix erroneous wait_srq ioctl return (git-fixes). * usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running (stable-fixes). * vfs: do not mod negative dentry count when on shrinker list (bsc#1242534). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() (git-fixes). * wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation (git-fixes). * wifi: iwlwifi: do not warn if the NIC is gone in resume (git-fixes). * wifi: iwlwifi: fix the check for the SCRATCH register upon resume (git- fixes). * wifi: mac80211, cfg80211: miscellaneous spelling fixes (git-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). * x86/cpu/amd: Fix workaround for erratum 1054 (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: Clean up stale comment on ERST_SIZE macro (stable-fixes). * xhci: Limit time spent with xHC interrupts disabled during bus resume (stable-fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-1972=1 * SUSE Real Time Module 15-SP7 zypper in -t patch SUSE-SLE-Module-RT-15-SP7-2025-1972=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_7_3-rt-1-150700.1.3.1 * kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource-1-150700.1.3.1 * kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo-1-150700.1.3.1 * SUSE Real Time Module 15-SP7 (x86_64) * kernel-rt-debuginfo-6.4.0-150700.7.3.1 * ocfs2-kmp-rt-6.4.0-150700.7.3.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150700.7.3.1 * kernel-rt-debugsource-6.4.0-150700.7.3.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150700.7.3.1 * kernel-rt_debug-debuginfo-6.4.0-150700.7.3.1 * cluster-md-kmp-rt-6.4.0-150700.7.3.1 * kernel-rt-devel-6.4.0-150700.7.3.1 * kernel-syms-rt-6.4.0-150700.7.3.1 * gfs2-kmp-rt-debuginfo-6.4.0-150700.7.3.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150700.7.3.1 * kernel-rt_debug-devel-6.4.0-150700.7.3.1 * dlm-kmp-rt-6.4.0-150700.7.3.1 * kernel-rt_debug-debugsource-6.4.0-150700.7.3.1 * dlm-kmp-rt-debuginfo-6.4.0-150700.7.3.1 * kernel-rt-devel-debuginfo-6.4.0-150700.7.3.1 * gfs2-kmp-rt-6.4.0-150700.7.3.1 * SUSE Real Time Module 15-SP7 (noarch) * kernel-source-rt-6.4.0-150700.7.3.1 * kernel-devel-rt-6.4.0-150700.7.3.1 * SUSE Real Time Module 15-SP7 (nosrc x86_64) * kernel-rt_debug-6.4.0-150700.7.3.1 * kernel-rt-6.4.0-150700.7.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53034.html * https://www.suse.com/security/cve/CVE-2024-27018.html * https://www.suse.com/security/cve/CVE-2024-27415.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-46763.html * https://www.suse.com/security/cve/CVE-2024-46865.html * https://www.suse.com/security/cve/CVE-2024-50083.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-56641.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-57998.html * https://www.suse.com/security/cve/CVE-2024-58001.html * https://www.suse.com/security/cve/CVE-2024-58070.html * https://www.suse.com/security/cve/CVE-2024-58093.html * https://www.suse.com/security/cve/CVE-2024-58094.html * https://www.suse.com/security/cve/CVE-2024-58095.html * https://www.suse.com/security/cve/CVE-2024-58096.html * https://www.suse.com/security/cve/CVE-2024-58097.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21683.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21707.html * https://www.suse.com/security/cve/CVE-2025-21758.html * https://www.suse.com/security/cve/CVE-2025-21768.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21792.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21852.html * https://www.suse.com/security/cve/CVE-2025-21853.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21929.html * https://www.suse.com/security/cve/CVE-2025-21962.html * https://www.suse.com/security/cve/CVE-2025-21963.html * https://www.suse.com/security/cve/CVE-2025-21964.html * https://www.suse.com/security/cve/CVE-2025-22018.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22033.html * https://www.suse.com/security/cve/CVE-2025-22044.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22062.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22064.html * https://www.suse.com/security/cve/CVE-2025-22065.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22075.html * https://www.suse.com/security/cve/CVE-2025-22085.html * https://www.suse.com/security/cve/CVE-2025-22086.html * https://www.suse.com/security/cve/CVE-2025-22088.html * https://www.suse.com/security/cve/CVE-2025-22091.html * https://www.suse.com/security/cve/CVE-2025-22093.html * https://www.suse.com/security/cve/CVE-2025-22094.html * https://www.suse.com/security/cve/CVE-2025-22097.html * https://www.suse.com/security/cve/CVE-2025-22102.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-22107.html * https://www.suse.com/security/cve/CVE-2025-22108.html * https://www.suse.com/security/cve/CVE-2025-22109.html * https://www.suse.com/security/cve/CVE-2025-22112.html * https://www.suse.com/security/cve/CVE-2025-22116.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-22128.html * https://www.suse.com/security/cve/CVE-2025-23129.html * https://www.suse.com/security/cve/CVE-2025-23131.html * https://www.suse.com/security/cve/CVE-2025-23134.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23154.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37799.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1223809 * https://bugzilla.suse.com/show_bug.cgi?id=1224013 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1224757 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1230764 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231103 * https://bugzilla.suse.com/show_bug.cgi?id=1232493 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235526 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1236704 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238527 * https://bugzilla.suse.com/show_bug.cgi?id=1238585 * https://bugzilla.suse.com/show_bug.cgi?id=1238714 * https://bugzilla.suse.com/show_bug.cgi?id=1238737 * https://bugzilla.suse.com/show_bug.cgi?id=1238745 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238862 * https://bugzilla.suse.com/show_bug.cgi?id=1238961 * https://bugzilla.suse.com/show_bug.cgi?id=1238983 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239079 * https://bugzilla.suse.com/show_bug.cgi?id=1239476 * https://bugzilla.suse.com/show_bug.cgi?id=1239487 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1240557 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240655 * https://bugzilla.suse.com/show_bug.cgi?id=1240711 * https://bugzilla.suse.com/show_bug.cgi?id=1240717 * https://bugzilla.suse.com/show_bug.cgi?id=1240740 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241266 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241319 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241333 * https://bugzilla.suse.com/show_bug.cgi?id=1241341 * https://bugzilla.suse.com/show_bug.cgi?id=1241343 * https://bugzilla.suse.com/show_bug.cgi?id=1241344 * https://bugzilla.suse.com/show_bug.cgi?id=1241347 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241388 * https://bugzilla.suse.com/show_bug.cgi?id=1241402 * https://bugzilla.suse.com/show_bug.cgi?id=1241412 * https://bugzilla.suse.com/show_bug.cgi?id=1241413 * https://bugzilla.suse.com/show_bug.cgi?id=1241419 * https://bugzilla.suse.com/show_bug.cgi?id=1241424 * https://bugzilla.suse.com/show_bug.cgi?id=1241436 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241442 * https://bugzilla.suse.com/show_bug.cgi?id=1241443 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241456 * https://bugzilla.suse.com/show_bug.cgi?id=1241458 * https://bugzilla.suse.com/show_bug.cgi?id=1241459 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241512 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241528 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241535 * https://bugzilla.suse.com/show_bug.cgi?id=1241541 * https://bugzilla.suse.com/show_bug.cgi?id=1241545 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241573 * https://bugzilla.suse.com/show_bug.cgi?id=1241574 * https://bugzilla.suse.com/show_bug.cgi?id=1241575 * https://bugzilla.suse.com/show_bug.cgi?id=1241581 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241598 * https://bugzilla.suse.com/show_bug.cgi?id=1241599 * https://bugzilla.suse.com/show_bug.cgi?id=1241601 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241628 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242119 * https://bugzilla.suse.com/show_bug.cgi?id=1242125 * https://bugzilla.suse.com/show_bug.cgi?id=1242172 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242205 * https://bugzilla.suse.com/show_bug.cgi?id=1242283 * https://bugzilla.suse.com/show_bug.cgi?id=1242307 * https://bugzilla.suse.com/show_bug.cgi?id=1242313 * https://bugzilla.suse.com/show_bug.cgi?id=1242314 * https://bugzilla.suse.com/show_bug.cgi?id=1242315 * https://bugzilla.suse.com/show_bug.cgi?id=1242321 * https://bugzilla.suse.com/show_bug.cgi?id=1242326 * https://bugzilla.suse.com/show_bug.cgi?id=1242327 * https://bugzilla.suse.com/show_bug.cgi?id=1242328 * https://bugzilla.suse.com/show_bug.cgi?id=1242332 * https://bugzilla.suse.com/show_bug.cgi?id=1242333 * https://bugzilla.suse.com/show_bug.cgi?id=1242335 * https://bugzilla.suse.com/show_bug.cgi?id=1242336 * https://bugzilla.suse.com/show_bug.cgi?id=1242342 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242344 * https://bugzilla.suse.com/show_bug.cgi?id=1242345 * https://bugzilla.suse.com/show_bug.cgi?id=1242346 * https://bugzilla.suse.com/show_bug.cgi?id=1242347 * https://bugzilla.suse.com/show_bug.cgi?id=1242348 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242526 * https://bugzilla.suse.com/show_bug.cgi?id=1242528 * https://bugzilla.suse.com/show_bug.cgi?id=1242533 * https://bugzilla.suse.com/show_bug.cgi?id=1242534 * https://bugzilla.suse.com/show_bug.cgi?id=1242535 * https://bugzilla.suse.com/show_bug.cgi?id=1242536 * https://bugzilla.suse.com/show_bug.cgi?id=1242537 * https://bugzilla.suse.com/show_bug.cgi?id=1242538 * https://bugzilla.suse.com/show_bug.cgi?id=1242539 * https://bugzilla.suse.com/show_bug.cgi?id=1242540 * https://bugzilla.suse.com/show_bug.cgi?id=1242546 * https://bugzilla.suse.com/show_bug.cgi?id=1242556 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242710 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242831 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242985 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243020 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243115 * https://bugzilla.suse.com/show_bug.cgi?id=1243116 * https://bugzilla.suse.com/show_bug.cgi?id=1243215 * https://bugzilla.suse.com/show_bug.cgi?id=1243341 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243817 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://jira.suse.com/browse/PED-11761 * https://jira.suse.com/browse/PED-12372 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 12:32:53 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 12:32:53 -0000 Subject: SUSE-RU-2025:01823-2: moderate: Recommended update for resource-agents Message-ID: <175016357385.11267.8646689096212715757@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2025:01823-2 Release Date: 2025-06-17T08:29:59Z Rating: moderate References: * bsc#1241692 * bsc#1241867 Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has two fixes can now be installed. ## Description: This update for resource-agents fixes the following issue: * DB2 resource agent forcefully shuts down database, risking data loss (bsc#1241692). * fuser returning unexpected list of PIDs to Filesystem RA (bsc#1241867). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-1823=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * resource-agents-debugsource-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-4.13.0+git6.ae50f94f-150600.4.14.3 * resource-agents-debuginfo-4.13.0+git6.ae50f94f-150600.4.14.3 * ldirectord-4.13.0+git6.ae50f94f-150600.4.14.3 * SUSE Linux Enterprise High Availability Extension 15 SP7 (noarch) * monitoring-plugins-metadata-4.13.0+git6.ae50f94f-150600.4.14.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241692 * https://bugzilla.suse.com/show_bug.cgi?id=1241867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:32:38 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:32:38 -0000 Subject: SUSE-SU-2025:01983-1: important: Security update for the Linux Kernel Message-ID: <175017795898.11267.11329438364770658399@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01983-1 Release Date: 2025-06-17T15:33:04Z Rating: important References: * bsc#1184350 * bsc#1190317 * bsc#1190601 * bsc#1194227 * bsc#1206073 * bsc#1206649 * bsc#1206677 * bsc#1206887 * bsc#1209292 * bsc#1209556 * bsc#1209684 * bsc#1210336 * bsc#1210337 * bsc#1211466 * bsc#1213012 * bsc#1213013 * bsc#1218752 * bsc#1222004 * bsc#1222563 * bsc#1222629 * bsc#1223720 * bsc#1225044 * bsc#1229516 * bsc#1230434 * bsc#1230786 * bsc#1230794 * bsc#1232504 * bsc#1232649 * bsc#1232882 * bsc#1234887 * bsc#1235485 * bsc#1235632 * bsc#1236142 * bsc#1237312 * bsc#1237571 * bsc#1238019 * bsc#1238032 * bsc#1238071 * bsc#1238109 * bsc#1238130 * bsc#1238162 * bsc#1238263 * bsc#1238284 * bsc#1238289 * bsc#1238306 * bsc#1238311 * bsc#1238331 * bsc#1238333 * bsc#1238338 * bsc#1238394 * bsc#1238411 * bsc#1238420 * bsc#1238473 * bsc#1238539 * bsc#1238546 * bsc#1238646 * bsc#1238774 * bsc#1238806 * bsc#1238815 * bsc#1238818 * bsc#1238868 * bsc#1238871 * bsc#1238887 * bsc#1238892 * bsc#1239060 * bsc#1239111 * bsc#1240254 * bsc#1240261 * bsc#1240266 * bsc#1240293 * bsc#1240297 * bsc#1240322 * bsc#1240784 * bsc#1241282 * bsc#1241332 * bsc#1241351 * bsc#1241357 * bsc#1241361 * bsc#1241369 * bsc#1241407 * bsc#1241441 * bsc#1241526 * bsc#1241550 * bsc#1241657 * bsc#1242147 * bsc#1242154 * bsc#1242165 * bsc#1242215 * bsc#1242218 * bsc#1242219 * bsc#1242225 * bsc#1242227 * bsc#1242228 * bsc#1242231 * bsc#1242239 * bsc#1242241 * bsc#1242245 * bsc#1242248 * bsc#1242284 * bsc#1242285 * bsc#1242287 * bsc#1242288 * bsc#1242352 * bsc#1242353 * bsc#1242361 * bsc#1242362 * bsc#1242366 * bsc#1242370 * bsc#1242371 * bsc#1242372 * bsc#1242377 * bsc#1242378 * bsc#1242382 * bsc#1242385 * bsc#1242394 * bsc#1242398 * bsc#1242405 * bsc#1242408 * bsc#1242409 * bsc#1242414 * bsc#1242416 * bsc#1242417 * bsc#1242422 * bsc#1242426 * bsc#1242427 * bsc#1242440 * bsc#1242447 * bsc#1242449 * bsc#1242450 * bsc#1242452 * bsc#1242453 * bsc#1242455 * bsc#1242464 * bsc#1242470 * bsc#1242472 * bsc#1242478 * bsc#1242483 * bsc#1242484 * bsc#1242497 * bsc#1242504 * bsc#1242513 * bsc#1242527 * bsc#1242542 * bsc#1242544 * bsc#1242549 * bsc#1242558 * bsc#1242566 * bsc#1242570 * bsc#1242580 * bsc#1242594 * bsc#1242686 * bsc#1242688 * bsc#1242691 * bsc#1242716 * bsc#1242727 * bsc#1242734 * bsc#1242745 * bsc#1242747 * bsc#1242755 * bsc#1242756 * bsc#1242759 * bsc#1242762 * bsc#1242765 * bsc#1242770 * bsc#1242778 * bsc#1242786 * bsc#1242790 * bsc#1242791 * bsc#1242792 * bsc#1242835 * bsc#1242859 * bsc#1242868 * bsc#1242924 * bsc#1242949 * bsc#1243047 * bsc#1243074 * bsc#1243077 * bsc#1243511 * bsc#1243541 * bsc#1243543 * bsc#1243627 * bsc#1243649 * bsc#1243660 * bsc#1243919 Cross-References: * CVE-2020-36791 * CVE-2021-20320 * CVE-2021-4159 * CVE-2021-47170 * CVE-2021-47670 * CVE-2022-3564 * CVE-2022-48875 * CVE-2022-49139 * CVE-2022-49145 * CVE-2022-49168 * CVE-2022-49190 * CVE-2022-49212 * CVE-2022-49216 * CVE-2022-49235 * CVE-2022-49248 * CVE-2022-49253 * CVE-2022-49320 * CVE-2022-49326 * CVE-2022-49371 * CVE-2022-49382 * CVE-2022-49396 * CVE-2022-49420 * CVE-2022-49441 * CVE-2022-49445 * CVE-2022-49460 * CVE-2022-49467 * CVE-2022-49474 * CVE-2022-49491 * CVE-2022-49503 * CVE-2022-49592 * CVE-2022-49625 * CVE-2022-49635 * CVE-2022-49652 * CVE-2022-49715 * CVE-2022-49728 * CVE-2022-49729 * CVE-2022-49751 * CVE-2022-49761 * CVE-2022-49769 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49775 * CVE-2022-49776 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49813 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49822 * CVE-2022-49826 * CVE-2022-49829 * CVE-2022-49832 * CVE-2022-49835 * CVE-2022-49840 * CVE-2022-49842 * CVE-2022-49846 * CVE-2022-49853 * CVE-2022-49861 * CVE-2022-49862 * CVE-2022-49865 * CVE-2022-49871 * CVE-2022-49872 * CVE-2022-49874 * CVE-2022-49877 * CVE-2022-49880 * CVE-2022-49889 * CVE-2022-49892 * CVE-2022-49898 * CVE-2022-49906 * CVE-2022-49907 * CVE-2022-49909 * CVE-2022-49910 * CVE-2022-49913 * CVE-2022-49914 * CVE-2022-49915 * CVE-2022-49922 * CVE-2022-49923 * CVE-2022-49924 * CVE-2022-49925 * CVE-2022-49927 * CVE-2022-49931 * CVE-2023-1074 * CVE-2023-1989 * CVE-2023-1990 * CVE-2023-52868 * CVE-2023-52975 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52993 * CVE-2023-53039 * CVE-2023-53041 * CVE-2023-53044 * CVE-2023-53045 * CVE-2023-53051 * CVE-2023-53056 * CVE-2023-53060 * CVE-2023-53062 * CVE-2023-53066 * CVE-2023-53068 * CVE-2023-53075 * CVE-2023-53078 * CVE-2023-53079 * CVE-2023-53080 * CVE-2023-53094 * CVE-2023-53100 * CVE-2023-53101 * CVE-2023-53103 * CVE-2023-53106 * CVE-2023-53108 * CVE-2023-53109 * CVE-2023-53114 * CVE-2023-53119 * CVE-2023-53121 * CVE-2023-53124 * CVE-2023-53125 * CVE-2023-53131 * CVE-2023-53139 * CVE-2023-53140 * CVE-2023-53141 * CVE-2023-53145 * CVE-2024-26740 * CVE-2024-26804 * CVE-2024-27010 * CVE-2024-45021 * CVE-2024-46751 * CVE-2024-46752 * CVE-2024-50106 * CVE-2024-53168 * CVE-2024-56633 * CVE-2024-56779 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21704 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21969 * CVE-2025-22021 * CVE-2025-22025 * CVE-2025-22027 * CVE-2025-22050 * CVE-2025-22058 * CVE-2025-22060 * CVE-2025-22063 * CVE-2025-22104 * CVE-2025-23136 * CVE-2025-23150 * CVE-2025-23161 * CVE-2025-37749 * CVE-2025-37752 * CVE-2025-37780 * CVE-2025-37782 * CVE-2025-37789 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37823 * CVE-2025-37833 * CVE-2025-37852 * CVE-2025-37871 * CVE-2025-37879 * CVE-2025-37932 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37953 * CVE-2025-37963 * CVE-2025-37989 * CVE-2025-38637 CVSS scores: * CVE-2020-36791 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2020-36791 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-20320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20320 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-4159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-4159 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49145 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-49168 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49190 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49420 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49460 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49728 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49728 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-49728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49729 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49761 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49776 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49776 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49813 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49822 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49829 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49829 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49840 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49840 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1074 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1989 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53039 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53041 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53100 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53100 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46752 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22025 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22025 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22027 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22027 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22027 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22050 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-23136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 169 vulnerabilities and has 15 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1983=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1983=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1983=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-4.12.14-122.261.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.261.1 * dlm-kmp-default-4.12.14-122.261.1 * kernel-default-debuginfo-4.12.14-122.261.1 * kernel-default-debugsource-4.12.14-122.261.1 * cluster-md-kmp-default-4.12.14-122.261.1 * kernel-syms-4.12.14-122.261.1 * ocfs2-kmp-default-4.12.14-122.261.1 * gfs2-kmp-default-4.12.14-122.261.1 * gfs2-kmp-default-debuginfo-4.12.14-122.261.1 * kernel-default-devel-4.12.14-122.261.1 * kernel-default-base-4.12.14-122.261.1 * kernel-default-base-debuginfo-4.12.14-122.261.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * kernel-source-4.12.14-122.261.1 * kernel-macros-4.12.14-122.261.1 * kernel-devel-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x) * kernel-default-man-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * dlm-kmp-default-debuginfo-4.12.14-122.261.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.261.1 * kernel-default-devel-debuginfo-4.12.14-122.261.1 * dlm-kmp-default-4.12.14-122.261.1 * kernel-default-debuginfo-4.12.14-122.261.1 * kernel-default-debugsource-4.12.14-122.261.1 * cluster-md-kmp-default-4.12.14-122.261.1 * kernel-syms-4.12.14-122.261.1 * ocfs2-kmp-default-4.12.14-122.261.1 * gfs2-kmp-default-4.12.14-122.261.1 * gfs2-kmp-default-debuginfo-4.12.14-122.261.1 * kernel-default-devel-4.12.14-122.261.1 * kernel-default-base-4.12.14-122.261.1 * kernel-default-base-debuginfo-4.12.14-122.261.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * kernel-default-4.12.14-122.261.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * kernel-source-4.12.14-122.261.1 * kernel-macros-4.12.14-122.261.1 * kernel-devel-4.12.14-122.261.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.261.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-4.12.14-122.261.1 * kernel-default-kgraft-devel-4.12.14-122.261.1 * kgraft-patch-4_12_14-122_261-default-1-8.3.1 * kernel-default-debuginfo-4.12.14-122.261.1 * kernel-default-debugsource-4.12.14-122.261.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36791.html * https://www.suse.com/security/cve/CVE-2021-20320.html * https://www.suse.com/security/cve/CVE-2021-4159.html * https://www.suse.com/security/cve/CVE-2021-47170.html * https://www.suse.com/security/cve/CVE-2021-47670.html * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-48875.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49145.html * https://www.suse.com/security/cve/CVE-2022-49168.html * https://www.suse.com/security/cve/CVE-2022-49190.html * https://www.suse.com/security/cve/CVE-2022-49212.html * https://www.suse.com/security/cve/CVE-2022-49216.html * https://www.suse.com/security/cve/CVE-2022-49235.html * https://www.suse.com/security/cve/CVE-2022-49248.html * https://www.suse.com/security/cve/CVE-2022-49253.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49326.html * https://www.suse.com/security/cve/CVE-2022-49371.html * https://www.suse.com/security/cve/CVE-2022-49382.html * https://www.suse.com/security/cve/CVE-2022-49396.html * https://www.suse.com/security/cve/CVE-2022-49420.html * https://www.suse.com/security/cve/CVE-2022-49441.html * https://www.suse.com/security/cve/CVE-2022-49445.html * https://www.suse.com/security/cve/CVE-2022-49460.html * https://www.suse.com/security/cve/CVE-2022-49467.html * https://www.suse.com/security/cve/CVE-2022-49474.html * https://www.suse.com/security/cve/CVE-2022-49491.html * https://www.suse.com/security/cve/CVE-2022-49503.html * https://www.suse.com/security/cve/CVE-2022-49592.html * https://www.suse.com/security/cve/CVE-2022-49625.html * https://www.suse.com/security/cve/CVE-2022-49635.html * https://www.suse.com/security/cve/CVE-2022-49652.html * https://www.suse.com/security/cve/CVE-2022-49715.html * https://www.suse.com/security/cve/CVE-2022-49728.html * https://www.suse.com/security/cve/CVE-2022-49729.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49761.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49776.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49813.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49822.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49829.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49840.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49853.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49862.html * https://www.suse.com/security/cve/CVE-2022-49865.html * https://www.suse.com/security/cve/CVE-2022-49871.html * https://www.suse.com/security/cve/CVE-2022-49872.html * https://www.suse.com/security/cve/CVE-2022-49874.html * https://www.suse.com/security/cve/CVE-2022-49877.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49898.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49907.html * https://www.suse.com/security/cve/CVE-2022-49909.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49913.html * https://www.suse.com/security/cve/CVE-2022-49914.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49923.html * https://www.suse.com/security/cve/CVE-2022-49924.html * https://www.suse.com/security/cve/CVE-2022-49925.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2022-49931.html * https://www.suse.com/security/cve/CVE-2023-1074.html * https://www.suse.com/security/cve/CVE-2023-1989.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-52868.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53041.html * https://www.suse.com/security/cve/CVE-2023-53044.html * https://www.suse.com/security/cve/CVE-2023-53045.html * https://www.suse.com/security/cve/CVE-2023-53051.html * https://www.suse.com/security/cve/CVE-2023-53056.html * https://www.suse.com/security/cve/CVE-2023-53060.html * https://www.suse.com/security/cve/CVE-2023-53062.html * https://www.suse.com/security/cve/CVE-2023-53066.html * https://www.suse.com/security/cve/CVE-2023-53068.html * https://www.suse.com/security/cve/CVE-2023-53075.html * https://www.suse.com/security/cve/CVE-2023-53078.html * https://www.suse.com/security/cve/CVE-2023-53079.html * https://www.suse.com/security/cve/CVE-2023-53080.html * https://www.suse.com/security/cve/CVE-2023-53094.html * https://www.suse.com/security/cve/CVE-2023-53100.html * https://www.suse.com/security/cve/CVE-2023-53101.html * https://www.suse.com/security/cve/CVE-2023-53103.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2023-53108.html * https://www.suse.com/security/cve/CVE-2023-53109.html * https://www.suse.com/security/cve/CVE-2023-53114.html * https://www.suse.com/security/cve/CVE-2023-53119.html * https://www.suse.com/security/cve/CVE-2023-53121.html * https://www.suse.com/security/cve/CVE-2023-53124.html * https://www.suse.com/security/cve/CVE-2023-53125.html * https://www.suse.com/security/cve/CVE-2023-53131.html * https://www.suse.com/security/cve/CVE-2023-53139.html * https://www.suse.com/security/cve/CVE-2023-53140.html * https://www.suse.com/security/cve/CVE-2023-53141.html * https://www.suse.com/security/cve/CVE-2023-53145.html * https://www.suse.com/security/cve/CVE-2024-26740.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-45021.html * https://www.suse.com/security/cve/CVE-2024-46751.html * https://www.suse.com/security/cve/CVE-2024-46752.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56779.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22025.html * https://www.suse.com/security/cve/CVE-2025-22027.html * https://www.suse.com/security/cve/CVE-2025-22050.html * https://www.suse.com/security/cve/CVE-2025-22058.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22104.html * https://www.suse.com/security/cve/CVE-2025-23136.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37752.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1190601 * https://bugzilla.suse.com/show_bug.cgi?id=1194227 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206677 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1209292 * https://bugzilla.suse.com/show_bug.cgi?id=1209556 * https://bugzilla.suse.com/show_bug.cgi?id=1209684 * https://bugzilla.suse.com/show_bug.cgi?id=1210336 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1211466 * https://bugzilla.suse.com/show_bug.cgi?id=1213012 * https://bugzilla.suse.com/show_bug.cgi?id=1213013 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1222004 * https://bugzilla.suse.com/show_bug.cgi?id=1222563 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1225044 * https://bugzilla.suse.com/show_bug.cgi?id=1229516 * https://bugzilla.suse.com/show_bug.cgi?id=1230434 * https://bugzilla.suse.com/show_bug.cgi?id=1230786 * https://bugzilla.suse.com/show_bug.cgi?id=1230794 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235632 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1238019 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1238071 * https://bugzilla.suse.com/show_bug.cgi?id=1238109 * https://bugzilla.suse.com/show_bug.cgi?id=1238130 * https://bugzilla.suse.com/show_bug.cgi?id=1238162 * https://bugzilla.suse.com/show_bug.cgi?id=1238263 * https://bugzilla.suse.com/show_bug.cgi?id=1238284 * https://bugzilla.suse.com/show_bug.cgi?id=1238289 * https://bugzilla.suse.com/show_bug.cgi?id=1238306 * https://bugzilla.suse.com/show_bug.cgi?id=1238311 * https://bugzilla.suse.com/show_bug.cgi?id=1238331 * https://bugzilla.suse.com/show_bug.cgi?id=1238333 * https://bugzilla.suse.com/show_bug.cgi?id=1238338 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238411 * https://bugzilla.suse.com/show_bug.cgi?id=1238420 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238539 * https://bugzilla.suse.com/show_bug.cgi?id=1238546 * https://bugzilla.suse.com/show_bug.cgi?id=1238646 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238806 * https://bugzilla.suse.com/show_bug.cgi?id=1238815 * https://bugzilla.suse.com/show_bug.cgi?id=1238818 * https://bugzilla.suse.com/show_bug.cgi?id=1238868 * https://bugzilla.suse.com/show_bug.cgi?id=1238871 * https://bugzilla.suse.com/show_bug.cgi?id=1238887 * https://bugzilla.suse.com/show_bug.cgi?id=1238892 * https://bugzilla.suse.com/show_bug.cgi?id=1239060 * https://bugzilla.suse.com/show_bug.cgi?id=1239111 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240261 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240322 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241332 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241357 * https://bugzilla.suse.com/show_bug.cgi?id=1241361 * https://bugzilla.suse.com/show_bug.cgi?id=1241369 * https://bugzilla.suse.com/show_bug.cgi?id=1241407 * https://bugzilla.suse.com/show_bug.cgi?id=1241441 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241550 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242165 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242218 * https://bugzilla.suse.com/show_bug.cgi?id=1242219 * https://bugzilla.suse.com/show_bug.cgi?id=1242225 * https://bugzilla.suse.com/show_bug.cgi?id=1242227 * https://bugzilla.suse.com/show_bug.cgi?id=1242228 * https://bugzilla.suse.com/show_bug.cgi?id=1242231 * https://bugzilla.suse.com/show_bug.cgi?id=1242239 * https://bugzilla.suse.com/show_bug.cgi?id=1242241 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242248 * https://bugzilla.suse.com/show_bug.cgi?id=1242284 * https://bugzilla.suse.com/show_bug.cgi?id=1242285 * https://bugzilla.suse.com/show_bug.cgi?id=1242287 * https://bugzilla.suse.com/show_bug.cgi?id=1242288 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242361 * https://bugzilla.suse.com/show_bug.cgi?id=1242362 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242370 * https://bugzilla.suse.com/show_bug.cgi?id=1242371 * https://bugzilla.suse.com/show_bug.cgi?id=1242372 * https://bugzilla.suse.com/show_bug.cgi?id=1242377 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242382 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242394 * https://bugzilla.suse.com/show_bug.cgi?id=1242398 * https://bugzilla.suse.com/show_bug.cgi?id=1242405 * https://bugzilla.suse.com/show_bug.cgi?id=1242408 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242422 * https://bugzilla.suse.com/show_bug.cgi?id=1242426 * https://bugzilla.suse.com/show_bug.cgi?id=1242427 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242447 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242450 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242453 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242470 * https://bugzilla.suse.com/show_bug.cgi?id=1242472 * https://bugzilla.suse.com/show_bug.cgi?id=1242478 * https://bugzilla.suse.com/show_bug.cgi?id=1242483 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242497 * https://bugzilla.suse.com/show_bug.cgi?id=1242504 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242544 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242558 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242570 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242594 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242688 * https://bugzilla.suse.com/show_bug.cgi?id=1242691 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242747 * https://bugzilla.suse.com/show_bug.cgi?id=1242755 * https://bugzilla.suse.com/show_bug.cgi?id=1242756 * https://bugzilla.suse.com/show_bug.cgi?id=1242759 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242765 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242790 * https://bugzilla.suse.com/show_bug.cgi?id=1242791 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242835 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1243047 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:33:43 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:33:43 -0000 Subject: SUSE-SU-2025:01982-1: important: Security update for the Linux Kernel Message-ID: <175017802332.11267.6126770227829629430@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01982-1 Release Date: 2025-06-17T15:32:22Z Rating: important References: * bsc#1154353 * bsc#1170891 * bsc#1173139 * bsc#1184350 * bsc#1184611 * bsc#1185010 * bsc#1190358 * bsc#1190428 * bsc#1201644 * bsc#1201664 * bsc#1201672 * bsc#1201673 * bsc#1201676 * bsc#1206073 * bsc#1206649 * bsc#1206886 * bsc#1206887 * bsc#1207198 * bsc#1210337 * bsc#1213476 * bsc#1232649 * bsc#1234887 * bsc#1235100 * bsc#1235568 * bsc#1237981 * bsc#1238032 * bsc#1238394 * bsc#1238471 * bsc#1240802 * bsc#1241362 * bsc#1241593 * bsc#1241637 * bsc#1242145 * bsc#1242147 * bsc#1242150 * bsc#1242154 * bsc#1242215 * bsc#1242232 * bsc#1242245 * bsc#1242264 * bsc#1242270 * bsc#1242352 * bsc#1242353 * bsc#1242355 * bsc#1242366 * bsc#1242378 * bsc#1242385 * bsc#1242387 * bsc#1242391 * bsc#1242392 * bsc#1242402 * bsc#1242409 * bsc#1242416 * bsc#1242440 * bsc#1242443 * bsc#1242449 * bsc#1242452 * bsc#1242455 * bsc#1242464 * bsc#1242473 * bsc#1242481 * bsc#1242484 * bsc#1242493 * bsc#1242527 * bsc#1242542 * bsc#1242545 * bsc#1242547 * bsc#1242548 * bsc#1242549 * bsc#1242551 * bsc#1242580 * bsc#1242597 * bsc#1242686 * bsc#1242689 * bsc#1242716 * bsc#1242733 * bsc#1242734 * bsc#1242736 * bsc#1242745 * bsc#1242749 * bsc#1242762 * bsc#1242835 * bsc#1242963 * bsc#1243919 Cross-References: * CVE-2020-36790 * CVE-2020-36791 * CVE-2021-32399 * CVE-2022-3564 * CVE-2022-49110 * CVE-2022-49139 * CVE-2022-49320 * CVE-2022-49767 * CVE-2022-49769 * CVE-2022-49770 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49775 * CVE-2022-49777 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49790 * CVE-2022-49793 * CVE-2022-49794 * CVE-2022-49799 * CVE-2022-49802 * CVE-2022-49809 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49823 * CVE-2022-49824 * CVE-2022-49825 * CVE-2022-49826 * CVE-2022-49827 * CVE-2022-49830 * CVE-2022-49832 * CVE-2022-49835 * CVE-2022-49836 * CVE-2022-49839 * CVE-2022-49841 * CVE-2022-49842 * CVE-2022-49846 * CVE-2022-49861 * CVE-2022-49870 * CVE-2022-49879 * CVE-2022-49880 * CVE-2022-49881 * CVE-2022-49887 * CVE-2022-49889 * CVE-2022-49892 * CVE-2022-49906 * CVE-2022-49910 * CVE-2022-49915 * CVE-2022-49922 * CVE-2022-49927 * CVE-2023-1990 * CVE-2023-53039 * CVE-2023-53052 * CVE-2023-53106 * CVE-2024-53168 * CVE-2024-56558 * CVE-2024-56705 * CVE-2025-21812 * CVE-2025-21999 * CVE-2025-22028 * CVE-2025-22121 * CVE-2025-37789 * CVE-2025-37846 * CVE-2025-40364 CVSS scores: * CVE-2020-36790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2020-36790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-36791 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2020-36791 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-32399 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-32399 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49110 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49793 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49794 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49823 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49830 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53039 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53052 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56705 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22028 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40364 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40364 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 65 vulnerabilities and has 19 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1982=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-1982=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1982=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1982=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1982=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1982=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1982=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1982=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1982=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1982=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (noarch) * kernel-source-5.3.18-150300.59.207.1 * kernel-source-vanilla-5.3.18-150300.59.207.1 * kernel-devel-5.3.18-150300.59.207.1 * kernel-macros-5.3.18-150300.59.207.1 * kernel-docs-html-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kernel-syms-5.3.18-150300.59.207.1 * kernel-default-extra-5.3.18-150300.59.207.1 * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * ocfs2-kmp-default-5.3.18-150300.59.207.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.207.1 * kselftests-kmp-default-5.3.18-150300.59.207.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.207.1 * kernel-obs-build-debugsource-5.3.18-150300.59.207.1 * dlm-kmp-default-5.3.18-150300.59.207.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.207.1 * kernel-obs-build-5.3.18-150300.59.207.1 * cluster-md-kmp-default-5.3.18-150300.59.207.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.207.1 * reiserfs-kmp-default-5.3.18-150300.59.207.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-optional-5.3.18-150300.59.207.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.207.1 * kernel-obs-qa-5.3.18-150300.59.207.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-livepatch-5.3.18-150300.59.207.1 * gfs2-kmp-default-5.3.18-150300.59.207.1 * kernel-default-base-rebuild-5.3.18-150300.59.207.1.150300.18.124.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-default-devel-5.3.18-150300.59.207.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_207-default-debuginfo-1-150300.7.3.1 * kernel-livepatch-SLE15-SP3_Update_58-debugsource-1-150300.7.3.1 * kernel-default-livepatch-devel-5.3.18-150300.59.207.1 * kernel-livepatch-5_3_18-150300_59_207-default-1-150300.7.3.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-5.3.18-150300.59.207.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.207.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.207.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_207-preempt-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_207-preempt-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-optional-5.3.18-150300.59.207.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.207.1 * ocfs2-kmp-preempt-5.3.18-150300.59.207.1 * kselftests-kmp-preempt-5.3.18-150300.59.207.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-devel-5.3.18-150300.59.207.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.207.1 * dlm-kmp-preempt-5.3.18-150300.59.207.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.207.1 * reiserfs-kmp-preempt-5.3.18-150300.59.207.1 * kernel-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-extra-5.3.18-150300.59.207.1 * gfs2-kmp-preempt-5.3.18-150300.59.207.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.207.1 * cluster-md-kmp-preempt-5.3.18-150300.59.207.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.207.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-debugsource-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debuginfo-5.3.18-150300.59.207.1 * kernel-zfcpdump-debugsource-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (aarch64) * dtb-amlogic-5.3.18-150300.59.207.1 * dtb-freescale-5.3.18-150300.59.207.1 * dtb-xilinx-5.3.18-150300.59.207.1 * ocfs2-kmp-64kb-5.3.18-150300.59.207.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.207.1 * dtb-renesas-5.3.18-150300.59.207.1 * kselftests-kmp-64kb-5.3.18-150300.59.207.1 * dtb-mediatek-5.3.18-150300.59.207.1 * kernel-64kb-optional-5.3.18-150300.59.207.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-64kb-extra-5.3.18-150300.59.207.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.207.1 * reiserfs-kmp-64kb-5.3.18-150300.59.207.1 * dtb-allwinner-5.3.18-150300.59.207.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.207.1 * dtb-broadcom-5.3.18-150300.59.207.1 * gfs2-kmp-64kb-5.3.18-150300.59.207.1 * dtb-nvidia-5.3.18-150300.59.207.1 * dtb-exynos-5.3.18-150300.59.207.1 * dtb-amd-5.3.18-150300.59.207.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.207.1 * dtb-zte-5.3.18-150300.59.207.1 * cluster-md-kmp-64kb-5.3.18-150300.59.207.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.207.1 * dtb-arm-5.3.18-150300.59.207.1 * dtb-cavium-5.3.18-150300.59.207.1 * dtb-altera-5.3.18-150300.59.207.1 * dtb-apm-5.3.18-150300.59.207.1 * dtb-qcom-5.3.18-150300.59.207.1 * dtb-rockchip-5.3.18-150300.59.207.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.207.1 * dlm-kmp-64kb-5.3.18-150300.59.207.1 * dtb-socionext-5.3.18-150300.59.207.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.207.1 * kernel-64kb-devel-5.3.18-150300.59.207.1 * kernel-64kb-debugsource-5.3.18-150300.59.207.1 * dtb-hisilicon-5.3.18-150300.59.207.1 * dtb-lg-5.3.18-150300.59.207.1 * dtb-marvell-5.3.18-150300.59.207.1 * dtb-sprd-5.3.18-150300.59.207.1 * kernel-64kb-debuginfo-5.3.18-150300.59.207.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.207.1 * dtb-al-5.3.18-150300.59.207.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.3.18-150300.59.207.1 * dlm-kmp-default-5.3.18-150300.59.207.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * gfs2-kmp-default-5.3.18-150300.59.207.1 * cluster-md-kmp-default-5.3.18-150300.59.207.1 * ocfs2-kmp-default-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.207.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.207.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-64kb-devel-5.3.18-150300.59.207.1 * kernel-64kb-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.207.1 * kernel-preempt-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-syms-5.3.18-150300.59.207.1 * reiserfs-kmp-default-5.3.18-150300.59.207.1 * kernel-obs-build-debugsource-5.3.18-150300.59.207.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * kernel-obs-build-5.3.18-150300.59.207.1 * kernel-preempt-debugsource-5.3.18-150300.59.207.1 * kernel-preempt-devel-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-devel-5.3.18-150300.59.207.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-devel-5.3.18-150300.59.207.1 * kernel-source-5.3.18-150300.59.207.1 * kernel-macros-5.3.18-150300.59.207.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.207.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-64kb-devel-5.3.18-150300.59.207.1 * kernel-64kb-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * kernel-syms-5.3.18-150300.59.207.1 * reiserfs-kmp-default-5.3.18-150300.59.207.1 * kernel-obs-build-debugsource-5.3.18-150300.59.207.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * kernel-obs-build-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-devel-5.3.18-150300.59.207.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * kernel-devel-5.3.18-150300.59.207.1 * kernel-source-5.3.18-150300.59.207.1 * kernel-macros-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc) * kernel-docs-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-devel-5.3.18-150300.59.207.1 * kernel-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-debugsource-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.3.18-150300.59.207.1 * kernel-zfcpdump-debugsource-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-syms-5.3.18-150300.59.207.1 * reiserfs-kmp-default-5.3.18-150300.59.207.1 * kernel-obs-build-debugsource-5.3.18-150300.59.207.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * kernel-obs-build-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-devel-5.3.18-150300.59.207.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-devel-5.3.18-150300.59.207.1 * kernel-source-5.3.18-150300.59.207.1 * kernel-macros-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-devel-5.3.18-150300.59.207.1 * kernel-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-debugsource-5.3.18-150300.59.207.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.207.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.207.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-64kb-devel-5.3.18-150300.59.207.1 * kernel-64kb-debuginfo-5.3.18-150300.59.207.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.207.1 * kernel-preempt-5.3.18-150300.59.207.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-syms-5.3.18-150300.59.207.1 * reiserfs-kmp-default-5.3.18-150300.59.207.1 * kernel-obs-build-debugsource-5.3.18-150300.59.207.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-preempt-debuginfo-5.3.18-150300.59.207.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.207.1 * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * kernel-obs-build-5.3.18-150300.59.207.1 * kernel-preempt-debugsource-5.3.18-150300.59.207.1 * kernel-preempt-devel-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-devel-5.3.18-150300.59.207.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-devel-5.3.18-150300.59.207.1 * kernel-source-5.3.18-150300.59.207.1 * kernel-macros-5.3.18-150300.59.207.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.207.1.150300.18.124.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.207.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_58-debugsource-1-150300.7.3.1 * kernel-default-livepatch-5.3.18-150300.59.207.1 * kernel-livepatch-5_3_18-150300_59_207-default-1-150300.7.3.1 * kernel-default-debugsource-5.3.18-150300.59.207.1 * kernel-default-livepatch-devel-5.3.18-150300.59.207.1 * kernel-livepatch-5_3_18-150300_59_207-default-debuginfo-1-150300.7.3.1 * kernel-default-debuginfo-5.3.18-150300.59.207.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36790.html * https://www.suse.com/security/cve/CVE-2020-36791.html * https://www.suse.com/security/cve/CVE-2021-32399.html * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-49110.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49767.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49777.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49790.html * https://www.suse.com/security/cve/CVE-2022-49793.html * https://www.suse.com/security/cve/CVE-2022-49794.html * https://www.suse.com/security/cve/CVE-2022-49799.html * https://www.suse.com/security/cve/CVE-2022-49802.html * https://www.suse.com/security/cve/CVE-2022-49809.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49823.html * https://www.suse.com/security/cve/CVE-2022-49824.html * https://www.suse.com/security/cve/CVE-2022-49825.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49827.html * https://www.suse.com/security/cve/CVE-2022-49830.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49836.html * https://www.suse.com/security/cve/CVE-2022-49839.html * https://www.suse.com/security/cve/CVE-2022-49841.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49870.html * https://www.suse.com/security/cve/CVE-2022-49879.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49881.html * https://www.suse.com/security/cve/CVE-2022-49887.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53052.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2024-56705.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22028.html * https://www.suse.com/security/cve/CVE-2025-22121.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37846.html * https://www.suse.com/security/cve/CVE-2025-40364.html * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1170891 * https://bugzilla.suse.com/show_bug.cgi?id=1173139 * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1184611 * https://bugzilla.suse.com/show_bug.cgi?id=1185010 * https://bugzilla.suse.com/show_bug.cgi?id=1190358 * https://bugzilla.suse.com/show_bug.cgi?id=1190428 * https://bugzilla.suse.com/show_bug.cgi?id=1201644 * https://bugzilla.suse.com/show_bug.cgi?id=1201664 * https://bugzilla.suse.com/show_bug.cgi?id=1201672 * https://bugzilla.suse.com/show_bug.cgi?id=1201673 * https://bugzilla.suse.com/show_bug.cgi?id=1201676 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1207198 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1213476 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235568 * https://bugzilla.suse.com/show_bug.cgi?id=1237981 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1241362 * https://bugzilla.suse.com/show_bug.cgi?id=1241593 * https://bugzilla.suse.com/show_bug.cgi?id=1241637 * https://bugzilla.suse.com/show_bug.cgi?id=1242145 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242150 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242232 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242264 * https://bugzilla.suse.com/show_bug.cgi?id=1242270 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242355 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242387 * https://bugzilla.suse.com/show_bug.cgi?id=1242391 * https://bugzilla.suse.com/show_bug.cgi?id=1242392 * https://bugzilla.suse.com/show_bug.cgi?id=1242402 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242443 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242473 * https://bugzilla.suse.com/show_bug.cgi?id=1242481 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242493 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242545 * https://bugzilla.suse.com/show_bug.cgi?id=1242547 * https://bugzilla.suse.com/show_bug.cgi?id=1242548 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242551 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242597 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242689 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242733 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242736 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242749 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242835 * https://bugzilla.suse.com/show_bug.cgi?id=1242963 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:33:51 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:33:51 -0000 Subject: SUSE-SU-2025:01981-1: important: Security update for xorg-x11-server Message-ID: <175017803180.11267.3461944785673562717@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:01981-1 Release Date: 2025-06-17T15:30:58Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244085 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49177 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves six vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) (bsc#1244085). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1981=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-1981=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-21.1.15-150700.5.3.1 * xorg-x11-server-debugsource-21.1.15-150700.5.3.1 * xorg-x11-server-Xvfb-debuginfo-21.1.15-150700.5.3.1 * xorg-x11-server-debuginfo-21.1.15-150700.5.3.1 * xorg-x11-server-extra-21.1.15-150700.5.3.1 * xorg-x11-server-21.1.15-150700.5.3.1 * xorg-x11-server-Xvfb-21.1.15-150700.5.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-sdk-21.1.15-150700.5.3.1 * xorg-x11-server-debuginfo-21.1.15-150700.5.3.1 * xorg-x11-server-debugsource-21.1.15-150700.5.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49177.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244085 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:33:57 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:33:57 -0000 Subject: SUSE-SU-2025:01980-1: important: Security update for xorg-x11-server Message-ID: <175017803733.11267.10230636175937379759@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:01980-1 Release Date: 2025-06-17T15:30:37Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244085 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49177 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) (bsc#1244085). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1980=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1980=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1980=1 openSUSE-SLE-15.6-2025-1980=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-21.1.11-150600.5.12.1 * xorg-x11-server-Xvfb-21.1.11-150600.5.12.1 * xorg-x11-server-extra-debuginfo-21.1.11-150600.5.12.1 * xorg-x11-server-21.1.11-150600.5.12.1 * xorg-x11-server-debuginfo-21.1.11-150600.5.12.1 * xorg-x11-server-debugsource-21.1.11-150600.5.12.1 * xorg-x11-server-Xvfb-debuginfo-21.1.11-150600.5.12.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debugsource-21.1.11-150600.5.12.1 * xorg-x11-server-sdk-21.1.11-150600.5.12.1 * xorg-x11-server-debuginfo-21.1.11-150600.5.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-extra-21.1.11-150600.5.12.1 * xorg-x11-server-Xvfb-21.1.11-150600.5.12.1 * xorg-x11-server-extra-debuginfo-21.1.11-150600.5.12.1 * xorg-x11-server-21.1.11-150600.5.12.1 * xorg-x11-server-debuginfo-21.1.11-150600.5.12.1 * xorg-x11-server-sdk-21.1.11-150600.5.12.1 * xorg-x11-server-source-21.1.11-150600.5.12.1 * xorg-x11-server-debugsource-21.1.11-150600.5.12.1 * xorg-x11-server-Xvfb-debuginfo-21.1.11-150600.5.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49177.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244085 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:34:02 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:34:02 -0000 Subject: SUSE-SU-2025:01979-1: important: Security update for xorg-x11-server Message-ID: <175017804299.11267.1862035592815346487@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:01979-1 Release Date: 2025-06-17T15:30:14Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244085 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49177 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) (bsc#1244085). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1979=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1979=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1979=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1979=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1979=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-21.1.4-150500.7.35.1 * xorg-x11-server-source-21.1.4-150500.7.35.1 * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-debugsource-21.1.4-150500.7.35.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-sdk-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.35.1 * xorg-x11-server-extra-21.1.4-150500.7.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * xorg-x11-server-21.1.4-150500.7.35.1 * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-debugsource-21.1.4-150500.7.35.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-sdk-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.35.1 * xorg-x11-server-extra-21.1.4-150500.7.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * xorg-x11-server-21.1.4-150500.7.35.1 * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-debugsource-21.1.4-150500.7.35.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-sdk-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.35.1 * xorg-x11-server-extra-21.1.4-150500.7.35.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-21.1.4-150500.7.35.1 * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-debugsource-21.1.4-150500.7.35.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-sdk-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.35.1 * xorg-x11-server-extra-21.1.4-150500.7.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * xorg-x11-server-21.1.4-150500.7.35.1 * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-debugsource-21.1.4-150500.7.35.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-sdk-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.35.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.35.1 * xorg-x11-server-extra-21.1.4-150500.7.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49177.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244085 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:34:08 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:34:08 -0000 Subject: SUSE-SU-2025:01978-1: important: Security update for xorg-x11-server Message-ID: <175017804802.11267.3608934700780472064@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:01978-1 Release Date: 2025-06-17T15:29:55Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves five vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1978=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1978=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1978=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1978=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1978=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1978=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1978=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1978=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * xorg-x11-server-source-1.20.3-150400.38.57.1 * xorg-x11-server-sdk-1.20.3-150400.38.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * xorg-x11-server-sdk-1.20.3-150400.38.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * xorg-x11-server-sdk-1.20.3-150400.38.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * xorg-x11-server-sdk-1.20.3-150400.38.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * xorg-x11-server-sdk-1.20.3-150400.38.57.1 * SUSE Manager Proxy 4.3 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.57.1 * xorg-x11-server-1.20.3-150400.38.57.1 * xorg-x11-server-debugsource-1.20.3-150400.38.57.1 * xorg-x11-server-extra-1.20.3-150400.38.57.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:34:14 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:34:14 -0000 Subject: SUSE-SU-2025:01977-1: important: Security update for xorg-x11-server Message-ID: <175017805410.11267.8682471956789103186@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:01977-1 Release Date: 2025-06-17T15:29:26Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves five vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1977=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1977=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1977=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1977=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1977=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1977=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.105.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.105.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.105.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150200.22.5.105.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.105.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.105.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * xorg-x11-server-1.20.3-150200.22.5.105.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.105.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.105.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * xorg-x11-server-wayland-1.20.3-150200.22.5.105.1 * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.105.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * xorg-x11-server-wayland-1.20.3-150200.22.5.105.1 * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.105.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.105.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.105.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-1.20.3-150200.22.5.105.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.105.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.105.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:34:21 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:34:21 -0000 Subject: SUSE-SU-2025:01975-1: important: Security update for xwayland Message-ID: <175017806101.11267.6137160156286368007@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2025:01975-1 Release Date: 2025-06-17T15:28:53Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244085 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49177 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves six vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082) * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084) * CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) (bsc#1244085) * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087) * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089) * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-1975=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * xwayland-debugsource-24.1.5-150700.3.3.1 * xwayland-debuginfo-24.1.5-150700.3.3.1 * xwayland-24.1.5-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49177.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244085 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:34:28 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:34:28 -0000 Subject: SUSE-SU-2025:01974-1: important: Security update for xwayland Message-ID: <175017806841.11267.15381867648062645417@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2025:01974-1 Release Date: 2025-06-17T15:28:44Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244085 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49177 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) (bsc#1244085). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1974=1 SUSE-2025-1974=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1974=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * xwayland-debuginfo-24.1.1-150600.5.12.1 * xwayland-debugsource-24.1.1-150600.5.12.1 * xwayland-24.1.1-150600.5.12.1 * xwayland-devel-24.1.1-150600.5.12.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * xwayland-debuginfo-24.1.1-150600.5.12.1 * xwayland-debugsource-24.1.1-150600.5.12.1 * xwayland-24.1.1-150600.5.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49177.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244085 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 16:34:30 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 16:34:30 -0000 Subject: SUSE-RU-2025:01973-1: moderate: Recommended update for crmsh Message-ID: <175017807031.11267.18357837671599847777@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2025:01973-1 Release Date: 2025-06-17T13:00:42Z Rating: moderate References: * jsc#PED-11808 * jsc#PED-8252 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains two features can now be installed. ## Description: This update for crmsh fixes the following issues: * Version update 4.6.2+20250612.e0482fa * Improved documentation on migration process (jsc#PED-11808). * pre-migration check tool focused on HA cluster stack, informs user about customers migration solutions (possible, obsolete, changes, ...). Pertains to migration related checks at the generic HA cluster level (jsc#PED-11808). * Improved migration process for HA clusters to pacemaker3/corosync3 (jsc#PED-8252) * Controls on remote nodes * Preserve checks for SLES16 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1973=1 openSUSE-SLE-15.6-2025-1973=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-1973=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-1973=1 ## Package List: * openSUSE Leap 15.6 (noarch) * crmsh-4.6.2+20250612.e0482fa-150600.3.35.2 * crmsh-test-4.6.2+20250612.e0482fa-150600.3.35.2 * crmsh-scripts-4.6.2+20250612.e0482fa-150600.3.35.2 * SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch) * crmsh-4.6.2+20250612.e0482fa-150600.3.35.2 * crmsh-scripts-4.6.2+20250612.e0482fa-150600.3.35.2 * SUSE Linux Enterprise High Availability Extension 15 SP7 (noarch) * crmsh-4.6.2+20250612.e0482fa-150600.3.35.2 * crmsh-scripts-4.6.2+20250612.e0482fa-150600.3.35.2 ## References: * https://jira.suse.com/browse/PED-11808 * https://jira.suse.com/browse/PED-8252 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:30:01 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:30:01 -0000 Subject: SUSE-RU-2025:20414-1: moderate: Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <175019220145.11267.14709771982586295285@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-RU-2025:20414-1 Release Date: 2025-06-16T14:29:52Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: This is the initial livepatch for MICRO-6-0-RT_Update_9. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-43=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-1-1.2 * kernel-livepatch-6_4_0-33-rt-debuginfo-1-1.2 * kernel-livepatch-6_4_0-33-rt-1-1.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:32:52 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:32:52 -0000 Subject: SUSE-SU-2025:20413-1: important: Security update for the Linux Kernel Message-ID: <175019237275.11267.331003922908166615@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20413-1 Release Date: 2025-06-16T14:12:16Z Rating: important References: * bsc#1215199 * bsc#1220112 * bsc#1223096 * bsc#1226498 * bsc#1228557 * bsc#1228854 * bsc#1229491 * bsc#1230581 * bsc#1231016 * bsc#1232504 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1234154 * bsc#1235149 * bsc#1235728 * bsc#1235968 * bsc#1236142 * bsc#1236208 * bsc#1237312 * bsc#1238212 * bsc#1238473 * bsc#1238774 * bsc#1238992 * bsc#1239691 * bsc#1239925 * bsc#1240180 * bsc#1240593 * bsc#1240723 * bsc#1240823 * bsc#1240866 * bsc#1240966 * bsc#1241148 * bsc#1241282 * bsc#1241305 * bsc#1241340 * bsc#1241351 * bsc#1241376 * bsc#1241448 * bsc#1241457 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241533 * bsc#1241538 * bsc#1241576 * bsc#1241590 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241617 * bsc#1241625 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241644 * bsc#1241654 * bsc#1241657 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242086 * bsc#1242163 * bsc#1242203 * bsc#1242343 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242504 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242573 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242709 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242846 * bsc#1242849 * bsc#1242850 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242940 * bsc#1242944 * bsc#1242945 * bsc#1242946 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242954 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242982 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243475 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243537 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243542 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243571 * bsc#1243572 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243628 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243782 * bsc#1243805 * bsc#1243836 * bsc#1243963 * bsc#1244145 * bsc#1244261 * jsc#PED-10253 Cross-References: * CVE-2023-52888 * CVE-2023-53146 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-49568 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-53135 * CVE-2024-54458 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21868 * CVE-2025-21919 * CVE-2025-21938 * CVE-2025-21997 * CVE-2025-22005 * CVE-2025-22021 * CVE-2025-22030 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22063 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22089 * CVE-2025-22095 * CVE-2025-22103 * CVE-2025-22113 * CVE-2025-22119 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23155 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37738 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37743 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37752 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37800 * CVE-2025-37801 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37844 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37862 * CVE-2025-37865 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37874 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37917 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37933 * CVE-2025-37936 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37967 * CVE-2025-37968 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37987 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-37998 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-52888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49568 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49568 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21997 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22113 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22113 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37738 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37743 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37801 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37862 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37917 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37917 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37933 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37933 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37998 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37998 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 193 vulnerabilities, contains one feature and has 35 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not NULL (bsc#1228557). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-49568: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg (bsc#1235728). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21868: kABI workaround for adding an header (bsc#1240180). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-21938: mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr (bsc#1240723). * CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem() (bsc#1240823). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-22113: ext4: define ext4_journal_destroy wrapper (bsc#1241617). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint (bsc#1242573). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846). * CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics (bsc#1242163). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849). * CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer() (bsc#1242850). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call (bsc#1242946). * CVE-2025-37862: HID: pidff: Fix null pointer dereference in pidff_find_fields (bsc#1242982). * CVE-2025-37865: net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported (bsc#1242954). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37874: net: ngbe: fix memory leak in ngbe_probe() error path (bsc#1242940). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37917: net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll (bsc#1243475). * CVE-2025-37933: octeon_ep: Fix host hang issue during device reboot (bsc#1243628). * CVE-2025-37936: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value (bsc#1243537). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks (bsc#1243664). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock (bsc#1243572). * CVE-2025-37968: iio: light: opt3001: fix deadlock due to concurrent flag access (bsc#1243571). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-37987: pds_core: Prevent possible adminq overflow/stuck condition (bsc#1243542). * CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in output_userspace() (bsc#1243836). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). The following non-security bugs were fixed: * ACPI: HED: Always initialize before evged (stable-fixes). * ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes). * ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git- fixes). * ACPICA: exserial: do not forget to handle FFixedHW opregions for reading (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes). * ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7 (stable-fixes). * ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: seq: Improve data consistency at polling (stable-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes). * ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable- fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git- fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes). * ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes). * ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes). * ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of() (stable-fixes). * ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect (stable-fixes). * ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes). * ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes). * ASoC: meson: meson-card-utils: use of_property_present() for DT parsing (git-fixes). * ASoC: ops: Enforce platform maximum on initial value (stable-fixes). * ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git- fixes). * ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup() (stable-fixes). * ASoC: rt722-sdca: Add some missing readable registers (stable-fixes). * ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable- fixes). * ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes). * ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes). * ASoC: tas2764: Enable main IRQs (git-fixes). * ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes). * ASoC: tas2764: Power up/down amp on mute ops (stable-fixes). * ASoC: tas2764: Reinit cache on part reset (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git- fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git- fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes). * Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes). * Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes). * Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes). * Documentation: fix typo in root= kernel parameter description (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * Drop AMDGPU patch that may cause regressions (bsc#1243782) * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer() (git-fixes). * Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add more controllers (stable-fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion (bsc#1215199). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * Move upstreamed patches into sorted section * Move upstreamed tpm patch into sorted section * NFS: Do not allow waiting for exiting tasks (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode buffer (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Check for delegation validity in nfs_start_delegation_return_locked() (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * NFSv4: Treat ENETUNREACH errors as fatal for state recovery (git-fixes). * PCI/DPC: Initialize aer_err_info before using it (git-fixes). * PCI: Explicitly put devices into D0 when initializing (git-fixes). * PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes). * PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes). * PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes). * PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes). * PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes). * PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes). * PCI: cadence: Fix runtime atomic count underflow (git-fixes). * PCI: dw-rockchip: Fix PHY function call sequence in rockchip_pcie_phy_deinit() (git-fixes). * PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable- fixes). * PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes). * PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git- fixes). * PM: sleep: Print PM debug messages during hibernation (git-fixes). * PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks() (git-fixes). * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * Refresh fixes for cBPF issue (bsc#1242778) * Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices first" (stable-fixes). * Revert "drm/amd: Keep display off while going into S4" (git-fixes). * Revert "drm/amd: Stop evicting resources on APUs in suspend" (stable-fixes). * Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable- fixes). * Revert "rndis_host: Flag RNDIS modems as WWAN devices" (git-fixes). * Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes). * SUNRPC: Do not allow waiting for exiting tasks (git-fixes). * SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls (git-fixes). * SUNRPC: rpc_clnt_set_transport() must not change the autobind setting (git- fixes). * SUNRPC: rpcbind should never reset the port to the value '0' (git-fixes). * Squashfs: check return result of sb_min_blocksize (git-fixes). * VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify (git-fixes). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * accel/qaic: Mask out SR-IOV PCI resources (stable-fixes). * acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git- fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * backlight: pm8941: Add NULL check in wled_configure() (git-fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git- fixes). * bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes). * bus: fsl-mc: fix double-free on mc_dev (git-fixes). * bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: c_can: Use of_property_present() to test existence of DT property (stable-fixes). * can: slcan: allow reception of short error messages (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: change tcon status when need_reconnect is set on it (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: lrw - Only add ecb if it is not already there (git-fixes). * crypto: lzo - Fix compression buffer overrun (stable-fixes). * crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes). * crypto: marvell/cesa - Do not chain submitted requests (git-fixes). * crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes). * crypto: octeontx2 - suppress auth failure screaming due to negative tests (stable-fixes). * crypto: qat - add shutdown handler to qat_420xx (git-fixes). * crypto: qat - add shutdown handler to qat_4xxx (git-fixes). * crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes). * crypto: sun8i-ce - move fallback ahash_request to the end of the struct (git-fixes). * crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() (git-fixes). * crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git- fixes). * crypto: xts - Only add ecb if it is not already there (git-fixes). * devlink: fix port new reply cmd type (git-fixes). * dlm: mask sk_shutdown value (bsc#1228854). * dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854). * dm-integrity: fix a warning on invalid table line (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open (stable-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: Add NULL check in udma_probe() (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable- fixes). * drm/amd/display: Add null pointer check for get_first_active_display() (git- fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Do not try AUX transactions on disconnected link (stable- fixes). * drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable- fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Guard against setting dispclk low for dcn31x (stable- fixes). * drm/amd/display: Increase block_sequence array size (stable-fixes). * drm/amd/display: Initial psr_version with correct setting (stable-fixes). * drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination (stable-fixes). * drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes). * drm/amd/display: fix link_set_dpms_off multi-display MST corner case (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable- fixes). * drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (git-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c (stable-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes). * drm/amdgpu: Update SRIOV video codec caps (stable-fixes). * drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable- fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdkfd: KFD release_work possible circular locking (stable-fixes). * drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes). * drm/ast: Find VBIOS mode from regular display size (stable-fixes). * drm/ast: Fix comment on modeset lock (git-fixes). * drm/atomic: clarify the rules around drm_atomic_state->allow_modeset (stable-fixes). * drm/bridge: cdns-dsi: Check return value when getting default PHY config (git-fixes). * drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes). * drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes). * drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes). * drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes). * drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes). * drm/mediatek: Fix kobject put for component sub-drivers (git-fixes). * drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable- fixes). * drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git- fixes). * drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git- fixes). * drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git- fixes). * drm/panel-edp: Add Starry 116KHD024006 (stable-fixes). * drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes). * drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes). * drm/tegra: Assign plane type before registration (git-fixes). * drm/tegra: Fix a possible null pointer dereference (git-fixes). * drm/tegra: rgb: Fix the unbound reference count (git-fixes). * drm/udl: Unregister device before cleaning up on disconnect (git-fixes). * drm/v3d: Add clock handling (stable-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/vc4: tests: Use return instead of assert (git-fixes). * drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes). * drm/vmwgfx: Add seqno waiter for sync_files (git-fixes). * drm: Add valid clones check (stable-fixes). * drm: bridge: adv7511: fill stream capabilities (stable-fixes). * drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes). * exfat: fix potential wrong error return from get_block (git-fixes). * fbcon: Use correct erase colour for clearing in fbcon (stable-fixes). * fbdev/efifb: Remove PM for parent device (bsc#1244261). * fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var (git-fixes). * fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git- fixes). * fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes). * fbdev: core: tileblit: Implement missing margin clearing for tileblit (stable-fixes). * fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes). * firmware: arm_ffa: Reject higher major version as incompatible (stable- fixes). * firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes). * firmware: arm_scmi: Relax duplicate name constraint across protocol ids (stable-fixes). * firmware: psci: Fix refcount leak in psci_dt_init (git-fixes). * fpga: altera-cvp: Increase credit timeout (stable-fixes). * fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio() (git-fixes). * gpio: pca953x: Simplify code with cleanup helpers (stable-fixes). * gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context() (stable-fixes). * gpio: pca953x: fix IRQ storm on system wake up (git-fixes). * gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable- fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes). * hwmon: (dell-smm) Increment the number of fans (stable-fixes). * hwmon: (gpio-fan) Add missing mutex locks (stable-fixes). * hwmon: (xgene-hwmon) use appropriate type for the latency value (stable- fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes). * i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes). * i2c: tegra: check msg length in SMBUS block read (bsc#1242086) * i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work() (git-fixes). * i3c: master: svc: Fix missing STOP for master request (stable-fixes). * i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA) (stable-fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * ieee802154: ca8210: Use proper setters and getters for bitwise types (stable-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes). * iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes). * iio: adc: ad7606_spi: fix reg write value mask (git-fixes). * iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes). * iio: filter: admv8818: fix band 4, state 15 (git-fixes). * iio: filter: admv8818: fix integer overflow (git-fixes). * iio: filter: admv8818: fix range calculation (git-fixes). * iio: imu: inv_icm42600: Fix temperature calculation (git-fixes). * ima: process_measurement() needlessly takes inode_lock() on MAY_READ (stable-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * intel_th: avoid using deprecated page->mapping, index fields (stable-fixes). * iommu: Protect against overflow in iommu_pgsize() (git-fixes). * ip6mr: fix tables suspicious RCU usage (git-fixes). * ip_tunnel: annotate data-races around t->parms.link (git-fixes). * ipmr: fix incorrect parameter validation in the ip_mroute_getsockopt() function (git-fixes). * ipmr: fix tables suspicious RCU usage (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Convert ip_route_input() to dscp_t (git-fixes). * ipv4: Correct/silence an endian warning in __ip_do_redirect (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). Both spellings are actually used * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * ipv6: save dontfrag in cork (git-fixes). * ipvs: Always clear ipvs_property flag in skb_scrub_packet() (git-fixes). * jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git- fixes). * jffs2: check that raw node were preallocated before writing summary (git- fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI workaround for hda_codec.beep_just_power_on flag (git-fixes). * kABI: ipv6: save dontfrag in cork (git-fixes). * leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes). * loop: Add sanity check for read/write_iter (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * media: adv7180: Disable test-pattern control on adv7180 (stable-fixes). * media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe() (stable-fixes). * media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git- fixes). * media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git- fixes). * media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git- fixes). * media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git- fixes). * media: cx231xx: set device_caps for 417 (stable-fixes). * media: cxusb: no longer judge rbuf when the write fails (git-fixes). * media: davinci: vpif: Fix memory leak in probe error path (git-fixes). * media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes). * media: i2c: imx219: Correct the minimum vblanking value (stable-fixes). * media: imx-jpeg: Cleanup after an allocation error (git-fixes). * media: imx-jpeg: Drop the first error frames (git-fixes). * media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes). * media: imx-jpeg: Reset slot data pointers when freed (git-fixes). * media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes). * media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes). * media: ov5675: suppress probe deferral errors (git-fixes). * media: ov8856: suppress probe deferral errors (git-fixes). * media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is available (stable-fixes). * media: rkvdec: Fix frame size enumeration (git-fixes). * media: tc358746: improve calculation of the D-PHY timing registers (stable- fixes). * media: test-drivers: vivid: do not call schedule in loop (stable-fixes). * media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes). * media: uvcvideo: Fix deferred probing error (git-fixes). * media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value (stable-fixes). * media: uvcvideo: Return the number of processed controls (git-fixes). * media: v4l2-dev: fix error handling in __video_register_device() (git- fixes). * media: v4l: Memset argument to 0 before calling get_mbus_config pad op (stable-fixes). * media: venus: Fix probe error handling (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes). * media: vidtv: Terminating the subsequent process of initialization failure (git-fixes). * media: vivid: Change the siize of the composing (git-fixes). * mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in exynos_lpass_remove() (git-fixes). * mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes). * mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes). * mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes). * mmc: host: Wait for Vdd to settle on card power off (stable-fixes). * mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes). * mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes). * mtd: nand: sunxi: Add randomizer configuration before randomizer enable (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: sunxi: Add randomizer configuration in sunxi_nfc_hw_ecc_write_chunk (git-fixes). * neighbour: Do not let neigh_forced_gc() disable preemption for long (git- fixes). * neighbour: delete redundant judgment statements (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/neighbor: clear error in case strict check is not set (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Implement missing getsockopt(SO_TIMESTAMPING_NEW) (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: add rcu safety to rtnl_prop_list_size() (git-fixes). * net: do not dump stack on queue timeout (git-fixes). * net: fix udp gso skb_segment after pull from frag_list (git-fixes). * net: give more chances to rcu in netdev_wait_allrefs_any() (git-fixes). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv4: fix a memleak in ip_setup_cork (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: linkwatch: use system_unbound_wq (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: page_pool: fix warning code (git-fixes). * net: phy: clear phydev->devlink when the link is deleted (git-fixes). * net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git- fixes). * net: phy: mscc: Fix memory leak when using one step timestamping (git- fixes). * net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git- fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: sched: cls_u32: Fix allocation size in u32_init() (git-fixes). * net: sched: consistently use rcu_replace_pointer() in taprio_change() (git- fixes). * net: sched: em_text: fix possible memory leak in em_text_destroy() (git- fixes). * net: sched: fix erspan_opt settings in cls_flower (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: usb: aqc111: debug info before sanitation (git-fixes). * net: usb: aqc111: fix error handling of usbnet read calls (git-fixes). * net: wwan: t7xx: Fix napi rx poll issue (git-fixes). * net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504) * netdev-genl: Hold rcu_read_lock in napi_get (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * netpoll: Use rcu_access_pointer() in __netpoll_setup (git-fixes). * netpoll: hold rcu read lock in __netpoll_send_skb() (git-fixes). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfsd: Initialize ssc before laundromat_work to prevent NULL dereference (git-fixes). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * orangefs: Do not truncate file size (git-fixes). * pNFS/flexfiles: Report ENETDOWN as a connection error (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * page_pool: Fix use-after-free in page_pool_recycle_in_ring (git-fixes). * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: core: do not require set_mode() callback for phy_get_mode() to work (stable-fixes). * phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes). * phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable- fixes). * phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data (git-fixes). * phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes). * pinctrl: armada-37xx: set GPIO output value before setting direction (git- fixes). * pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git- fixes). * pinctrl: at91: Fix possible out-of-boundary access (git-fixes). * pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable- fixes). * pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map (stable-fixes). * pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable- fixes). * pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (git-fixes). * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes). * platform/x86: thinkpad_acpi: Ignore battery threshold change event notification (stable-fixes). * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (git-fixes). * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes). * power: reset: at91-reset: Optimize at91_reset() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * powerpc/pseries/msi: Avoid reading PCI device registers in reduced power states (bsc#1215199). * pstore: Change kmsg_bytes storage size to u32 (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: ad5398: Add device tree support (stable-fixes). * regulator: max14577: Add error check for max14577_read_reg() (git-fixes). * regulator: max20086: Change enable gpio to optional (git-fixes). * regulator: max20086: Fix MAX200086 chip id (git-fixes). * regulator: max20086: fix invalid memory access (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rtc: Fix offset calculation for .start_secs < 0 (git-fixes). * rtc: at91rm9200: drop unused module alias (git-fixes). * rtc: cpcap: drop unused module alias (git-fixes). * rtc: da9063: drop unused module alias (git-fixes). * rtc: ds1307: stop disabling alarms on probe (stable-fixes). * rtc: jz4740: drop unused module alias (git-fixes). * rtc: pm8xxx: drop unused module alias (git-fixes). * rtc: rv3032: fix EERD location (stable-fixes). * rtc: s3c: drop unused module alias (git-fixes). * rtc: sh: assign correct interrupts with DT (git-fixes). * rtc: stm32: drop unused module alias (git-fixes). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/pci: Allow re-add of a reserved but not yet removed device (bsc#1244145). * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes bsc#1244145). * s390/pci: Fix potential double remove of hotplug slot (bsc#1244145). * s390/pci: Prevent self deletion in disable_slot() (bsc#1244145). * s390/pci: Remove redundant bus removal and disable from zpci_release_device() (bsc#1244145). * s390/pci: Serialize device addition and removal (bsc#1244145). * s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253 bsc#1244145). * s390/pci: remove hotplug slot when releasing the device (bsc#1244145). * s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145). * scsi: Improve CDL control (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * selftests/bpf: Fix bpf_nf selftest failure (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: restore default nr_hugepages value during cleanup in hugetlb_reparenting_test.sh (git-fixes). * selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes). * selftests/seccomp: fix syscall_restart test for arm compat (git-fixes). * serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes). * serial: sh-sci: Save and restore more registers (git-fixes). * serial: sh-sci: Update the suspend/resume support (stable-fixes). * smb3: fix Open files on server counter going negative (git-fixes). * smb: client: Use str_yes_no() helper function (git-fixes). * smb: client: allow more DFS referrals to be cached (git-fixes). * smb: client: avoid unnecessary reconnects when refreshing referrals (git- fixes). * smb: client: change return value in open_cached_dir_by_dentry() if !cfids (git-fixes). * smb: client: do not retry DFS targets on server shutdown (git-fixes). * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes). * smb: client: do not try following DFS links in cifs_tree_connect() (git- fixes). * smb: client: fix DFS interlink failover (git-fixes). * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes). * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709). * smb: client: fix potential race in cifs_put_tcon() (git-fixes). * smb: client: fix return value of parse_dfs_referrals() (git-fixes). * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes). * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes). * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes). * smb: client: improve purging of cached referrals (git-fixes). * smb: client: introduce av_for_each_entry() helper (git-fixes). * smb: client: optimize referral walk on failed link targets (git-fixes). * smb: client: parse DNS domain name from domain= option (git-fixes). * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes). * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes). * smb: client: refresh referral without acquiring refpath_lock (git-fixes). * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes). * soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes). * soc: aspeed: lpc: Fix impossible judgment condition (git-fixes). * soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes). * soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable- fixes). * soundwire: amd: change the soundwire wake enable/disable sequence (stable- fixes). * spi-rockchip: Fix register out of bounds access (stable-fixes). * spi: bcm63xx-hsspi: fix shared reset (git-fixes). * spi: bcm63xx-spi: fix shared reset (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: sh-msiof: Fix maximum DMA transfer size (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: spi-sun4i: fix early activation (stable-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git- fixes). * spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes). * spi: tegra210-quad: remove redundant error handling code (git-fixes). * spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes). * staging: iio: ad5933: Correct settling cycles encoding per datasheet (git- fixes). * tcp/dccp: allow a connection when sk_max_ack_backlog is zero (git-fixes). * tcp/dccp: bypass empty buckets in inet_twsk_purge() (git-fixes). * tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog (git-fixes). * tcp: bring back NUMA dispersion in inet_ehash_locks_alloc() (git-fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * tcp_metrics: optimize tcp_metrics_flush_all() (git-fixes). * thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for retimer (stable-fixes). * thunderbolt: Fix a logic error in wake on connect (git-fixes). * udp: annotate data-races around up->pending (git-fixes). * udp: fix incorrect parameter validation in the udp_lib_getsockopt() function (git-fixes). * udp: fix receiving fraglist GSO packets (git-fixes). * udp: preserve the connected status if only UDP cmsg (git-fixes). * usb: Flush altsetting 0 endpoints before reinitializating them after reset (git-fixes). * usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes). * usb: cdnsp: Fix issue with detecting command completion event (git-fixes). * usb: renesas_usbhs: Reorder clock handling and power management in probe (git-fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes). * usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes). * usb: usbtmc: Fix timeout value in get_stb (git-fixes). * usb: xhci: Do not change the status of stalled TDs on failed Stop EP (stable-fixes). * vgacon: Add check for vc_origin address range in vgacon_scroll() (git- fixes). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes). * watchdog: exar: Shorten identity name to fit correctly (git-fixes). * wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath11k: fix ring-buffer corruption (git-fixes). * wifi: ath11k: fix rx completion meta data corruption (git-fixes). * wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes). * wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes). * wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes). * wifi: ath12k: Fix end offset bit definition in monitor ring descriptor (stable-fixes). * wifi: ath12k: Fix invalid memory access while forming 802.11 header (git- fixes). * wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes). * wifi: ath12k: Fix the QoS control field offset to build QoS header (git- fixes). * wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable- fixes). * wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes). * wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable- fixes). * wifi: ath12k: fix cleanup path after mhi init (git-fixes). * wifi: ath12k: fix invalid access to memory (git-fixes). * wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath12k: fix ring-buffer corruption (git-fixes). * wifi: ath9k: return by of_get_mac_address (stable-fixes). * wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes). * wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes). * wifi: iwlwifi: add support for Killer on MTL (stable-fixes). * wifi: iwlwifi: fix debug actions order (stable-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable- fixes). * wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git- fixes). * wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes). * wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes). * wifi: mt76: mt7925: prevent multiple scan commands (git-fixes). * wifi: mt76: mt7925: refine the sniffer commnad (git-fixes). * wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes). * wifi: mt76: mt7996: revise TXS size (stable-fixes). * wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes). * wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable- fixes). * wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes). * wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git- fixes). * wifi: rtw88: Do not use static local variable in rtw8822b_set_tx_power_index_by_rate (stable-fixes). * wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes). * wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: do not ignore hardware read error during DPK (git-fixes). * wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git- fixes). * wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git- fixes). * wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes). * wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes). * wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet (stable-fixes). * wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes). * wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes). * x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/AMD: Do not return error when microcode update is not necessary (git-fixes). * x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes). * x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes). * x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). * xsk: always clear DMA mapping information when unmapping the pool (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-42=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-42=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-source-rt-6.4.0-33.1 * kernel-devel-rt-6.4.0-33.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-33.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-livepatch-6.4.0-33.1 * kernel-rt-debuginfo-6.4.0-33.1 * kernel-rt-debugsource-6.4.0-33.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-33.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-devel-6.4.0-33.1 * kernel-rt-devel-debuginfo-6.4.0-33.1 * kernel-rt-debugsource-6.4.0-33.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52888.html * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-49568.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21868.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21938.html * https://www.suse.com/security/cve/CVE-2025-21997.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22113.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23155.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37738.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37743.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37752.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37800.html * https://www.suse.com/security/cve/CVE-2025-37801.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37844.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37862.html * https://www.suse.com/security/cve/CVE-2025-37865.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37874.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37917.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37933.html * https://www.suse.com/security/cve/CVE-2025-37936.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37967.html * https://www.suse.com/security/cve/CVE-2025-37968.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37987.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-37998.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1228557 * https://bugzilla.suse.com/show_bug.cgi?id=1228854 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235728 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240180 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240723 * https://bugzilla.suse.com/show_bug.cgi?id=1240823 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241617 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242163 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242504 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242573 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242846 * https://bugzilla.suse.com/show_bug.cgi?id=1242849 * https://bugzilla.suse.com/show_bug.cgi?id=1242850 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242940 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242946 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242954 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242982 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243475 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243537 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243542 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243571 * https://bugzilla.suse.com/show_bug.cgi?id=1243572 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243628 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243782 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243836 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://bugzilla.suse.com/show_bug.cgi?id=1244145 * https://bugzilla.suse.com/show_bug.cgi?id=1244261 * https://jira.suse.com/browse/PED-10253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:32:56 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:32:56 -0000 Subject: SUSE-SU-2025:20412-1: important: Security update for python-setuptools Message-ID: <175019237689.11267.7012034192424703882@smelt2.prg2.suse.org> # Security update for python-setuptools Announcement ID: SUSE-SU-2025:20412-1 Release Date: 2025-06-16T11:27:56Z Rating: important References: * bsc#1243313 Cross-References: * CVE-2025-47273 CVSS scores: * CVE-2025-47273 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-47273 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-47273 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-47273 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-setuptools fixes the following issues: * CVE-2025-47273: Fixed a path traversal vulnerability. (bsc#1243313, gh#pypa/setuptools at 250a6d17978f) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-358=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * python311-setuptools-69.0.2-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47273.html * https://bugzilla.suse.com/show_bug.cgi?id=1243313 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:32:58 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:32:58 -0000 Subject: SUSE-RU-2025:20411-1: moderate: Recommended update for microsoft-dracut-config Message-ID: <175019237816.11267.9994465171871132352@smelt2.prg2.suse.org> # Recommended update for microsoft-dracut-config Announcement ID: SUSE-RU-2025:20411-1 Release Date: 2025-06-16T10:58:01Z Rating: moderate References: * jsc#PED-11572 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for microsoft-dracut-config fixes the following issues: Update to 0.0.4: * Move dracut config files to usr/lib/ dir Update to 0.0.3: * Add provides and conflicts on generic name dracut-instance-change-config Update to 0.0.2: * Rename config for nvme for consistency * Add dracut build requirement * Initial release v0.0.1 (PED-11572) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-357=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * microsoft-dracut-config-0.0.4-1.1 ## References: * https://jira.suse.com/browse/PED-11572 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:33:01 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:33:01 -0000 Subject: SUSE-SU-2025:20410-1: important: Security update for ucode-intel Message-ID: <175019238179.11267.11158281503235883230@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20410-1 Release Date: 2025-06-16T09:53:26Z Rating: important References: * bsc#1243123 Cross-References: * CVE-2024-28956 * CVE-2024-43420 * CVE-2024-45332 * CVE-2025-20012 * CVE-2025-20054 * CVE-2025-20103 * CVE-2025-20623 * CVE-2025-24495 CVSS scores: * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43420 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43420 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43420 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43420 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45332 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-45332 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45332 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-45332 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20012 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-20012 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20012 ( NVD ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20012 ( NVD ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20054 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20054 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-20103 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20103 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-20623 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20623 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20623 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20623 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-24495 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-24495 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-24495 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-24495 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves eight vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: Intel CPU Microcode was updated to the 20250512 release (bsc#1243123) * Security updates for INTEL-SA-01153 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01153.html) * CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-01244 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01244.html) * CVE-2025-20103: Insufficient resource pool in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access. * CVE-2025-20054: Uncaught exception in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access. * Security updates for INTEL-SA-01247 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01247.html) * CVE-2024-43420: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20623: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2024-45332: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-01322 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html) * CVE-2025-24495: Incorrect initialization of resource in the branch prediction unit for some Intel Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20012: Incorrect behavior order for some Intel Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access. * Update for functional issues. Refer to Intel Core Ultra 200 V Series Processor (Series2) https://cdrdv2.intel.com/v1/dl/getContent/834774) for details. * Update for functional issues. Refer to Intel Core Ultra 200 V Series Processor https://cdrdv2.intel.com/v1/dl/getContent/827538) for details. * Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254) for details. * Update for functional issues. Refer to 14th/13th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518) for details. * Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436) for details. * Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123) for details. * Update for functional issues. Refer to 10th Gen Intel Core Processor Families Specification Update https://cdrdv2.intel.com/v1/dl/getContent/341079) for details. * Update for functional issues. Refer to 10th Gen Intel Core Processor Families Specification Update https://cdrdv2.intel.com/v1/dl/getContent/615213) for details. * Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346) for details. * Update for functional issues. Refer to 6th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/835486) for details. * Update for functional issues. Refer to 5th Gen Intel Xeon Processor Scalable Family https://cdrdv2.intel.com/v1/dl/getContent/793902) for details. * Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415) for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/634897) for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780) for details. * Update for functional issues. Refer to 2nd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/338848) for details. * Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922) for details. * Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192) for details. * Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071) for details. * Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616) for details. * Update for functional issues. Refer to Intel Pentium Silver and Intel Celeron Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/336562) for details. ### New Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ARL-U A1 06-b5-00/80 0000000a Core Ultra Processor (Series2) ARL-S/HX (8P) B0 06-c6-02/82 00000118 Core Ultra Processor (Series2) ARL-H A1 06-c5-02/82 00000118 Core Ultra Processor (Series2) GNR-AP/SP B0 06-ad-01/95 010003a2 Xeon Scalable Gen6 GNR-AP/SP H0 06-ad-01/20 0a0000d1 Xeon Scalable Gen6 LNL B0 06-bd-01/80 0000011f Core Ultra 200 V Series Processor ### Updated Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000038 0000003a Core Gen12 ADL H0 06-97-05/07 00000038 0000003a Core Gen12 ADL L0 06-9a-03/80 00000436 00000437 Core Gen12 ADL R0 06-9a-04/80 00000436 00000437 Core Gen12 ADL-N N0 06-be-00/19 0000001c 0000001d Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E AML-Y42 V0 06-8e-0c/94 000000fc 00000100 Core Gen10 Mobile AZB A0/R0 06-9a-04/40 00000009 0000000a Intel(R) Atom(R) C1100 CFL-H R0 06-9e-0d/22 00000102 00000104 Core Gen9 Mobile CLX-SP B1 06-55-07/bf 05003707 05003901 Xeon Scalable Gen2 CML-H R1 06-a5-02/20 000000fc 00000100 Core Gen10 Mobile CML-S102 Q0 06-a5-05/22 000000fc 00000100 Core Gen10 CML-S62 G1 06-a5-03/22 000000fc 00000100 Core Gen10 CML-U42 V0 06-8e-0c/94 000000fc 00000100 Core Gen10 Mobile CML-U62 V1 A0 06-a6-00/80 000000fe 00000102 Core Gen10 Mobile CML-U62 V2 K1 06-a6-01/80 000000fc 00000100 Core Gen10 Mobile CML-Y42 V0 06-8e-0c/94 000000fc 00000100 Core Gen10 Mobile CPX-SP A1 06-55-0b/bf 07002904 07002b01 Xeon Scalable Gen3 EMR-SP A1 06-cf-02/87 21000291 210002a9 Xeon Scalable Gen5 GLK-R R0 06-7a-08/01 00000024 00000026 Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 ICL-D B0 06-6c-01/10 010002c0 010002d0 Xeon D-17xx, D-27xx ICL-U/Y D1 06-7e-05/80 000000c6 000000ca Core Gen10 Mobile ICX-SP Dx/M1 06-6a-06/87 0d0003f5 0d000404 Xeon Scalable Gen3 MTL C0 06-aa-04/e6 00000020 00000024 Core Ultra Processor RKL-S B0 06-a7-01/02 00000063 00000064 Core Gen11 RPL-E/HX/S B0 06-b7-01/32 0000012c 0000012f Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004124 00004128 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000038 0000003a Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000038 0000003a Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004124 00004128 Core Gen13 SPR-HBM Bx 06-8f-08/10 2c0003e0 2c0003f7 Xeon Max SPR-SP E4/S2 06-8f-07/87 2b000620 2b000639 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b000620 2b000639 Xeon Scalable Gen4 SRF-SP C0 06-af-03/01 03000330 03000341 Xeon 6700-Series Processors with E-Cores TGL B0/B1 06-8c-01/80 000000b8 000000bc Core Gen11 Mobile TGL-H R0 06-8d-01/c2 00000052 00000056 Core Gen11 Mobile TGL-R C0 06-8c-02/c2 00000038 0000003c Core Gen11 Mobile TWL N0 06-be-00/19 0000001c 0000001d Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E WHL-U V0 06-8e-0c/94 000000fc 00000100 Core Gen8 Mobile ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-356=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * ucode-intel-20250512-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-43420.html * https://www.suse.com/security/cve/CVE-2024-45332.html * https://www.suse.com/security/cve/CVE-2025-20012.html * https://www.suse.com/security/cve/CVE-2025-20054.html * https://www.suse.com/security/cve/CVE-2025-20103.html * https://www.suse.com/security/cve/CVE-2025-20623.html * https://www.suse.com/security/cve/CVE-2025-24495.html * https://bugzilla.suse.com/show_bug.cgi?id=1243123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:33:03 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:33:03 -0000 Subject: SUSE-RU-2025:20409-1: moderate: Recommended update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <175019238320.11267.15618555044814539106@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-RU-2025:20409-1 Release Date: 2025-06-15T18:14:06Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: This is the initial livepatch for the 8th update of SLE Micro 6.0/6.1. It fixes no issues yet. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-41=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-debuginfo-1-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-1-1.2 * kernel-livepatch-6_4_0-30-default-1-1.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:35:28 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:35:28 -0000 Subject: SUSE-SU-2025:20408-1: important: Security update for the Linux Kernel Message-ID: <175019252882.11267.5651971000765707333@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20408-1 Release Date: 2025-06-15T12:01:22Z Rating: important References: * bsc#1220112 * bsc#1223096 * bsc#1226498 * bsc#1228557 * bsc#1228854 * bsc#1229491 * bsc#1230581 * bsc#1231016 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1234154 * bsc#1235149 * bsc#1235968 * bsc#1236142 * bsc#1236208 * bsc#1237312 * bsc#1238212 * bsc#1238473 * bsc#1238774 * bsc#1238992 * bsc#1239691 * bsc#1239925 * bsc#1240593 * bsc#1240823 * bsc#1240866 * bsc#1240966 * bsc#1241148 * bsc#1241282 * bsc#1241305 * bsc#1241340 * bsc#1241351 * bsc#1241376 * bsc#1241448 * bsc#1241457 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241533 * bsc#1241538 * bsc#1241576 * bsc#1241590 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241625 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241644 * bsc#1241654 * bsc#1241657 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242163 * bsc#1242203 * bsc#1242343 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242709 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242849 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242944 * bsc#1242945 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243782 * bsc#1243805 * bsc#1243963 * bsc#1244145 * bsc#1244261 * jsc#PED-10253 Cross-References: * CVE-2023-52888 * CVE-2023-53146 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-53135 * CVE-2024-54458 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21919 * CVE-2025-21997 * CVE-2025-22005 * CVE-2025-22021 * CVE-2025-22030 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22063 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22089 * CVE-2025-22095 * CVE-2025-22103 * CVE-2025-22119 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37743 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37800 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-52888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21997 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37743 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 174 vulnerabilities, contains one feature and has 32 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not NULL (bsc#1228557). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics (bsc#1242163). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks (bsc#1243664). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). * CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem() (bsc#1240823). The following non-security bugs were fixed: * accel/qaic: Mask out SR-IOV PCI resources (stable-fixes). * ACPICA: exserial: do not forget to handle FFixedHW opregions for reading (git-fixes). * ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git- fixes). * acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git- fixes). * ACPI: HED: Always initialize before evged (stable-fixes). * ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes). * ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes). * ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7 (stable-fixes). * ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: seq: Improve data consistency at polling (stable-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes). * ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes). * ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes). * ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of() (stable-fixes). * ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes). * ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable- fixes). * ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect (stable-fixes). * ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes). * ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes). * ASoC: meson: meson-card-utils: use of_property_present() for DT parsing (git-fixes). * ASoC: ops: Enforce platform maximum on initial value (stable-fixes). * ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git- fixes). * ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup() (stable-fixes). * ASoC: rt722-sdca: Add some missing readable registers (stable-fixes). * ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable- fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git- fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes). * ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes). * ASoC: tas2764: Enable main IRQs (git-fixes). * ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes). * ASoC: tas2764: Power up/down amp on mute ops (stable-fixes). * ASoC: tas2764: Reinit cache on part reset (git-fixes). * backlight: pm8941: Add NULL check in wled_configure() (git-fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git- fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git- fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git- fixes). * bus: fsl-mc: fix double-free on mc_dev (git-fixes). * bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes). * bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: c_can: Use of_property_present() to test existence of DT property (stable-fixes). * can: slcan: allow reception of short error messages (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: change tcon status when need_reconnect is set on it (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: lrw - Only add ecb if it is not already there (git-fixes). * crypto: lzo - Fix compression buffer overrun (stable-fixes). * crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes). * crypto: marvell/cesa - Do not chain submitted requests (git-fixes). * crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes). * crypto: octeontx2 - suppress auth failure screaming due to negative tests (stable-fixes). * crypto: qat - add shutdown handler to qat_420xx (git-fixes). * crypto: qat - add shutdown handler to qat_4xxx (git-fixes). * crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes). * crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() (git-fixes). * crypto: sun8i-ce - move fallback ahash_request to the end of the struct (git-fixes). * crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git- fixes). * crypto: xts - Only add ecb if it is not already there (git-fixes). * devlink: fix port new reply cmd type (git-fixes). * dlm: mask sk_shutdown value (bsc#1228854). * dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open (stable-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: ti: Add NULL check in udma_probe() (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * Documentation: fix typo in root= kernel parameter description (git-fixes). * Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes). * Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes). * Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * drm: Add valid clones check (stable-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amd/display: Add null pointer check for get_first_active_display() (git- fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable- fixes). * drm/amd/display: Do not try AUX transactions on disconnected link (stable- fixes). * drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable- fixes). * drm/amd/display: fix link_set_dpms_off multi-display MST corner case (stable-fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Guard against setting dispclk low for dcn31x (stable- fixes). * drm/amd/display: Increase block_sequence array size (stable-fixes). * drm/amd/display: Initial psr_version with correct setting (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable- fixes). * drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination (stable-fixes). * drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes). * drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c (stable-fixes). * drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable- fixes). * drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdgpu: Update SRIOV video codec caps (stable-fixes). * drm/amdkfd: KFD release_work possible circular locking (stable-fixes). * drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes). * drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (git-fixes). * drm/ast: Find VBIOS mode from regular display size (stable-fixes). * drm/ast: Fix comment on modeset lock (git-fixes). * drm/atomic: clarify the rules around drm_atomic_state->allow_modeset (stable-fixes). * drm: bridge: adv7511: fill stream capabilities (stable-fixes). * drm/bridge: cdns-dsi: Check return value when getting default PHY config (git-fixes). * drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes). * drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes). * drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes). * drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes). * drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes). * drm/mediatek: Fix kobject put for component sub-drivers (git-fixes). * drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable- fixes). * drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git- fixes). * drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git- fixes). * drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git- fixes). * drm/panel-edp: Add Starry 116KHD024006 (stable-fixes). * drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes). * drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes). * drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes). * drm/tegra: Assign plane type before registration (git-fixes). * drm/tegra: Fix a possible null pointer dereference (git-fixes). * drm/tegra: rgb: Fix the unbound reference count (git-fixes). * drm/udl: Unregister device before cleaning up on disconnect (git-fixes). * drm/v3d: Add clock handling (stable-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/vc4: tests: Use return instead of assert (git-fixes). * drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes). * drm/vmwgfx: Add seqno waiter for sync_files (git-fixes). * Drop AMDGPU patch that may cause regressions (bsc#1243782) * exfat: fix potential wrong error return from get_block (git-fixes). * fbcon: Use correct erase colour for clearing in fbcon (stable-fixes). * fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes). * fbdev: core: tileblit: Implement missing margin clearing for tileblit (stable-fixes). * fbdev/efifb: Remove PM for parent device (bsc#1244261). * fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var (git-fixes). * fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git- fixes). * fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes). * firmware: arm_ffa: Reject higher major version as incompatible (stable- fixes). * firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes). * firmware: arm_scmi: Relax duplicate name constraint across protocol ids (stable-fixes). * firmware: psci: Fix refcount leak in psci_dt_init (git-fixes). * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * fpga: altera-cvp: Increase credit timeout (stable-fixes). * gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable- fixes). * gpio: pca953x: fix IRQ storm on system wake up (git-fixes). * gpio: pca953x: Simplify code with cleanup helpers (stable-fixes). * gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context() (stable-fixes). * HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes). * hwmon: (dell-smm) Increment the number of fans (stable-fixes). * hwmon: (gpio-fan) Add missing mutex locks (stable-fixes). * hwmon: (xgene-hwmon) use appropriate type for the latency value (stable- fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes). * i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes). * i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work() (git-fixes). * i3c: master: svc: Fix missing STOP for master request (stable-fixes). * i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA) (stable-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * ieee802154: ca8210: Use proper setters and getters for bitwise types (stable-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes). * iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes). * iio: adc: ad7606_spi: fix reg write value mask (git-fixes). * iio: filter: admv8818: fix band 4, state 15 (git-fixes). * iio: filter: admv8818: fix integer overflow (git-fixes). * iio: filter: admv8818: fix range calculation (git-fixes). * iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes). * iio: imu: inv_icm42600: Fix temperature calculation (git-fixes). * ima: process_measurement() needlessly takes inode_lock() on MAY_READ (stable-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer() (git-fixes). * Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add more controllers (stable-fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * intel_th: avoid using deprecated page->mapping, index fields (stable-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). Both spellings are actually used * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git- fixes). * jffs2: check that raw node were preallocated before writing summary (git- fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI workaround for hda_codec.beep_just_power_on flag (git-fixes). * kernel-obs-qa: Use srchash for dependency as well * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes). * loop: Add sanity check for read/write_iter (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * media: adv7180: Disable test-pattern control on adv7180 (stable-fixes). * media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe() (stable-fixes). * media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git- fixes). * media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git- fixes). * media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git- fixes). * media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git- fixes). * media: cx231xx: set device_caps for 417 (stable-fixes). * media: cxusb: no longer judge rbuf when the write fails (git-fixes). * media: davinci: vpif: Fix memory leak in probe error path (git-fixes). * media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes). * media: i2c: imx219: Correct the minimum vblanking value (stable-fixes). * media: imx-jpeg: Cleanup after an allocation error (git-fixes). * media: imx-jpeg: Drop the first error frames (git-fixes). * media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes). * media: imx-jpeg: Reset slot data pointers when freed (git-fixes). * media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes). * media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes). * media: ov5675: suppress probe deferral errors (git-fixes). * media: ov8856: suppress probe deferral errors (git-fixes). * media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is available (stable-fixes). * media: rkvdec: Fix frame size enumeration (git-fixes). * media: tc358746: improve calculation of the D-PHY timing registers (stable- fixes). * media: test-drivers: vivid: do not call schedule in loop (stable-fixes). * media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes). * media: uvcvideo: Fix deferred probing error (git-fixes). * media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value (stable-fixes). * media: uvcvideo: Return the number of processed controls (git-fixes). * media: v4l2-dev: fix error handling in __video_register_device() (git- fixes). * media: v4l: Memset argument to 0 before calling get_mbus_config pad op (stable-fixes). * media: venus: Fix probe error handling (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes). * media: vidtv: Terminating the subsequent process of initialization failure (git-fixes). * media: vivid: Change the siize of the composing (git-fixes). * mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in exynos_lpass_remove() (git-fixes). * mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes). * mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes). * mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes). * mmc: host: Wait for Vdd to settle on card power off (stable-fixes). * mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes). * mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes). * mtd: nand: sunxi: Add randomizer configuration before randomizer enable (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: sunxi: Add randomizer configuration in sunxi_nfc_hw_ecc_write_chunk (git-fixes). * neighbour: delete redundant judgment statements (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * net: do not dump stack on queue timeout (git-fixes). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net: phy: clear phydev->devlink when the link is deleted (git-fixes). * net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git- fixes). * net: phy: mscc: Fix memory leak when using one step timestamping (git- fixes). * net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git- fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: usb: aqc111: debug info before sanitation (git-fixes). * net: usb: aqc111: fix error handling of usbnet read calls (git-fixes). * net: wwan: t7xx: Fix napi rx poll issue (git-fixes). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: Initialize ssc before laundromat_work to prevent NULL dereference (git-fixes). * NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode buffer (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes). * PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes). * PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes). * PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes). * PCI: cadence: Fix runtime atomic count underflow (git-fixes). * PCI/DPC: Initialize aer_err_info before using it (git-fixes). * PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable- fixes). * PCI: dw-rockchip: Fix PHY function call sequence in rockchip_pcie_phy_deinit() (git-fixes). * PCI: Explicitly put devices into D0 when initializing (git-fixes). * PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes). * PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes). * PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes). * phy: core: do not require set_mode() callback for phy_get_mode() to work (stable-fixes). * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes). * phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable- fixes). * phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data (git-fixes). * phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * pinctrl: armada-37xx: set GPIO output value before setting direction (git- fixes). * pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git- fixes). * pinctrl: at91: Fix possible out-of-boundary access (git-fixes). * pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable- fixes). * pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map (stable-fixes). * pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable- fixes). * pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes). * pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes). * platform/x86: thinkpad_acpi: Ignore battery threshold change event notification (stable-fixes). * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes). * PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git- fixes). * PM: sleep: Print PM debug messages during hibernation (git-fixes). * PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * power: reset: at91-reset: Optimize at91_reset() (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * Refresh fixes for cBPF issue (bsc#1242778) * regulator: ad5398: Add device tree support (stable-fixes). * regulator: max14577: Add error check for max14577_read_reg() (git-fixes). * regulator: max20086: Change enable gpio to optional (git-fixes). * regulator: max20086: fix invalid memory access (git-fixes). * regulator: max20086: Fix MAX200086 chip id (git-fixes). * Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices first" (stable-fixes). * Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable- fixes). * Revert "drm/amd: Keep display off while going into S4" (git-fixes). * Revert "drm/amd: Stop evicting resources on APUs in suspend" (stable-fixes). * Revert "rndis_host: Flag RNDIS modems as WWAN devices" (git-fixes). * Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rtc: at91rm9200: drop unused module alias (git-fixes). * rtc: cpcap: drop unused module alias (git-fixes). * rtc: da9063: drop unused module alias (git-fixes). * rtc: ds1307: stop disabling alarms on probe (stable-fixes). * rtc: Fix offset calculation for .start_secs < 0 (git-fixes). * rtc: jz4740: drop unused module alias (git-fixes). * rtc: pm8xxx: drop unused module alias (git-fixes). * rtc: rv3032: fix EERD location (stable-fixes). * rtc: s3c: drop unused module alias (git-fixes). * rtc: sh: assign correct interrupts with DT (git-fixes). * rtc: stm32: drop unused module alias (git-fixes). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/pci: Allow re-add of a reserved but not yet removed device (bsc#1244145). * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes bsc#1244145). * s390/pci: Fix potential double remove of hotplug slot (bsc#1244145). * s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253 bsc#1244145). * s390/pci: Prevent self deletion in disable_slot() (bsc#1244145). * s390/pci: remove hotplug slot when releasing the device (bsc#1244145). * s390/pci: Remove redundant bus removal and disable from zpci_release_device() (bsc#1244145). * s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145). * s390/pci: Serialize device addition and removal (bsc#1244145). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: Improve CDL control (git-fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * selftests/bpf: Fix bpf_nf selftest failure (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: restore default nr_hugepages value during cleanup in hugetlb_reparenting_test.sh (git-fixes). * selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes). * selftests/seccomp: fix syscall_restart test for arm compat (git-fixes). * serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes). * serial: sh-sci: Save and restore more registers (git-fixes). * serial: sh-sci: Update the suspend/resume support (stable-fixes). * smb3: fix Open files on server counter going negative (git-fixes). * smb: client: allow more DFS referrals to be cached (git-fixes). * smb: client: avoid unnecessary reconnects when refreshing referrals (git- fixes). * smb: client: change return value in open_cached_dir_by_dentry() if !cfids (git-fixes). * smb: client: do not retry DFS targets on server shutdown (git-fixes). * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes). * smb: client: do not try following DFS links in cifs_tree_connect() (git- fixes). * smb: client: fix DFS interlink failover (git-fixes). * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes). * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709). * smb: client: fix potential race in cifs_put_tcon() (git-fixes). * smb: client: fix return value of parse_dfs_referrals() (git-fixes). * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes). * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes). * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes). * smb: client: improve purging of cached referrals (git-fixes). * smb: client: introduce av_for_each_entry() helper (git-fixes). * smb: client: optimize referral walk on failed link targets (git-fixes). * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes). * smb: client: parse DNS domain name from domain= option (git-fixes). * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes). * smb: client: refresh referral without acquiring refpath_lock (git-fixes). * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes). * smb: client: Use str_yes_no() helper function (git-fixes). * soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes). * soc: aspeed: lpc: Fix impossible judgment condition (git-fixes). * soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes). * soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable- fixes). * soundwire: amd: change the soundwire wake enable/disable sequence (stable- fixes). * spi: bcm63xx-hsspi: fix shared reset (git-fixes). * spi: bcm63xx-spi: fix shared reset (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi-rockchip: Fix register out of bounds access (stable-fixes). * spi: sh-msiof: Fix maximum DMA transfer size (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: spi-sun4i: fix early activation (stable-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git- fixes). * spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes). * spi: tegra210-quad: remove redundant error handling code (git-fixes). * spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes). * Squashfs: check return result of sb_min_blocksize (git-fixes). * staging: iio: ad5933: Correct settling cycles encoding per datasheet (git- fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for retimer (stable-fixes). * thunderbolt: Fix a logic error in wake on connect (git-fixes). * usb: cdnsp: Fix issue with detecting command completion event (git-fixes). * usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes). * usb: Flush altsetting 0 endpoints before reinitializating them after reset (git-fixes). * usb: renesas_usbhs: Reorder clock handling and power management in probe (git-fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes). * usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes). * usb: usbtmc: Fix timeout value in get_stb (git-fixes). * usb: xhci: Do not change the status of stalled TDs on failed Stop EP (stable-fixes). * vgacon: Add check for vc_origin address range in vgacon_scroll() (git- fixes). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify (git-fixes). * vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes). * watchdog: exar: Shorten identity name to fit correctly (git-fixes). * wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath11k: fix ring-buffer corruption (git-fixes). * wifi: ath11k: fix rx completion meta data corruption (git-fixes). * wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes). * wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes). * wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable- fixes). * wifi: ath12k: fix cleanup path after mhi init (git-fixes). * wifi: ath12k: Fix end offset bit definition in monitor ring descriptor (stable-fixes). * wifi: ath12k: fix invalid access to memory (git-fixes). * wifi: ath12k: Fix invalid memory access while forming 802.11 header (git- fixes). * wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes). * wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath12k: fix ring-buffer corruption (git-fixes). * wifi: ath12k: Fix the QoS control field offset to build QoS header (git- fixes). * wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes). * wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable- fixes). * wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes). * wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes). * wifi: ath9k: return by of_get_mac_address (stable-fixes). * wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes). * wifi: iwlwifi: add support for Killer on MTL (stable-fixes). * wifi: iwlwifi: fix debug actions order (stable-fixes). * wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable- fixes). * wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git- fixes). * wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes). * wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes). * wifi: mt76: mt7925: prevent multiple scan commands (git-fixes). * wifi: mt76: mt7925: refine the sniffer commnad (git-fixes). * wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes). * wifi: mt76: mt7996: revise TXS size (stable-fixes). * wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes). * wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable- fixes). * wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes). * wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git- fixes). * wifi: rtw88: do not ignore hardware read error during DPK (git-fixes). * wifi: rtw88: Do not use static local variable in rtw8822b_set_tx_power_index_by_rate (stable-fixes). * wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes). * wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git- fixes). * wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git- fixes). * wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes). * wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes). * wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet (stable-fixes). * wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes). * wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes). * x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/AMD: Do not return error when microcode update is not necessary (git-fixes). * x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes). * x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes). * x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-40=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-40=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-6.4.0-30.1 * kernel-macros-6.4.0-30.1 * kernel-source-6.4.0-30.1 * SUSE Linux Micro 6.0 (aarch64 nosrc s390x x86_64) * kernel-default-6.4.0-30.1 * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * kernel-default-debugsource-6.4.0-30.1 * kernel-default-debuginfo-6.4.0-30.1 * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-default-livepatch-6.4.0-30.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-kvmsmall-6.4.0-30.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-30.1 * kernel-kvmsmall-debugsource-6.4.0-30.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * kernel-default-base-6.4.0-30.1.21.8 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-64kb-6.4.0-30.1 * kernel-default-6.4.0-30.1 * SUSE Linux Micro Extras 6.0 (aarch64) * kernel-64kb-debugsource-6.4.0-30.1 * kernel-64kb-devel-6.4.0-30.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * kernel-obs-build-6.4.0-30.1 * kernel-default-devel-6.4.0-30.1 * kernel-obs-build-debugsource-6.4.0-30.1 * kernel-default-debugsource-6.4.0-30.1 * kernel-syms-6.4.0-30.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-default-devel-debuginfo-6.4.0-30.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52888.html * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21997.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37743.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37800.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1228557 * https://bugzilla.suse.com/show_bug.cgi?id=1228854 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240823 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242163 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242849 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243782 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://bugzilla.suse.com/show_bug.cgi?id=1244145 * https://bugzilla.suse.com/show_bug.cgi?id=1244261 * https://jira.suse.com/browse/PED-10253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:35:31 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:35:31 -0000 Subject: SUSE-SU-2025:20407-1: moderate: Security update for python-cryptography Message-ID: <175019253187.11267.13629258507770881844@smelt2.prg2.suse.org> # Security update for python-cryptography Announcement ID: SUSE-SU-2025:20407-1 Release Date: 2025-06-13T11:36:33Z Rating: moderate References: * bsc#1242631 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-cryptography fixes the following issues: * CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch in rust- openssl crate (bsc#1242631) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-354=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-cryptography-42.0.4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:35:35 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:35:35 -0000 Subject: SUSE-SU-2025:20406-1: moderate: Security update for openssl-3 Message-ID: <175019253575.11267.15436023030122200256@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:20406-1 Release Date: 2025-06-13T11:30:03Z Rating: moderate References: * bsc#1236136 * bsc#1240366 Cross-References: * CVE-2024-13176 * CVE-2025-27587 CVSS scores: * CVE-2024-13176 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-13176 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-13176 ( NVD ): 4.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-27587 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-27587 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2025-27587: Fixed Minerva side channel vulnerability in P-384 on PPC arch (bsc#1240366) * CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation (bsc#1236136) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-353=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openssl-3-debugsource-3.1.4-8.1 * libopenssl3-3.1.4-8.1 * libopenssl3-debuginfo-3.1.4-8.1 * libopenssl-3-devel-3.1.4-8.1 * openssl-3-debuginfo-3.1.4-8.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-8.1 * libopenssl-3-fips-provider-3.1.4-8.1 * openssl-3-3.1.4-8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-13176.html * https://www.suse.com/security/cve/CVE-2025-27587.html * https://bugzilla.suse.com/show_bug.cgi?id=1236136 * https://bugzilla.suse.com/show_bug.cgi?id=1240366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:35:39 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:35:39 -0000 Subject: SUSE-SU-2025:20405-1: moderate: Security update for systemd Message-ID: <175019253962.11267.12113443657639564640@smelt2.prg2.suse.org> # Security update for systemd Announcement ID: SUSE-SU-2025:20405-1 Release Date: 2025-06-12T07:16:22Z Rating: moderate References: * bsc#1236177 * bsc#1237496 * bsc#1241190 * bsc#1242938 Cross-References: * CVE-2025-4598 CVSS scores: * CVE-2025-4598 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4598 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for systemd fixes the following issues: * coredump: use %d in kernel core pattern (CVE-2025-4598) * Revert "macro: terminate the temporary VA_ARGS_FOREACH() array with a sentinel" (SUSE specific) * umount: do not move busy network mounts (bsc#1236177) * man/pstore.conf: pstore.conf template is not always installed in /etc * man: coredump.conf template is not always installed in /etc (bsc#1237496) * Don't write messages sent from users with UID falling into the container UID range to the system journal. Daemons in the container don't talk to the outside journald as they talk to the inner one directly, which does its journal splitting based on shifted uids. (bsc#1242938) * This re-adds back the support for the persistent net name rules as well as their generator since predictable naming scheme is still disabled by default on Micro (via the `net.ifnames=0` boot option). (bsc#1241190) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-352=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-352=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-254.25-1.1 * libsystemd0-254.25-1.1 * systemd-debugsource-254.25-1.1 * systemd-portable-debuginfo-254.25-1.1 * udev-254.25-1.1 * libudev1-254.25-1.1 * systemd-container-254.25-1.1 * libudev1-debuginfo-254.25-1.1 * systemd-journal-remote-debuginfo-254.25-1.1 * systemd-debuginfo-254.25-1.1 * systemd-journal-remote-254.25-1.1 * systemd-portable-254.25-1.1 * udev-debuginfo-254.25-1.1 * systemd-coredump-254.25-1.1 * systemd-coredump-debuginfo-254.25-1.1 * systemd-experimental-debuginfo-254.25-1.1 * systemd-experimental-254.25-1.1 * systemd-container-debuginfo-254.25-1.1 * libsystemd0-debuginfo-254.25-1.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-debugsource-254.25-1.1 * systemd-devel-254.25-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4598.html * https://bugzilla.suse.com/show_bug.cgi?id=1236177 * https://bugzilla.suse.com/show_bug.cgi?id=1237496 * https://bugzilla.suse.com/show_bug.cgi?id=1241190 * https://bugzilla.suse.com/show_bug.cgi?id=1242938 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 17 20:35:40 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 17 Jun 2025 20:35:40 -0000 Subject: SUSE-RU-2025:20404-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <175019254081.11267.2115764838868629894@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2025:20404-1 Release Date: 2025-06-11T07:23:28Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Add initial lifecycle files for the kernel livepatches. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-39=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * lifecycle-data-sle-module-live-patching-6-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:06 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:06 -0000 Subject: SUSE-SU-2025:01994-1: moderate: Security update 4.3.15.2 SUSE Manager Server 4.3 Message-ID: <175023540642.10997.2267155433248475578@smelt2.prg2.suse.org> # Security update 4.3.15.2 SUSE Manager Server 4.3 Announcement ID: SUSE-SU-2025:01994-1 Release Date: 2025-06-18T02:13:39Z Rating: moderate References: * bsc#1230585 * bsc#1233297 * jsc#MSC-956 * jsc#MSQA-992 Cross-References: * CVE-2024-47535 CVSS scores: * CVE-2024-47535 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47535 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47535 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update fixes the following issues: netty: * Security issues fixed: * CVE-2024-47535: Decorate InputStream to throw an exception once the data read limit is reached (bsc#1233297) * Other changes: * Replace AlgorithmId.sha256WithRSAEncryption_oid usage with specify the OID directly susemanager-sync-data: * Version 4.3.22-0: * Added support for OES 24.4 (bsc#1230585) * Set Ubuntu 24.04 as released How to apply this update: 1. Log in as root user to the Multi-Linux Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1994=1 ## Package List: * SUSE Manager Server 4.3 Module (noarch) * netty-4.1.44.Final-150400.3.6.3 * susemanager-sync-data-4.3.23-150400.3.41.3 ## References: * https://www.suse.com/security/cve/CVE-2024-47535.html * https://bugzilla.suse.com/show_bug.cgi?id=1230585 * https://bugzilla.suse.com/show_bug.cgi?id=1233297 * https://jira.suse.com/browse/MSC-956 * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:08 -0000 Subject: SUSE-RU-2025:01993-1: moderate: Maintenance update for Multi-Linux Manager 5.0.4.1: Server, Proxy and Retail Branch Server Message-ID: <175023540807.10997.11739790100304778463@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 5.0.4.1: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2025:01993-1 Release Date: 2025-06-18T02:13:30Z Rating: moderate References: * jsc#MSQA-992 Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that contains one feature can now be installed. ## Recommended update 5.0.4.1 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: uyuni-tools: * version 0.1.30-0 * Bump the default image tag to 5.0.4.1 How to apply this update: 1. Log in as root user to the Multi-Linux Manager Proxy. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Recommended update 5.0.4.1 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: uyuni-tools: * version 0.1.30-0 * Bump the default image tag to 5.0.4.1 How to apply this update: 1. Log in as root user to the Multi-Linux Manager Retail Branch Server. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Recommended update 5.0.4.1 for Multi-Linux Manager Server ### Description: This update fixes the following issues: uyuni-tools: * version 0.1.30-0 * Bump the default image tag to 5.0.4.1 How to apply this update: 1. Log in as root user to the Multi-Linux Manager Server. 2. Upgrade mgradm and mgrctl. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgradm upgrade podman` which will use the default image tags. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-1993=1 * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-1993=1 * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-1993=1 ## Package List: * SUSE Manager Server 5.0 Extension (aarch64 ppc64le s390x x86_64) * mgrctl-0.1.30-150500.3.26.2 * mgradm-debuginfo-0.1.30-150500.3.26.2 * mgrctl-debuginfo-0.1.30-150500.3.26.2 * mgradm-0.1.30-150500.3.26.2 * SUSE Manager Server 5.0 Extension (noarch) * mgradm-bash-completion-0.1.30-150500.3.26.2 * mgrctl-lang-0.1.30-150500.3.26.2 * mgradm-lang-0.1.30-150500.3.26.2 * mgrctl-zsh-completion-0.1.30-150500.3.26.2 * mgradm-zsh-completion-0.1.30-150500.3.26.2 * mgrctl-bash-completion-0.1.30-150500.3.26.2 * SUSE Manager Proxy 5.0 Extension (aarch64 ppc64le s390x x86_64) * mgrpxy-debuginfo-0.1.30-150500.3.26.2 * mgrpxy-0.1.30-150500.3.26.2 * SUSE Manager Proxy 5.0 Extension (noarch) * mgrpxy-lang-0.1.30-150500.3.26.2 * mgrpxy-bash-completion-0.1.30-150500.3.26.2 * mgrpxy-zsh-completion-0.1.30-150500.3.26.2 * SUSE Manager Retail Branch Server 5.0 Extension (aarch64 ppc64le s390x x86_64) * mgrpxy-debuginfo-0.1.30-150500.3.26.2 * mgrpxy-0.1.30-150500.3.26.2 * SUSE Manager Retail Branch Server 5.0 Extension (noarch) * mgrpxy-lang-0.1.30-150500.3.26.2 * mgrpxy-bash-completion-0.1.30-150500.3.26.2 * mgrpxy-zsh-completion-0.1.30-150500.3.26.2 ## References: * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:10 -0000 Subject: SUSE-SU-2025:01992-1: moderate: Security update for golang-github-prometheus-alertmanager Message-ID: <175023541091.10997.7938765181396546479@smelt2.prg2.suse.org> # Security update for golang-github-prometheus-alertmanager Announcement ID: SUSE-SU-2025:01992-1 Release Date: 2025-06-18T02:13:13Z Rating: moderate References: * bsc#1236516 * bsc#1238686 * jsc#MSQA-992 Cross-References: * CVE-2023-45288 * CVE-2025-22870 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities and contains one feature can now be installed. ## Description: This update for golang-github-prometheus-alertmanager fixes the following issues: * Security: * CVE-2025-22870: Fix proxy bypassing using IPv6 zone IDs (bsc#1238686) * CVE-2023-45288: Fix HTTP/2 CONTINUATION flood in net/http (bsc#1236516) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1992=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1992=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1992=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1992=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1992=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-debuginfo-0.26.0-150100.4.25.2 * golang-github-prometheus-alertmanager-0.26.0-150100.4.25.2 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.25.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-debuginfo-0.26.0-150100.4.25.2 * golang-github-prometheus-alertmanager-0.26.0-150100.4.25.2 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-debuginfo-0.26.0-150100.4.25.2 * golang-github-prometheus-alertmanager-0.26.0-150100.4.25.2 * SUSE Manager Proxy 4.3 Module (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.25.2 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1236516 * https://bugzilla.suse.com/show_bug.cgi?id=1238686 * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:21 -0000 Subject: SUSE-SU-2025:01991-1: moderate: Security update for grafana Message-ID: <175023542198.10997.14956210428326437325@smelt2.prg2.suse.org> # Security update for grafana Announcement ID: SUSE-SU-2025:01991-1 Release Date: 2025-06-18T02:12:31Z Rating: moderate References: * bsc#1231844 * bsc#1233343 * bsc#1236510 * bsc#1236516 * bsc#1238686 * bsc#1238703 * bsc#1241683 * bsc#1241687 * bsc#1241809 * bsc#1243672 * bsc#1243714 * jsc#MSQA-992 * jsc#PED-12918 Cross-References: * CVE-2023-45288 * CVE-2024-9264 * CVE-2024-9476 * CVE-2025-22870 * CVE-2025-22872 * CVE-2025-2703 * CVE-2025-29923 * CVE-2025-3454 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9264 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9476 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9476 ( NVD ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-2703 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-2703 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L * CVE-2025-29923 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-29923 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-3454 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-3454 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves eight vulnerabilities, contains two features and has three security fixes can now be installed. ## Description: This update for grafana fixes the following issues: grafana was updated from version 10.4.15 to 11.5.5 (jsc#PED-12918): * Security issues fixed: * CVE-2025-4123: Fix cross-site scripting vulnerability (bsc#1243714). * CVE-2025-22872: Bump golang.org/x/net/html (bsc#1241809) * CVE-2025-3580: Prevent unauthorized server admin deletion (bsc#1243672). * CVE-2025-29923: Bump github.com/redis/go-redis/v9 to 9.6.3. * CVE-2025-3454: Sanitize paths before evaluating access to route (bsc#1241683). * CVE-2025-2703: Fix built-in XY Chart plugin (bsc#1241687). * CVE-2025-22870: Bump golang.org/x/net (bsc#1238703). * CVE-2024-9476: Fix Migration Assistant issue (bsc#1233343) * CVE-2024-9264: SQL Expressions (bsc#1231844) * CVE-2023-45288: Bump golang.org/x/net (bsc#1236510) * CVE-2025-22870: Bump golang.org/x/net to version 0.37.0 (bsc#1238686) * Potential breaking changes in version 11.5.0: * Loki: Default to /labels API with query param instead of /series API. * Potential breaking changes in version 11.0.1: * If you had selected your language as "Portugu??s Brasileiro" previously, this will be reset. You have to select it again in your Preferences for the fix to be applied and the translations will then be shown. * Potential breaking changes in version 11.0.0: * AngularJS support is turned off by default. * Legacy alerting is entirely removed. * Subfolders cause very rare issues with folders which have slashes in their names. * The input data source is removed. * Data sources: Responses which are associated with hidden queries will be removed (filtered) by Grafana. * The URL which is generated when viewing an individual repeated panel has changed. * React Router is deprecated. * The grafana/e2e testing tool is deprecated. * This update brings many new features, enhancements and fixes highlighted at: * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-5/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-4/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-3/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-2/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-1/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-0/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1991=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1991=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1991=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * grafana-debuginfo-11.5.5-150200.3.72.2 * grafana-11.5.5-150200.3.72.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * grafana-debuginfo-11.5.5-150200.3.72.2 * grafana-11.5.5-150200.3.72.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * grafana-debuginfo-11.5.5-150200.3.72.2 * grafana-11.5.5-150200.3.72.2 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-9264.html * https://www.suse.com/security/cve/CVE-2024-9476.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-2703.html * https://www.suse.com/security/cve/CVE-2025-29923.html * https://www.suse.com/security/cve/CVE-2025-3454.html * https://bugzilla.suse.com/show_bug.cgi?id=1231844 * https://bugzilla.suse.com/show_bug.cgi?id=1233343 * https://bugzilla.suse.com/show_bug.cgi?id=1236510 * https://bugzilla.suse.com/show_bug.cgi?id=1236516 * https://bugzilla.suse.com/show_bug.cgi?id=1238686 * https://bugzilla.suse.com/show_bug.cgi?id=1238703 * https://bugzilla.suse.com/show_bug.cgi?id=1241683 * https://bugzilla.suse.com/show_bug.cgi?id=1241687 * https://bugzilla.suse.com/show_bug.cgi?id=1241809 * https://bugzilla.suse.com/show_bug.cgi?id=1243672 * https://bugzilla.suse.com/show_bug.cgi?id=1243714 * https://jira.suse.com/browse/MSQA-992 * https://jira.suse.com/browse/PED-12918 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:28 -0000 Subject: SUSE-SU-2025:01990-1: moderate: Security update for golang-github-prometheus-prometheus Message-ID: <175023542816.10997.16656885808954526345@smelt2.prg2.suse.org> # Security update for golang-github-prometheus-prometheus Announcement ID: SUSE-SU-2025:01990-1 Release Date: 2025-06-18T02:12:03Z Rating: moderate References: * bsc#1208752 * bsc#1236516 * bsc#1238686 * jsc#MSQA-992 * jsc#PED-11740 Cross-References: * CVE-2023-45288 * CVE-2025-22870 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities, contains two features and has one security fix can now be installed. ## Description: This update for golang-github-prometheus-prometheus fixes the following issues: * Security issues fixed: * CVE-2023-45288: Require Go >= 1.23 for building (bsc#1236516) * CVE-2025-22870: Bump golang.org/x/net to version 0.39.0 (bsc#1238686) * Version was updated to 2.53.4 with the following bug fixes: * Runtime: fix GOGC is being set to 0 when installed with empty prometheus.yml file resulting high cpu usage * Scrape: fix dropping valid metrics after previous scrape failed ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1990=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1990=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-1990=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1990=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.53.4-150100.4.26.2 * firewalld-prometheus-config-0.1-150100.4.26.2 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.53.4-150100.4.26.2 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.53.4-150100.4.26.2 * golang-github-prometheus-prometheus-debuginfo-2.53.4-150100.4.26.2 * SUSE Manager Proxy 4.3 Module (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.53.4-150100.4.26.2 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1208752 * https://bugzilla.suse.com/show_bug.cgi?id=1236516 * https://bugzilla.suse.com/show_bug.cgi?id=1238686 * https://jira.suse.com/browse/MSQA-992 * https://jira.suse.com/browse/PED-11740 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:39 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:39 -0000 Subject: SUSE-SU-2025:01989-1: moderate: Security update for Multi-Linux Manager Client Tools Message-ID: <175023543972.10997.1424915965931464126@smelt2.prg2.suse.org> # Security update for Multi-Linux Manager Client Tools Announcement ID: SUSE-SU-2025:01989-1 Release Date: 2025-06-18T02:11:30Z Rating: moderate References: * bsc#1208752 * bsc#1231844 * bsc#1233343 * bsc#1236510 * bsc#1236515 * bsc#1236516 * bsc#1238680 * bsc#1238686 * bsc#1238703 * bsc#1241683 * bsc#1241687 * bsc#1241809 * bsc#1243672 * bsc#1243714 * jsc#MSQA-992 * jsc#PED-11740 * jsc#PED-12872 * jsc#PED-12918 Cross-References: * CVE-2023-45288 * CVE-2024-9264 * CVE-2024-9476 * CVE-2025-22870 * CVE-2025-22872 * CVE-2025-2703 * CVE-2025-29923 * CVE-2025-3454 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9264 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9476 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9476 ( NVD ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-2703 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-2703 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L * CVE-2025-29923 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-29923 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-3454 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-3454 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module * SUSE Manager Retail Branch Server 4.3 An update that solves eight vulnerabilities, contains four features and has six security fixes can now be installed. ## Description: This update fixes the following issues: golang-github-prometheus-prometheus was updated to version 2.53.4: * Security issues fixed: * CVE-2023-45288: Require Go >= 1.23 for building (bsc#1236516) * CVE-2025-22870: Bumped golang.org/x/net to version 0.39.0 (bsc#1238686) * Other bugs fixes from version 2.53.4: * Runtime: fixed GOGC being set to 0 when installed with empty prometheus.yml file resulting high cpu usage * Scrape: fixed dropping valid metrics after previous scrape failed prometheus-blackbox_exporter was updated from version 0.24.0 to 0.26.0 (jsc#PED-12872): * Security issues fixed: * CVE-2025-22870: Fixed proxy bypassing using IPv6 zone IDs (bsc#1238680) * CVE-2023-45288: Fixed closing connections when receiving too many headers (bsc#1236515) * Other changes from version 0.26.0: * Changes: * Replace go-kit/log with log/slog module. * Features: * Add metric to record tls ciphersuite negotiated during handshake. * Add a way to export labels with content matched by the probe. Reports Certificate Serial number. * Enhancement: * Add stale workflow to start sync with stale.yaml in Prometheus. * Bug fixes: * Only register grpc TLS metrics on successful handshake. * Other changes from version 0.25.0: * Features: * Allow to get Probe logs by target. * Log errors from probe. * Bug fixes: * Prevent logging confusing error message. * Explicit registration of internal exporter metrics. grafana was updated from version 10.4.15 to 11.5.5 (jsc#PED-12918): * Security issues fixed: * CVE-2025-4123: Fix cross-site scripting vulnerability (bsc#1243714). * CVE-2025-22872: Bump golang.org/x/net/html (bsc#1241809) * CVE-2025-3580: Prevent unauthorized server admin deletion (bsc#1243672). * CVE-2025-29923: Bump github.com/redis/go-redis/v9 to 9.6.3. * CVE-2025-3454: Sanitize paths before evaluating access to route (bsc#1241683). * CVE-2025-2703: Fix built-in XY Chart plugin (bsc#1241687). * CVE-2025-22870: Bump golang.org/x/net (bsc#1238703). * CVE-2024-9476: Fix Migration Assistant issue (bsc#1233343) * CVE-2024-9264: SQL Expressions (bsc#1231844) * CVE-2023-45288: Bump golang.org/x/net (bsc#1236510) * CVE-2025-22870: Bump golang.org/x/net to version 0.37.0 (bsc#1238686) * Potential breaking changes in version 11.5.0: * Loki: Default to /labels API with query param instead of /series API. * Potential breaking changes in version 11.0.1: * If you had selected your language as "Portugu??s Brasileiro" previously, this will be reset. You have to select it again in your Preferences for the fix to be applied and the translations will then be shown. * Potential breaking changes in version 11.0.0: * AngularJS support is turned off by default. * Legacy alerting is entirely removed. * Subfolders cause very rare issues with folders which have slashes in their names. * The input data source is removed. * Data sources: Responses which are associated with hidden queries will be removed (filtered) by Grafana. * The URL which is generated when viewing an individual repeated panel has changed. * React Router is deprecated. * The grafana/e2e testing tool is deprecated. * This update brings many new features, enhancements and fixes highlighted at: * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-5/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-4/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-3/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-2/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-1/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-0/ ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1989=1 * SUSE Manager Proxy 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-1989=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1989=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-1989=1 ## Package List: * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * prometheus-blackbox_exporter-0.26.0-150000.1.27.1 * SUSE Manager Proxy 4.3 Module (aarch64 ppc64le s390x x86_64) * prometheus-blackbox_exporter-0.26.0-150000.1.27.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * prometheus-blackbox_exporter-0.26.0-150000.1.27.1 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * grafana-11.5.5-150000.1.79.1 * firewalld-prometheus-config-0.1-150000.3.62.2 * golang-github-prometheus-prometheus-2.53.4-150000.3.62.2 * prometheus-blackbox_exporter-0.26.0-150000.1.27.1 * grafana-debuginfo-11.5.5-150000.1.79.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-9264.html * https://www.suse.com/security/cve/CVE-2024-9476.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-2703.html * https://www.suse.com/security/cve/CVE-2025-29923.html * https://www.suse.com/security/cve/CVE-2025-3454.html * https://bugzilla.suse.com/show_bug.cgi?id=1208752 * https://bugzilla.suse.com/show_bug.cgi?id=1231844 * https://bugzilla.suse.com/show_bug.cgi?id=1233343 * https://bugzilla.suse.com/show_bug.cgi?id=1236510 * https://bugzilla.suse.com/show_bug.cgi?id=1236515 * https://bugzilla.suse.com/show_bug.cgi?id=1236516 * https://bugzilla.suse.com/show_bug.cgi?id=1238680 * https://bugzilla.suse.com/show_bug.cgi?id=1238686 * https://bugzilla.suse.com/show_bug.cgi?id=1238703 * https://bugzilla.suse.com/show_bug.cgi?id=1241683 * https://bugzilla.suse.com/show_bug.cgi?id=1241687 * https://bugzilla.suse.com/show_bug.cgi?id=1241809 * https://bugzilla.suse.com/show_bug.cgi?id=1243672 * https://bugzilla.suse.com/show_bug.cgi?id=1243714 * https://jira.suse.com/browse/MSQA-992 * https://jira.suse.com/browse/PED-11740 * https://jira.suse.com/browse/PED-12872 * https://jira.suse.com/browse/PED-12918 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:44 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:44 -0000 Subject: SUSE-SU-2025:01988-1: moderate: Security update for golang-github-prometheus-node_exporter Message-ID: <175023544435.10997.13444208095147691708@smelt2.prg2.suse.org> # Security update for golang-github-prometheus-node_exporter Announcement ID: SUSE-SU-2025:01988-1 Release Date: 2025-06-18T02:10:52Z Rating: moderate References: * bsc#1236516 * bsc#1238686 * jsc#MSQA-992 Cross-References: * CVE-2023-45288 * CVE-2025-22870 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities and contains one feature can now be installed. ## Description: This update for golang-github-prometheus-node_exporter fixes the following issues: golang-github-prometheus-node_exporter was updated to version 1.9.1: * Security issues fixed: * CVE-2025-22870: Bumped golang.org/x/net to version 0.37.0 (bsc#1238686) * Other bugs fixed: * pressure: Fixed missing IRQ on older kernels * Fix Darwin memory leak ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1988=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-1988=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1988=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1988=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1988=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1988=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1988=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1988=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1988=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1988=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1988=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1988=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1988=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1988=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1988=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1988=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1988=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1988=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1988=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-debuginfo-1.9.1-150100.3.35.2 * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Manager Proxy 4.3 (x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.9.1-150100.3.35.2 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1236516 * https://bugzilla.suse.com/show_bug.cgi?id=1238686 * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:57 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:57 -0000 Subject: SUSE-SU-2025:01987-1: moderate: Security update for Multi-Linux Manager Client Tools Message-ID: <175023545733.10997.12593650781424950269@smelt2.prg2.suse.org> # Security update for Multi-Linux Manager Client Tools Announcement ID: SUSE-SU-2025:01987-1 Release Date: 2025-06-18T02:09:14Z Rating: moderate References: * bsc#1208752 * bsc#1231844 * bsc#1233343 * bsc#1236510 * bsc#1236515 * bsc#1236516 * bsc#1238680 * bsc#1238686 * bsc#1238703 * bsc#1241683 * bsc#1241687 * bsc#1241809 * bsc#1243672 * bsc#1243714 * jsc#MSQA-992 * jsc#PED-11740 * jsc#PED-12872 * jsc#PED-12918 Cross-References: * CVE-2023-45288 * CVE-2024-9264 * CVE-2024-9476 * CVE-2025-22870 * CVE-2025-22872 * CVE-2025-2703 * CVE-2025-29923 * CVE-2025-3454 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9264 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9476 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9476 ( NVD ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-2703 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-2703 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L * CVE-2025-29923 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-29923 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-3454 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-3454 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves eight vulnerabilities, contains four features and has six security fixes can now be installed. ## Description: This update fixes the following issues: golang-github-prometheus-prometheus was updated to version 2.53.4: * Security issues fixed: * CVE-2023-45288: Require Go >= 1.23 for building (bsc#1236516) * CVE-2025-22870: Bumped golang.org/x/net to version 0.39.0 (bsc#1238686) * Other bugs fixes from version 2.53.4: * Runtime: fixed GOGC being set to 0 when installed with empty prometheus.yml file resulting high cpu usage * Scrape: fixed dropping valid metrics after previous scrape failed prometheus-blackbox_exporter was updated from version 0.24.0 to 0.26.0 (jsc#PED-12872): * Security issues fixed: * CVE-2025-22870: Fixed proxy bypassing using IPv6 zone IDs (bsc#1238680) * CVE-2023-45288: Fixed closing connections when receiving too many headers (bsc#1236515) * Other changes from version 0.26.0: * Changes: * Replace go-kit/log with log/slog module. * Features: * Add metric to record tls ciphersuite negotiated during handshake. * Add a way to export labels with content matched by the probe. Reports Certificate Serial number. * Enhancement: * Add stale workflow to start sync with stale.yaml in Prometheus. * Bug fixes: * Only register grpc TLS metrics on successful handshake. * Other changes from version 0.25.0: * Features: * Allow to get Probe logs by target. * Log errors from probe. * Bug fixes: * Prevent logging confusing error message. * Explicit registration of internal exporter metrics. grafana was updated from version 10.4.15 to 11.5.5 (jsc#PED-12918): * Security issues fixed: * CVE-2025-4123: Fix cross-site scripting vulnerability (bsc#1243714). * CVE-2025-22872: Bump golang.org/x/net/html (bsc#1241809) * CVE-2025-3580: Prevent unauthorized server admin deletion (bsc#1243672). * CVE-2025-29923: Bump github.com/redis/go-redis/v9 to 9.6.3. * CVE-2025-3454: Sanitize paths before evaluating access to route (bsc#1241683). * CVE-2025-2703: Fix built-in XY Chart plugin (bsc#1241687). * CVE-2025-22870: Bump golang.org/x/net (bsc#1238703). * CVE-2024-9476: Fix Migration Assistant issue (bsc#1233343) * CVE-2024-9264: SQL Expressions (bsc#1231844) * CVE-2023-45288: Bump golang.org/x/net (bsc#1236510) * CVE-2025-22870: Bump golang.org/x/net to version 0.37.0 (bsc#1238686) * Potential breaking changes in version 11.5.0: * Loki: Default to /labels API with query param instead of /series API. * Potential breaking changes in version 11.0.1: * If you had selected your language as "Portugu??s Brasileiro" previously, this will be reset. You have to select it again in your Preferences for the fix to be applied and the translations will then be shown. * Potential breaking changes in version 11.0.0: * AngularJS support is turned off by default. * Legacy alerting is entirely removed. * Subfolders cause very rare issues with folders which have slashes in their names. * The input data source is removed. * Data sources: Responses which are associated with hidden queries will be removed (filtered) by Grafana. * The URL which is generated when viewing an individual repeated panel has changed. * React Router is deprecated. * The grafana/e2e testing tool is deprecated. * This update brings many new features, enhancements and fixes highlighted at: * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-5/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-4/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-3/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-2/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-1/ * https://grafana.com/docs/grafana/next/whatsnew/whats-new-in-v11-0/ golang-github-prometheus-node_exporter was updated to version 1.9.1: * Security issues fixed: * CVE-2025-22870: Bumped golang.org/x/net to version 0.37.0 (bsc#1238686) * Other changes from version 1.9.1: * pressure: Fix missing IRQ on older kernels * Fix Darwin memory leak golang-github-prometheus-alertmanager: * Security issues fixed: * CVE-2025-22870: Fix proxy bypassing using IPv6 zone IDs (bsc#1238686) * CVE-2023-45288: Fix HTTP/2 CONTINUATION flood in net/http (bsc#1236516) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2025-1987=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1987=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1987=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * grafana-11.5.5-1.79.2 * golang-github-prometheus-node_exporter-1.9.1-1.36.2 * prometheus-blackbox_exporter-0.26.0-1.27.1 * golang-github-prometheus-prometheus-2.53.4-1.60.2 * golang-github-prometheus-alertmanager-0.26.0-1.31.2 * prometheus-blackbox_exporter-debuginfo-0.26.0-1.27.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.9.1-1.36.2 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * golang-github-prometheus-node_exporter-1.9.1-1.36.2 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-9264.html * https://www.suse.com/security/cve/CVE-2024-9476.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-2703.html * https://www.suse.com/security/cve/CVE-2025-29923.html * https://www.suse.com/security/cve/CVE-2025-3454.html * https://bugzilla.suse.com/show_bug.cgi?id=1208752 * https://bugzilla.suse.com/show_bug.cgi?id=1231844 * https://bugzilla.suse.com/show_bug.cgi?id=1233343 * https://bugzilla.suse.com/show_bug.cgi?id=1236510 * https://bugzilla.suse.com/show_bug.cgi?id=1236515 * https://bugzilla.suse.com/show_bug.cgi?id=1236516 * https://bugzilla.suse.com/show_bug.cgi?id=1238680 * https://bugzilla.suse.com/show_bug.cgi?id=1238686 * https://bugzilla.suse.com/show_bug.cgi?id=1238703 * https://bugzilla.suse.com/show_bug.cgi?id=1241683 * https://bugzilla.suse.com/show_bug.cgi?id=1241687 * https://bugzilla.suse.com/show_bug.cgi?id=1241809 * https://bugzilla.suse.com/show_bug.cgi?id=1243672 * https://bugzilla.suse.com/show_bug.cgi?id=1243714 * https://jira.suse.com/browse/MSQA-992 * https://jira.suse.com/browse/PED-11740 * https://jira.suse.com/browse/PED-12872 * https://jira.suse.com/browse/PED-12918 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:30:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:30:59 -0000 Subject: SUSE-RU-2025:01986-1: moderate: Maintenance update for Multi-Linux Manager 5.0: Server, Proxy and Retail Branch Server Message-ID: <175023545909.10997.15361456776890148328@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 5.0: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2025:01986-1 Release Date: 2025-06-18T02:08:50Z Rating: moderate References: * jsc#MSQA-992 Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that contains one feature can now be installed. ## Recommended update 5.0.4.1 for Multi-Linux Manager Server ### Description: This update fixes the following issues: server-attestation-image: * Version 5.0.9: * Image rebuilt to the newest version server-hub-xmlrpc-api-image: * Version 5.0.11: * Image rebuilt to the newest version server-image: * Version 5.0.14: * Image rebuilt to the newest version with updated dependencies server-migration-14-16-image: * Version 5.0.12: * Image rebuilt to the newest version ## Recommended update 5.0.4.1 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.13: * Image rebuilt to the newest version proxy-httpd-image: * Version 5.0.11: * Image rebuilt to the newest version proxy-salt-broker-image: * Version 5.0.11: * Image rebuilt to the newest version proxy-squid-image: * Version 5.0.11: * Image rebuilt to the newest version proxy-ssh-image: * version 5.0.11: * Image rebuilt to the newest version proxy-tftpd-image: * Version 5.0.11: * Image rebuilt to the newest version ## Recommended update 5.0.4.1 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.13: * Image rebuilt to the newest version proxy-httpd-image: * Version 5.0.11: * Image rebuilt to the newest version proxy-salt-broker-image: * Version 5.0.11: * Image rebuilt to the newest version proxy-squid-image: * Version 5.0.11: * Image rebuilt to the newest version proxy-ssh-image: * version 5.0.11: * Image rebuilt to the newest version proxy-tftpd-image: * Version 5.0.11: * Image rebuilt to the newest version ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-1986=1 * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-1986=1 * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-1986=1 ## Package List: * SUSE Manager Proxy 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4-7.15.7 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.17.7 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4-7.15.7 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4-7.15.7 * SUSE Manager Proxy 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4-7.15.7 * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4-7.15.7 * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.17.7 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4-7.15.7 * SUSE Manager Proxy 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.17.7 * SUSE Manager Proxy 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.17.7 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4-7.15.7 * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4-7.15.7 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4-7.15.7 * SUSE Manager Retail Branch Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4-7.15.7 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.17.7 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4-7.15.7 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4-7.15.7 * SUSE Manager Retail Branch Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4-7.15.7 * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4-7.15.7 * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.17.7 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4-7.15.7 * SUSE Manager Retail Branch Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4-7.15.7 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.17.7 * SUSE Manager Retail Branch Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4-7.15.7 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.17.7 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4-7.15.7 * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4-7.15.7 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4-7.15.7 * SUSE Manager Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.4-7.15.10 * suse-manager-5.0-aarch64-server-image-5.0.4-7.22.12 * suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.4-6.15.7 * suse-manager-5.0-aarch64-server-attestation-image-5.0.4-6.15.7 * SUSE Manager Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-server-image-5.0.4-7.22.12 * suse-manager-5.0-ppc64le-server-attestation-image-5.0.4-6.15.7 * suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.4-7.15.10 * suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.4-6.15.7 * SUSE Manager Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-server-image-5.0.4-7.22.12 * suse-manager-5.0-s390x-server-attestation-image-5.0.4-6.15.7 * suse-manager-5.0-s390x-server-migration-14-16-image-5.0.4-7.15.10 * suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.4-6.15.7 * SUSE Manager Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.4-6.15.7 * suse-manager-5.0-x86_64-server-image-5.0.4-7.22.12 * suse-manager-5.0-x86_64-server-attestation-image-5.0.4-6.15.7 * suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.4-7.15.10 ## References: * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 08:31:00 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 08:31:00 -0000 Subject: SUSE-SU-2025:01985-1: moderate: Maintenance update for Multi-Linux Manager 4.3 Release Notes Release Notes Message-ID: <175023546052.10997.15451560023648690645@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 4.3 Release Notes Release Notes Announcement ID: SUSE-SU-2025:01985-1 Release Date: 2025-06-18T02:07:51Z Rating: moderate References: * jsc#MSQA-992 Cross-References: * CVE-2023-45288 * CVE-2024-11741 * CVE-2024-45337 * CVE-2024-45339 * CVE-2024-47535 * CVE-2024-51744 * CVE-2024-9264 * CVE-2024-9476 * CVE-2025-22870 * CVE-2025-22872 * CVE-2025-2703 * CVE-2025-27144 * CVE-2025-3454 * CVE-2025-3580 * CVE-2025-4123 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-11741 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-11741 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-11741 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-45339 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-45339 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-45339 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47535 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47535 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47535 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-51744 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-51744 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-9264 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9264 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2024-9264 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-9476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-9476 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-9476 ( NVD ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-2703 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-2703 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3454 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-3454 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2025-3580 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-3580 ( SUSE ): 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-3580 ( NVD ): 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-4123 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L * CVE-2025-4123 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Manager Server 4.3 An update that solves 15 vulnerabilities and contains one feature can now be installed. ## Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.15.2 * SUSE Manager 4.3 will transition to LTS after June 2025 * CVE Fixed CVE-2023-45288, CVE-2024-11741, CVE-2024-45337, CVE-2024-45339 CVE-2024-51744, CVE-2024-9264, CVE-2024-9476, CVE-2025-22870 CVE-2025-22872, CVE-2025-2703 CVE-2025-27144, CVE-2025-3454 CVE-2025-3580, CVE-2025-4123, CVE-2024-47535 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1985=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1985=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-4.3.15.2-150400.3.133.1 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.15.2-150400.3.133.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-11741.html * https://www.suse.com/security/cve/CVE-2024-45337.html * https://www.suse.com/security/cve/CVE-2024-45339.html * https://www.suse.com/security/cve/CVE-2024-47535.html * https://www.suse.com/security/cve/CVE-2024-51744.html * https://www.suse.com/security/cve/CVE-2024-9264.html * https://www.suse.com/security/cve/CVE-2024-9476.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-2703.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://www.suse.com/security/cve/CVE-2025-3454.html * https://www.suse.com/security/cve/CVE-2025-3580.html * https://www.suse.com/security/cve/CVE-2025-4123.html * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:30:03 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:30:03 -0000 Subject: SUSE-SU-2025:02006-1: moderate: Security update for govulncheck-vulndb Message-ID: <175024980360.11257.13356833873770875874@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:02006-1 Release Date: 2025-06-18T11:41:01Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: Update to version 0.0.20250612T141001 2025-06-11T17:46:02Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3570 * GO-2025-3683 * GO-2025-3755 Update to version 0.0.20250611T174602 2025-06-11T17:46:02Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2022-0470 * GO-2024-3262 * GO-2025-3510 * GO-2025-3743 * GO-2025-3744 * GO-2025-3745 * GO-2025-3746 * GO-2025-3747 * GO-2025-3748 * GO-2025-3749 * GO-2025-3750 * GO-2025-3751 * GO-2025-3754 * GO-2025-3756 * GO-2025-3757 Update to version 0.0.20250609T181436 2025-06-09T18:14:36Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3740 * GO-2025-3741 * GO-2025-3742 Update to version 0.0.20250603T175802 2025-06-03T17:58:02Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3722 * GO-2025-3724 * GO-2025-3726 * GO-2025-3728 * GO-2025-3729 * GO-2025-3730 * GO-2025-3731 * GO-2025-3732 * GO-2025-3733 * GO-2025-3734 * GO-2025-3735 * GO-2025-3736 * GO-2025-3737 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2006=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2006=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250612T141001-150000.1.89.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250612T141001-150000.1.89.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:30:09 -0000 Subject: SUSE-SU-2025:02005-1: important: Security update for gdm Message-ID: <175024980903.11257.10327492582760842637@smelt2.prg2.suse.org> # Security update for gdm Announcement ID: SUSE-SU-2025:02005-1 Release Date: 2025-06-18T11:22:45Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gdm fixes the following issues: * CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2005=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libgdm1-debuginfo-45.0.1-150700.12.5.1 * typelib-1_0-Gdm-1_0-45.0.1-150700.12.5.1 * gdm-debuginfo-45.0.1-150700.12.5.1 * gdm-devel-45.0.1-150700.12.5.1 * gdm-debugsource-45.0.1-150700.12.5.1 * libgdm1-45.0.1-150700.12.5.1 * gdm-45.0.1-150700.12.5.1 * Desktop Applications Module 15-SP7 (noarch) * gdmflexiserver-45.0.1-150700.12.5.1 * gdm-systemd-45.0.1-150700.12.5.1 * gdm-lang-45.0.1-150700.12.5.1 * gdm-schema-45.0.1-150700.12.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:30:12 -0000 Subject: SUSE-SU-2025:02004-1: important: Security update for gdm Message-ID: <175024981259.11257.13331948791854824740@smelt2.prg2.suse.org> # Security update for gdm Announcement ID: SUSE-SU-2025:02004-1 Release Date: 2025-06-18T11:22:29Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gdm fixes the following issues: * CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2004=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2004=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2004=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2004=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2004=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2004=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2004=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2004=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2004=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * openSUSE Leap 15.4 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-branding-upstream-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * typelib-1_0-Gdm-1_0-41.3-150400.4.14.1 * gdm-debugsource-41.3-150400.4.14.1 * gdm-41.3-150400.4.14.1 * libgdm1-debuginfo-41.3-150400.4.14.1 * gdm-debuginfo-41.3-150400.4.14.1 * gdm-devel-41.3-150400.4.14.1 * libgdm1-41.3-150400.4.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * gdm-lang-41.3-150400.4.14.1 * gdm-systemd-41.3-150400.4.14.1 * gdm-schema-41.3-150400.4.14.1 * gdmflexiserver-41.3-150400.4.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:30:17 -0000 Subject: SUSE-SU-2025:02003-1: important: Security update for gdm Message-ID: <175024981752.11257.17203794213716444693@smelt2.prg2.suse.org> # Security update for gdm Announcement ID: SUSE-SU-2025:02003-1 Release Date: 2025-06-18T11:21:56Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for gdm fixes the following issues: * CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2003=1 openSUSE-SLE-15.6-2025-2003=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-2003=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgdm1-debuginfo-45.0.1-150600.6.8.1 * gdm-devel-45.0.1-150600.6.8.1 * gdm-debuginfo-45.0.1-150600.6.8.1 * typelib-1_0-Gdm-1_0-45.0.1-150600.6.8.1 * libgdm1-45.0.1-150600.6.8.1 * gdm-debugsource-45.0.1-150600.6.8.1 * gdm-45.0.1-150600.6.8.1 * openSUSE Leap 15.6 (noarch) * gdm-systemd-45.0.1-150600.6.8.1 * gdm-lang-45.0.1-150600.6.8.1 * gdm-branding-upstream-45.0.1-150600.6.8.1 * gdmflexiserver-45.0.1-150600.6.8.1 * gdm-schema-45.0.1-150600.6.8.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgdm1-debuginfo-45.0.1-150600.6.8.1 * gdm-devel-45.0.1-150600.6.8.1 * gdm-debuginfo-45.0.1-150600.6.8.1 * typelib-1_0-Gdm-1_0-45.0.1-150600.6.8.1 * libgdm1-45.0.1-150600.6.8.1 * gdm-debugsource-45.0.1-150600.6.8.1 * gdm-45.0.1-150600.6.8.1 * Desktop Applications Module 15-SP6 (noarch) * gdm-schema-45.0.1-150600.6.8.1 * gdm-systemd-45.0.1-150600.6.8.1 * gdmflexiserver-45.0.1-150600.6.8.1 * gdm-lang-45.0.1-150600.6.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:30:21 -0000 Subject: SUSE-SU-2025:02002-1: important: Security update for gdm Message-ID: <175024982104.11257.6942329535272457271@smelt2.prg2.suse.org> # Security update for gdm Announcement ID: SUSE-SU-2025:02002-1 Release Date: 2025-06-18T11:21:43Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gdm fixes the following issues: * CVE-2025-6018: pam.d: removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2002=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2002=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * gdm-3.10.0.1-54.23.1 * libgdm1-3.10.0.1-54.23.1 * libgdm1-debuginfo-3.10.0.1-54.23.1 * gdm-debuginfo-3.10.0.1-54.23.1 * gdm-debugsource-3.10.0.1-54.23.1 * gdm-devel-3.10.0.1-54.23.1 * typelib-1_0-Gdm-1_0-3.10.0.1-54.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * gdmflexiserver-3.10.0.1-54.23.1 * gdm-lang-3.10.0.1-54.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * gdm-3.10.0.1-54.23.1 * libgdm1-3.10.0.1-54.23.1 * libgdm1-debuginfo-3.10.0.1-54.23.1 * gdm-debuginfo-3.10.0.1-54.23.1 * gdm-debugsource-3.10.0.1-54.23.1 * gdm-devel-3.10.0.1-54.23.1 * typelib-1_0-Gdm-1_0-3.10.0.1-54.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * gdmflexiserver-3.10.0.1-54.23.1 * gdm-lang-3.10.0.1-54.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:30:25 -0000 Subject: SUSE-SU-2025:02001-1: important: Security update for pam Message-ID: <175024982550.11257.13214560831820053835@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:02001-1 Release Date: 2025-06-18T11:21:30Z Rating: important References: * bsc#1243226 * bsc#1244509 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2025-6018: pam_env: Change the default to not read the user .pam_environment file (bsc#1243226). * pam_namespace: convert functions that may operate on a user-controlled path to operate on file descriptors instead of absolute path (bsc#1244509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2001=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2001=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * pam-32bit-1.1.8-24.71.1 * pam-debugsource-1.1.8-24.71.1 * pam-devel-1.1.8-24.71.1 * pam-extra-1.1.8-24.71.1 * pam-1.1.8-24.71.1 * pam-extra-debuginfo-1.1.8-24.71.1 * pam-debuginfo-1.1.8-24.71.1 * pam-extra-32bit-1.1.8-24.71.1 * pam-extra-debuginfo-32bit-1.1.8-24.71.1 * pam-debuginfo-32bit-1.1.8-24.71.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * pam-doc-1.1.8-24.71.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pam-debugsource-1.1.8-24.71.1 * pam-devel-1.1.8-24.71.1 * pam-extra-1.1.8-24.71.1 * pam-1.1.8-24.71.1 * pam-debuginfo-1.1.8-24.71.1 * pam-extra-debuginfo-1.1.8-24.71.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * pam-doc-1.1.8-24.71.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * pam-debuginfo-32bit-1.1.8-24.71.1 * pam-extra-32bit-1.1.8-24.71.1 * pam-extra-debuginfo-32bit-1.1.8-24.71.1 * pam-32bit-1.1.8-24.71.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 * https://bugzilla.suse.com/show_bug.cgi?id=1244509 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:32:59 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:32:59 -0000 Subject: SUSE-SU-2025:02000-1: important: Security update for the Linux Kernel Message-ID: <175024997901.11257.8729354009425312330@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:02000-1 Release Date: 2025-06-18T11:08:40Z Rating: important References: * bsc#1220112 * bsc#1223096 * bsc#1226498 * bsc#1229491 * bsc#1230581 * bsc#1231016 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1234154 * bsc#1235149 * bsc#1235968 * bsc#1236142 * bsc#1236208 * bsc#1237312 * bsc#1238212 * bsc#1238473 * bsc#1238774 * bsc#1238992 * bsc#1239691 * bsc#1239925 * bsc#1240593 * bsc#1240866 * bsc#1240966 * bsc#1241148 * bsc#1241282 * bsc#1241305 * bsc#1241340 * bsc#1241351 * bsc#1241376 * bsc#1241448 * bsc#1241457 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241533 * bsc#1241538 * bsc#1241576 * bsc#1241590 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241625 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241644 * bsc#1241654 * bsc#1241657 * bsc#1242006 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242203 * bsc#1242343 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242709 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242944 * bsc#1242945 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243805 * bsc#1243963 Cross-References: * CVE-2023-53146 * CVE-2024-28956 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-53135 * CVE-2024-54458 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21919 * CVE-2025-22005 * CVE-2025-22021 * CVE-2025-22030 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22063 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22089 * CVE-2025-22095 * CVE-2025-22103 * CVE-2025-22119 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves 171 vulnerabilities and has 28 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2000=1 SUSE-2025-2000=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2000=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2000=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-2000=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-2000=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-2000=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2000=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (noarch) * kernel-docs-html-6.4.0-150600.23.53.1 * kernel-source-vanilla-6.4.0-150600.23.53.1 * kernel-macros-6.4.0-150600.23.53.1 * kernel-devel-6.4.0-150600.23.53.1 * kernel-source-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-debuginfo-6.4.0-150600.23.53.1 * kernel-debug-debugsource-6.4.0-150600.23.53.1 * kernel-debug-devel-debuginfo-6.4.0-150600.23.53.1 * kernel-debug-devel-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (x86_64) * kernel-default-vdso-6.4.0-150600.23.53.1 * kernel-kvmsmall-vdso-6.4.0-150600.23.53.1 * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.53.1 * kernel-default-vdso-debuginfo-6.4.0-150600.23.53.1 * kernel-debug-vdso-6.4.0-150600.23.53.1 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-6.4.0-150600.23.53.1 * kernel-default-base-6.4.0-150600.23.53.1.150600.12.24.1 * kernel-kvmsmall-debugsource-6.4.0-150600.23.53.1 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.53.1 * kernel-kvmsmall-devel-6.4.0-150600.23.53.1 * kernel-default-base-rebuild-6.4.0-150600.23.53.1.150600.12.24.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150600.23.53.1 * kernel-default-optional-debuginfo-6.4.0-150600.23.53.1 * kernel-syms-6.4.0-150600.23.53.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.53.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.53.1 * kernel-obs-qa-6.4.0-150600.23.53.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.53.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.53.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.53.1 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.53.1 * kernel-default-debugsource-6.4.0-150600.23.53.1 * dlm-kmp-default-6.4.0-150600.23.53.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.53.1 * ocfs2-kmp-default-6.4.0-150600.23.53.1 * gfs2-kmp-default-6.4.0-150600.23.53.1 * cluster-md-kmp-default-6.4.0-150600.23.53.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.53.1 * kernel-default-extra-6.4.0-150600.23.53.1 * kernel-default-livepatch-6.4.0-150600.23.53.1 * kernel-obs-build-debugsource-6.4.0-150600.23.53.1 * kselftests-kmp-default-6.4.0-150600.23.53.1 * kernel-default-debuginfo-6.4.0-150600.23.53.1 * kernel-default-optional-6.4.0-150600.23.53.1 * kernel-obs-build-6.4.0-150600.23.53.1 * kernel-default-devel-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-1-150600.13.3.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-1-150600.13.3.1 * kernel-default-livepatch-devel-6.4.0-150600.23.53.1 * kernel-livepatch-6_4_0-150600_23_53-default-1-150600.13.3.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150600.23.53.1 * kernel-zfcpdump-debugsource-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (aarch64) * cluster-md-kmp-64kb-6.4.0-150600.23.53.1 * kernel-64kb-debuginfo-6.4.0-150600.23.53.1 * dtb-qcom-6.4.0-150600.23.53.1 * dtb-exynos-6.4.0-150600.23.53.1 * dtb-mediatek-6.4.0-150600.23.53.1 * dtb-nvidia-6.4.0-150600.23.53.1 * ocfs2-kmp-64kb-6.4.0-150600.23.53.1 * dtb-xilinx-6.4.0-150600.23.53.1 * kernel-64kb-debugsource-6.4.0-150600.23.53.1 * kernel-64kb-extra-6.4.0-150600.23.53.1 * kernel-64kb-optional-6.4.0-150600.23.53.1 * dlm-kmp-64kb-6.4.0-150600.23.53.1 * dtb-hisilicon-6.4.0-150600.23.53.1 * kselftests-kmp-64kb-6.4.0-150600.23.53.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.53.1 * dtb-marvell-6.4.0-150600.23.53.1 * gfs2-kmp-64kb-6.4.0-150600.23.53.1 * dtb-amazon-6.4.0-150600.23.53.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.53.1 * dtb-altera-6.4.0-150600.23.53.1 * reiserfs-kmp-64kb-6.4.0-150600.23.53.1 * dtb-apm-6.4.0-150600.23.53.1 * dtb-amd-6.4.0-150600.23.53.1 * dtb-allwinner-6.4.0-150600.23.53.1 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.53.1 * dtb-freescale-6.4.0-150600.23.53.1 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.53.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.53.1 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.53.1 * dtb-cavium-6.4.0-150600.23.53.1 * dtb-sprd-6.4.0-150600.23.53.1 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.53.1 * kernel-64kb-devel-6.4.0-150600.23.53.1 * dtb-renesas-6.4.0-150600.23.53.1 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.53.1 * dtb-rockchip-6.4.0-150600.23.53.1 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.53.1 * dtb-broadcom-6.4.0-150600.23.53.1 * dtb-apple-6.4.0-150600.23.53.1 * dtb-amlogic-6.4.0-150600.23.53.1 * dtb-lg-6.4.0-150600.23.53.1 * dtb-arm-6.4.0-150600.23.53.1 * dtb-socionext-6.4.0-150600.23.53.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-devel-debuginfo-6.4.0-150600.23.53.1 * kernel-64kb-debuginfo-6.4.0-150600.23.53.1 * kernel-64kb-devel-6.4.0-150600.23.53.1 * kernel-64kb-debugsource-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.53.1.150600.12.24.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150600.23.53.1 * kernel-default-debuginfo-6.4.0-150600.23.53.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.53.1 * kernel-default-devel-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (noarch) * kernel-macros-6.4.0-150600.23.53.1 * kernel-devel-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.53.1 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150600.23.53.1 * kernel-zfcpdump-debugsource-6.4.0-150600.23.53.1 * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.53.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.4.0-150600.23.53.1 * kernel-obs-build-debugsource-6.4.0-150600.23.53.1 * kernel-syms-6.4.0-150600.23.53.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.53.1 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.53.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150600.23.53.1 * kernel-default-debuginfo-6.4.0-150600.23.53.1 * reiserfs-kmp-default-6.4.0-150600.23.53.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.53.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150600.23.53.1 * ocfs2-kmp-default-6.4.0-150600.23.53.1 * gfs2-kmp-default-6.4.0-150600.23.53.1 * cluster-md-kmp-default-6.4.0-150600.23.53.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.53.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.53.1 * kernel-default-debuginfo-6.4.0-150600.23.53.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.53.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.53.1 * dlm-kmp-default-6.4.0-150600.23.53.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.53.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.53.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-extra-6.4.0-150600.23.53.1 * kernel-default-debugsource-6.4.0-150600.23.53.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.53.1 * kernel-default-debuginfo-6.4.0-150600.23.53.1 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.53.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_53-default-1-150600.13.3.1 * kernel-default-debuginfo-6.4.0-150600.23.53.1 * kernel-default-livepatch-devel-6.4.0-150600.23.53.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-1-150600.13.3.1 * kernel-default-livepatch-6.4.0-150600.23.53.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-1-150600.13.3.1 * kernel-default-debugsource-6.4.0-150600.23.53.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:33:05 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:33:05 -0000 Subject: SUSE-SU-2025:01999-1: moderate: Security update for python-requests Message-ID: <175024998532.11257.2960355561884527310@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:01999-1 Release Date: 2025-06-18T08:43:01Z Rating: moderate References: * bsc#1244039 Cross-References: * CVE-2024-47081 CVSS scores: * CVE-2024-47081 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47081 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2024-47081: fixed netrc credential leak (bsc#1244039). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-1999=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1999=1 ## Package List: * Public Cloud Module 12 (noarch) * python-requests-2.24.0-8.23.1 * python3-requests-2.24.0-8.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * python-requests-2.24.0-8.23.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47081.html * https://bugzilla.suse.com/show_bug.cgi?id=1244039 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:33:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:33:10 -0000 Subject: SUSE-SU-2025:01998-1: moderate: Security update for python-requests Message-ID: <175024999066.11257.2274568120654456804@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:01998-1 Release Date: 2025-06-18T08:42:50Z Rating: moderate References: * bsc#1244039 Cross-References: * CVE-2024-47081 CVSS scores: * CVE-2024-47081 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47081 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.3 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2024-47081: fixed netrc credential leak (bsc#1244039). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1998=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1998=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1998=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1998=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1998=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1998=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1998=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-1998=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1998=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1998=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1998=1 ## Package List: * openSUSE Leap 15.3 (noarch) * python3-requests-2.25.1-150300.3.15.1 * python2-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-requests-2.25.1-150300.3.15.1 * Basesystem Module 15-SP6 (noarch) * python3-requests-2.25.1-150300.3.15.1 * Basesystem Module 15-SP7 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * python3-requests-2.25.1-150300.3.15.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * python3-requests-2.25.1-150300.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47081.html * https://bugzilla.suse.com/show_bug.cgi?id=1244039 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:33:15 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:33:15 -0000 Subject: SUSE-SU-2025:01997-1: moderate: Security update for python3-requests Message-ID: <175024999524.11257.4814742348050815352@smelt2.prg2.suse.org> # Security update for python3-requests Announcement ID: SUSE-SU-2025:01997-1 Release Date: 2025-06-18T08:41:19Z Rating: moderate References: * bsc#1244039 Cross-References: * CVE-2024-47081 CVSS scores: * CVE-2024-47081 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47081 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python3-requests fixes the following issues: * CVE-2024-47081: fixes netrc credential leak (bsc#1244039). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1997=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * python3-requests-2.24.0-8.20.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47081.html * https://bugzilla.suse.com/show_bug.cgi?id=1244039 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 12:34:48 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 12:34:48 -0000 Subject: SUSE-SU-2025:01995-1: important: Security update for the Linux Kernel Message-ID: <175025008804.11257.1648048463943494703@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:01995-1 Release Date: 2025-06-18T08:34:45Z Rating: important References: * bsc#1154353 * bsc#1156395 * bsc#1170891 * bsc#1173139 * bsc#1184350 * bsc#1184611 * bsc#1185010 * bsc#1188772 * bsc#1189883 * bsc#1190358 * bsc#1190428 * bsc#1201644 * bsc#1201664 * bsc#1201672 * bsc#1201673 * bsc#1201676 * bsc#1206073 * bsc#1206649 * bsc#1206886 * bsc#1206887 * bsc#1207198 * bsc#1209657 * bsc#1210337 * bsc#1213476 * bsc#1214842 * bsc#1216702 * bsc#1220754 * bsc#1220985 * bsc#1221015 * bsc#1221044 * bsc#1223932 * bsc#1224099 * bsc#1224482 * bsc#1224511 * bsc#1224592 * bsc#1224831 * bsc#1224832 * bsc#1224834 * bsc#1224841 * bsc#1224843 * bsc#1224846 * bsc#1224849 * bsc#1224854 * bsc#1224859 * bsc#1224882 * bsc#1224889 * bsc#1224891 * bsc#1224892 * bsc#1224893 * bsc#1224904 * bsc#1225360 * bsc#1225411 * bsc#1231193 * bsc#1232649 * bsc#1234887 * bsc#1235100 * bsc#1237981 * bsc#1238032 * bsc#1238471 * bsc#1240802 * bsc#1242145 * bsc#1242147 * bsc#1242150 * bsc#1242154 * bsc#1242215 * bsc#1242232 * bsc#1242245 * bsc#1242264 * bsc#1242270 * bsc#1242352 * bsc#1242353 * bsc#1242355 * bsc#1242366 * bsc#1242378 * bsc#1242385 * bsc#1242387 * bsc#1242391 * bsc#1242392 * bsc#1242402 * bsc#1242409 * bsc#1242416 * bsc#1242440 * bsc#1242443 * bsc#1242449 * bsc#1242452 * bsc#1242455 * bsc#1242464 * bsc#1242473 * bsc#1242481 * bsc#1242484 * bsc#1242493 * bsc#1242527 * bsc#1242542 * bsc#1242545 * bsc#1242547 * bsc#1242548 * bsc#1242549 * bsc#1242551 * bsc#1242580 * bsc#1242597 * bsc#1242686 * bsc#1242689 * bsc#1242716 * bsc#1242733 * bsc#1242734 * bsc#1242736 * bsc#1242745 * bsc#1242749 * bsc#1242762 * bsc#1242835 * bsc#1243919 Cross-References: * CVE-2020-36790 * CVE-2020-36791 * CVE-2021-32399 * CVE-2021-3743 * CVE-2021-47100 * CVE-2021-47220 * CVE-2021-47229 * CVE-2021-47231 * CVE-2021-47236 * CVE-2021-47239 * CVE-2021-47240 * CVE-2021-47246 * CVE-2021-47252 * CVE-2021-47255 * CVE-2021-47260 * CVE-2021-47288 * CVE-2021-47296 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47485 * CVE-2021-47500 * CVE-2021-47511 * CVE-2022-3564 * CVE-2022-48704 * CVE-2022-49110 * CVE-2022-49139 * CVE-2022-49767 * CVE-2022-49769 * CVE-2022-49770 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49775 * CVE-2022-49777 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49790 * CVE-2022-49793 * CVE-2022-49794 * CVE-2022-49799 * CVE-2022-49802 * CVE-2022-49809 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49823 * CVE-2022-49824 * CVE-2022-49825 * CVE-2022-49826 * CVE-2022-49827 * CVE-2022-49830 * CVE-2022-49832 * CVE-2022-49835 * CVE-2022-49836 * CVE-2022-49839 * CVE-2022-49841 * CVE-2022-49842 * CVE-2022-49846 * CVE-2022-49861 * CVE-2022-49870 * CVE-2022-49879 * CVE-2022-49880 * CVE-2022-49881 * CVE-2022-49887 * CVE-2022-49889 * CVE-2022-49892 * CVE-2022-49906 * CVE-2022-49910 * CVE-2022-49915 * CVE-2022-49922 * CVE-2022-49927 * CVE-2023-0160 * CVE-2023-1990 * CVE-2023-47233 * CVE-2023-52508 * CVE-2023-52591 * CVE-2023-52654 * CVE-2023-53039 * CVE-2023-53052 * CVE-2023-53106 * CVE-2023-6531 * CVE-2024-35811 * CVE-2024-35895 * CVE-2024-35914 * CVE-2024-46814 * CVE-2024-53168 * CVE-2024-56558 * CVE-2025-21812 * CVE-2025-21999 * CVE-2025-37789 CVSS scores: * CVE-2020-36790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2020-36790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-36791 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2020-36791 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-32399 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-32399 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47240 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47255 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47260 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47288 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47314 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47511 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49110 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49793 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49794 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49823 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49830 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52508 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52591 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53039 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53052 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21812 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 89 vulnerabilities and has 22 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981). * CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032). * CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493). * CVE-2022-49769: gfs2: Check sb_bsize_shift after reading superblock (bsc#1242440). * CVE-2022-49770: ceph: avoid putting the realm twice when decoding snaps fails (bsc#1242597). * CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245). * CVE-2022-49789: scsi: zfcp: Fix double free of FSF request when qdio send fails (bsc#1242366). * CVE-2023-53039: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (bsc#1242745). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1234887). * CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100). * CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). The following non-security bugs were fixed: * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (bsc#1242745). * devm-helpers: Add resource managed version of work init (bsc#1242745). * mtd: phram: Add the kernel lock down check (bsc#1232649). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * workqueue: Add resource managed version of delayed work init (bsc#1242745). * Remove debug flavor (bsc#1243919). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1995=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1995=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1995=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debugsource-5.3.18-150300.211.1 * kernel-rt-debuginfo-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * kernel-source-rt-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.211.1 * kernel-rt-debuginfo-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.211.1 * kernel-rt-debuginfo-5.3.18-150300.211.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.211.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36790.html * https://www.suse.com/security/cve/CVE-2020-36791.html * https://www.suse.com/security/cve/CVE-2021-32399.html * https://www.suse.com/security/cve/CVE-2021-3743.html * https://www.suse.com/security/cve/CVE-2021-47100.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47240.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47255.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47296.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-49110.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49767.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49777.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49790.html * https://www.suse.com/security/cve/CVE-2022-49793.html * https://www.suse.com/security/cve/CVE-2022-49794.html * https://www.suse.com/security/cve/CVE-2022-49799.html * https://www.suse.com/security/cve/CVE-2022-49802.html * https://www.suse.com/security/cve/CVE-2022-49809.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49823.html * https://www.suse.com/security/cve/CVE-2022-49824.html * https://www.suse.com/security/cve/CVE-2022-49825.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49827.html * https://www.suse.com/security/cve/CVE-2022-49830.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49836.html * https://www.suse.com/security/cve/CVE-2022-49839.html * https://www.suse.com/security/cve/CVE-2022-49841.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49870.html * https://www.suse.com/security/cve/CVE-2022-49879.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49881.html * https://www.suse.com/security/cve/CVE-2022-49887.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52508.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53052.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2025-21812.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1170891 * https://bugzilla.suse.com/show_bug.cgi?id=1173139 * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1184611 * https://bugzilla.suse.com/show_bug.cgi?id=1185010 * https://bugzilla.suse.com/show_bug.cgi?id=1188772 * https://bugzilla.suse.com/show_bug.cgi?id=1189883 * https://bugzilla.suse.com/show_bug.cgi?id=1190358 * https://bugzilla.suse.com/show_bug.cgi?id=1190428 * https://bugzilla.suse.com/show_bug.cgi?id=1201644 * https://bugzilla.suse.com/show_bug.cgi?id=1201664 * https://bugzilla.suse.com/show_bug.cgi?id=1201672 * https://bugzilla.suse.com/show_bug.cgi?id=1201673 * https://bugzilla.suse.com/show_bug.cgi?id=1201676 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1207198 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1213476 * https://bugzilla.suse.com/show_bug.cgi?id=1214842 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1220754 * https://bugzilla.suse.com/show_bug.cgi?id=1220985 * https://bugzilla.suse.com/show_bug.cgi?id=1221015 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224832 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224843 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224891 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1237981 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1238471 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1242145 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242150 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242232 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242264 * https://bugzilla.suse.com/show_bug.cgi?id=1242270 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242355 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242387 * https://bugzilla.suse.com/show_bug.cgi?id=1242391 * https://bugzilla.suse.com/show_bug.cgi?id=1242392 * https://bugzilla.suse.com/show_bug.cgi?id=1242402 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242443 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242473 * https://bugzilla.suse.com/show_bug.cgi?id=1242481 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242493 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242545 * https://bugzilla.suse.com/show_bug.cgi?id=1242547 * https://bugzilla.suse.com/show_bug.cgi?id=1242548 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242551 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242597 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242689 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242733 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242736 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242749 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242835 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 16:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 16:30:11 -0000 Subject: SUSE-SU-2025:02012-1: important: Security update for xorg-x11-server Message-ID: <175026421100.11267.17706719016702403246@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:02012-1 Release Date: 2025-06-18T15:36:20Z Rating: important References: * bsc#1244082 * bsc#1244084 * bsc#1244087 * bsc#1244089 * bsc#1244090 Cross-References: * CVE-2025-49175 * CVE-2025-49176 * CVE-2025-49178 * CVE-2025-49179 * CVE-2025-49180 CVSS scores: * CVE-2025-49175 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49175 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-49178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49179 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49179 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-49180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49180 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) (bsc#1244082). * CVE-2025-49176: Integer overflow in Big Requests Extension (bsc#1244084). * CVE-2025-49178: Unprocessed client request via bytes to ignore (bsc#1244087). * CVE-2025-49179: Integer overflow in X Record extension (bsc#1244089). * CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) (bsc#1244090). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2012=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2012=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.19.6-10.83.1 * xorg-x11-server-debuginfo-1.19.6-10.83.1 * xorg-x11-server-debugsource-1.19.6-10.83.1 * xorg-x11-server-extra-1.19.6-10.83.1 * xorg-x11-server-1.19.6-10.83.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * xorg-x11-server-extra-debuginfo-1.19.6-10.83.1 * xorg-x11-server-debuginfo-1.19.6-10.83.1 * xorg-x11-server-debugsource-1.19.6-10.83.1 * xorg-x11-server-extra-1.19.6-10.83.1 * xorg-x11-server-1.19.6-10.83.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49175.html * https://www.suse.com/security/cve/CVE-2025-49176.html * https://www.suse.com/security/cve/CVE-2025-49178.html * https://www.suse.com/security/cve/CVE-2025-49179.html * https://www.suse.com/security/cve/CVE-2025-49180.html * https://bugzilla.suse.com/show_bug.cgi?id=1244082 * https://bugzilla.suse.com/show_bug.cgi?id=1244084 * https://bugzilla.suse.com/show_bug.cgi?id=1244087 * https://bugzilla.suse.com/show_bug.cgi?id=1244089 * https://bugzilla.suse.com/show_bug.cgi?id=1244090 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 16:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 16:30:13 -0000 Subject: SUSE-SU-2025:02010-1: important: Security update for redis Message-ID: <175026421394.11267.5209325830730405087@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:02010-1 Release Date: 2025-06-18T15:25:27Z Rating: important References: * bsc#1241708 Cross-References: * CVE-2025-21605 CVSS scores: * CVE-2025-21605 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21605 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21605 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-21605: output buffer denial of service (bsc#1241708). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2010=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2010=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2010=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2010=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * redis-debuginfo-6.0.14-150200.6.35.1 * redis-6.0.14-150200.6.35.1 * redis-debugsource-6.0.14-150200.6.35.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * redis-debuginfo-6.0.14-150200.6.35.1 * redis-6.0.14-150200.6.35.1 * redis-debugsource-6.0.14-150200.6.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * redis-debuginfo-6.0.14-150200.6.35.1 * redis-6.0.14-150200.6.35.1 * redis-debugsource-6.0.14-150200.6.35.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * redis-debuginfo-6.0.14-150200.6.35.1 * redis-6.0.14-150200.6.35.1 * redis-debugsource-6.0.14-150200.6.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21605.html * https://bugzilla.suse.com/show_bug.cgi?id=1241708 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 16:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 16:30:18 -0000 Subject: SUSE-RU-2025:02009-1: moderate: Recommended update for libtcnative-1-0 Message-ID: <175026421828.11267.6643162973168430049@smelt2.prg2.suse.org> # Recommended update for libtcnative-1-0 Announcement ID: SUSE-RU-2025:02009-1 Release Date: 2025-06-18T14:24:00Z Rating: moderate References: * bsc#1221198 Affected Products: * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update of libtcnative-1-0 rebuilds it against a TLS 1.3 capable openssl 1.1, enabling TLS 1.3 support. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2009=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2009=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2009=1 ## Package List: * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libtcnative-1-0-debugsource-1.2.38-150200.6.2.1 * libtcnative-1-0-1.2.38-150200.6.2.1 * libtcnative-1-0-debuginfo-1.2.38-150200.6.2.1 * libtcnative-1-0-devel-1.2.38-150200.6.2.1 * SUSE Manager Proxy 4.3 (x86_64) * libtcnative-1-0-debugsource-1.2.38-150200.6.2.1 * libtcnative-1-0-1.2.38-150200.6.2.1 * libtcnative-1-0-debuginfo-1.2.38-150200.6.2.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libtcnative-1-0-debugsource-1.2.38-150200.6.2.1 * libtcnative-1-0-1.2.38-150200.6.2.1 * libtcnative-1-0-debuginfo-1.2.38-150200.6.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221198 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 16:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 16:30:25 -0000 Subject: SUSE-RU-2025:02008-1: moderate: Recommended update for libzypp, zypper Message-ID: <175026422574.11267.17736470413937536778@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2025:02008-1 Release Date: 2025-06-18T14:04:12Z Rating: moderate References: * bsc#1239012 * bsc#1239543 * bsc#1240132 * bsc#1241463 * bsc#1243887 * bsc#1243901 * bsc#1244105 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has seven fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Fix credential handling in HEAD requests (bsc#1244105) * RepoInfo: use pathNameSetTrailingSlash * Fix wrong userdata parameter type when running zypp with debug verbosity (bsc#1239012) * Do not warn about no mirrors if mirrorlist was switched on automatically. (bsc#1243901) * Relax permission of cached packages to 0644 & ~umask (bsc#1243887) * Add a note to service maintained .repo file entries * Support using %{url} variable in a RIS service's repo section. * Use a cookie file to validate mirrorlist cache. This patch extends the mirrorlist code to use a cookie file to validate the contents of the cache against the source URL, making sure that we do not accidentially use a old cache when the mirrorlist url was changed. For example when migrating a system from one release to the next where the same repo alias might just have a different URL. * Let Service define and update gpgkey, mirrorlist and metalink. * Preserve a mirrorlist file in the raw cache during refresh. * Enable curl2 backend and parallel package download by default. Environment variables ZYPP_CURL2=<0|1> and ZYPP_PCK_PRELOAD=<0|1> can be used to turn the features on or off. * Make gpgKeyUrl the default source for gpg keys. When refreshing zypp now primarily uses gpgKeyUrl information from the repo files and only falls back to a automatically generated key Url if a gpgKeyUrl was not specified. * Introduce mirrors into the Media backends (bsc#1240132) * Drop MediaMultiCurl backend. * Throttle progress updates when preloading packages (bsc#1239543) * Check if request is in valid state in CURL callbacks * spec/CMake: add conditional build '\--with[out] classic_rpmtrans_as_default'. classic_rpmtrans is the current builtin default for SUSE, otherwise it's single_rpmtrans. The `enable_preview_single_rpmtrans_as_default_for_zypper` switch was removed from the spec file. Accordingly the CMake option ENABLE_PREVIEW_SINGLE_RPMTRANS_AS_DEFAULT_FOR_ZYPPER was removed. * BuildRequires: libzypp-devel >= 17.37.0. * Use libzypp improvements for preload and mirror handling. * xmlout.rnc: Update repo-element (bsc#1241463) Add the "metalink" attribute and reflect that the "url" elements list may in fact be empty, if no baseurls are defined in the .repo files. * man: update --allow-unsigned-rpm description. Explain how to achieve the same for packages provided by repositories. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2008=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-2008=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-2008=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-2008=1 SUSE-SLE-Product- SLES_SAP-15-SP5-2025-2008=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2025-2008=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2008=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2008=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2008=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2008=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libzypp-debugsource-17.37.5-150500.6.52.1 * libzypp-17.37.5-150500.6.52.1 * libzypp-debuginfo-17.37.5-150500.6.52.1 * zypper-1.14.90-150500.6.32.3 * libzypp-devel-17.37.5-150500.6.52.1 * zypper-debuginfo-1.14.90-150500.6.32.3 * zypper-debugsource-1.14.90-150500.6.32.3 * libzypp-devel-doc-17.37.5-150500.6.52.1 * openSUSE Leap 15.5 (noarch) * zypper-aptitude-1.14.90-150500.6.32.3 * zypper-log-1.14.90-150500.6.32.3 * zypper-needs-restarting-1.14.90-150500.6.32.3 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libzypp-17.37.5-150500.6.52.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.37.5-150500.6.52.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libzypp-debugsource-17.37.5-150500.6.52.1 * libzypp-17.37.5-150500.6.52.1 * libzypp-debuginfo-17.37.5-150500.6.52.1 * zypper-1.14.90-150500.6.32.3 * libzypp-devel-17.37.5-150500.6.52.1 * zypper-debuginfo-1.14.90-150500.6.32.3 * zypper-debugsource-1.14.90-150500.6.32.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * zypper-log-1.14.90-150500.6.32.3 * zypper-needs-restarting-1.14.90-150500.6.32.3 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libzypp-17.37.5-150500.6.52.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libzypp-debugsource-17.37.5-150500.6.52.1 * libzypp-17.37.5-150500.6.52.1 * libzypp-debuginfo-17.37.5-150500.6.52.1 * zypper-1.14.90-150500.6.32.3 * zypper-debuginfo-1.14.90-150500.6.32.3 * zypper-debugsource-1.14.90-150500.6.32.3 * SUSE Linux Enterprise Micro 5.5 (noarch) * zypper-needs-restarting-1.14.90-150500.6.32.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libzypp-debugsource-17.37.5-150500.6.52.1 * libzypp-17.37.5-150500.6.52.1 * libzypp-debuginfo-17.37.5-150500.6.52.1 * zypper-1.14.90-150500.6.32.3 * libzypp-devel-17.37.5-150500.6.52.1 * zypper-debuginfo-1.14.90-150500.6.32.3 * zypper-debugsource-1.14.90-150500.6.32.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * zypper-log-1.14.90-150500.6.32.3 * zypper-needs-restarting-1.14.90-150500.6.32.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libzypp-debugsource-17.37.5-150500.6.52.1 * libzypp-17.37.5-150500.6.52.1 * libzypp-debuginfo-17.37.5-150500.6.52.1 * zypper-1.14.90-150500.6.32.3 * libzypp-devel-17.37.5-150500.6.52.1 * zypper-debuginfo-1.14.90-150500.6.32.3 * zypper-debugsource-1.14.90-150500.6.32.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * zypper-log-1.14.90-150500.6.32.3 * zypper-needs-restarting-1.14.90-150500.6.32.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libzypp-debugsource-17.37.5-150500.6.52.1 * libzypp-17.37.5-150500.6.52.1 * libzypp-debuginfo-17.37.5-150500.6.52.1 * zypper-1.14.90-150500.6.32.3 * libzypp-devel-17.37.5-150500.6.52.1 * zypper-debuginfo-1.14.90-150500.6.32.3 * zypper-debugsource-1.14.90-150500.6.32.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * zypper-log-1.14.90-150500.6.32.3 * zypper-needs-restarting-1.14.90-150500.6.32.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239012 * https://bugzilla.suse.com/show_bug.cgi?id=1239543 * https://bugzilla.suse.com/show_bug.cgi?id=1240132 * https://bugzilla.suse.com/show_bug.cgi?id=1241463 * https://bugzilla.suse.com/show_bug.cgi?id=1243887 * https://bugzilla.suse.com/show_bug.cgi?id=1243901 * https://bugzilla.suse.com/show_bug.cgi?id=1244105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 16:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 16:30:31 -0000 Subject: SUSE-RU-2025:02007-1: moderate: Recommended update for libzypp, zypper Message-ID: <175026423131.11267.16662155636706995229@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2025:02007-1 Release Date: 2025-06-18T14:03:37Z Rating: moderate References: * bsc#1239012 * bsc#1239543 * bsc#1240132 * bsc#1241463 * bsc#1243887 * bsc#1243901 * bsc#1244105 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has seven fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Fix credential handling in HEAD requests (bsc#1244105) * RepoInfo: use pathNameSetTrailingSlash * Fix wrong userdata parameter type when running zypp with debug verbosity (bsc#1239012) * Do not warn about no mirrors if mirrorlist was switched on automatically. (bsc#1243901) * Relax permission of cached packages to 0644 & ~umask (bsc#1243887) * Add a note to service maintained .repo file entries * Support using %{url} variable in a RIS service's repo section. * Use a cookie file to validate mirrorlist cache. This patch extends the mirrorlist code to use a cookie file to validate the contents of the cache against the source URL, making sure that we do not accidentially use a old cache when the mirrorlist url was changed. For example when migrating a system from one release to the next where the same repo alias might just have a different URL. * Let Service define and update gpgkey, mirrorlist and metalink. * Preserve a mirrorlist file in the raw cache during refresh. * Enable curl2 backend and parallel package download by default. Environment variables ZYPP_CURL2=<0|1> and ZYPP_PCK_PRELOAD=<0|1> can be used to turn the features on or off. * Make gpgKeyUrl the default source for gpg keys. When refreshing zypp now primarily uses gpgKeyUrl information from the repo files and only falls back to a automatically generated key Url if a gpgKeyUrl was not specified. * Introduce mirrors into the Media backends (bsc#1240132) * Drop MediaMultiCurl backend. * Throttle progress updates when preloading packages (bsc#1239543) * Check if request is in valid state in CURL callbacks * spec/CMake: add conditional build '\--with[out] classic_rpmtrans_as_default'. classic_rpmtrans is the current builtin default for SUSE, otherwise it's single_rpmtrans. The `enable_preview_single_rpmtrans_as_default_for_zypper` switch was removed from the spec file. Accordingly the CMake option ENABLE_PREVIEW_SINGLE_RPMTRANS_AS_DEFAULT_FOR_ZYPPER was removed. * BuildRequires: libzypp-devel >= 17.37.0. * Use libzypp improvements for preload and mirror handling. * xmlout.rnc: Update repo-element (bsc#1241463) Add the "metalink" attribute and reflect that the "url" elements list may in fact be empty, if no baseurls are defined in the .repo files. * man: update --allow-unsigned-rpm description. Explain how to achieve the same for packages provided by repositories. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2007=1 openSUSE-SLE-15.6-2025-2007=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-2007=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-2007=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-2007=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2025-2007=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2007=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2007=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * zypper-1.14.90-150600.10.34.3 * libzypp-17.37.5-150600.3.60.1 * zypper-debugsource-1.14.90-150600.10.34.3 * libzypp-devel-17.37.5-150600.3.60.1 * libzypp-debuginfo-17.37.5-150600.3.60.1 * libzypp-debugsource-17.37.5-150600.3.60.1 * libzypp-devel-doc-17.37.5-150600.3.60.1 * zypper-debuginfo-1.14.90-150600.10.34.3 * openSUSE Leap 15.6 (noarch) * zypper-log-1.14.90-150600.10.34.3 * zypper-needs-restarting-1.14.90-150600.10.34.3 * zypper-aptitude-1.14.90-150600.10.34.3 * SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64) * libzypp-17.37.5-150600.3.60.1 * SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64) * libzypp-17.37.5-150600.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libzypp-17.37.5-150600.3.60.1 * SUSE Linux Enterprise Desktop 15 SP6 (x86_64) * libzypp-17.37.5-150600.3.60.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * zypper-1.14.90-150600.10.34.3 * libzypp-17.37.5-150600.3.60.1 * zypper-debugsource-1.14.90-150600.10.34.3 * libzypp-devel-17.37.5-150600.3.60.1 * libzypp-debuginfo-17.37.5-150600.3.60.1 * libzypp-debugsource-17.37.5-150600.3.60.1 * zypper-debuginfo-1.14.90-150600.10.34.3 * Basesystem Module 15-SP6 (noarch) * zypper-log-1.14.90-150600.10.34.3 * zypper-needs-restarting-1.14.90-150600.10.34.3 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * zypper-1.14.90-150600.10.34.3 * libzypp-17.37.5-150600.3.60.1 * zypper-debugsource-1.14.90-150600.10.34.3 * libzypp-devel-17.37.5-150600.3.60.1 * libzypp-debuginfo-17.37.5-150600.3.60.1 * libzypp-debugsource-17.37.5-150600.3.60.1 * zypper-debuginfo-1.14.90-150600.10.34.3 * Basesystem Module 15-SP7 (noarch) * zypper-log-1.14.90-150600.10.34.3 * zypper-needs-restarting-1.14.90-150600.10.34.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239012 * https://bugzilla.suse.com/show_bug.cgi?id=1239543 * https://bugzilla.suse.com/show_bug.cgi?id=1240132 * https://bugzilla.suse.com/show_bug.cgi?id=1241463 * https://bugzilla.suse.com/show_bug.cgi?id=1243887 * https://bugzilla.suse.com/show_bug.cgi?id=1243901 * https://bugzilla.suse.com/show_bug.cgi?id=1244105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jun 18 20:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 18 Jun 2025 20:30:08 -0000 Subject: SUSE-SU-2025:02013-1: important: Security update for pam Message-ID: <175027860858.11267.12350395919169521118@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:02013-1 Release Date: 2025-06-18T18:06:12Z Rating: important References: * bsc#1243226 * bsc#1244509 Cross-References: * CVE-2025-6018 * CVE-2025-6020 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-6020 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2025-6018: pam_env: Change the default to not read the user .pam_environment file (bsc#1243226). * CVE-2025-6020: pam_namespace: convert functions that may operate on a user- controlled path to operate on file descriptors instead of absolute path (bsc#1244509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2013=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2013=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2013=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2013=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2013=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2013=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2013=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2013=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2013=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2013=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2013=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2013=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2013=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2013=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2013=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2013=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2013=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2013=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2013=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2013=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2013=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2013=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2013=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2013=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2013=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2013=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2013=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2013=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * openSUSE Leap 15.6 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * openSUSE Leap 15.6 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * Basesystem Module 15-SP6 (noarch) * pam-doc-1.3.0-150000.6.83.1 * Basesystem Module 15-SP6 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * Basesystem Module 15-SP7 (noarch) * pam-doc-1.3.0-150000.6.83.1 * Basesystem Module 15-SP7 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * Development Tools Module 15-SP6 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * Development Tools Module 15-SP7 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Manager Proxy 4.3 (x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Manager Proxy 4.3 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Manager Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Manager Server 4.3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-extra-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-extra-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * pam-devel-1.3.0-150000.6.83.1 * SUSE Enterprise Storage 7.1 (noarch) * pam-doc-1.3.0-150000.6.83.1 * SUSE Enterprise Storage 7.1 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.83.1 * pam-devel-32bit-1.3.0-150000.6.83.1 * pam-extra-32bit-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam-debuginfo-1.3.0-150000.6.83.1 * pam-1.3.0-150000.6.83.1 * pam-debugsource-1.3.0-150000.6.83.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://www.suse.com/security/cve/CVE-2025-6020.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 * https://bugzilla.suse.com/show_bug.cgi?id=1244509 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 08:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 08:30:13 -0000 Subject: SUSE-SU-2025:02019-1: important: Security update for systemd Message-ID: <175032181397.11267.16851478126422318936@smelt2.prg2.suse.org> # Security update for systemd Announcement ID: SUSE-SU-2025:02019-1 Release Date: 2025-06-19T07:58:06Z Rating: important References: * bsc#1205000 * bsc#1208958 * bsc#1211576 * bsc#1211725 * bsc#1215241 * bsc#1243935 Cross-References: * CVE-2022-4415 * CVE-2023-26604 * CVE-2025-4598 CVSS scores: * CVE-2022-4415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-4415 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-4415 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-26604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-26604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-26604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4598 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4598 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities and has three security fixes can now be installed. ## Description: This update for systemd fixes the following issues: * CVE-2025-4598: Race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935). * CVE-2023-26604: Privilege escalation via the less pager (bsc#1208958). * CVE-2022-4415: systemd-coredump was not respecting fs.suid_dumpable kernel setting (bsc#1205000). Other bugfixes: * clarify passno and noauto combination in /etc/fstab (bsc#1211725) * handle -EINTR return from bus_poll() (bsc#1215241) * /usr/ should never be unmounted regardless of HAVE_SPLIT_USR or not (bsc#1211576) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-2019=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2019=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2019=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2019=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2019=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2019=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2019=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2019=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * systemd-mini-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * systemd-coredump-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * libudev-mini1-debuginfo-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * libsystemd0-mini-debuginfo-246.16-150300.7.60.1 * systemd-mini-container-debuginfo-246.16-150300.7.60.1 * nss-myhostname-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * systemd-network-debuginfo-246.16-150300.7.60.1 * nss-resolve-246.16-150300.7.60.1 * nss-mymachines-246.16-150300.7.60.1 * systemd-doc-246.16-150300.7.60.1 * systemd-portable-246.16-150300.7.60.1 * systemd-mini-container-246.16-150300.7.60.1 * systemd-mini-debugsource-246.16-150300.7.60.1 * udev-mini-debuginfo-246.16-150300.7.60.1 * nss-systemd-debuginfo-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-mini-246.16-150300.7.60.1 * systemd-coredump-debuginfo-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * nss-systemd-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * systemd-mini-sysvinit-246.16-150300.7.60.1 * nss-mymachines-debuginfo-246.16-150300.7.60.1 * systemd-mini-devel-246.16-150300.7.60.1 * nss-resolve-debuginfo-246.16-150300.7.60.1 * udev-mini-246.16-150300.7.60.1 * libudev-mini1-246.16-150300.7.60.1 * libsystemd0-mini-246.16-150300.7.60.1 * systemd-devel-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * systemd-network-246.16-150300.7.60.1 * libudev-devel-246.16-150300.7.60.1 * systemd-portable-debuginfo-246.16-150300.7.60.1 * systemd-logger-246.16-150300.7.60.1 * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * nss-myhostname-debuginfo-246.16-150300.7.60.1 * libudev-mini-devel-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * openSUSE Leap 15.3 (x86_64) * libudev-devel-32bit-246.16-150300.7.60.1 * nss-myhostname-32bit-debuginfo-246.16-150300.7.60.1 * systemd-32bit-debuginfo-246.16-150300.7.60.1 * libsystemd0-32bit-246.16-150300.7.60.1 * nss-mymachines-32bit-246.16-150300.7.60.1 * libsystemd0-32bit-debuginfo-246.16-150300.7.60.1 * libudev1-32bit-246.16-150300.7.60.1 * nss-myhostname-32bit-246.16-150300.7.60.1 * systemd-32bit-246.16-150300.7.60.1 * libudev1-32bit-debuginfo-246.16-150300.7.60.1 * nss-mymachines-32bit-debuginfo-246.16-150300.7.60.1 * openSUSE Leap 15.3 (noarch) * systemd-lang-246.16-150300.7.60.1 * openSUSE Leap 15.3 (aarch64_ilp32) * systemd-64bit-debuginfo-246.16-150300.7.60.1 * libudev-devel-64bit-246.16-150300.7.60.1 * libsystemd0-64bit-246.16-150300.7.60.1 * nss-mymachines-64bit-246.16-150300.7.60.1 * systemd-64bit-246.16-150300.7.60.1 * libudev1-64bit-debuginfo-246.16-150300.7.60.1 * nss-myhostname-64bit-246.16-150300.7.60.1 * libsystemd0-64bit-debuginfo-246.16-150300.7.60.1 * nss-myhostname-64bit-debuginfo-246.16-150300.7.60.1 * libudev1-64bit-246.16-150300.7.60.1 * nss-mymachines-64bit-debuginfo-246.16-150300.7.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * systemd-doc-246.16-150300.7.60.1 * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * systemd-coredump-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-coredump-debuginfo-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * systemd-devel-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * libudev-devel-246.16-150300.7.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * systemd-lang-246.16-150300.7.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * systemd-32bit-debuginfo-246.16-150300.7.60.1 * libsystemd0-32bit-246.16-150300.7.60.1 * systemd-32bit-246.16-150300.7.60.1 * libudev1-32bit-246.16-150300.7.60.1 * libsystemd0-32bit-debuginfo-246.16-150300.7.60.1 * libudev1-32bit-debuginfo-246.16-150300.7.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * systemd-doc-246.16-150300.7.60.1 * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * systemd-coredump-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-coredump-debuginfo-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * systemd-devel-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * libudev-devel-246.16-150300.7.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * systemd-lang-246.16-150300.7.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * systemd-32bit-debuginfo-246.16-150300.7.60.1 * libsystemd0-32bit-246.16-150300.7.60.1 * systemd-32bit-246.16-150300.7.60.1 * libudev1-32bit-246.16-150300.7.60.1 * libsystemd0-32bit-debuginfo-246.16-150300.7.60.1 * libudev1-32bit-debuginfo-246.16-150300.7.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * systemd-doc-246.16-150300.7.60.1 * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * systemd-coredump-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-coredump-debuginfo-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * systemd-devel-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * libudev-devel-246.16-150300.7.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * systemd-lang-246.16-150300.7.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * systemd-32bit-debuginfo-246.16-150300.7.60.1 * libsystemd0-32bit-246.16-150300.7.60.1 * systemd-32bit-246.16-150300.7.60.1 * libudev1-32bit-246.16-150300.7.60.1 * libsystemd0-32bit-debuginfo-246.16-150300.7.60.1 * libudev1-32bit-debuginfo-246.16-150300.7.60.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * systemd-doc-246.16-150300.7.60.1 * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * systemd-coredump-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-coredump-debuginfo-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * systemd-devel-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * libudev-devel-246.16-150300.7.60.1 * SUSE Enterprise Storage 7.1 (noarch) * systemd-lang-246.16-150300.7.60.1 * SUSE Enterprise Storage 7.1 (x86_64) * systemd-32bit-debuginfo-246.16-150300.7.60.1 * libsystemd0-32bit-246.16-150300.7.60.1 * systemd-32bit-246.16-150300.7.60.1 * libudev1-32bit-246.16-150300.7.60.1 * libsystemd0-32bit-debuginfo-246.16-150300.7.60.1 * libudev1-32bit-debuginfo-246.16-150300.7.60.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * systemd-journal-remote-debuginfo-246.16-150300.7.60.1 * systemd-container-debuginfo-246.16-150300.7.60.1 * udev-246.16-150300.7.60.1 * systemd-debuginfo-246.16-150300.7.60.1 * systemd-sysvinit-246.16-150300.7.60.1 * libudev1-246.16-150300.7.60.1 * systemd-container-246.16-150300.7.60.1 * systemd-246.16-150300.7.60.1 * libsystemd0-debuginfo-246.16-150300.7.60.1 * systemd-journal-remote-246.16-150300.7.60.1 * udev-debuginfo-246.16-150300.7.60.1 * libsystemd0-246.16-150300.7.60.1 * systemd-debugsource-246.16-150300.7.60.1 * libudev1-debuginfo-246.16-150300.7.60.1 ## References: * https://www.suse.com/security/cve/CVE-2022-4415.html * https://www.suse.com/security/cve/CVE-2023-26604.html * https://www.suse.com/security/cve/CVE-2025-4598.html * https://bugzilla.suse.com/show_bug.cgi?id=1205000 * https://bugzilla.suse.com/show_bug.cgi?id=1208958 * https://bugzilla.suse.com/show_bug.cgi?id=1211576 * https://bugzilla.suse.com/show_bug.cgi?id=1211725 * https://bugzilla.suse.com/show_bug.cgi?id=1215241 * https://bugzilla.suse.com/show_bug.cgi?id=1243935 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 08:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 08:30:18 -0000 Subject: SUSE-RU-2025:02018-1: moderate: Recommended update for release-notes-ha Message-ID: <175032181884.11267.9863688235498826407@smelt2.prg2.suse.org> # Recommended update for release-notes-ha Announcement ID: SUSE-RU-2025:02018-1 Release Date: 2025-06-19T07:24:39Z Rating: moderate References: * bsc#933411 * jsc#PED-11875 * jsc#PED-12469 Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains two features and has one fix can now be installed. ## Description: This update for release-notes-ha fixes the following issues: * Update to 15.7.20250616 (tracked in bsc#933411) * Added note about cpuid update (jsc#PED-12469) * Added note about hwlock (jsc#PED-11875) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-2018=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP7 (noarch) * release-notes-ha-15.7.20250616-150700.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-11875 * https://jira.suse.com/browse/PED-12469 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 08:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 08:30:20 -0000 Subject: SUSE-SU-2025:02017-1: moderate: Security update for s390-tools Message-ID: <175032182088.11267.12502531799299797567@smelt2.prg2.suse.org> # Security update for s390-tools Announcement ID: SUSE-SU-2025:02017-1 Release Date: 2025-06-19T07:14:57Z Rating: moderate References: * bsc#1242622 * jsc#PED-12028 Cross-References: * CVE-2025-3416 CVSS scores: * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for s390-tools fixes the following issues: Security issues fixed: * CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch in rust- openssl crate. (bsc#1242622) Other issues: * Added the new IBM z17 (9175) processor type. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2017=1 ## Package List: * Basesystem Module 15-SP7 (s390x) * osasnmpd-debuginfo-2.37.0-150700.4.3.1 * osasnmpd-2.37.0-150700.4.3.1 * s390-tools-chreipl-fcp-mpath-2.37.0-150700.4.3.1 * s390-tools-zdsfs-2.37.0-150700.4.3.1 * s390-tools-debugsource-2.37.0-150700.4.3.1 * libekmfweb1-devel-2.37.0-150700.4.3.1 * libekmfweb1-2.37.0-150700.4.3.1 * s390-tools-debuginfo-2.37.0-150700.4.3.1 * libkmipclient1-debuginfo-2.37.0-150700.4.3.1 * libekmfweb1-debuginfo-2.37.0-150700.4.3.1 * libkmipclient1-2.37.0-150700.4.3.1 * s390-tools-hmcdrvfs-2.37.0-150700.4.3.1 * s390-tools-zdsfs-debuginfo-2.37.0-150700.4.3.1 * s390-tools-hmcdrvfs-debuginfo-2.37.0-150700.4.3.1 * Basesystem Module 15-SP7 (s390x x86_64) * s390-tools-2.37.0-150700.4.3.1 * Basesystem Module 15-SP7 (noarch) * s390-tools-genprotimg-data-2.37.0-150700.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242622 * https://jira.suse.com/browse/PED-12028 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 08:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 08:30:23 -0000 Subject: SUSE-SU-2025:02016-1: moderate: Security update for screen Message-ID: <175032182334.11267.3043639064719585198@smelt2.prg2.suse.org> # Security update for screen Announcement ID: SUSE-SU-2025:02016-1 Release Date: 2025-06-19T07:14:49Z Rating: moderate References: * bsc#1242269 Cross-References: * CVE-2025-46802 CVSS scores: * CVE-2025-46802 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-46802 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46802 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-46802 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for screen fixes the following issues: Security issues fixed: * CVE-2025-46802: temporary `chmod` of a user's TTY to mode 0666 when attempting to attach to a multi-user session allows for TTY hijacking (bsc#1242269). Other issues fixed: * Use TTY file descriptor passing after a suspend (`MSG_CONT`). * Fix resume after suspend in multi-user mode. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2016=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2016=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2016=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2016=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2016=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2016=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2016=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2016=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * screen-4.6.2-150000.5.8.1 * screen-debuginfo-4.6.2-150000.5.8.1 * screen-debugsource-4.6.2-150000.5.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46802.html * https://bugzilla.suse.com/show_bug.cgi?id=1242269 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 08:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 08:30:26 -0000 Subject: SUSE-SU-2025:02015-1: important: Security update for gdm Message-ID: <175032182663.11267.10527151616549147064@smelt2.prg2.suse.org> # Security update for gdm Announcement ID: SUSE-SU-2025:02015-1 Release Date: 2025-06-19T07:14:13Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for gdm fixes the following issues: * CVE-2025-6018: pam.d: removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2015=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2015=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2015=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2015=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * gdm-3.34.1-150200.8.26.1 * typelib-1_0-Gdm-1_0-3.34.1-150200.8.26.1 * libgdm1-debuginfo-3.34.1-150200.8.26.1 * gdm-debugsource-3.34.1-150200.8.26.1 * libgdm1-3.34.1-150200.8.26.1 * gdm-debuginfo-3.34.1-150200.8.26.1 * gdm-devel-3.34.1-150200.8.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gdmflexiserver-3.34.1-150200.8.26.1 * gdm-systemd-3.34.1-150200.8.26.1 * gdm-lang-3.34.1-150200.8.26.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * gdm-3.34.1-150200.8.26.1 * typelib-1_0-Gdm-1_0-3.34.1-150200.8.26.1 * libgdm1-debuginfo-3.34.1-150200.8.26.1 * gdm-debugsource-3.34.1-150200.8.26.1 * libgdm1-3.34.1-150200.8.26.1 * gdm-debuginfo-3.34.1-150200.8.26.1 * gdm-devel-3.34.1-150200.8.26.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * gdmflexiserver-3.34.1-150200.8.26.1 * gdm-systemd-3.34.1-150200.8.26.1 * gdm-lang-3.34.1-150200.8.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * gdm-3.34.1-150200.8.26.1 * typelib-1_0-Gdm-1_0-3.34.1-150200.8.26.1 * libgdm1-debuginfo-3.34.1-150200.8.26.1 * gdm-debugsource-3.34.1-150200.8.26.1 * libgdm1-3.34.1-150200.8.26.1 * gdm-debuginfo-3.34.1-150200.8.26.1 * gdm-devel-3.34.1-150200.8.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gdmflexiserver-3.34.1-150200.8.26.1 * gdm-systemd-3.34.1-150200.8.26.1 * gdm-lang-3.34.1-150200.8.26.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * gdm-3.34.1-150200.8.26.1 * typelib-1_0-Gdm-1_0-3.34.1-150200.8.26.1 * libgdm1-debuginfo-3.34.1-150200.8.26.1 * gdm-debugsource-3.34.1-150200.8.26.1 * libgdm1-3.34.1-150200.8.26.1 * gdm-debuginfo-3.34.1-150200.8.26.1 * gdm-devel-3.34.1-150200.8.26.1 * SUSE Enterprise Storage 7.1 (noarch) * gdmflexiserver-3.34.1-150200.8.26.1 * gdm-systemd-3.34.1-150200.8.26.1 * gdm-lang-3.34.1-150200.8.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 08:30:30 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 08:30:30 -0000 Subject: SUSE-SU-2025:02014-1: important: Security update for ignition Message-ID: <175032183021.11267.12775893107493395536@smelt2.prg2.suse.org> # Security update for ignition Announcement ID: SUSE-SU-2025:02014-1 Release Date: 2025-06-19T07:13:52Z Rating: important References: * bsc#1238681 * bsc#1239192 Cross-References: * CVE-2025-22868 * CVE-2025-22870 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * HPC Module 15-SP6 * HPC Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for ignition fixes the following issues: * CVE-2025-22870: golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs (bsc#1238681). * CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239192). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2014=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2014=1 * HPC Module 15-SP6 zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2025-2014=1 * HPC Module 15-SP7 zypper in -t patch SUSE-SLE-Module-HPC-15-SP7-2025-2014=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * ignition-dracut-grub2-2.14.0-150400.9.9.1 * ignition-debuginfo-2.14.0-150400.9.9.1 * ignition-2.14.0-150400.9.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ignition-dracut-grub2-2.14.0-150400.9.9.1 * ignition-debuginfo-2.14.0-150400.9.9.1 * ignition-2.14.0-150400.9.9.1 * HPC Module 15-SP6 (aarch64 x86_64) * ignition-dracut-grub2-2.14.0-150400.9.9.1 * ignition-debuginfo-2.14.0-150400.9.9.1 * ignition-2.14.0-150400.9.9.1 * HPC Module 15-SP7 (aarch64 x86_64) * ignition-dracut-grub2-2.14.0-150400.9.9.1 * ignition-debuginfo-2.14.0-150400.9.9.1 * ignition-2.14.0-150400.9.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1238681 * https://bugzilla.suse.com/show_bug.cgi?id=1239192 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 12:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 12:30:12 -0000 Subject: SUSE-SU-2025:02020-1: important: Security update for gstreamer-plugins-base Message-ID: <175033621257.11267.3097688114524030025@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-base Announcement ID: SUSE-SU-2025:02020-1 Release Date: 2025-06-19T08:35:06Z Rating: important References: * bsc#1234415 * bsc#1234450 * bsc#1234453 * bsc#1234455 * bsc#1234456 * bsc#1234459 * bsc#1234460 * bsc#1244403 * bsc#1244404 * bsc#1244407 Cross-References: * CVE-2024-47538 * CVE-2024-47541 * CVE-2024-47542 * CVE-2024-47600 * CVE-2024-47607 * CVE-2024-47615 * CVE-2024-47835 * CVE-2025-47806 * CVE-2025-47807 * CVE-2025-47808 CVSS scores: * CVE-2024-47538 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47538 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47538 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-47541 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47541 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47542 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47542 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47600 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47600 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47600 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47607 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47607 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47607 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47615 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47835 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47835 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47806 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-47807 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-47808 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-base fixes the following issues: * CVE-2024-47538: Fixed stack-buffer overflow in vorbis_handle_identification_packet (bnc#1234415) * CVE-2024-47600: Fixed out-of-bounds read in gst-discoverer-1.0 commandline tool (bnc#1234453) * CVE-2024-47615: Fixed out-of-bounds write in Ogg demuxer (bnc#1234456) * CVE-2024-47542: Fixed ID3v2 parser out-of-bounds read and NULL-pointer dereference (bnc#1234460) * CVE-2024-47607: Fixed stack buffer-overflow in Opus decoder (bnc#1234455) * CVE-2024-47835: Fixed NULL-pointer dereference in LRC subtitle parser (bnc#1234450) * CVE-2024-47541: Fixed out-of-bounds write in SSA subtitle parser (bnc#1234459) * CVE-2025-47808: Fixed NULL-pointer dereference in TMPlayer subtitle parser (boo#1244404) * CVE-2025-47807: Fixed NULL-pointer dereference in SubRip subtitle parser (boo#1244403) * CVE-2025-47806: Fixed Stack buffer overflow in SubRip subtitle parser (boo#1244407) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2020=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2020=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2020=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2020=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2020=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2020=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libgstsdp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstapp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstgl-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-1.16.3-150200.4.19.1 * gstreamer-plugins-base-devel-1.16.3-150200.4.19.1 * typelib-1_0-GstAudio-1_0-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-1.16.3-150200.4.19.1 * libgstapp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgsttag-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstVideo-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstGL-1_0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debuginfo-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstfft-1_0-0-1.16.3-150200.4.19.1 * libgsttag-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstApp-1_0-1.16.3-150200.4.19.1 * libgstfft-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstsdp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstTag-1_0-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debugsource-1.16.3-150200.4.19.1 * libgstgl-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtp-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstSdp-1_0-1.16.3-150200.4.19.1 * typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-1.16.3-150200.4.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gstreamer-plugins-base-lang-1.16.3-150200.4.19.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libgstsdp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstapp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstgl-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-1.16.3-150200.4.19.1 * gstreamer-plugins-base-devel-1.16.3-150200.4.19.1 * typelib-1_0-GstAudio-1_0-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-1.16.3-150200.4.19.1 * libgstapp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgsttag-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstVideo-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstGL-1_0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debuginfo-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstfft-1_0-0-1.16.3-150200.4.19.1 * libgsttag-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstApp-1_0-1.16.3-150200.4.19.1 * libgstfft-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstsdp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstTag-1_0-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debugsource-1.16.3-150200.4.19.1 * libgstgl-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtp-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstSdp-1_0-1.16.3-150200.4.19.1 * typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-1.16.3-150200.4.19.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * gstreamer-plugins-base-lang-1.16.3-150200.4.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libgstsdp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstapp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstgl-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-1.16.3-150200.4.19.1 * gstreamer-plugins-base-devel-1.16.3-150200.4.19.1 * typelib-1_0-GstAudio-1_0-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-1.16.3-150200.4.19.1 * libgstapp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgsttag-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstVideo-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstGL-1_0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debuginfo-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstfft-1_0-0-1.16.3-150200.4.19.1 * libgsttag-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstApp-1_0-1.16.3-150200.4.19.1 * libgstfft-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstsdp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstTag-1_0-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debugsource-1.16.3-150200.4.19.1 * libgstgl-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtp-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstSdp-1_0-1.16.3-150200.4.19.1 * typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-1.16.3-150200.4.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gstreamer-plugins-base-lang-1.16.3-150200.4.19.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libgstsdp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstapp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstgl-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-1.16.3-150200.4.19.1 * gstreamer-plugins-base-devel-1.16.3-150200.4.19.1 * typelib-1_0-GstAudio-1_0-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-1.16.3-150200.4.19.1 * libgstapp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgsttag-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstVideo-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstGL-1_0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debuginfo-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstfft-1_0-0-1.16.3-150200.4.19.1 * libgsttag-1_0-0-1.16.3-150200.4.19.1 * libgstrtsp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstApp-1_0-1.16.3-150200.4.19.1 * libgstfft-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstsdp-1_0-0-1.16.3-150200.4.19.1 * typelib-1_0-GstTag-1_0-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debugsource-1.16.3-150200.4.19.1 * libgstgl-1_0-0-1.16.3-150200.4.19.1 * libgstrtp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstRtp-1_0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.19.1 * typelib-1_0-GstSdp-1_0-1.16.3-150200.4.19.1 * typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-1.16.3-150200.4.19.1 * libgstriff-1_0-0-1.16.3-150200.4.19.1 * SUSE Enterprise Storage 7.1 (noarch) * gstreamer-plugins-base-lang-1.16.3-150200.4.19.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libgsttag-1_0-0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstapp-1_0-0-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstgl-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debugsource-1.16.3-150200.4.19.1 * libgstgl-1_0-0-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstriff-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-1.16.3-150200.4.19.1 * libgsttag-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-1.16.3-150200.4.19.1 * libgstapp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstriff-1_0-0-1.16.3-150200.4.19.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libgsttag-1_0-0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-1.16.3-150200.4.19.1 * libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstapp-1_0-0-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstgl-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-1.16.3-150200.4.19.1 * libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-debugsource-1.16.3-150200.4.19.1 * libgstgl-1_0-0-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstriff-1_0-0-debuginfo-1.16.3-150200.4.19.1 * gstreamer-plugins-base-1.16.3-150200.4.19.1 * libgstallocators-1_0-0-1.16.3-150200.4.19.1 * libgsttag-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstaudio-1_0-0-1.16.3-150200.4.19.1 * libgstapp-1_0-0-debuginfo-1.16.3-150200.4.19.1 * libgstriff-1_0-0-1.16.3-150200.4.19.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47538.html * https://www.suse.com/security/cve/CVE-2024-47541.html * https://www.suse.com/security/cve/CVE-2024-47542.html * https://www.suse.com/security/cve/CVE-2024-47600.html * https://www.suse.com/security/cve/CVE-2024-47607.html * https://www.suse.com/security/cve/CVE-2024-47615.html * https://www.suse.com/security/cve/CVE-2024-47835.html * https://www.suse.com/security/cve/CVE-2025-47806.html * https://www.suse.com/security/cve/CVE-2025-47807.html * https://www.suse.com/security/cve/CVE-2025-47808.html * https://bugzilla.suse.com/show_bug.cgi?id=1234415 * https://bugzilla.suse.com/show_bug.cgi?id=1234450 * https://bugzilla.suse.com/show_bug.cgi?id=1234453 * https://bugzilla.suse.com/show_bug.cgi?id=1234455 * https://bugzilla.suse.com/show_bug.cgi?id=1234456 * https://bugzilla.suse.com/show_bug.cgi?id=1234459 * https://bugzilla.suse.com/show_bug.cgi?id=1234460 * https://bugzilla.suse.com/show_bug.cgi?id=1244403 * https://bugzilla.suse.com/show_bug.cgi?id=1244404 * https://bugzilla.suse.com/show_bug.cgi?id=1244407 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:07 -0000 Subject: SUSE-SU-2025:02029-1: important: Security update for apache2-mod_security2 Message-ID: <175035060700.10997.5063849620306983732@smelt2.prg2.suse.org> # Security update for apache2-mod_security2 Announcement ID: SUSE-SU-2025:02029-1 Release Date: 2025-06-19T15:17:29Z Rating: important References: * bsc#1243976 * bsc#1243978 Cross-References: * CVE-2025-47947 * CVE-2025-48866 CVSS scores: * CVE-2025-47947 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47947 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47947 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48866 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-48866 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48866 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for apache2-mod_security2 fixes the following issues: * CVE-2025-47947: Fixed denial of service through sanitiseMatchedBytes (bsc#1243978). * CVE-2025-48866: Fixed denial of service via excessive number of arguments in sanitiseArg (bsc#1243976). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2029=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2029=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2029=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2029=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-debuginfo-2.9.2-150000.3.12.1 * apache2-mod_security2-debugsource-2.9.2-150000.3.12.1 * apache2-mod_security2-2.9.2-150000.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache2-mod_security2-debuginfo-2.9.2-150000.3.12.1 * apache2-mod_security2-debugsource-2.9.2-150000.3.12.1 * apache2-mod_security2-2.9.2-150000.3.12.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache2-mod_security2-debuginfo-2.9.2-150000.3.12.1 * apache2-mod_security2-debugsource-2.9.2-150000.3.12.1 * apache2-mod_security2-2.9.2-150000.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache2-mod_security2-debuginfo-2.9.2-150000.3.12.1 * apache2-mod_security2-debugsource-2.9.2-150000.3.12.1 * apache2-mod_security2-2.9.2-150000.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47947.html * https://www.suse.com/security/cve/CVE-2025-48866.html * https://bugzilla.suse.com/show_bug.cgi?id=1243976 * https://bugzilla.suse.com/show_bug.cgi?id=1243978 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:10 -0000 Subject: SUSE-SU-2025:02028-1: important: Security update for apache2-mod_security2 Message-ID: <175035061020.10997.2138042801926177408@smelt2.prg2.suse.org> # Security update for apache2-mod_security2 Announcement ID: SUSE-SU-2025:02028-1 Release Date: 2025-06-19T15:17:14Z Rating: important References: * bsc#1243976 * bsc#1243978 Cross-References: * CVE-2025-47947 * CVE-2025-48866 CVSS scores: * CVE-2025-47947 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47947 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47947 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48866 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-48866 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48866 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for apache2-mod_security2 fixes the following issues: * CVE-2025-47947: Fixed denial of service through sanitiseMatchedBytes (bsc#1243978). * CVE-2025-48866: Fixed denial of service via excessive number of arguments in sanitiseArg (bsc#1243976). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2028=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2028=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-2028=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-2028=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2028=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2028=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2028=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2028=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2028=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2028=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2028=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2028=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2028=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2028=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2028=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_security2-2.9.4-150400.3.9.1 * apache2-mod_security2-debugsource-2.9.4-150400.3.9.1 * apache2-mod_security2-debuginfo-2.9.4-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47947.html * https://www.suse.com/security/cve/CVE-2025-48866.html * https://bugzilla.suse.com/show_bug.cgi?id=1243976 * https://bugzilla.suse.com/show_bug.cgi?id=1243978 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:14 -0000 Subject: SUSE-SU-2025:02027-1: moderate: Security update for perl Message-ID: <175035061428.10997.7875738907315500656@smelt2.prg2.suse.org> # Security update for perl Announcement ID: SUSE-SU-2025:02027-1 Release Date: 2025-06-19T15:16:16Z Rating: moderate References: * bsc#1244079 Cross-References: * CVE-2025-40909 CVSS scores: * CVE-2025-40909 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2025-40909 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for perl fixes the following issues: * CVE-2025-40909: Do not change the current directory when cloning an open directory handle (bsc#1244079). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2027=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2027=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2027=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2027=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2027=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2027=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2027=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2027=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2027=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-2027=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2027=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2027=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2027=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2027=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2027=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2027=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.20.1 * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-core-DB_File-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.20.1 * Basesystem Module 15-SP6 (x86_64) * perl-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-base-32bit-5.26.1-150300.17.20.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.20.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.20.1 * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-core-DB_File-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.20.1 * Basesystem Module 15-SP7 (x86_64) * perl-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-base-32bit-5.26.1-150300.17.20.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.20.1 * Development Tools Module 15-SP6 (noarch) * perl-doc-5.26.1-150300.17.20.1 * Development Tools Module 15-SP7 (noarch) * perl-doc-5.26.1-150300.17.20.1 * SUSE Package Hub 15 15-SP6 (x86_64) * perl-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-32bit-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * SUSE Package Hub 15 15-SP7 (x86_64) * perl-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-32bit-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * openSUSE Leap 15.3 (x86_64) * perl-core-DB_File-32bit-5.26.1-150300.17.20.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-base-32bit-5.26.1-150300.17.20.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-32bit-5.26.1-150300.17.20.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perl-5.26.1-150300.17.20.1 * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-core-DB_File-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.20.1 * openSUSE Leap 15.3 (noarch) * perl-doc-5.26.1-150300.17.20.1 * openSUSE Leap 15.3 (aarch64_ilp32) * perl-core-DB_File-64bit-5.26.1-150300.17.20.1 * perl-base-64bit-5.26.1-150300.17.20.1 * perl-64bit-5.26.1-150300.17.20.1 * perl-base-64bit-debuginfo-5.26.1-150300.17.20.1 * perl-64bit-debuginfo-5.26.1-150300.17.20.1 * perl-core-DB_File-64bit-debuginfo-5.26.1-150300.17.20.1 * openSUSE Leap 15.6 (x86_64) * perl-core-DB_File-32bit-5.26.1-150300.17.20.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-base-32bit-5.26.1-150300.17.20.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-32bit-debuginfo-5.26.1-150300.17.20.1 * perl-32bit-5.26.1-150300.17.20.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.20.1 * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-core-DB_File-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.20.1 * openSUSE Leap 15.6 (noarch) * perl-doc-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * perl-base-5.26.1-150300.17.20.1 * perl-base-debuginfo-5.26.1-150300.17.20.1 * perl-debugsource-5.26.1-150300.17.20.1 * perl-debuginfo-5.26.1-150300.17.20.1 * perl-5.26.1-150300.17.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40909.html * https://bugzilla.suse.com/show_bug.cgi?id=1244079 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:17 -0000 Subject: SUSE-SU-2025:02026-1: important: Security update for pam_pkcs11 Message-ID: <175035061715.10997.9904642756489322547@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:02026-1 Release Date: 2025-06-19T13:31:08Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2026=1 SUSE-2025-2026=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2026=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2026=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * pam_pkcs11-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-debugsource-0.6.10-150600.16.8.1 * pam_pkcs11-0.6.10-150600.16.8.1 * openSUSE Leap 15.6 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-32bit-0.6.10-150600.16.8.1 * openSUSE Leap 15.6 (noarch) * pam_pkcs11-devel-doc-0.6.10-150600.16.8.1 * openSUSE Leap 15.6 (aarch64_ilp32) * pam_pkcs11-64bit-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-64bit-0.6.10-150600.16.8.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-debugsource-0.6.10-150600.16.8.1 * pam_pkcs11-0.6.10-150600.16.8.1 * Basesystem Module 15-SP6 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-32bit-0.6.10-150600.16.8.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-debugsource-0.6.10-150600.16.8.1 * pam_pkcs11-0.6.10-150600.16.8.1 * Basesystem Module 15-SP7 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150600.16.8.1 * pam_pkcs11-32bit-0.6.10-150600.16.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:19 -0000 Subject: SUSE-RU-2025:02025-1: important: Recommended update for google-guest-configs Message-ID: <175035061943.10997.18231935235511213920@smelt2.prg2.suse.org> # Recommended update for google-guest-configs Announcement ID: SUSE-RU-2025:02025-1 Release Date: 2025-06-19T13:18:06Z Rating: important References: * bsc#1241112 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for google-guest-configs fixes the following issues: * Check that %{_sysconfdir}/sysconfig/network/ifcfg-eth0 actually exists before making any modifications to it (bsc#1241112) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2025=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2025=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2025=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2025=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-2025=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-2025=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-2025=1 ## Package List: * openSUSE Leap 15.4 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 * openSUSE Leap 15.6 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 * Public Cloud Module 15-SP4 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 * Public Cloud Module 15-SP5 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 * Public Cloud Module 15-SP6 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 * Public Cloud Module 15-SP7 (noarch) * google-guest-configs-20241205.00-150400.13.22.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241112 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:23 -0000 Subject: SUSE-RU-2025:02024-1: moderate: Recommended update for release-notes-sles-for-sap Message-ID: <175035062396.10997.4415717525523668191@smelt2.prg2.suse.org> # Recommended update for release-notes-sles-for-sap Announcement ID: SUSE-RU-2025:02024-1 Release Date: 2025-06-19T13:16:33Z Rating: moderate References: * bsc#933411 * jsc#PED-11048 * jsc#PED-11566 Affected Products: * SAP Applications Module 15-SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains two features and has one fix can now be installed. ## Description: This update for release-notes-sles-for-sap fixes the following issues: * Update to 15.7.20250616 (tracked in bsc#933411) * Added ocfs2 deprecation note (jsc#PED-11048) * Added note about SAPHanaSR deprecations (jsc#PED-11566) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP7-2025-2024=1 ## Package List: * SAP Applications Module 15-SP7 (noarch) * release-notes-sles-for-sap-15.7.20250616-150700.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-11048 * https://jira.suse.com/browse/PED-11566 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:31 -0000 Subject: SUSE-RU-2025:02023-1: moderate: Recommended update for libzypp, zypper Message-ID: <175035063111.10997.14147159629266419377@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2025:02023-1 Release Date: 2025-06-19T13:15:42Z Rating: moderate References: * bsc#1239012 * bsc#1239543 * bsc#1240132 * bsc#1241463 * bsc#1243887 * bsc#1243901 * bsc#1244105 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has seven fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Fix credential handling in HEAD requests (bsc#1244105) * RepoInfo: use pathNameSetTrailingSlash * Fix wrong userdata parameter type when running zypp with debug verbosity (bsc#1239012) * Do not warn about no mirrors if mirrorlist was switched on automatically. (bsc#1243901) * Relax permission of cached packages to 0644 & ~umask (bsc#1243887) * Add a note to service maintained .repo file entries * Support using %{url} variable in a RIS service's repo section. * Use a cookie file to validate mirrorlist cache. This patch extends the mirrorlist code to use a cookie file to validate the contents of the cache against the source URL, making sure that we do not accidentially use a old cache when the mirrorlist url was changed. For example when migrating a system from one release to the next where the same repo alias might just have a different URL. * Let Service define and update gpgkey, mirrorlist and metalink. * Preserve a mirrorlist file in the raw cache during refresh. * Enable curl2 backend and parallel package download by default. Environment variables ZYPP_CURL2=<0|1> and ZYPP_PCK_PRELOAD=<0|1> can be used to turn the features on or off. * Make gpgKeyUrl the default source for gpg keys. When refreshing zypp now primarily uses gpgKeyUrl information from the repo files and only falls back to a automatically generated key Url if a gpgKeyUrl was not specified. * Introduce mirrors into the Media backends (bsc#1240132) * Drop MediaMultiCurl backend. * Throttle progress updates when preloading packages (bsc#1239543) * Check if request is in valid state in CURL callbacks * spec/CMake: add conditional build '\--with[out] classic_rpmtrans_as_default'. classic_rpmtrans is the current builtin default for SUSE, otherwise it's single_rpmtrans. The `enable_preview_single_rpmtrans_as_default_for_zypper` switch was removed from the spec file. Accordingly the CMake option ENABLE_PREVIEW_SINGLE_RPMTRANS_AS_DEFAULT_FOR_ZYPPER was removed. * BuildRequires: libzypp-devel >= 17.37.0. * Use libzypp improvements for preload and mirror handling. * xmlout.rnc: Update repo-element (bsc#1241463) Add the "metalink" attribute and reflect that the "url" elements list may in fact be empty, if no baseurls are defined in the .repo files. * man: update --allow-unsigned-rpm description. Explain how to achieve the same for packages provided by repositories. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2025-2023=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2023=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2023=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2023=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2023=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2023=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2023=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2023=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libzypp-17.37.5-150200.160.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * libzypp-devel-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 * zypper-log-1.14.90-150200.114.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * libzypp-devel-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 * zypper-log-1.14.90-150200.114.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * libzypp-devel-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 * zypper-log-1.14.90-150200.114.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * libzypp-devel-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Enterprise Storage 7.1 (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 * zypper-log-1.14.90-150200.114.3 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Linux Enterprise Micro 5.1 (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Linux Enterprise Micro 5.2 (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * zypper-1.14.90-150200.114.3 * libzypp-17.37.5-150200.160.1 * zypper-debugsource-1.14.90-150200.114.3 * libzypp-debugsource-17.37.5-150200.160.1 * libzypp-debuginfo-17.37.5-150200.160.1 * zypper-debuginfo-1.14.90-150200.114.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * zypper-needs-restarting-1.14.90-150200.114.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239012 * https://bugzilla.suse.com/show_bug.cgi?id=1239543 * https://bugzilla.suse.com/show_bug.cgi?id=1240132 * https://bugzilla.suse.com/show_bug.cgi?id=1241463 * https://bugzilla.suse.com/show_bug.cgi?id=1243887 * https://bugzilla.suse.com/show_bug.cgi?id=1243901 * https://bugzilla.suse.com/show_bug.cgi?id=1244105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:37 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:37 -0000 Subject: SUSE-RU-2025:02022-1: moderate: Recommended update for libzypp, zypper Message-ID: <175035063716.10997.18018876499993058228@smelt2.prg2.suse.org> # Recommended update for libzypp, zypper Announcement ID: SUSE-RU-2025:02022-1 Release Date: 2025-06-19T13:15:03Z Rating: moderate References: * bsc#1239012 * bsc#1239543 * bsc#1240132 * bsc#1241463 * bsc#1243887 * bsc#1243901 * bsc#1244105 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has seven fixes can now be installed. ## Description: This update for libzypp, zypper fixes the following issues: * Fix credential handling in HEAD requests (bsc#1244105) * RepoInfo: use pathNameSetTrailingSlash * Fix wrong userdata parameter type when running zypp with debug verbosity (bsc#1239012) * Do not warn about no mirrors if mirrorlist was switched on automatically. (bsc#1243901) * Relax permission of cached packages to 0644 & ~umask (bsc#1243887) * Add a note to service maintained .repo file entries * Support using %{url} variable in a RIS service's repo section. * Use a cookie file to validate mirrorlist cache. This patch extends the mirrorlist code to use a cookie file to validate the contents of the cache against the source URL, making sure that we do not accidentially use a old cache when the mirrorlist url was changed. For example when migrating a system from one release to the next where the same repo alias might just have a different URL. * Let Service define and update gpgkey, mirrorlist and metalink. * Preserve a mirrorlist file in the raw cache during refresh. * Enable curl2 backend and parallel package download by default. Environment variables ZYPP_CURL2=<0|1> and ZYPP_PCK_PRELOAD=<0|1> can be used to turn the features on or off. * Make gpgKeyUrl the default source for gpg keys. When refreshing zypp now primarily uses gpgKeyUrl information from the repo files and only falls back to a automatically generated key Url if a gpgKeyUrl was not specified. * Introduce mirrors into the Media backends (bsc#1240132) * Drop MediaMultiCurl backend. * Throttle progress updates when preloading packages (bsc#1239543) * Check if request is in valid state in CURL callbacks * spec/CMake: add conditional build '\--with[out] classic_rpmtrans_as_default'. classic_rpmtrans is the current builtin default for SUSE, otherwise it's single_rpmtrans. The `enable_preview_single_rpmtrans_as_default_for_zypper` switch was removed from the spec file. Accordingly the CMake option ENABLE_PREVIEW_SINGLE_RPMTRANS_AS_DEFAULT_FOR_ZYPPER was removed. * BuildRequires: libzypp-devel >= 17.37.0. * Use libzypp improvements for preload and mirror handling. * xmlout.rnc: Update repo-element (bsc#1241463) Add the "metalink" attribute and reflect that the "url" elements list may in fact be empty, if no baseurls are defined in the .repo files. * man: update --allow-unsigned-rpm description. Explain how to achieve the same for packages provided by repositories. ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2022=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2022=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2022=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2022=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2022=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2022=1 SUSE-SLE- INSTALLER-15-SP4-2025-2022=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2022=1 SUSE- SLE-INSTALLER-15-SP4-2025-2022=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-2022=1 SUSE-SLE-Product-SUSE- Manager-Retail-Branch-Server-4.3-2025-2022=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-2022=1 SUSE-SLE-Product-SUSE- Manager-Server-4.3-2025-2022=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2022=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-2022=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-2022=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2025-2022=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2022=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2022=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libzypp-debuginfo-17.37.5-150400.3.126.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * zypper-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libzypp-debuginfo-17.37.5-150400.3.126.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * zypper-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * PackageKit-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * libzypp-devel-17.37.5-150400.3.126.1 * PackageKit-devel-debuginfo-1.2.4-150400.3.24.1 * PackageKit-1.2.4-150400.3.24.1 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.24.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * PackageKit-devel-1.2.4-150400.3.24.1 * libpackagekit-glib2-devel-1.2.4-150400.3.24.1 * libzypp-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * PackageKit-debugsource-1.2.4-150400.3.24.1 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * PackageKit-lang-1.2.4-150400.3.24.1 * zypper-log-1.14.90-150400.3.85.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * PackageKit-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * libzypp-devel-17.37.5-150400.3.126.1 * PackageKit-devel-debuginfo-1.2.4-150400.3.24.1 * PackageKit-1.2.4-150400.3.24.1 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.24.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * PackageKit-devel-1.2.4-150400.3.24.1 * libpackagekit-glib2-devel-1.2.4-150400.3.24.1 * libzypp-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * PackageKit-debugsource-1.2.4-150400.3.24.1 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * PackageKit-lang-1.2.4-150400.3.24.1 * zypper-log-1.14.90-150400.3.85.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * PackageKit-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * libzypp-devel-17.37.5-150400.3.126.1 * PackageKit-devel-debuginfo-1.2.4-150400.3.24.1 * PackageKit-1.2.4-150400.3.24.1 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.24.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * PackageKit-devel-1.2.4-150400.3.24.1 * libpackagekit-glib2-devel-1.2.4-150400.3.24.1 * libzypp-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * PackageKit-debugsource-1.2.4-150400.3.24.1 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * PackageKit-lang-1.2.4-150400.3.24.1 * zypper-log-1.14.90-150400.3.85.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * PackageKit-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * libzypp-devel-17.37.5-150400.3.126.1 * PackageKit-devel-debuginfo-1.2.4-150400.3.24.1 * PackageKit-1.2.4-150400.3.24.1 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.24.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * PackageKit-devel-1.2.4-150400.3.24.1 * libpackagekit-glib2-devel-1.2.4-150400.3.24.1 * libzypp-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * PackageKit-debugsource-1.2.4-150400.3.24.1 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * PackageKit-lang-1.2.4-150400.3.24.1 * zypper-log-1.14.90-150400.3.85.3 * SUSE Manager Proxy 4.3 (x86_64) * libzypp-devel-17.37.5-150400.3.126.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * PackageKit-1.2.4-150400.3.24.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * zypper-debuginfo-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * SUSE Manager Proxy 4.3 (noarch) * zypper-log-1.14.90-150400.3.85.3 * zypper-needs-restarting-1.14.90-150400.3.85.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libzypp-devel-17.37.5-150400.3.126.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * zypper-debuginfo-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * zypper-log-1.14.90-150400.3.85.3 * zypper-needs-restarting-1.14.90-150400.3.85.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libzypp-devel-17.37.5-150400.3.126.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * PackageKit-1.2.4-150400.3.24.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-1.14.90-150400.3.85.3 * zypper-debuginfo-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * SUSE Manager Server 4.3 (noarch) * zypper-log-1.14.90-150400.3.85.3 * zypper-needs-restarting-1.14.90-150400.3.85.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.24.1 * PackageKit-devel-debuginfo-1.2.4-150400.3.24.1 * libzypp-debugsource-17.37.5-150400.3.126.1 * PackageKit-backend-dnf-1.2.4-150400.3.24.1 * PackageKit-devel-1.2.4-150400.3.24.1 * libzypp-17.37.5-150400.3.126.1 * PackageKit-backend-zypp-1.2.4-150400.3.24.1 * PackageKit-debugsource-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.24.1 * libzypp-debuginfo-17.37.5-150400.3.126.1 * PackageKit-1.2.4-150400.3.24.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * libzypp-devel-17.37.5-150400.3.126.1 * PackageKit-gstreamer-plugin-1.2.4-150400.3.24.1 * PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.24.1 * zypper-1.14.90-150400.3.85.3 * PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.24.1 * PackageKit-debuginfo-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-1.2.4-150400.3.24.1 * libzypp-devel-doc-17.37.5-150400.3.126.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libpackagekit-glib2-devel-1.2.4-150400.3.24.1 * PackageKit-gtk3-module-1.2.4-150400.3.24.1 * PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.24.1 * typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.24.1 * openSUSE Leap 15.4 (noarch) * zypper-aptitude-1.14.90-150400.3.85.3 * zypper-needs-restarting-1.14.90-150400.3.85.3 * PackageKit-branding-upstream-1.2.4-150400.3.24.1 * PackageKit-lang-1.2.4-150400.3.24.1 * zypper-log-1.14.90-150400.3.85.3 * openSUSE Leap 15.4 (x86_64) * libpackagekit-glib2-18-32bit-1.2.4-150400.3.24.1 * libpackagekit-glib2-devel-32bit-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.24.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libpackagekit-glib2-18-64bit-1.2.4-150400.3.24.1 * libpackagekit-glib2-devel-64bit-1.2.4-150400.3.24.1 * libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150400.3.24.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libzypp-debuginfo-17.37.5-150400.3.126.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * zypper-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libzypp-debuginfo-17.37.5-150400.3.126.1 * zypper-debugsource-1.14.90-150400.3.85.3 * libzypp-debugsource-17.37.5-150400.3.126.1 * zypper-debuginfo-1.14.90-150400.3.85.3 * zypper-1.14.90-150400.3.85.3 * libzypp-17.37.5-150400.3.126.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * zypper-needs-restarting-1.14.90-150400.3.85.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239012 * https://bugzilla.suse.com/show_bug.cgi?id=1239543 * https://bugzilla.suse.com/show_bug.cgi?id=1240132 * https://bugzilla.suse.com/show_bug.cgi?id=1241463 * https://bugzilla.suse.com/show_bug.cgi?id=1243887 * https://bugzilla.suse.com/show_bug.cgi?id=1243901 * https://bugzilla.suse.com/show_bug.cgi?id=1244105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jun 19 16:30:39 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 19 Jun 2025 16:30:39 -0000 Subject: SUSE-RU-2025:02021-1: important: Recommended update for google-guest-configs Message-ID: <175035063973.10997.1589441637104050005@smelt2.prg2.suse.org> # Recommended update for google-guest-configs Announcement ID: SUSE-RU-2025:02021-1 Release Date: 2025-06-19T13:13:39Z Rating: important References: * bsc#1241112 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for google-guest-configs fixes the following issues: * Check that %{_sysconfdir}/sysconfig/network/ifcfg-eth0 actually exists before making any modifications to it (bsc#1241112) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-2021=1 ## Package List: * Public Cloud Module 12 (noarch) * google-guest-configs-20241205.00-1.43.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241112 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:13 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:13 -0000 Subject: SUSE-SU-2025:02032-1: important: Security update for pam_pkcs11 Message-ID: <175040821364.11022.17968452021449570380@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:02032-1 Release Date: 2025-06-20T07:56:56Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2032=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2032=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debuginfo-0.6.8-7.13.1 * pam_pkcs11-debugsource-0.6.8-7.13.1 * pam_pkcs11-0.6.8-7.13.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * pam_pkcs11-debuginfo-32bit-0.6.8-7.13.1 * pam_pkcs11-32bit-0.6.8-7.13.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * pam_pkcs11-debuginfo-0.6.8-7.13.1 * pam_pkcs11-debuginfo-32bit-0.6.8-7.13.1 * pam_pkcs11-0.6.8-7.13.1 * pam_pkcs11-32bit-0.6.8-7.13.1 * pam_pkcs11-debugsource-0.6.8-7.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:19 -0000 Subject: SUSE-SU-2025:02031-1: important: Security update for pam_pkcs11 Message-ID: <175040821944.11022.14530684287230891698@smelt2.prg2.suse.org> # Security update for pam_pkcs11 Announcement ID: SUSE-SU-2025:02031-1 Release Date: 2025-06-20T07:56:44Z Rating: important References: * bsc#1243226 Cross-References: * CVE-2025-6018 CVSS scores: * CVE-2025-6018 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6018 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for pam_pkcs11 fixes the following issues: * CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2031=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2031=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2031=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2031=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2031=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2031=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2031=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2031=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2031=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2031=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2031=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2031=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2031=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2031=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2031=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2031=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2031=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2031=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2031=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2031=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2031=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2031=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2031=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Manager Proxy 4.3 (x86_64) * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Manager Server 4.3 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Enterprise Storage 7.1 (x86_64) * pam_pkcs11-32bit-0.6.10-150100.3.11.1 * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam_pkcs11-debugsource-0.6.10-150100.3.11.1 * pam_pkcs11-0.6.10-150100.3.11.1 * pam_pkcs11-debuginfo-0.6.10-150100.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6018.html * https://bugzilla.suse.com/show_bug.cgi?id=1243226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:23 -0000 Subject: SUSE-SU-2025:02030-1: moderate: Security update for xen Message-ID: <175040822368.11022.712720876567255292@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2025:02030-1 Release Date: 2025-06-20T07:04:04Z Rating: moderate References: * bsc#1027519 * bsc#1243117 Cross-References: * CVE-2024-28956 CVSS scores: * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for xen fixes the following issues: Security fixes: * CVE-2024-28956: Fixed Intel CPU: Indirect Target Selection (ITS) (XSA-469) (bsc#1243117) Other fixes: * Upstream bug fixes (bsc#1027519) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2030=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-2030=1 ## Package List: * Basesystem Module 15-SP7 (x86_64) * xen-libs-4.20.0_12-150700.3.3.1 * xen-tools-domU-4.20.0_12-150700.3.3.1 * xen-libs-debuginfo-4.20.0_12-150700.3.3.1 * xen-debugsource-4.20.0_12-150700.3.3.1 * xen-tools-domU-debuginfo-4.20.0_12-150700.3.3.1 * Server Applications Module 15-SP7 (x86_64) * xen-devel-4.20.0_12-150700.3.3.1 * xen-tools-debuginfo-4.20.0_12-150700.3.3.1 * xen-4.20.0_12-150700.3.3.1 * xen-tools-4.20.0_12-150700.3.3.1 * xen-debugsource-4.20.0_12-150700.3.3.1 * Server Applications Module 15-SP7 (noarch) * xen-tools-xendomains-wait-disk-4.20.0_12-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28956.html * https://bugzilla.suse.com/show_bug.cgi?id=1027519 * https://bugzilla.suse.com/show_bug.cgi?id=1243117 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:24 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:24 -0000 Subject: SUSE-RU-2025:20425-1: moderate: Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <175040822488.11022.1597926524184115574@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-RU-2025:20425-1 Release Date: 2025-06-16T14:29:52Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: This is the initial livepatch for MICRO-6-0-RT_Update_9. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-43=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-1-1.2 * kernel-livepatch-6_4_0-33-rt-1-1.2 * kernel-livepatch-6_4_0-33-rt-debuginfo-1-1.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:28 -0000 Subject: SUSE-SU-2025:20424-1: moderate: Security update for ucode-intel Message-ID: <175040822852.11022.125090731394175161@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2025:20424-1 Release Date: 2025-06-16T09:28:11Z Rating: moderate References: * bsc#1243123 Cross-References: * CVE-2024-28956 * CVE-2024-43420 * CVE-2024-45332 * CVE-2025-20012 * CVE-2025-20054 * CVE-2025-20103 * CVE-2025-20623 * CVE-2025-24495 CVSS scores: * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43420 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43420 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-43420 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-43420 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45332 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-45332 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-45332 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-45332 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20012 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-20012 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20012 ( NVD ): 4.1 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20012 ( NVD ): 4.9 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20054 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20054 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-20103 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20103 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-20623 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20623 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-20623 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-20623 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-24495 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-24495 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-24495 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-24495 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves eight vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: Intel CPU Microcode was updated to the 20250512 release (bsc#1243123): * Security updates for INTEL-SA-01153 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01153.html * CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-01244 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01244.html * CVE-2025-20103: Insufficient resource pool in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access. * CVE-2025-20054: Uncaught exception in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access. * Security updates for INTEL-SA-01247 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01247.html * CVE-2024-43420: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20623: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2024-45332: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access. * Security updates for INTEL-SA-01322 https://www.intel.com/content/www/us/en/security-center/advisory/intel- sa-01322.html * CVE-2025-24495: Incorrect initialization of resource in the branch prediction unit for some Intel Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access. * CVE-2025-20012: Incorrect behavior order for some Intel Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access. * Update for functional issues. Refer to Intel Core Ultra 200 V Series Processor (Series2) https://cdrdv2.intel.com/v1/dl/getContent/834774 for details. * Update for functional issues. Refer to Intel Core Ultra 200 V Series Processor https://cdrdv2.intel.com/v1/dl/getContent/827538 for details. * Update for functional issues. Refer to Intel Core Ultra Processor https://cdrdv2.intel.com/v1/dl/getContent/792254 for details. * Update for functional issues. Refer to 14th/13th Generation Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/740518 for details. * Update for functional issues. Refer to 12th Generation Intel Core Processor Family https://cdrdv2.intel.com/v1/dl/getContent/682436 for details. * Update for functional issues. Refer to 11th Gen Intel Core Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/631123 for details. * Update for functional issues. Refer to 10th Gen Intel Core Processor Families Specification Update https://cdrdv2.intel.com/v1/dl/getContent/341079 for details. * Update for functional issues. Refer to 10th Gen Intel Core Processor Families Specification Update https://cdrdv2.intel.com/v1/dl/getContent/615213 for details. * Update for functional issues. Refer to 8th and 9th Generation Intel Core Processor Family Spec Update https://cdrdv2.intel.com/v1/dl/getContent/337346 for details. * Update for functional issues. Refer to 6th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/835486 for details. * Update for functional issues. Refer to 5th Gen Intel Xeon Processor Scalable Family https://cdrdv2.intel.com/v1/dl/getContent/793902 for details. * Update for functional issues. Refer to 4th Gen Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/772415 for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/634897 for details. * Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable Processors Specification Update https://cdrdv2.intel.com/v1/dl/getContent/637780 for details. * Update for functional issues. Refer to 2nd Generation Intel Xeon Processor Scalable Family Specification Update https://cdrdv2.intel.com/v1/dl/getContent/338848 for details. * Update for functional issues. Refer to Intel Xeon 6700-Series Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/820922 for details. * Update for functional issues. Refer to Intel Xeon E-2300 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/709192 for details. * Update for functional issues. Refer to Intel Xeon D-2700 Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/714071 for details. * Update for functional issues. Refer to Intel Processors and Intel Core i3 N-Series https://cdrdv2.intel.com/v1/dl/getContent/764616 for details. * Update for functional issues. Refer to Intel Pentium Silver and Intel Celeron Processor Specification Update https://cdrdv2.intel.com/v1/dl/getContent/336562 for details. ### New Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ARL-U A1 06-b5-00/80 0000000a Core Ultra Processor (Series2) ARL-S/HX (8P) B0 06-c6-02/82 00000118 Core Ultra Processor (Series2) ARL-H A1 06-c5-02/82 00000118 Core Ultra Processor (Series2) GNR-AP/SP B0 06-ad-01/95 010003a2 Xeon Scalable Gen6 GNR-AP/SP H0 06-ad-01/20 0a0000d1 Xeon Scalable Gen6 LNL B0 06-bd-01/80 0000011f Core Ultra 200 V Series Processor ### Updated Platforms Processor Stepping F-M-S/PI Old Ver New Ver Products ADL C0 06-97-02/07 00000038 0000003a Core Gen12 ADL H0 06-97-05/07 00000038 0000003a Core Gen12 ADL L0 06-9a-03/80 00000436 00000437 Core Gen12 ADL R0 06-9a-04/80 00000436 00000437 Core Gen12 ADL-N N0 06-be-00/19 0000001c 0000001d Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E AML-Y42 V0 06-8e-0c/94 000000fc 00000100 Core Gen10 Mobile AZB A0/R0 06-9a-04/40 00000009 0000000a Intel(R) Atom(R) C1100 CFL-H R0 06-9e-0d/22 00000102 00000104 Core Gen9 Mobile CLX-SP B1 06-55-07/bf 05003707 05003901 Xeon Scalable Gen2 CML-H R1 06-a5-02/20 000000fc 00000100 Core Gen10 Mobile CML-S102 Q0 06-a5-05/22 000000fc 00000100 Core Gen10 CML-S62 G1 06-a5-03/22 000000fc 00000100 Core Gen10 CML-U42 V0 06-8e-0c/94 000000fc 00000100 Core Gen10 Mobile CML-U62 V1 A0 06-a6-00/80 000000fe 00000102 Core Gen10 Mobile CML-U62 V2 K1 06-a6-01/80 000000fc 00000100 Core Gen10 Mobile CML-Y42 V0 06-8e-0c/94 000000fc 00000100 Core Gen10 Mobile CPX-SP A1 06-55-0b/bf 07002904 07002b01 Xeon Scalable Gen3 EMR-SP A1 06-cf-02/87 21000291 210002a9 Xeon Scalable Gen5 GLK-R R0 06-7a-08/01 00000024 00000026 Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120 ICL-D B0 06-6c-01/10 010002c0 010002d0 Xeon D-17xx, D-27xx ICL-U/Y D1 06-7e-05/80 000000c6 000000ca Core Gen10 Mobile ICX-SP Dx/M1 06-6a-06/87 0d0003f5 0d000404 Xeon Scalable Gen3 MTL C0 06-aa-04/e6 00000020 00000024 Core Ultra Processor RKL-S B0 06-a7-01/02 00000063 00000064 Core Gen11 RPL-E/HX/S B0 06-b7-01/32 0000012c 0000012f Core Gen13/Gen14 RPL-H/P/PX 6+8 J0 06-ba-02/e0 00004124 00004128 Core Gen13 RPL-HX/S C0 06-bf-02/07 00000038 0000003a Core Gen13/Gen14 RPL-S H0 06-bf-05/07 00000038 0000003a Core Gen13/Gen14 RPL-U 2+8 Q0 06-ba-03/e0 00004124 00004128 Core Gen13 SPR-HBM Bx 06-8f-08/10 2c0003e0 2c0003f7 Xeon Max SPR-SP E4/S2 06-8f-07/87 2b000620 2b000639 Xeon Scalable Gen4 SPR-SP E5/S3 06-8f-08/87 2b000620 2b000639 Xeon Scalable Gen4 SRF-SP C0 06-af-03/01 03000330 03000341 Xeon 6700-Series Processors with E-Cores TGL B0/B1 06-8c-01/80 000000b8 000000bc Core Gen11 Mobile TGL-H R0 06-8d-01/c2 00000052 00000056 Core Gen11 Mobile TGL-R C0 06-8c-02/c2 00000038 0000003c Core Gen11 Mobile TWL N0 06-be-00/19 0000001c 0000001d Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E WHL-U V0 06-8e-0c/94 000000fc 00000100 Core Gen8 Mobile ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-148=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * ucode-intel-20250512-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-43420.html * https://www.suse.com/security/cve/CVE-2024-45332.html * https://www.suse.com/security/cve/CVE-2025-20012.html * https://www.suse.com/security/cve/CVE-2025-20054.html * https://www.suse.com/security/cve/CVE-2025-20103.html * https://www.suse.com/security/cve/CVE-2025-20623.html * https://www.suse.com/security/cve/CVE-2025-24495.html * https://bugzilla.suse.com/show_bug.cgi?id=1243123 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:30 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:30 -0000 Subject: SUSE-RU-2025:20422-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <175040823089.11022.2931862191136753273@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2025:20422-1 Release Date: 2025-06-11T07:23:46Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Add initial lifecycle files for the kernel livepatches. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-39=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * lifecycle-data-sle-module-live-patching-6-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:30:29 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:30:29 -0000 Subject: SUSE-RU-2025:20423-1: moderate: Recommended update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <175040822985.11022.17663744001426748089@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-RU-2025:20423-1 Release Date: 2025-06-15T18:14:06Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: This is the initial livepatch for the 8th update of SLE Micro 6.0/6.1. It fixes no issues yet. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-41=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_8-debugsource-1-1.2 * kernel-livepatch-6_4_0-30-default-debuginfo-1-1.2 * kernel-livepatch-6_4_0-30-default-1-1.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:33:13 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:33:13 -0000 Subject: SUSE-SU-2025:20421-1: important: Security update for the Linux Kernel Message-ID: <175040839356.11022.5699029444223941827@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20421-1 Release Date: 2025-06-16T15:33:59Z Rating: important References: * bsc#1215199 * bsc#1220112 * bsc#1223096 * bsc#1226498 * bsc#1228557 * bsc#1228854 * bsc#1229491 * bsc#1230581 * bsc#1231016 * bsc#1232504 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1234154 * bsc#1235149 * bsc#1235728 * bsc#1235968 * bsc#1236142 * bsc#1236208 * bsc#1237312 * bsc#1238212 * bsc#1238473 * bsc#1238774 * bsc#1238992 * bsc#1239691 * bsc#1239925 * bsc#1240180 * bsc#1240593 * bsc#1240723 * bsc#1240823 * bsc#1240866 * bsc#1240966 * bsc#1241148 * bsc#1241282 * bsc#1241305 * bsc#1241340 * bsc#1241351 * bsc#1241376 * bsc#1241448 * bsc#1241457 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241533 * bsc#1241538 * bsc#1241576 * bsc#1241590 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241617 * bsc#1241625 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241644 * bsc#1241654 * bsc#1241657 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242086 * bsc#1242163 * bsc#1242203 * bsc#1242343 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242504 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242573 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242709 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242846 * bsc#1242849 * bsc#1242850 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242940 * bsc#1242944 * bsc#1242945 * bsc#1242946 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242954 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242982 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243475 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243537 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243542 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243571 * bsc#1243572 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243628 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243782 * bsc#1243805 * bsc#1243836 * bsc#1243963 * bsc#1244145 * bsc#1244261 * jsc#PED-10253 Cross-References: * CVE-2023-52888 * CVE-2023-53146 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-49568 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-53135 * CVE-2024-54458 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21868 * CVE-2025-21919 * CVE-2025-21938 * CVE-2025-21997 * CVE-2025-22005 * CVE-2025-22021 * CVE-2025-22030 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22063 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22089 * CVE-2025-22095 * CVE-2025-22103 * CVE-2025-22113 * CVE-2025-22119 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23155 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37738 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37743 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37752 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37800 * CVE-2025-37801 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37844 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37862 * CVE-2025-37865 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37874 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37917 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37933 * CVE-2025-37936 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37967 * CVE-2025-37968 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37987 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-37998 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-52888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49568 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49568 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21997 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22113 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22113 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37738 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37743 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37801 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37862 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37917 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37917 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37933 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37933 ( SUSE ): 3.9 CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37998 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37998 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 193 vulnerabilities, contains one feature and has 35 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not NULL (bsc#1228557). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-49568: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg (bsc#1235728). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21868: kABI workaround for adding an header (bsc#1240180). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-21938: mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr (bsc#1240723). * CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem() (bsc#1240823). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-22113: ext4: define ext4_journal_destroy wrapper (bsc#1241617). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint (bsc#1242573). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846). * CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics (bsc#1242163). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849). * CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer() (bsc#1242850). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call (bsc#1242946). * CVE-2025-37862: HID: pidff: Fix null pointer dereference in pidff_find_fields (bsc#1242982). * CVE-2025-37865: net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported (bsc#1242954). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37874: net: ngbe: fix memory leak in ngbe_probe() error path (bsc#1242940). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37917: net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll (bsc#1243475). * CVE-2025-37933: octeon_ep: Fix host hang issue during device reboot (bsc#1243628). * CVE-2025-37936: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value (bsc#1243537). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks (bsc#1243664). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock (bsc#1243572). * CVE-2025-37968: iio: light: opt3001: fix deadlock due to concurrent flag access (bsc#1243571). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-37987: pds_core: Prevent possible adminq overflow/stuck condition (bsc#1243542). * CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in output_userspace() (bsc#1243836). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). The following non-security bugs were fixed: * ACPI: HED: Always initialize before evged (stable-fixes). * ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes). * ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git- fixes). * ACPICA: exserial: do not forget to handle FFixedHW opregions for reading (git-fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes). * ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7 (stable-fixes). * ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: seq: Improve data consistency at polling (stable-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes). * ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable- fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git- fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes). * ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes). * ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes). * ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of() (stable-fixes). * ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect (stable-fixes). * ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes). * ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes). * ASoC: meson: meson-card-utils: use of_property_present() for DT parsing (git-fixes). * ASoC: ops: Enforce platform maximum on initial value (stable-fixes). * ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git- fixes). * ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup() (stable-fixes). * ASoC: rt722-sdca: Add some missing readable registers (stable-fixes). * ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable- fixes). * ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes). * ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes). * ASoC: tas2764: Enable main IRQs (git-fixes). * ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes). * ASoC: tas2764: Power up/down amp on mute ops (stable-fixes). * ASoC: tas2764: Reinit cache on part reset (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git- fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git- fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes). * Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes). * Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes). * Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes). * Documentation: fix typo in root= kernel parameter description (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * Drop AMDGPU patch that may cause regressions (bsc#1243782) * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer() (git-fixes). * Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add more controllers (stable-fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: powerpc: Enable commented out BUILD_BUG_ON() assertion (bsc#1215199). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * Move upstreamed patches into sorted section * Move upstreamed tpm patch into sorted section * NFS: Do not allow waiting for exiting tasks (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode buffer (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * NFSv4: Check for delegation validity in nfs_start_delegation_return_locked() (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * NFSv4: Treat ENETUNREACH errors as fatal for state recovery (git-fixes). * PCI/DPC: Initialize aer_err_info before using it (git-fixes). * PCI: Explicitly put devices into D0 when initializing (git-fixes). * PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes). * PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes). * PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes). * PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes). * PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes). * PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes). * PCI: cadence: Fix runtime atomic count underflow (git-fixes). * PCI: dw-rockchip: Fix PHY function call sequence in rockchip_pcie_phy_deinit() (git-fixes). * PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable- fixes). * PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes). * PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git- fixes). * PM: sleep: Print PM debug messages during hibernation (git-fixes). * PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks() (git-fixes). * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * Refresh fixes for cBPF issue (bsc#1242778) * Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices first" (stable-fixes). * Revert "drm/amd: Keep display off while going into S4" (git-fixes). * Revert "drm/amd: Stop evicting resources on APUs in suspend" (stable-fixes). * Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable- fixes). * Revert "rndis_host: Flag RNDIS modems as WWAN devices" (git-fixes). * Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes). * SUNRPC: Do not allow waiting for exiting tasks (git-fixes). * SUNRPC: Prevent hang on NFS mount with xprtsec=[m]tls (git-fixes). * SUNRPC: rpc_clnt_set_transport() must not change the autobind setting (git- fixes). * SUNRPC: rpcbind should never reset the port to the value '0' (git-fixes). * Squashfs: check return result of sb_min_blocksize (git-fixes). * VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify (git-fixes). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * accel/qaic: Mask out SR-IOV PCI resources (stable-fixes). * acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git- fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * backlight: pm8941: Add NULL check in wled_configure() (git-fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git- fixes). * bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes). * bus: fsl-mc: fix double-free on mc_dev (git-fixes). * bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: c_can: Use of_property_present() to test existence of DT property (stable-fixes). * can: slcan: allow reception of short error messages (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: change tcon status when need_reconnect is set on it (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: lrw - Only add ecb if it is not already there (git-fixes). * crypto: lzo - Fix compression buffer overrun (stable-fixes). * crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes). * crypto: marvell/cesa - Do not chain submitted requests (git-fixes). * crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes). * crypto: octeontx2 - suppress auth failure screaming due to negative tests (stable-fixes). * crypto: qat - add shutdown handler to qat_420xx (git-fixes). * crypto: qat - add shutdown handler to qat_4xxx (git-fixes). * crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes). * crypto: sun8i-ce - move fallback ahash_request to the end of the struct (git-fixes). * crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() (git-fixes). * crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git- fixes). * crypto: xts - Only add ecb if it is not already there (git-fixes). * devlink: fix port new reply cmd type (git-fixes). * dlm: mask sk_shutdown value (bsc#1228854). * dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854). * dm-integrity: fix a warning on invalid table line (git-fixes). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open (stable-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: ti: Add NULL check in udma_probe() (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable- fixes). * drm/amd/display: Add null pointer check for get_first_active_display() (git- fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display: Do not try AUX transactions on disconnected link (stable- fixes). * drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable- fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Guard against setting dispclk low for dcn31x (stable- fixes). * drm/amd/display: Increase block_sequence array size (stable-fixes). * drm/amd/display: Initial psr_version with correct setting (stable-fixes). * drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination (stable-fixes). * drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes). * drm/amd/display: fix link_set_dpms_off multi-display MST corner case (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable- fixes). * drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (git-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c (stable-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes). * drm/amdgpu: Update SRIOV video codec caps (stable-fixes). * drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable- fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdkfd: KFD release_work possible circular locking (stable-fixes). * drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes). * drm/ast: Find VBIOS mode from regular display size (stable-fixes). * drm/ast: Fix comment on modeset lock (git-fixes). * drm/atomic: clarify the rules around drm_atomic_state->allow_modeset (stable-fixes). * drm/bridge: cdns-dsi: Check return value when getting default PHY config (git-fixes). * drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes). * drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes). * drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes). * drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes). * drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes). * drm/mediatek: Fix kobject put for component sub-drivers (git-fixes). * drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable- fixes). * drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git- fixes). * drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git- fixes). * drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git- fixes). * drm/panel-edp: Add Starry 116KHD024006 (stable-fixes). * drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes). * drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes). * drm/tegra: Assign plane type before registration (git-fixes). * drm/tegra: Fix a possible null pointer dereference (git-fixes). * drm/tegra: rgb: Fix the unbound reference count (git-fixes). * drm/udl: Unregister device before cleaning up on disconnect (git-fixes). * drm/v3d: Add clock handling (stable-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/vc4: tests: Use return instead of assert (git-fixes). * drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes). * drm/vmwgfx: Add seqno waiter for sync_files (git-fixes). * drm: Add valid clones check (stable-fixes). * drm: bridge: adv7511: fill stream capabilities (stable-fixes). * drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes). * exfat: fix potential wrong error return from get_block (git-fixes). * fbcon: Use correct erase colour for clearing in fbcon (stable-fixes). * fbdev/efifb: Remove PM for parent device (bsc#1244261). * fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var (git-fixes). * fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git- fixes). * fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes). * fbdev: core: tileblit: Implement missing margin clearing for tileblit (stable-fixes). * fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes). * firmware: arm_ffa: Reject higher major version as incompatible (stable- fixes). * firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes). * firmware: arm_scmi: Relax duplicate name constraint across protocol ids (stable-fixes). * firmware: psci: Fix refcount leak in psci_dt_init (git-fixes). * fpga: altera-cvp: Increase credit timeout (stable-fixes). * fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio() (git-fixes). * gpio: pca953x: Simplify code with cleanup helpers (stable-fixes). * gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context() (stable-fixes). * gpio: pca953x: fix IRQ storm on system wake up (git-fixes). * gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable- fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes). * hwmon: (dell-smm) Increment the number of fans (stable-fixes). * hwmon: (gpio-fan) Add missing mutex locks (stable-fixes). * hwmon: (xgene-hwmon) use appropriate type for the latency value (stable- fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes). * i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes). * i2c: tegra: check msg length in SMBUS block read (bsc#1242086) * i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work() (git-fixes). * i3c: master: svc: Fix missing STOP for master request (stable-fixes). * i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA) (stable-fixes). * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * ieee802154: ca8210: Use proper setters and getters for bitwise types (stable-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes). * iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes). * iio: adc: ad7606_spi: fix reg write value mask (git-fixes). * iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes). * iio: filter: admv8818: fix band 4, state 15 (git-fixes). * iio: filter: admv8818: fix integer overflow (git-fixes). * iio: filter: admv8818: fix range calculation (git-fixes). * iio: imu: inv_icm42600: Fix temperature calculation (git-fixes). * ima: process_measurement() needlessly takes inode_lock() on MAY_READ (stable-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * intel_th: avoid using deprecated page->mapping, index fields (stable-fixes). * iommu: Protect against overflow in iommu_pgsize() (git-fixes). * ip6mr: fix tables suspicious RCU usage (git-fixes). * ip_tunnel: annotate data-races around t->parms.link (git-fixes). * ipmr: fix incorrect parameter validation in the ip_mroute_getsockopt() function (git-fixes). * ipmr: fix tables suspicious RCU usage (git-fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Convert ip_route_input() to dscp_t (git-fixes). * ipv4: Correct/silence an endian warning in __ip_do_redirect (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). Both spellings are actually used * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * ipv6: save dontfrag in cork (git-fixes). * ipvs: Always clear ipvs_property flag in skb_scrub_packet() (git-fixes). * jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git- fixes). * jffs2: check that raw node were preallocated before writing summary (git- fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI workaround for hda_codec.beep_just_power_on flag (git-fixes). * kABI: ipv6: save dontfrag in cork (git-fixes). * leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes). * loop: Add sanity check for read/write_iter (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * media: adv7180: Disable test-pattern control on adv7180 (stable-fixes). * media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe() (stable-fixes). * media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git- fixes). * media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git- fixes). * media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git- fixes). * media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git- fixes). * media: cx231xx: set device_caps for 417 (stable-fixes). * media: cxusb: no longer judge rbuf when the write fails (git-fixes). * media: davinci: vpif: Fix memory leak in probe error path (git-fixes). * media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes). * media: i2c: imx219: Correct the minimum vblanking value (stable-fixes). * media: imx-jpeg: Cleanup after an allocation error (git-fixes). * media: imx-jpeg: Drop the first error frames (git-fixes). * media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes). * media: imx-jpeg: Reset slot data pointers when freed (git-fixes). * media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes). * media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes). * media: ov5675: suppress probe deferral errors (git-fixes). * media: ov8856: suppress probe deferral errors (git-fixes). * media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is available (stable-fixes). * media: rkvdec: Fix frame size enumeration (git-fixes). * media: tc358746: improve calculation of the D-PHY timing registers (stable- fixes). * media: test-drivers: vivid: do not call schedule in loop (stable-fixes). * media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes). * media: uvcvideo: Fix deferred probing error (git-fixes). * media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value (stable-fixes). * media: uvcvideo: Return the number of processed controls (git-fixes). * media: v4l2-dev: fix error handling in __video_register_device() (git- fixes). * media: v4l: Memset argument to 0 before calling get_mbus_config pad op (stable-fixes). * media: venus: Fix probe error handling (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes). * media: vidtv: Terminating the subsequent process of initialization failure (git-fixes). * media: vivid: Change the siize of the composing (git-fixes). * mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in exynos_lpass_remove() (git-fixes). * mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes). * mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes). * mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes). * mmc: host: Wait for Vdd to settle on card power off (stable-fixes). * mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes). * mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes). * mtd: nand: sunxi: Add randomizer configuration before randomizer enable (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: sunxi: Add randomizer configuration in sunxi_nfc_hw_ecc_write_chunk (git-fixes). * neighbour: Do not let neigh_forced_gc() disable preemption for long (git- fixes). * neighbour: delete redundant judgment statements (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/neighbor: clear error in case strict check is not set (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net: Implement missing getsockopt(SO_TIMESTAMPING_NEW) (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: add rcu safety to rtnl_prop_list_size() (git-fixes). * net: do not dump stack on queue timeout (git-fixes). * net: fix udp gso skb_segment after pull from frag_list (git-fixes). * net: give more chances to rcu in netdev_wait_allrefs_any() (git-fixes). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: ipv4: fix a memleak in ip_setup_cork (git-fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * net: linkwatch: use system_unbound_wq (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net: page_pool: fix warning code (git-fixes). * net: phy: clear phydev->devlink when the link is deleted (git-fixes). * net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git- fixes). * net: phy: mscc: Fix memory leak when using one step timestamping (git- fixes). * net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git- fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: sched: cls_u32: Fix allocation size in u32_init() (git-fixes). * net: sched: consistently use rcu_replace_pointer() in taprio_change() (git- fixes). * net: sched: em_text: fix possible memory leak in em_text_destroy() (git- fixes). * net: sched: fix erspan_opt settings in cls_flower (git-fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: usb: aqc111: debug info before sanitation (git-fixes). * net: usb: aqc111: fix error handling of usbnet read calls (git-fixes). * net: wwan: t7xx: Fix napi rx poll issue (git-fixes). * net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504) * netdev-genl: Hold rcu_read_lock in napi_get (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * netpoll: Use rcu_access_pointer() in __netpoll_setup (git-fixes). * netpoll: hold rcu read lock in __netpoll_send_skb() (git-fixes). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * nfsd: Initialize ssc before laundromat_work to prevent NULL dereference (git-fixes). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * orangefs: Do not truncate file size (git-fixes). * pNFS/flexfiles: Report ENETDOWN as a connection error (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * page_pool: Fix use-after-free in page_pool_recycle_in_ring (git-fixes). * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: core: do not require set_mode() callback for phy_get_mode() to work (stable-fixes). * phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes). * phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable- fixes). * phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data (git-fixes). * phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes). * pinctrl: armada-37xx: set GPIO output value before setting direction (git- fixes). * pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git- fixes). * pinctrl: at91: Fix possible out-of-boundary access (git-fixes). * pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable- fixes). * pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map (stable-fixes). * pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable- fixes). * pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (git-fixes). * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes). * platform/x86: thinkpad_acpi: Ignore battery threshold change event notification (stable-fixes). * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (git-fixes). * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes). * power: reset: at91-reset: Optimize at91_reset() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * powerpc/pseries/msi: Avoid reading PCI device registers in reduced power states (bsc#1215199). * pstore: Change kmsg_bytes storage size to u32 (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * regulator: ad5398: Add device tree support (stable-fixes). * regulator: max14577: Add error check for max14577_read_reg() (git-fixes). * regulator: max20086: Change enable gpio to optional (git-fixes). * regulator: max20086: Fix MAX200086 chip id (git-fixes). * regulator: max20086: fix invalid memory access (git-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rtc: Fix offset calculation for .start_secs < 0 (git-fixes). * rtc: at91rm9200: drop unused module alias (git-fixes). * rtc: cpcap: drop unused module alias (git-fixes). * rtc: da9063: drop unused module alias (git-fixes). * rtc: ds1307: stop disabling alarms on probe (stable-fixes). * rtc: jz4740: drop unused module alias (git-fixes). * rtc: pm8xxx: drop unused module alias (git-fixes). * rtc: rv3032: fix EERD location (stable-fixes). * rtc: s3c: drop unused module alias (git-fixes). * rtc: sh: assign correct interrupts with DT (git-fixes). * rtc: stm32: drop unused module alias (git-fixes). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/pci: Allow re-add of a reserved but not yet removed device (bsc#1244145). * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes bsc#1244145). * s390/pci: Fix potential double remove of hotplug slot (bsc#1244145). * s390/pci: Prevent self deletion in disable_slot() (bsc#1244145). * s390/pci: Remove redundant bus removal and disable from zpci_release_device() (bsc#1244145). * s390/pci: Serialize device addition and removal (bsc#1244145). * s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253 bsc#1244145). * s390/pci: remove hotplug slot when releasing the device (bsc#1244145). * s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145). * scsi: Improve CDL control (git-fixes). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * selftests/bpf: Fix bpf_nf selftest failure (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: restore default nr_hugepages value during cleanup in hugetlb_reparenting_test.sh (git-fixes). * selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes). * selftests/seccomp: fix syscall_restart test for arm compat (git-fixes). * serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes). * serial: sh-sci: Save and restore more registers (git-fixes). * serial: sh-sci: Update the suspend/resume support (stable-fixes). * smb3: fix Open files on server counter going negative (git-fixes). * smb: client: Use str_yes_no() helper function (git-fixes). * smb: client: allow more DFS referrals to be cached (git-fixes). * smb: client: avoid unnecessary reconnects when refreshing referrals (git- fixes). * smb: client: change return value in open_cached_dir_by_dentry() if !cfids (git-fixes). * smb: client: do not retry DFS targets on server shutdown (git-fixes). * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes). * smb: client: do not try following DFS links in cifs_tree_connect() (git- fixes). * smb: client: fix DFS interlink failover (git-fixes). * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes). * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709). * smb: client: fix potential race in cifs_put_tcon() (git-fixes). * smb: client: fix return value of parse_dfs_referrals() (git-fixes). * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes). * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes). * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes). * smb: client: improve purging of cached referrals (git-fixes). * smb: client: introduce av_for_each_entry() helper (git-fixes). * smb: client: optimize referral walk on failed link targets (git-fixes). * smb: client: parse DNS domain name from domain= option (git-fixes). * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes). * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes). * smb: client: refresh referral without acquiring refpath_lock (git-fixes). * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes). * soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes). * soc: aspeed: lpc: Fix impossible judgment condition (git-fixes). * soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes). * soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable- fixes). * soundwire: amd: change the soundwire wake enable/disable sequence (stable- fixes). * spi-rockchip: Fix register out of bounds access (stable-fixes). * spi: bcm63xx-hsspi: fix shared reset (git-fixes). * spi: bcm63xx-spi: fix shared reset (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi: sh-msiof: Fix maximum DMA transfer size (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: spi-sun4i: fix early activation (stable-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git- fixes). * spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes). * spi: tegra210-quad: remove redundant error handling code (git-fixes). * spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes). * staging: iio: ad5933: Correct settling cycles encoding per datasheet (git- fixes). * tcp/dccp: allow a connection when sk_max_ack_backlog is zero (git-fixes). * tcp/dccp: bypass empty buckets in inet_twsk_purge() (git-fixes). * tcp/dccp: complete lockless accesses to sk->sk_max_ack_backlog (git-fixes). * tcp: bring back NUMA dispersion in inet_ehash_locks_alloc() (git-fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * tcp_metrics: optimize tcp_metrics_flush_all() (git-fixes). * thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for retimer (stable-fixes). * thunderbolt: Fix a logic error in wake on connect (git-fixes). * udp: annotate data-races around up->pending (git-fixes). * udp: fix incorrect parameter validation in the udp_lib_getsockopt() function (git-fixes). * udp: fix receiving fraglist GSO packets (git-fixes). * udp: preserve the connected status if only UDP cmsg (git-fixes). * usb: Flush altsetting 0 endpoints before reinitializating them after reset (git-fixes). * usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes). * usb: cdnsp: Fix issue with detecting command completion event (git-fixes). * usb: renesas_usbhs: Reorder clock handling and power management in probe (git-fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes). * usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes). * usb: usbtmc: Fix timeout value in get_stb (git-fixes). * usb: xhci: Do not change the status of stalled TDs on failed Stop EP (stable-fixes). * vgacon: Add check for vc_origin address range in vgacon_scroll() (git- fixes). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes). * watchdog: exar: Shorten identity name to fit correctly (git-fixes). * wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath11k: fix ring-buffer corruption (git-fixes). * wifi: ath11k: fix rx completion meta data corruption (git-fixes). * wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes). * wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes). * wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes). * wifi: ath12k: Fix end offset bit definition in monitor ring descriptor (stable-fixes). * wifi: ath12k: Fix invalid memory access while forming 802.11 header (git- fixes). * wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes). * wifi: ath12k: Fix the QoS control field offset to build QoS header (git- fixes). * wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable- fixes). * wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes). * wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable- fixes). * wifi: ath12k: fix cleanup path after mhi init (git-fixes). * wifi: ath12k: fix invalid access to memory (git-fixes). * wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath12k: fix ring-buffer corruption (git-fixes). * wifi: ath9k: return by of_get_mac_address (stable-fixes). * wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes). * wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes). * wifi: iwlwifi: add support for Killer on MTL (stable-fixes). * wifi: iwlwifi: fix debug actions order (stable-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable- fixes). * wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git- fixes). * wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes). * wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes). * wifi: mt76: mt7925: prevent multiple scan commands (git-fixes). * wifi: mt76: mt7925: refine the sniffer commnad (git-fixes). * wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes). * wifi: mt76: mt7996: revise TXS size (stable-fixes). * wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes). * wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable- fixes). * wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes). * wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git- fixes). * wifi: rtw88: Do not use static local variable in rtw8822b_set_tx_power_index_by_rate (stable-fixes). * wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes). * wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: do not ignore hardware read error during DPK (git-fixes). * wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git- fixes). * wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git- fixes). * wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes). * wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes). * wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet (stable-fixes). * wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes). * wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes). * x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/AMD: Do not return error when microcode update is not necessary (git-fixes). * x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes). * x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes). * x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). * xsk: always clear DMA mapping information when unmapping the pool (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-42=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-33.1 * kernel-source-rt-6.4.0-33.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-33.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-debuginfo-6.4.0-33.1 * kernel-rt-debugsource-6.4.0-33.1 * kernel-rt-devel-6.4.0-33.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-rt-devel-debuginfo-6.4.0-33.1 * kernel-rt-livepatch-6.4.0-33.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52888.html * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-49568.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21868.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21938.html * https://www.suse.com/security/cve/CVE-2025-21997.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22113.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23155.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37738.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37743.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37752.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37800.html * https://www.suse.com/security/cve/CVE-2025-37801.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37844.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37862.html * https://www.suse.com/security/cve/CVE-2025-37865.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37874.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37917.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37933.html * https://www.suse.com/security/cve/CVE-2025-37936.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37967.html * https://www.suse.com/security/cve/CVE-2025-37968.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37987.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-37998.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1228557 * https://bugzilla.suse.com/show_bug.cgi?id=1228854 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235728 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240180 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240723 * https://bugzilla.suse.com/show_bug.cgi?id=1240823 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241617 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242163 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242504 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242573 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242846 * https://bugzilla.suse.com/show_bug.cgi?id=1242849 * https://bugzilla.suse.com/show_bug.cgi?id=1242850 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242940 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242946 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242954 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242982 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243475 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243537 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243542 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243571 * https://bugzilla.suse.com/show_bug.cgi?id=1243572 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243628 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243782 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243836 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://bugzilla.suse.com/show_bug.cgi?id=1244145 * https://bugzilla.suse.com/show_bug.cgi?id=1244261 * https://jira.suse.com/browse/PED-10253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:33:15 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:33:15 -0000 Subject: SUSE-RU-2025:20420-1: moderate: Recommended update for microsoft-dracut-config Message-ID: <175040839596.11022.9695997275344563275@smelt2.prg2.suse.org> # Recommended update for microsoft-dracut-config Announcement ID: SUSE-RU-2025:20420-1 Release Date: 2025-06-16T11:45:26Z Rating: moderate References: * jsc#PED-11572 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for microsoft-dracut-config fixes the following issues: * Initial release for microsoft-dracut-config on Micro 6.1: * Update to 0.0.4 * Move dracut config files to usr/lib/ dir * Update to 0.0.3 * Add provides and conflicts on generic name dracut-instance-change-config * Update to 0.0.2 * Rename config for nvme for consistency * Add dracut build requirement * Initial release v0.0.1 (PED-11572) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-149=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * microsoft-dracut-config-0.0.4-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/PED-11572 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:35:39 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:35:39 -0000 Subject: SUSE-SU-2025:20419-1: important: Security update for the Linux Kernel Message-ID: <175040853955.11022.3901334071132559969@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20419-1 Release Date: 2025-06-15T13:06:50Z Rating: important References: * bsc#1220112 * bsc#1223096 * bsc#1226498 * bsc#1228557 * bsc#1228854 * bsc#1229491 * bsc#1230581 * bsc#1231016 * bsc#1232649 * bsc#1232882 * bsc#1233192 * bsc#1234154 * bsc#1235149 * bsc#1235968 * bsc#1236142 * bsc#1236208 * bsc#1237312 * bsc#1238212 * bsc#1238473 * bsc#1238774 * bsc#1238992 * bsc#1239691 * bsc#1239925 * bsc#1240593 * bsc#1240823 * bsc#1240866 * bsc#1240966 * bsc#1241148 * bsc#1241282 * bsc#1241305 * bsc#1241340 * bsc#1241351 * bsc#1241376 * bsc#1241448 * bsc#1241457 * bsc#1241492 * bsc#1241519 * bsc#1241525 * bsc#1241533 * bsc#1241538 * bsc#1241576 * bsc#1241590 * bsc#1241595 * bsc#1241596 * bsc#1241597 * bsc#1241625 * bsc#1241627 * bsc#1241635 * bsc#1241638 * bsc#1241644 * bsc#1241654 * bsc#1241657 * bsc#1242012 * bsc#1242035 * bsc#1242044 * bsc#1242163 * bsc#1242203 * bsc#1242343 * bsc#1242414 * bsc#1242417 * bsc#1242501 * bsc#1242502 * bsc#1242506 * bsc#1242507 * bsc#1242509 * bsc#1242510 * bsc#1242512 * bsc#1242513 * bsc#1242514 * bsc#1242520 * bsc#1242523 * bsc#1242524 * bsc#1242529 * bsc#1242530 * bsc#1242531 * bsc#1242532 * bsc#1242559 * bsc#1242563 * bsc#1242564 * bsc#1242565 * bsc#1242566 * bsc#1242567 * bsc#1242568 * bsc#1242569 * bsc#1242574 * bsc#1242575 * bsc#1242578 * bsc#1242584 * bsc#1242585 * bsc#1242587 * bsc#1242591 * bsc#1242709 * bsc#1242727 * bsc#1242758 * bsc#1242760 * bsc#1242761 * bsc#1242762 * bsc#1242763 * bsc#1242764 * bsc#1242766 * bsc#1242770 * bsc#1242778 * bsc#1242781 * bsc#1242782 * bsc#1242785 * bsc#1242786 * bsc#1242792 * bsc#1242849 * bsc#1242852 * bsc#1242854 * bsc#1242856 * bsc#1242859 * bsc#1242860 * bsc#1242861 * bsc#1242866 * bsc#1242867 * bsc#1242868 * bsc#1242871 * bsc#1242873 * bsc#1242875 * bsc#1242906 * bsc#1242908 * bsc#1242924 * bsc#1242930 * bsc#1242944 * bsc#1242945 * bsc#1242948 * bsc#1242949 * bsc#1242951 * bsc#1242953 * bsc#1242955 * bsc#1242957 * bsc#1242959 * bsc#1242961 * bsc#1242962 * bsc#1242973 * bsc#1242974 * bsc#1242977 * bsc#1242990 * bsc#1242993 * bsc#1243000 * bsc#1243006 * bsc#1243011 * bsc#1243015 * bsc#1243044 * bsc#1243049 * bsc#1243056 * bsc#1243074 * bsc#1243076 * bsc#1243077 * bsc#1243082 * bsc#1243090 * bsc#1243330 * bsc#1243342 * bsc#1243456 * bsc#1243469 * bsc#1243470 * bsc#1243471 * bsc#1243472 * bsc#1243473 * bsc#1243476 * bsc#1243509 * bsc#1243511 * bsc#1243513 * bsc#1243515 * bsc#1243516 * bsc#1243517 * bsc#1243519 * bsc#1243522 * bsc#1243524 * bsc#1243528 * bsc#1243529 * bsc#1243530 * bsc#1243534 * bsc#1243536 * bsc#1243539 * bsc#1243540 * bsc#1243541 * bsc#1243543 * bsc#1243545 * bsc#1243547 * bsc#1243559 * bsc#1243560 * bsc#1243562 * bsc#1243567 * bsc#1243573 * bsc#1243574 * bsc#1243575 * bsc#1243589 * bsc#1243621 * bsc#1243624 * bsc#1243625 * bsc#1243626 * bsc#1243627 * bsc#1243649 * bsc#1243657 * bsc#1243658 * bsc#1243659 * bsc#1243660 * bsc#1243664 * bsc#1243737 * bsc#1243782 * bsc#1243805 * bsc#1243963 * bsc#1244145 * bsc#1244261 * jsc#PED-10253 Cross-References: * CVE-2023-52888 * CVE-2023-53146 * CVE-2024-43869 * CVE-2024-46713 * CVE-2024-50106 * CVE-2024-50223 * CVE-2024-53135 * CVE-2024-54458 * CVE-2024-58098 * CVE-2024-58099 * CVE-2024-58100 * CVE-2024-58237 * CVE-2025-21629 * CVE-2025-21648 * CVE-2025-21702 * CVE-2025-21787 * CVE-2025-21814 * CVE-2025-21919 * CVE-2025-21997 * CVE-2025-22005 * CVE-2025-22021 * CVE-2025-22030 * CVE-2025-22056 * CVE-2025-22057 * CVE-2025-22063 * CVE-2025-22066 * CVE-2025-22070 * CVE-2025-22089 * CVE-2025-22095 * CVE-2025-22103 * CVE-2025-22119 * CVE-2025-22124 * CVE-2025-22125 * CVE-2025-22126 * CVE-2025-23140 * CVE-2025-23141 * CVE-2025-23142 * CVE-2025-23144 * CVE-2025-23146 * CVE-2025-23147 * CVE-2025-23148 * CVE-2025-23149 * CVE-2025-23150 * CVE-2025-23151 * CVE-2025-23156 * CVE-2025-23157 * CVE-2025-23158 * CVE-2025-23159 * CVE-2025-23160 * CVE-2025-23161 * CVE-2025-37740 * CVE-2025-37741 * CVE-2025-37742 * CVE-2025-37743 * CVE-2025-37747 * CVE-2025-37748 * CVE-2025-37749 * CVE-2025-37750 * CVE-2025-37754 * CVE-2025-37755 * CVE-2025-37758 * CVE-2025-37765 * CVE-2025-37766 * CVE-2025-37767 * CVE-2025-37768 * CVE-2025-37769 * CVE-2025-37770 * CVE-2025-37771 * CVE-2025-37772 * CVE-2025-37773 * CVE-2025-37780 * CVE-2025-37781 * CVE-2025-37782 * CVE-2025-37787 * CVE-2025-37788 * CVE-2025-37789 * CVE-2025-37790 * CVE-2025-37792 * CVE-2025-37793 * CVE-2025-37794 * CVE-2025-37796 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37800 * CVE-2025-37803 * CVE-2025-37804 * CVE-2025-37805 * CVE-2025-37809 * CVE-2025-37810 * CVE-2025-37812 * CVE-2025-37815 * CVE-2025-37819 * CVE-2025-37820 * CVE-2025-37823 * CVE-2025-37824 * CVE-2025-37829 * CVE-2025-37830 * CVE-2025-37831 * CVE-2025-37833 * CVE-2025-37836 * CVE-2025-37839 * CVE-2025-37840 * CVE-2025-37841 * CVE-2025-37842 * CVE-2025-37849 * CVE-2025-37850 * CVE-2025-37851 * CVE-2025-37852 * CVE-2025-37853 * CVE-2025-37854 * CVE-2025-37858 * CVE-2025-37867 * CVE-2025-37870 * CVE-2025-37871 * CVE-2025-37873 * CVE-2025-37875 * CVE-2025-37879 * CVE-2025-37881 * CVE-2025-37886 * CVE-2025-37887 * CVE-2025-37889 * CVE-2025-37890 * CVE-2025-37891 * CVE-2025-37892 * CVE-2025-37897 * CVE-2025-37900 * CVE-2025-37901 * CVE-2025-37903 * CVE-2025-37905 * CVE-2025-37911 * CVE-2025-37912 * CVE-2025-37913 * CVE-2025-37914 * CVE-2025-37915 * CVE-2025-37918 * CVE-2025-37925 * CVE-2025-37928 * CVE-2025-37929 * CVE-2025-37930 * CVE-2025-37931 * CVE-2025-37932 * CVE-2025-37937 * CVE-2025-37943 * CVE-2025-37944 * CVE-2025-37948 * CVE-2025-37949 * CVE-2025-37951 * CVE-2025-37953 * CVE-2025-37954 * CVE-2025-37957 * CVE-2025-37958 * CVE-2025-37959 * CVE-2025-37960 * CVE-2025-37963 * CVE-2025-37969 * CVE-2025-37970 * CVE-2025-37972 * CVE-2025-37974 * CVE-2025-37978 * CVE-2025-37979 * CVE-2025-37980 * CVE-2025-37982 * CVE-2025-37983 * CVE-2025-37985 * CVE-2025-37986 * CVE-2025-37989 * CVE-2025-37990 * CVE-2025-38104 * CVE-2025-38152 * CVE-2025-38240 * CVE-2025-38637 * CVE-2025-39735 * CVE-2025-40014 * CVE-2025-40325 CVSS scores: * CVE-2023-52888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53146 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-54458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54458 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58099 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21629 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21997 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22021 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22021 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22030 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22030 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22057 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22057 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22063 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-22095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22103 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22103 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22119 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22119 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-22124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23146 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23161 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37740 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37741 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37742 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2025-37743 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37749 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37766 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37780 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-37787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37803 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37804 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37805 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37810 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37810 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37812 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37812 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37839 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37839 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37851 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37851 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37854 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37854 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37858 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37858 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37870 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37881 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37890 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37891 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37897 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37897 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37903 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37903 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37905 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37905 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37911 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37911 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37918 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37918 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37925 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-37925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37928 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37928 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37929 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-37929 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-37930 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37930 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-37931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37951 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37954 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37954 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37983 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37983 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38152 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38240 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38240 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39735 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39735 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40014 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40014 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 174 vulnerabilities, contains one feature and has 32 fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not NULL (bsc#1228557). * CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581). * CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992). * CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774). * CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473). * CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593). * CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282). * CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533). * CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351). * CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305). * CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448). * CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763). * CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513). * CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507). * CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics (bsc#1242163). * CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523). * CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859). * CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510). * CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506). * CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502). * CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786). * CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). * CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849). * CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852). * CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854). * CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856). * CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867). * CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875). * CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860). * CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861). * CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868). * CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951). * CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056). * CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077). * CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944). * CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962). * CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541). * CVE-2025-37954: smb: client: Avoid race in open_cached_dir with lease breaks (bsc#1243664). * CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513). * CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539). * CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519). * CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547). * CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627). * CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657). * CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem() (bsc#1240823). The following non-security bugs were fixed: * accel/qaic: Mask out SR-IOV PCI resources (stable-fixes). * ACPICA: exserial: do not forget to handle FFixedHW opregions for reading (git-fixes). * ACPICA: Utilities: Fix spelling mistake "Incremement" -> "Increment" (git- fixes). * acpi-cpufreq: Fix nominal_freq units to KHz in get_max_boost_ratio() (git- fixes). * ACPI: HED: Always initialize before evged (stable-fixes). * ACPI: OSI: Stop advertising support for "3.0 _SCP Extensions" (git-fixes). * ACPI: PNP: Add Intel OC Watchdog IDs to non-PNP device list (stable-fixes). * ACPI: PPTT: Fix processor subtable walk (git-fixes). * add bug reference for an existing hv_netvsc change (bsc#1243737). * afs: Fix the server_list to unuse a displaced server rather than putting it (git-fixes). * afs: Make it possible to find the volumes that are using a server (git- fixes). * ALSA: es1968: Add error handling for snd_pcm_hw_constraint_pow2() (git- fixes). * ALSA: hda/realtek: Add quirk for HP Spectre x360 15-df1xxx (stable-fixes). * ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14ASP10 (stable-fixes). * ALSA: hda/realtek: Enable PC beep passthrough for HP EliteBook 855 G7 (stable-fixes). * ALSA: pcm: Fix race of buffer access at PCM OSS layer (stable-fixes). * ALSA: seq: Fix delivery of UMP events to group ports (git-fixes). * ALSA: seq: Improve data consistency at polling (stable-fixes). * ALSA: sh: SND_AICA should depend on SH_DMA_API (git-fixes). * ALSA: ump: Fix a typo of snd_ump_stream_msg_device_info (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Audioengine D1 (git-fixes). * ALSA: usb-audio: Add sample rate quirk for Microdia JP001 USB Camera (stable-fixes). * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (git-fixes) * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (git- fixes) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: imx8mm-verdin: Link reg_usdhc2_vqmmc to usdhc2 (git-fixes) * arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays (git-fixes) * arm64: insn: Add support for encoding DSB (git-fixes) * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (git- fixes) * arm64: proton-pack: Expose whether the branchy loop k value (git-fixes) * arm64: proton-pack: Expose whether the platform is mitigated by (git-fixes) * arp: switch to dev_getbyhwaddr() in arp_req_set_public() (git-fixes). * ASoC: apple: mca: Constrain channels according to TDM mask (git-fixes). * ASoC: codecs: hda: Fix RPM usage count underflow (git-fixes). * ASoC: codecs: pcm3168a: Allow for 24-bit in provider mode (stable-fixes). * ASoC: imx-card: Adjust over allocation of memory in imx_card_parse_of() (stable-fixes). * ASoC: Intel: avs: Fix deadlock when the failing IPC is SET_D0IX (git-fixes). * ASoC: Intel: avs: Verify content returned by parse_int_array() (git-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Acer Aspire SW3-013 (stable- fixes). * ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect (stable-fixes). * ASoC: mediatek: mt8188: Add reference for dmic clocks (stable-fixes). * ASoC: mediatek: mt8188: Treat DMIC_GAINx_CUR as non-volatile (stable-fixes). * ASoC: meson: meson-card-utils: use of_property_present() for DT parsing (git-fixes). * ASoC: ops: Enforce platform maximum on initial value (stable-fixes). * ASoC: qcom: sdm845: Add error handling in sdm845_slim_snd_hw_params() (git- fixes). * ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup() (stable-fixes). * ASoC: rt722-sdca: Add some missing readable registers (stable-fixes). * ASoC: soc-dai: check return value at snd_soc_dai_set_tdm_slot() (stable- fixes). * ASoC: SOF: ipc4-control: Use SOF_CTRL_CMD_BINARY as numid for bytes_ext (git-fixes). * ASoC: SOF: ipc4-pcm: Adjust pipeline_list->pipelines allocation type (git- fixes). * ASoC: SOF: ipc4-pcm: Delay reporting is only supported for playback direction (git-fixes). * ASoc: SOF: topology: connect DAI to a single DAI link (git-fixes). * ASoC: sun4i-codec: support hp-det-gpios property (stable-fixes). * ASoC: tas2764: Add reg defaults for TAS2764_INT_CLK_CFG (stable-fixes). * ASoC: tas2764: Enable main IRQs (git-fixes). * ASoC: tas2764: Mark SW_RESET as volatile (stable-fixes). * ASoC: tas2764: Power up/down amp on mute ops (stable-fixes). * ASoC: tas2764: Reinit cache on part reset (git-fixes). * backlight: pm8941: Add NULL check in wled_configure() (git-fixes). * Bluetooth: btusb: use skb_pull to avoid unsafe access in QCA dump handling (git-fixes). * Bluetooth: hci_qca: move the SoC type check to the right place (git-fixes). * Bluetooth: L2CAP: Fix not checking l2cap_chan security level (git-fixes). * Bluetooth: L2CAP: Fix not responding with L2CAP_CR_LE_ENCRYPTION (git- fixes). * Bluetooth: MGMT: Fix MGMT_OP_ADD_DEVICE invalid device flags (git-fixes). * Bluetooth: MGMT: iterate over mesh commands in mgmt_mesh_foreach() (git- fixes). * bnxt_en: Add missing skb_mark_for_recycle() in bnxt_rx_vlan() (git-fixes). * bnxt_en: Fix coredump logic to free allocated buffer (git-fixes). * bnxt_en: Fix ethtool -d byte order for 32-bit values (git-fixes). * bnxt_en: Fix out-of-bound memcpy() during ethtool -w (git-fixes). * bpf: Fix mismatched RCU unlock flavour in bpf_out_neigh_v6 (git-fixes). * bpf: Scrub packet on bpf_redirect_peer (git-fixes). * btrfs: adjust subpage bit start based on sectorsize (bsc#1241492). * btrfs: avoid monopolizing a core when activating a swap file (git-fixes). * btrfs: avoid NULL pointer dereference if no valid csum tree (bsc#1243342). * btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1236208). * btrfs: do not loop for nowait writes when checking for cross references (git-fixes). * btrfs: fix a leaked chunk map issue in read_one_chunk() (git-fixes). * btrfs: fix discard worker infinite loop after disabling discard (bsc#1242012). * btrfs: fix non-empty delayed iputs list on unmount due to compressed write workers (git-fixes). * bus: fsl-mc: do not add a device-link for the UAPI used DPMCP device (git- fixes). * bus: fsl-mc: fix double-free on mc_dev (git-fixes). * bus: fsl-mc: fix GET/SET_TAILDROP command ids (git-fixes). * bus: mhi: host: Fix conflict between power_up and SYSERR (git-fixes). * can: bcm: add locking for bcm_op runtime updates (git-fixes). * can: bcm: add missing rcu read protection for procfs content (git-fixes). * can: c_can: Use of_property_present() to test existence of DT property (stable-fixes). * can: slcan: allow reception of short error messages (git-fixes). * check-for-config-changes: Fix flag name typo * cifs: change tcon status when need_reconnect is set on it (git-fixes). * cifs: reduce warning log level for server not advertising interfaces (git- fixes). * crypto: algif_hash - fix double free in hash_accept (git-fixes). * crypto: lrw - Only add ecb if it is not already there (git-fixes). * crypto: lzo - Fix compression buffer overrun (stable-fixes). * crypto: marvell/cesa - Avoid empty transfer descriptor (git-fixes). * crypto: marvell/cesa - Do not chain submitted requests (git-fixes). * crypto: marvell/cesa - Handle zero-length skcipher requests (git-fixes). * crypto: octeontx2 - suppress auth failure screaming due to negative tests (stable-fixes). * crypto: qat - add shutdown handler to qat_420xx (git-fixes). * crypto: qat - add shutdown handler to qat_4xxx (git-fixes). * crypto: skcipher - Zap type in crypto_alloc_sync_skcipher (stable-fixes). * crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() (git-fixes). * crypto: sun8i-ce - move fallback ahash_request to the end of the struct (git-fixes). * crypto: sun8i-ss - do not use sg_dma_len before calling DMA functions (git- fixes). * crypto: xts - Only add ecb if it is not already there (git-fixes). * devlink: fix port new reply cmd type (git-fixes). * dlm: mask sk_shutdown value (bsc#1228854). * dlm: use SHUT_RDWR for SCTP shutdown (bsc#1228854). * dma-buf: insert memory barrier before updating num_fences (git-fixes). * dmaengine: idxd: Add missing cleanup for early error out in idxd_setup_internals (git-fixes). * dmaengine: idxd: Add missing cleanups in cleanup internals (git-fixes). * dmaengine: idxd: Add missing idxd cleanup to fix memory leak in remove call (git-fixes). * dmaengine: idxd: cdev: Fix uninitialized use of sva in idxd_cdev_open (stable-fixes). * dmaengine: idxd: Fix allowing write() from different address spaces (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (git- fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_pci_probe (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_engines (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_groups (git-fixes). * dmaengine: idxd: fix memory leak in error handling path of idxd_setup_wqs (git-fixes). * dmaengine: idxd: Fix ->poll() return value (git-fixes). * dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (git- fixes). * dmaengine: mediatek: drop unused variable (git-fixes). * dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() (git-fixes). * dmaengine: Revert "dmaengine: dmatest: Fix dmatest waiting less when interrupted" (git-fixes). * dmaengine: ti: Add NULL check in udma_probe() (git-fixes). * dmaengine: ti: k3-udma: Add missing locking (git-fixes). * dmaengine: ti: k3-udma: Use cap_mask directly from dma_device structure instead of a local copy (git-fixes). * dm-integrity: fix a warning on invalid table line (git-fixes). * Documentation: fix typo in root= kernel parameter description (git-fixes). * Documentation/rtla: Fix duplicate text about timerlat tracer (git-fixes). * Documentation/rtla: Fix typo in common_timerlat_description.rst (git-fixes). * Documentation/rtla: Fix typo in rtla-timerlat.rst (git-fixes). * Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (git-fixes). * drm: Add valid clones check (stable-fixes). * drm/amd: Add Suspend/Hibernate notification callback support (stable-fixes). * drm/amd/display: Add null pointer check for get_first_active_display() (git- fixes). * drm/amd/display: Avoid flooding unnecessary info messages (git-fixes). * drm/amd/display: Correct the reply value when AUX write incomplete (git- fixes). * drm/amd/display/dm: drop hw_support check in amdgpu_dm_i2c_xfer() (stable- fixes). * drm/amd/display: Do not try AUX transactions on disconnected link (stable- fixes). * drm/amd/display: Fix incorrect DPCD configs while Replay/PSR switch (stable- fixes). * drm/amd/display: fix link_set_dpms_off multi-display MST corner case (stable-fixes). * drm/amd/display: Fix the checking condition in dmub aux handling (stable- fixes). * drm/amd/display: Guard against setting dispclk low for dcn31x (stable- fixes). * drm/amd/display: Increase block_sequence array size (stable-fixes). * drm/amd/display: Initial psr_version with correct setting (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (stable-fixes). * drm/amd/display: remove minimum Dispclk and apply oem panel timing (stable- fixes). * drm/amd/display: Skip checking FRL_MODE bit for PCON BW determination (stable-fixes). * drm/amd/display: Update CR AUX RD interval interpretation (stable-fixes). * drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c (stable-fixes). * drm/amdgpu: enlarge the VBIOS binary size limit (stable-fixes). * drm/amdgpu: fix pm notifier handling (git-fixes). * drm/amdgpu: Queue KFD reset workitem in VF FED (stable-fixes). * drm/amdgpu: reset psp->cmd to NULL after releasing the buffer (stable- fixes). * drm/amdgpu: Set snoop bit for SDMA for MI series (stable-fixes). * drm/amdgpu: trigger flr_work if reading pf2vf data failed (stable-fixes). * drm/amdgpu: Update SRIOV video codec caps (stable-fixes). * drm/amdkfd: KFD release_work possible circular locking (stable-fixes). * drm/amdkfd: Set per-process flags only once cik/vi (stable-fixes). * drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table (git-fixes). * drm/ast: Find VBIOS mode from regular display size (stable-fixes). * drm/ast: Fix comment on modeset lock (git-fixes). * drm/atomic: clarify the rules around drm_atomic_state->allow_modeset (stable-fixes). * drm: bridge: adv7511: fill stream capabilities (stable-fixes). * drm/bridge: cdns-dsi: Check return value when getting default PHY config (git-fixes). * drm/bridge: cdns-dsi: Fix connecting to next bridge (git-fixes). * drm/bridge: cdns-dsi: Fix phy de-init and flag it so (git-fixes). * drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() (git-fixes). * drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready (git-fixes). * drm/bridge: lt9611uxc: Fix an error handling path in lt9611uxc_probe() (git- fixes). * drm/edid: fixed the bug that hdr metadata was not reset (git-fixes). * drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 (git-fixes). * drm/mediatek: Fix kobject put for component sub-drivers (git-fixes). * drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence (stable- fixes). * drm/mediatek: mtk_drm_drv: Fix kobject put for mtk_mutex device ptr (git- fixes). * drm/mediatek: mtk_drm_drv: Unbind secondary mmsys components on err (git- fixes). * drm/msm/gpu: Fix crash when throttling GPU immediately during boot (git- fixes). * drm/panel-edp: Add Starry 116KHD024006 (stable-fixes). * drm/panel: samsung-sofef00: Drop s6e3fc2x01 support (git-fixes). * drm: rcar-du: Fix memory leak in rcar_du_vsps_init() (git-fixes). * drm/rockchip: vop2: Add uv swap for cluster window (stable-fixes). * drm/tegra: Assign plane type before registration (git-fixes). * drm/tegra: Fix a possible null pointer dereference (git-fixes). * drm/tegra: rgb: Fix the unbound reference count (git-fixes). * drm/udl: Unregister device before cleaning up on disconnect (git-fixes). * drm/v3d: Add clock handling (stable-fixes). * drm/v3d: Add job to pending list if the reset was skipped (stable-fixes). * drm/vc4: tests: Use return instead of assert (git-fixes). * drm/vkms: Adjust vkms_state->active_planes allocation type (git-fixes). * drm/vmwgfx: Add seqno waiter for sync_files (git-fixes). * Drop AMDGPU patch that may cause regressions (bsc#1243782) * exfat: fix potential wrong error return from get_block (git-fixes). * fbcon: Use correct erase colour for clearing in fbcon (stable-fixes). * fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() (git-fixes). * fbdev: core: tileblit: Implement missing margin clearing for tileblit (stable-fixes). * fbdev/efifb: Remove PM for parent device (bsc#1244261). * fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var (git-fixes). * fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var (git- fixes). * fbdev: fsl-diu-fb: add missing device_remove_file() (stable-fixes). * firmware: arm_ffa: Reject higher major version as incompatible (stable- fixes). * firmware: arm_ffa: Set dma_mask for ffa devices (stable-fixes). * firmware: arm_scmi: Relax duplicate name constraint across protocol ids (stable-fixes). * firmware: psci: Fix refcount leak in psci_dt_init (git-fixes). * Fix write to cloned skb in ipv6_hop_ioam() (git-fixes). * fpga: altera-cvp: Increase credit timeout (stable-fixes). * gpiolib: Revert "Do not WARN on gpiod_put() for optional GPIO" (stable- fixes). * gpio: pca953x: fix IRQ storm on system wake up (git-fixes). * gpio: pca953x: Simplify code with cleanup helpers (stable-fixes). * gpio: pca953x: Split pca953x_restore_context() and pca953x_save_context() (stable-fixes). * HID: quirks: Add ADATA XPG alpha wireless mouse support (stable-fixes). * HID: thrustmaster: fix memory leak in thrustmaster_interrupts() (git-fixes). * HID: uclogic: Add NULL check in uclogic_input_configured() (git-fixes). * HID: usbkbd: Fix the bit shift number for LED_KANA (stable-fixes). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (git- fixes). * hv_netvsc: Remove rmsg_pgcnt (git-fixes). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (git- fixes). * hwmon: (asus-ec-sensors) check sensor index in read_string() (git-fixes). * hwmon: (dell-smm) Increment the number of fans (stable-fixes). * hwmon: (gpio-fan) Add missing mutex locks (stable-fixes). * hwmon: (xgene-hwmon) use appropriate type for the latency value (stable- fixes). * i2c: designware: Fix an error handling path in i2c_dw_pci_probe() (git- fixes). * i2c: pxa: fix call balance of i2c->clk handling routines (stable-fixes). * i2c: qup: Vote for interconnect bandwidth to DRAM (stable-fixes). * i3c: master: svc: Fix implicit fallthrough in svc_i3c_master_ibi_work() (git-fixes). * i3c: master: svc: Fix missing STOP for master request (stable-fixes). * i3c: master: svc: Flush FIFO before sending Dynamic Address Assignment(DAA) (stable-fixes). * IB/cm: use rwlock for MAD agent lock (git-fixes) * ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() (git-fixes). * idpf: fix offloads support for encapsulated packets (git-fixes). * idpf: fix potential memory leak on kcalloc() failure (git-fixes). * idpf: protect shutdown from reset (git-fixes). * ieee802154: ca8210: Use proper setters and getters for bitwise types (stable-fixes). * igc: fix lock order in igc_ptp_reset (git-fixes). * iio: accel: fxls8962af: Fix temperature scan element sign (git-fixes). * iio: adc: ad7124: Fix 3dB filter frequency reading (git-fixes). * iio: adc: ad7606_spi: fix reg write value mask (git-fixes). * iio: filter: admv8818: fix band 4, state 15 (git-fixes). * iio: filter: admv8818: fix integer overflow (git-fixes). * iio: filter: admv8818: fix range calculation (git-fixes). * iio: filter: admv8818: Support frequencies >= 2^32 (git-fixes). * iio: imu: inv_icm42600: Fix temperature calculation (git-fixes). * ima: process_measurement() needlessly takes inode_lock() on MAY_READ (stable-fixes). * inetpeer: remove create argument of inet_getpeer_v() (git-fixes). * inetpeer: update inetpeer timestamp in inet_getpeer() (git-fixes). * Input: gpio-keys - fix possible concurrent access in gpio_keys_irq_timer() (git-fixes). * Input: ims-pcu - check record size in ims_pcu_flash_firmware() (git-fixes). * Input: synaptics - enable InterTouch on Dell Precision M3800 (stable-fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30-D (stable- fixes). * Input: synaptics - enable InterTouch on Dynabook Portege X30L-G (stable- fixes). * Input: synaptics - enable InterTouch on TUXEDO InfinityBook Pro 14 v5 (stable-fixes). * Input: synaptics - enable SMBus for HP Elitebook 850 G1 (stable-fixes). * Input: synaptics-rmi - fix crash with unsupported versions of F34 (git- fixes). * Input: xpad - add more controllers (stable-fixes). * Input: xpad - add support for 8BitDo Ultimate 2 Wireless Controller (stable- fixes). * Input: xpad - fix Share button on Xbox One controllers (stable-fixes). * intel_th: avoid using deprecated page->mapping, index fields (stable-fixes). * ipv4: Check !in_dev earlier for ioctl(SIOCSIFADDR) (git-fixes). * ipv4: Convert icmp_route_lookup() to dscp_t (git-fixes). * ipv4: Fix incorrect source address in Record Route option (git-fixes). * ipv4: fix source address selection with route leak (git-fixes). * ipv4: give an IPv4 dev to blackhole_netdev (git-fixes). * ipv4: icmp: Pass full DS field to ip_route_input() (git-fixes). * ipv4: ip_gre: Avoid skb_pull() failure in ipgre_xmit() (git-fixes). Both spellings are actually used * ipv4: ip_gre: Fix drops of small packets in ipgre_xmit (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() (git-fixes). * ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() (git-fixes). * ipv4: Mask upper DSCP bits and ECN bits in NETLINK_FIB_LOOKUP family (git- fixes). * ipv4: properly combine dev_base_seq and ipv4.dev_addr_genid (git-fixes). * ipv4: raw: Fix sending packets from raw sockets via IPsec tunnels (git- fixes). * ipv4/route: avoid unused-but-set-variable warning (git-fixes). * ipv6: Align behavior across nexthops during path selection (git-fixes). * ipv6: Do not consider link down nexthops in path selection (git-fixes). * ipv6: fix omitted netlink attributes when using RTEXT_FILTER_SKIP_STATS (git-fixes). * ipv6: Start path selection from the first nexthop (git-fixes). * jffs2: check jffs2_prealloc_raw_node_refs() result in few other places (git- fixes). * jffs2: check that raw node were preallocated before writing summary (git- fixes). * jiffies: Cast to unsigned long in secs_to_jiffies() conversion (bsc#1242993). * jiffies: Define secs_to_jiffies() (bsc#1242993). * kABI workaround for hda_codec.beep_just_power_on flag (git-fixes). * kernel-obs-qa: Use srchash for dependency as well * KVM: arm64: Change kvm_handle_mmio_return() return polarity (git-fixes). * KVM: arm64: Fix RAS trapping in pKVM for protected VMs (git-fixes). * KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status (git- fixes). * KVM: arm64: Mark some header functions as inline (git-fixes). * KVM: arm64: Tear down vGIC on failed vCPU creation (git-fixes). * KVM: arm64: timer: Always evaluate the need for a soft timer (git-fixes). * KVM: arm64: vgic-its: Add a data length check in vgic_its_save_* (git- fixes). * KVM: arm64: vgic-its: Clear DTE when MAPD unmaps a device (git-fixes). * KVM: arm64: vgic-its: Clear ITE when DISCARD frees an ITE (git-fixes). * KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found (git- fixes). * KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs (git-fixes). * KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation (git-fixes). * KVM: nVMX: Allow emulating RDPID on behalf of L2 (git-fixes). * KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation (git-fixes). * KVM: s390: Do not use %pK through debug printing (git-fixes bsc#1243657). * KVM: s390: Do not use %pK through tracepoints (git-fixes bsc#1243658). * KVM: SVM: Allocate IR data using atomic allocation (git-fixes). * KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value (git-fixes). * KVM: SVM: Suppress DEBUGCTL.BTF on AMD (git-fixes). * KVM: SVM: Update dump_ghcb() to use the GHCB snapshot fields (git-fixes). * KVM: VMX: Do not modify guest XFD_ERR if CR0.TS=1 (git-fixes). * KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (git-fixes). * KVM: x86: Do not take kvm->lock when iterating over vCPUs in suspend notifier (git-fixes). * KVM: x86: Explicitly treat routing entry type changes as changes (git- fixes). * KVM: x86: Explicitly zero EAX and EBX when PERFMON_V2 isn't supported by KVM (git-fixes). * KVM: x86: Explicitly zero-initialize on-stack CPUID unions (git-fixes). * KVM: x86: Make x2APIC ID 100% readonly (git-fixes). * KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed (git- fixes). * KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func() (git-fixes). * KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found (git-fixes). * KVM: x86/xen: Use guest's copy of pvclock when starting timer (git-fixes). * leds: pwm-multicolor: Add check for fwnode_property_read_u32 (stable-fixes). * loop: Add sanity check for read/write_iter (git-fixes). * loop: aio inherit the ioprio of original request (git-fixes). * loop: do not require ->write_iter for writable files in loop_configure (git- fixes). * mailbox: use error ret code of of_parse_phandle_with_args() (stable-fixes). * md: add a new callback pers->bitmap_sector() (git-fixes). * md: ensure resync is prioritized over recovery (git-fixes). * md: fix mddev uaf while iterating all_mddevs list (git-fixes). * md: preserve KABI in struct md_personality v2 (git-fixes). * md/raid10: fix missing discard IO accounting (git-fixes). * md/raid10: wait barrier before returning discard request with REQ_NOWAIT (git-fixes). * md/raid1: Add check for missing source disk in process_checks() (git-fixes). * md/raid1: fix memory leak in raid1_run() if no active rdev (git-fixes). * md/raid1,raid10: do not ignore IO flags (git-fixes). * md/raid5: implement pers->bitmap_sector() (git-fixes). * media: adv7180: Disable test-pattern control on adv7180 (stable-fixes). * media: c8sectpfe: Call of_node_put(i2c_bus) only once in c8sectpfe_probe() (stable-fixes). * media: ccs-pll: Check for too high VT PLL multiplier in dual PLL case (git- fixes). * media: ccs-pll: Correct the upper limit of maximum op_pre_pll_clk_div (git- fixes). * media: ccs-pll: Start OP pre-PLL multiplier search from correct value (git- fixes). * media: ccs-pll: Start VT pre-PLL multiplier search from correct value (git- fixes). * media: cx231xx: set device_caps for 417 (stable-fixes). * media: cxusb: no longer judge rbuf when the write fails (git-fixes). * media: davinci: vpif: Fix memory leak in probe error path (git-fixes). * media: gspca: Add error handling for stv06xx_read_sensor() (git-fixes). * media: i2c: imx219: Correct the minimum vblanking value (stable-fixes). * media: imx-jpeg: Cleanup after an allocation error (git-fixes). * media: imx-jpeg: Drop the first error frames (git-fixes). * media: imx-jpeg: Move mxc_jpeg_free_slot_data() ahead (git-fixes). * media: imx-jpeg: Reset slot data pointers when freed (git-fixes). * media: nxp: imx8-isi: better handle the m2m usage_count (git-fixes). * media: omap3isp: use sgtable-based scatterlist wrappers (git-fixes). * media: ov5675: suppress probe deferral errors (git-fixes). * media: ov8856: suppress probe deferral errors (git-fixes). * media: qcom: camss: csid: Only add TPG v4l2 ctrl if TPG hardware is available (stable-fixes). * media: rkvdec: Fix frame size enumeration (git-fixes). * media: tc358746: improve calculation of the D-PHY timing registers (stable- fixes). * media: test-drivers: vivid: do not call schedule in loop (stable-fixes). * media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map (stable-fixes). * media: uvcvideo: Fix deferred probing error (git-fixes). * media: uvcvideo: Handle uvc menu translation inside uvc_get_le_value (stable-fixes). * media: uvcvideo: Return the number of processed controls (git-fixes). * media: v4l2-dev: fix error handling in __video_register_device() (git- fixes). * media: v4l: Memset argument to 0 before calling get_mbus_config pad op (stable-fixes). * media: venus: Fix probe error handling (git-fixes). * media: videobuf2: Add missing doc comment for waiting_in_dqbuf (git-fixes). * media: videobuf2: use sgtable-based scatterlist wrappers (git-fixes). * media: vidtv: Terminating the subsequent process of initialization failure (git-fixes). * media: vivid: Change the siize of the composing (git-fixes). * mfd: exynos-lpass: Avoid calling exynos_lpass_disable() twice in exynos_lpass_remove() (git-fixes). * mfd: stmpe-spi: Correct the name used in MODULE_DEVICE_TABLE (git-fixes). * mfd: tps65219: Remove TPS65219_REG_TI_DEV_ID check (stable-fixes). * mmc: dw_mmc: add exynos7870 DW MMC support (stable-fixes). * mmc: host: Wait for Vdd to settle on card power off (stable-fixes). * mmc: sdhci: Disable SD card clock before changing parameters (stable-fixes). * mtd: nand: ecc-mxic: Fix use of uninitialized variable ret (git-fixes). * mtd: nand: sunxi: Add randomizer configuration before randomizer enable (git-fixes). * mtd: phram: Add the kernel lock down check (bsc#1232649). * mtd: rawnand: sunxi: Add randomizer configuration in sunxi_nfc_hw_ecc_write_chunk (git-fixes). * neighbour: delete redundant judgment statements (git-fixes). * net: Add non-RCU dev_getbyhwaddr() helper (git-fixes). * net: Clear old fragment checksum value in napi_reuse_skb (git-fixes). * netdev: fix repeated netlink messages in queue dump (git-fixes). * netdev-genl: avoid empty messages in queue dump (git-fixes). * net: do not dump stack on queue timeout (git-fixes). * net: gro: parse ipv6 ext headers without frag0 invalidation (git-fixes). * net: Handle napi_schedule() calls from non-interrupt (git-fixes). * net/handshake: Fix handshake_req_destroy_test1 (git-fixes). * net/handshake: Fix memory leak in __sock_create() and sock_alloc_file() (git-fixes). * net: Implement missing SO_TIMESTAMPING_NEW cmsg support (git-fixes). * net/ipv6: delete temporary address if mngtmpaddr is removed or unmanaged (git-fixes). * net/ipv6: Fix route deleting failure when metric equals 0 (git-fixes). * net/ipv6: Fix the RT cache flush via sysctl using a previous delay (git- fixes). * net: ipv6: ioam6: fix lwtunnel_output() loop (git-fixes). * netlink: annotate data-races around sk->sk_err (git-fixes). * net: loopback: Avoid sending IP packets without an Ethernet header (git- fixes). * net/mlx5e: Disable MACsec offload for uplink representor profile (git- fixes). * net/mlx5: E-switch, Fix error handling for enabling roce (git-fixes). * net/mlx5: E-Switch, Initialize MAC Address for Default GID (git-fixes). * net: phy: clear phydev->devlink when the link is deleted (git-fixes). * net: phy: fix up const issues in to_mdio_device() and to_phy_device() (git- fixes). * net: phy: mscc: Fix memory leak when using one step timestamping (git- fixes). * net: phy: mscc: Stop clearing the the UDPv4 checksum for L2 frames (git- fixes). * netpoll: Ensure clean state on setup failures (git-fixes). * net: qede: Initialize qede_ll_ops with designated initializer (git-fixes). * net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets (git-fixes). * net: Remove acked SYN flag from packet in the transmit queue correctly (git- fixes). * net: set the minimum for net_hotdata.netdev_budget_usecs (git-fixes). * net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension (git-fixes). * net: usb: aqc111: debug info before sanitation (git-fixes). * net: usb: aqc111: fix error handling of usbnet read calls (git-fixes). * net: wwan: t7xx: Fix napi rx poll issue (git-fixes). * nfsd: add list_head nf_gc to struct nfsd_file (git-fixes). * nfsd: Initialize ssc before laundromat_work to prevent NULL dereference (git-fixes). * NFSD: Insulate nfsd4_encode_read_plus() from page boundaries in the encode buffer (git-fixes). * NFSD: Skip sending CB_RECALL_ANY when the backchannel isn't up (git-fixes). * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (git-fixes). * nfs: handle failure of nfs_get_lock_context in unlock path (git-fixes). * NFS: O_DIRECT writes must check and adjust the file length (git-fixes). * NFSv4: Do not trigger uneccessary scans for return-on-close delegations (git-fixes). * NFSv4/pnfs: Reset the layout state after a layoutreturn (git-fixes). * nilfs2: add pointer check for nilfs_direct_propagate() (git-fixes). * nilfs2: do not propagate ENOENT error from nilfs_btree_propagate() (git- fixes). * nvme: Add 'partial_nid' quirk (bsc#1241148). * nvme: Add warning when a partiually unique NID is detected (bsc#1241148). * nvme: fixup scan failure for non-ANA multipath controllers (git-fixes). * nvme: multipath: fix return value of nvme_available_path (git-fixes). * nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (git-fixes bsc#1223096). * nvme-pci: add quirk for Samsung PM173x/PM173xa disk (bsc#1241148). * nvme-pci: fix queue unquiesce check on slot_reset (git-fixes). * nvme-pci: make nvme_pci_npages_prp() __always_inline (git-fixes). * nvme: requeue namespace scan on missed AENs (git-fixes). * nvme: re-read ANA log page after ns scan completes (git-fixes). * nvme-tcp: fix premature queue removal and I/O failover (git-fixes). * nvme-tcp: select CONFIG_TLS from CONFIG_NVME_TCP_TLS (git-fixes). * nvmet-fc: inline nvmet_fc_delete_assoc (git-fixes). * nvmet-fc: inline nvmet_fc_free_hostport (git-fixes). * nvmet-fcloop: add ref counting to lport (git-fixes). * nvmet-fcloop: Remove remote port from list when unlinking (git-fixes). * nvmet-fcloop: replace kref with refcount (git-fixes). * nvmet-fc: put ref when assoc->del_work is already scheduled (git-fixes). * nvmet-fc: take tgtport reference only once (git-fixes). * nvmet-fc: update tgtport ref per assoc (git-fixes). * nvmet-tcp: select CONFIG_TLS from CONFIG_NVME_TARGET_TCP_TLS (git-fixes). * nvme: unblock ctrl state transition for firmware update (git-fixes). * objtool, panic: Disable SMAP in __stack_chk_fail() (bsc#1243963). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * octeontx2-pf: qos: fix VF root node parent queue index (git-fixes). * padata: do not leak refcount in reorder_work (git-fixes). * PCI: apple: Use gpiod_set_value_cansleep in probe flow (git-fixes). * PCI: brcmstb: Add a softdep to MIP MSI-X driver (stable-fixes). * PCI: brcmstb: Expand inbound window size up to 64GB (stable-fixes). * PCI: cadence-ep: Correct PBA offset in .set_msix() callback (git-fixes). * PCI: cadence: Fix runtime atomic count underflow (git-fixes). * PCI/DPC: Initialize aer_err_info before using it (git-fixes). * PCI: dwc: ep: Ensure proper iteration over outbound map windows (stable- fixes). * PCI: dw-rockchip: Fix PHY function call sequence in rockchip_pcie_phy_deinit() (git-fixes). * PCI: Explicitly put devices into D0 when initializing (git-fixes). * PCI: Fix lock symmetry in pci_slot_unlock() (git-fixes). * PCI: Fix old_size lower bound in calculate_iosize() too (stable-fixes). * PCI: vmd: Disable MSI remapping bypass under Xen (stable-fixes). * phy: core: do not require set_mode() callback for phy_get_mode() to work (stable-fixes). * phy: Fix error handling in tegra_xusb_port_init (git-fixes). * phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug (git-fixes). * phy: renesas: rcar-gen3-usb2: Add support to initialize the bus (stable- fixes). * phy: renesas: rcar-gen3-usb2: Assert PLL reset on PHY power off (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix role detection on unbind/bind (git-fixes). * phy: renesas: rcar-gen3-usb2: Lock around hardware registers and driver data (git-fixes). * phy: renesas: rcar-gen3-usb2: Move IRQ request in probe (stable-fixes). * phy: renesas: rcar-gen3-usb2: Set timing registers only once (git-fixes). * phy: tegra: xusb: remove a stray unlock (git-fixes). * phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking (git- fixes). * pinctrl: armada-37xx: set GPIO output value before setting direction (git- fixes). * pinctrl: armada-37xx: use correct OUTPUT_VAL register for GPIOs > 31 (git- fixes). * pinctrl: at91: Fix possible out-of-boundary access (git-fixes). * pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned" (stable- fixes). * pinctrl: devicetree: do not goto err when probing hogs in pinctrl_dt_to_map (stable-fixes). * pinctrl: meson: define the pull up/down resistor value as 60 kOhm (stable- fixes). * pinctrl: tegra: Fix off by one in tegra_pinctrl_get_group() (git-fixes). * pinctrl-tegra: Restore SFSEL bit when freeing pins (stable-fixes). * platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() (git-fixes). * platform/x86: fujitsu-laptop: Support Lifebook S2110 hotkeys (stable-fixes). * platform/x86: thinkpad_acpi: Ignore battery threshold change event notification (stable-fixes). * platform/x86: thinkpad_acpi: Support also NEC Lavie X1475JAS (stable-fixes). * PM: sleep: Fix power.is_suspended cleanup for direct-complete devices (git- fixes). * PM: sleep: Print PM debug messages during hibernation (git-fixes). * PM: wakeup: Delete space in the end of string shown by pm_show_wakelocks() (git-fixes). * powercap: intel_rapl: Fix locking in TPMI RAPL (git-fixes). * powerpc/pseries/iommu: create DDW for devices with DMA mask less than 64-bits (bsc#1239691 bsc#1243044 ltc#212555). * power: reset: at91-reset: Optimize at91_reset() (git-fixes). * qibfs: fix _another_ leak (git-fixes) * rcu: Break rcu_node_0 --> &rq->__lock order (git-fixes) * rcu: Introduce rcu_cpu_online() (git-fixes) * rcu/tasks: Handle new PF_IDLE semantics (git-fixes) * rcu/tasks-trace: Handle new PF_IDLE semantics (git-fixes) * RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work (git- fixes) * RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (git-fixes) * RDMA/hns: Include hnae3.h in hns_roce_hw_v2.h (git-fixes) * RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (git- fixes) * RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction (git- fixes) * RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug (git-fixes) * RDMA/rxe: Fix "trying to register non-static key in rxe_qp_do_cleanup" bug (git-fixes) * Refresh fixes for cBPF issue (bsc#1242778) * regulator: ad5398: Add device tree support (stable-fixes). * regulator: max14577: Add error check for max14577_read_reg() (git-fixes). * regulator: max20086: Change enable gpio to optional (git-fixes). * regulator: max20086: fix invalid memory access (git-fixes). * regulator: max20086: Fix MAX200086 chip id (git-fixes). * Revert "bus: ti-sysc: Probe for l4_wkup and l4_cfg interconnect devices first" (stable-fixes). * Revert "drm/amdgpu: do not allow userspace to create a doorbell BO" (stable- fixes). * Revert "drm/amd: Keep display off while going into S4" (git-fixes). * Revert "drm/amd: Stop evicting resources on APUs in suspend" (stable-fixes). * Revert "rndis_host: Flag RNDIS modems as WWAN devices" (git-fixes). * Revert "wifi: mt76: mt7996: fill txd by host driver" (stable-fixes). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rtc: at91rm9200: drop unused module alias (git-fixes). * rtc: cpcap: drop unused module alias (git-fixes). * rtc: da9063: drop unused module alias (git-fixes). * rtc: ds1307: stop disabling alarms on probe (stable-fixes). * rtc: Fix offset calculation for .start_secs < 0 (git-fixes). * rtc: jz4740: drop unused module alias (git-fixes). * rtc: pm8xxx: drop unused module alias (git-fixes). * rtc: rv3032: fix EERD location (stable-fixes). * rtc: s3c: drop unused module alias (git-fixes). * rtc: sh: assign correct interrupts with DT (git-fixes). * rtc: stm32: drop unused module alias (git-fixes). * s390/bpf: Store backchain even for leaf progs (git-fixes bsc#1243805). * s390/pci: Allow re-add of a reserved but not yet removed device (bsc#1244145). * s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs (git-fixes bsc#1244145). * s390/pci: Fix potential double remove of hotplug slot (bsc#1244145). * s390/pci: introduce lock to synchronize state of zpci_dev's (jsc#PED-10253 bsc#1244145). * s390/pci: Prevent self deletion in disable_slot() (bsc#1244145). * s390/pci: remove hotplug slot when releasing the device (bsc#1244145). * s390/pci: Remove redundant bus removal and disable from zpci_release_device() (bsc#1244145). * s390/pci: rename lock member in struct zpci_dev (jsc#PED-10253 bsc#1244145). * s390/pci: Serialize device addition and removal (bsc#1244145). * scsi: core: Clear flags for scsi_cmnd that did not complete (git-fixes). * scsi: hisi_sas: Fix I/O errors caused by hardware port ID changes (git- fixes). * scsi: Improve CDL control (git-fixes). * scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1242993). * scsi: lpfc: convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Convert timeouts to secs_to_jiffies() (bsc#1242993). * scsi: lpfc: Copyright updates for 14.4.0.9 patches (bsc#1242993). * scsi: lpfc: Create lpfc_vmid_info sysfs entry (bsc#1242993). * scsi: lpfc: Fix lpfc_check_sli_ndlp() handling for GEN_REQUEST64 commands (bsc#1242993). * scsi: lpfc: Fix spelling mistake 'Toplogy' -> 'Topology' (bsc#1242993). * scsi: lpfc: Notify FC transport of rport disappearance during PCI fcn reset (bsc#1242993). * scsi: lpfc: Prevent failure to reregister with NVMe transport after PRLI retry (bsc#1242993). * scsi: lpfc: Restart eratt_poll timer if HBA_SETUP flag still unset (bsc#1242993). * scsi: lpfc: Update lpfc version to 14.4.0.9 (bsc#1242993). * scsi: lpfc: Use memcpy() for BIOS version (bsc#1240966). * scsi: megaraid_sas: Block zero-length ATA VPD inquiry (git-fixes). * scsi: pm80xx: Set phy_attached to zero when device is gone (git-fixes). * scsi: qla2xxx: Fix typos in a comment (bsc#1243090). * scsi: qla2xxx: Mark device strings as nonstring (bsc#1243090). * scsi: qla2xxx: Remove duplicate struct crb_addr_pair (bsc#1243090). * scsi: qla2xxx: Remove unused module parameters (bsc#1243090). * scsi: qla2xxx: Remove unused qla2x00_gpsc() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_pci_region_offset() (bsc#1243090). * scsi: qla2xxx: Remove unused qla82xx_wait_for_state_change() (bsc#1243090). * scsi: qla2xxx: Remove unused ql_log_qp (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_83xx_iospace_config() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_fc_port_deleted() (bsc#1243090). * scsi: qla2xxx: Remove unused qlt_free_qfull_cmds() (bsc#1243090). * selftests/bpf: Fix bpf_nf selftest failure (git-fixes). * selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test (bsc#1242203). * selftests/mm: restore default nr_hugepages value during cleanup in hugetlb_reparenting_test.sh (git-fixes). * selftests/net: have `gro.sh -t` return a correct exit code (stable-fixes). * selftests/seccomp: fix syscall_restart test for arm compat (git-fixes). * serial: Fix potential null-ptr-deref in mlb_usio_probe() (git-fixes). * serial: sh-sci: Save and restore more registers (git-fixes). * serial: sh-sci: Update the suspend/resume support (stable-fixes). * smb3: fix Open files on server counter going negative (git-fixes). * smb: client: allow more DFS referrals to be cached (git-fixes). * smb: client: avoid unnecessary reconnects when refreshing referrals (git- fixes). * smb: client: change return value in open_cached_dir_by_dentry() if !cfids (git-fixes). * smb: client: do not retry DFS targets on server shutdown (git-fixes). * smb: client: do not trust DFSREF_STORAGE_SERVER bit (git-fixes). * smb: client: do not try following DFS links in cifs_tree_connect() (git- fixes). * smb: client: fix DFS interlink failover (git-fixes). * smb: client: fix DFS mount against old servers with NTLMSSP (git-fixes). * smb: client: fix hang in wait_for_response() for negproto (bsc#1242709). * smb: client: fix potential race in cifs_put_tcon() (git-fixes). * smb: client: fix return value of parse_dfs_referrals() (git-fixes). * smb: client: get rid of kstrdup() in get_ses_refpath() (git-fixes). * smb: client: get rid of @nlsc param in cifs_tree_connect() (git-fixes). * smb: client: get rid of TCP_Server_Info::refpath_lock (git-fixes). * smb: client: improve purging of cached referrals (git-fixes). * smb: client: introduce av_for_each_entry() helper (git-fixes). * smb: client: optimize referral walk on failed link targets (git-fixes). * smb: client: parse av pair type 4 in CHALLENGE_MESSAGE (git-fixes). * smb: client: parse DNS domain name from domain= option (git-fixes). * smb: client: provide dns_resolve_{unc,name} helpers (git-fixes). * smb: client: refresh referral without acquiring refpath_lock (git-fixes). * smb: client: remove unnecessary checks in open_cached_dir() (git-fixes). * smb: client: Use str_yes_no() helper function (git-fixes). * soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() (git-fixes). * soc: aspeed: lpc: Fix impossible judgment condition (git-fixes). * soc: qcom: smp2p: Fix fallback to qcom,ipc parse (git-fixes). * soc: ti: k3-socinfo: Do not use syscon helper to build regmap (stable- fixes). * soundwire: amd: change the soundwire wake enable/disable sequence (stable- fixes). * spi: bcm63xx-hsspi: fix shared reset (git-fixes). * spi: bcm63xx-spi: fix shared reset (git-fixes). * spi: loopback-test: Do not split 1024-byte hexdumps (git-fixes). * spi-rockchip: Fix register out of bounds access (stable-fixes). * spi: sh-msiof: Fix maximum DMA transfer size (git-fixes). * spi: spi-fsl-dspi: Halt the module after a new message transfer (git-fixes). * spi: spi-fsl-dspi: Reset SR flags before sending a new message (git-fixes). * spi: spi-fsl-dspi: restrict register range for regmap access (git-fixes). * spi: spi-sun4i: fix early activation (stable-fixes). * spi: tegra114: Use value to check for invalid delays (git-fixes). * spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers (git- fixes). * spi: tegra210-quad: modify chip select (CS) deactivation (git-fixes). * spi: tegra210-quad: remove redundant error handling code (git-fixes). * spi: zynqmp-gqspi: Always acknowledge interrupts (stable-fixes). * Squashfs: check return result of sb_min_blocksize (git-fixes). * staging: iio: ad5933: Correct settling cycles encoding per datasheet (git- fixes). * tcp_bpf: Charge receive socket buffer in bpf_tcp_ingress() (git-fixes). * tcp_cubic: fix incorrect HyStart round start detection (git-fixes). * thermal/drivers/qoriq: Power down TMU on system suspend (stable-fixes). * thermal: intel: x86_pkg_temp_thermal: Fix bogus trip temperature (git- fixes). * thunderbolt: Do not add non-active NVM if NVM upgrade is disabled for retimer (stable-fixes). * thunderbolt: Fix a logic error in wake on connect (git-fixes). * usb: cdnsp: Fix issue with detecting command completion event (git-fixes). * usb: cdnsp: Fix issue with detecting USB 3.2 speed (git-fixes). * usb: Flush altsetting 0 endpoints before reinitializating them after reset (git-fixes). * usb: renesas_usbhs: Reorder clock handling and power management in probe (git-fixes). * usb: typec: class: Invalidate USB device pointers on partner unregistration (git-fixes). * usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() (git-fixes). * usb: usbtmc: Fix read_stb function and get_stb ioctl (git-fixes). * usb: usbtmc: Fix timeout value in get_stb (git-fixes). * usb: xhci: Do not change the status of stalled TDs on failed Stop EP (stable-fixes). * vgacon: Add check for vc_origin address range in vgacon_scroll() (git- fixes). * vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (git- fixes). * virtio_console: fix missing byte order handling for cols and rows (git- fixes). * VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify (git-fixes). * vt: remove VT_RESIZE and VT_RESIZEX from vt_compat_ioctl() (git-fixes). * watchdog: exar: Shorten identity name to fit correctly (git-fixes). * wifi: ath11k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath11k: fix ring-buffer corruption (git-fixes). * wifi: ath11k: fix rx completion meta data corruption (git-fixes). * wifi: ath12k: Add MSDU length validation for TKIP MIC error (git-fixes). * wifi: ath12k: Avoid napi_sync() before napi_enable() (stable-fixes). * wifi: ath12k: fix ath12k_hal_tx_cmd_ext_desc_setup() info1 override (stable- fixes). * wifi: ath12k: fix cleanup path after mhi init (git-fixes). * wifi: ath12k: Fix end offset bit definition in monitor ring descriptor (stable-fixes). * wifi: ath12k: fix invalid access to memory (git-fixes). * wifi: ath12k: Fix invalid memory access while forming 802.11 header (git- fixes). * wifi: ath12k: Fix memory leak during vdev_id mismatch (git-fixes). * wifi: ath12k: fix node corruption in ar->arvifs list (git-fixes). * wifi: ath12k: fix ring-buffer corruption (git-fixes). * wifi: ath12k: Fix the QoS control field offset to build QoS header (git- fixes). * wifi: ath12k: Fix WMI tag for EHT rate in peer assoc (git-fixes). * wifi: ath12k: Improve BSS discovery with hidden SSID in 6 GHz band (stable- fixes). * wifi: ath12k: Report proper tx completion status to mac80211 (stable-fixes). * wifi: ath9k_htc: Abort software beacon handling if disabled (git-fixes). * wifi: ath9k: return by of_get_mac_address (stable-fixes). * wifi: iwlfiwi: mvm: Fix the rate reporting (git-fixes). * wifi: iwlwifi: add support for Killer on MTL (stable-fixes). * wifi: iwlwifi: fix debug actions order (stable-fixes). * wifi: mac80211: do not unconditionally call drv_mgd_complete_tx() (stable- fixes). * wifi: mac80211: remove misplaced drv_mgd_complete_tx() call (stable-fixes). * wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request (git-fixes). * wifi: mt76: disable napi on driver removal (git-fixes). * wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init() (git- fixes). * wifi: mt76: mt7925: ensure all MCU commands wait for response (git-fixes). * wifi: mt76: mt7925: fix host interrupt register initialization (git-fixes). * wifi: mt76: mt7925: prevent multiple scan commands (git-fixes). * wifi: mt76: mt7925: refine the sniffer commnad (git-fixes). * wifi: mt76: mt7996: fix RX buffer size of MCU event (git-fixes). * wifi: mt76: mt7996: revise TXS size (stable-fixes). * wifi: mt76: mt7996: set EHT max ampdu length capability (git-fixes). * wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2 (stable- fixes). * wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() (git-fixes). * wifi: rtlwifi: disable ASPM for RTL8723BE with subsystem ID 11ad:1723 (git- fixes). * wifi: rtw88: do not ignore hardware read error during DPK (git-fixes). * wifi: rtw88: Do not use static local variable in rtw8822b_set_tx_power_index_by_rate (stable-fixes). * wifi: rtw88: Fix download_firmware_validate() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_desc_to_mcsrate() to handle MCS16-31 (stable-fixes). * wifi: rtw88: Fix __rtw_download_firmware() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_init_ht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: Fix rtw_init_vht_cap() for RTL8814AU (stable-fixes). * wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (git- fixes). * wifi: rtw88: sdio: call rtw_sdio_indicate_tx_status unconditionally (git- fixes). * wifi: rtw88: sdio: map mgmt frames to queue TX_DESC_QSEL_MGMT (git-fixes). * wifi: rtw88: usb: Reduce control message timeout to 500 ms (git-fixes). * wifi: rtw89: add wiphy_lock() to work that isn't held wiphy_lock() yet (stable-fixes). * wifi: rtw89: fw: propagate error code from rtw89_h2c_tx() (stable-fixes). * wifi: rtw89: pci: enlarge retry times of RX tag to 1000 (git-fixes). * x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (git-fixes). * x86/its: Fix build errors when CONFIG_MODULES=n (git-fixes). * x86/microcode/AMD: Do not return error when microcode update is not necessary (git-fixes). * x86/microcode/AMD: Have __apply_microcode_amd() return bool (git-fixes). * x86/microcode/AMD: Make __verify_patch_size() return bool (git-fixes). * x86/microcode/AMD: Return bool from find_blobs_in_containers() (git-fixes). * x86/xen: move xen_reserve_extra_memory() (git-fixes). * xen: Change xen-acpi-processor dom0 dependency (git-fixes). * xenfs/xensyms: respect hypervisor's "next" indication (git-fixes). * xen/mcelog: Add __nonstring annotations for unterminated strings (git- fixes). * Xen/swiotlb: mark xen_swiotlb_fixup() __init (git-fixes). * xhci: Add helper to set an interrupters interrupt moderation interval (git- fixes). * xhci: split free interrupter into separate remove and free parts (git- fixes). * xsk: Add truesize to skb_add_rx_frag() (git-fixes). * xsk: Do not assume metadata is always requested in TX completion (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-40=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-source-6.4.0-30.1 * kernel-macros-6.4.0-30.1 * kernel-devel-6.4.0-30.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-30.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-30.1 * kernel-default-devel-6.4.0-30.1 * kernel-default-debuginfo-6.4.0-30.1 * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-30.1.21.8 * SUSE Linux Micro 6.1 (ppc64le x86_64) * kernel-default-devel-debuginfo-6.4.0-30.1 * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-default-livepatch-6.4.0-30.1 * SUSE Linux Micro 6.1 (nosrc x86_64) * kernel-kvmsmall-6.4.0-30.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-kvmsmall-debuginfo-6.4.0-30.1 * kernel-kvmsmall-debugsource-6.4.0-30.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52888.html * https://www.suse.com/security/cve/CVE-2023-53146.html * https://www.suse.com/security/cve/CVE-2024-43869.html * https://www.suse.com/security/cve/CVE-2024-46713.html * https://www.suse.com/security/cve/CVE-2024-50106.html * https://www.suse.com/security/cve/CVE-2024-50223.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-54458.html * https://www.suse.com/security/cve/CVE-2024-58098.html * https://www.suse.com/security/cve/CVE-2024-58099.html * https://www.suse.com/security/cve/CVE-2024-58100.html * https://www.suse.com/security/cve/CVE-2024-58237.html * https://www.suse.com/security/cve/CVE-2025-21629.html * https://www.suse.com/security/cve/CVE-2025-21648.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21787.html * https://www.suse.com/security/cve/CVE-2025-21814.html * https://www.suse.com/security/cve/CVE-2025-21919.html * https://www.suse.com/security/cve/CVE-2025-21997.html * https://www.suse.com/security/cve/CVE-2025-22005.html * https://www.suse.com/security/cve/CVE-2025-22021.html * https://www.suse.com/security/cve/CVE-2025-22030.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22057.html * https://www.suse.com/security/cve/CVE-2025-22063.html * https://www.suse.com/security/cve/CVE-2025-22066.html * https://www.suse.com/security/cve/CVE-2025-22070.html * https://www.suse.com/security/cve/CVE-2025-22089.html * https://www.suse.com/security/cve/CVE-2025-22095.html * https://www.suse.com/security/cve/CVE-2025-22103.html * https://www.suse.com/security/cve/CVE-2025-22119.html * https://www.suse.com/security/cve/CVE-2025-22124.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-22126.html * https://www.suse.com/security/cve/CVE-2025-23140.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23142.html * https://www.suse.com/security/cve/CVE-2025-23144.html * https://www.suse.com/security/cve/CVE-2025-23146.html * https://www.suse.com/security/cve/CVE-2025-23147.html * https://www.suse.com/security/cve/CVE-2025-23148.html * https://www.suse.com/security/cve/CVE-2025-23149.html * https://www.suse.com/security/cve/CVE-2025-23150.html * https://www.suse.com/security/cve/CVE-2025-23151.html * https://www.suse.com/security/cve/CVE-2025-23156.html * https://www.suse.com/security/cve/CVE-2025-23157.html * https://www.suse.com/security/cve/CVE-2025-23158.html * https://www.suse.com/security/cve/CVE-2025-23159.html * https://www.suse.com/security/cve/CVE-2025-23160.html * https://www.suse.com/security/cve/CVE-2025-23161.html * https://www.suse.com/security/cve/CVE-2025-37740.html * https://www.suse.com/security/cve/CVE-2025-37741.html * https://www.suse.com/security/cve/CVE-2025-37742.html * https://www.suse.com/security/cve/CVE-2025-37743.html * https://www.suse.com/security/cve/CVE-2025-37747.html * https://www.suse.com/security/cve/CVE-2025-37748.html * https://www.suse.com/security/cve/CVE-2025-37749.html * https://www.suse.com/security/cve/CVE-2025-37750.html * https://www.suse.com/security/cve/CVE-2025-37754.html * https://www.suse.com/security/cve/CVE-2025-37755.html * https://www.suse.com/security/cve/CVE-2025-37758.html * https://www.suse.com/security/cve/CVE-2025-37765.html * https://www.suse.com/security/cve/CVE-2025-37766.html * https://www.suse.com/security/cve/CVE-2025-37767.html * https://www.suse.com/security/cve/CVE-2025-37768.html * https://www.suse.com/security/cve/CVE-2025-37769.html * https://www.suse.com/security/cve/CVE-2025-37770.html * https://www.suse.com/security/cve/CVE-2025-37771.html * https://www.suse.com/security/cve/CVE-2025-37772.html * https://www.suse.com/security/cve/CVE-2025-37773.html * https://www.suse.com/security/cve/CVE-2025-37780.html * https://www.suse.com/security/cve/CVE-2025-37781.html * https://www.suse.com/security/cve/CVE-2025-37782.html * https://www.suse.com/security/cve/CVE-2025-37787.html * https://www.suse.com/security/cve/CVE-2025-37788.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37790.html * https://www.suse.com/security/cve/CVE-2025-37792.html * https://www.suse.com/security/cve/CVE-2025-37793.html * https://www.suse.com/security/cve/CVE-2025-37794.html * https://www.suse.com/security/cve/CVE-2025-37796.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37800.html * https://www.suse.com/security/cve/CVE-2025-37803.html * https://www.suse.com/security/cve/CVE-2025-37804.html * https://www.suse.com/security/cve/CVE-2025-37805.html * https://www.suse.com/security/cve/CVE-2025-37809.html * https://www.suse.com/security/cve/CVE-2025-37810.html * https://www.suse.com/security/cve/CVE-2025-37812.html * https://www.suse.com/security/cve/CVE-2025-37815.html * https://www.suse.com/security/cve/CVE-2025-37819.html * https://www.suse.com/security/cve/CVE-2025-37820.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37824.html * https://www.suse.com/security/cve/CVE-2025-37829.html * https://www.suse.com/security/cve/CVE-2025-37830.html * https://www.suse.com/security/cve/CVE-2025-37831.html * https://www.suse.com/security/cve/CVE-2025-37833.html * https://www.suse.com/security/cve/CVE-2025-37836.html * https://www.suse.com/security/cve/CVE-2025-37839.html * https://www.suse.com/security/cve/CVE-2025-37840.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37842.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37850.html * https://www.suse.com/security/cve/CVE-2025-37851.html * https://www.suse.com/security/cve/CVE-2025-37852.html * https://www.suse.com/security/cve/CVE-2025-37853.html * https://www.suse.com/security/cve/CVE-2025-37854.html * https://www.suse.com/security/cve/CVE-2025-37858.html * https://www.suse.com/security/cve/CVE-2025-37867.html * https://www.suse.com/security/cve/CVE-2025-37870.html * https://www.suse.com/security/cve/CVE-2025-37871.html * https://www.suse.com/security/cve/CVE-2025-37873.html * https://www.suse.com/security/cve/CVE-2025-37875.html * https://www.suse.com/security/cve/CVE-2025-37879.html * https://www.suse.com/security/cve/CVE-2025-37881.html * https://www.suse.com/security/cve/CVE-2025-37886.html * https://www.suse.com/security/cve/CVE-2025-37887.html * https://www.suse.com/security/cve/CVE-2025-37889.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37891.html * https://www.suse.com/security/cve/CVE-2025-37892.html * https://www.suse.com/security/cve/CVE-2025-37897.html * https://www.suse.com/security/cve/CVE-2025-37900.html * https://www.suse.com/security/cve/CVE-2025-37901.html * https://www.suse.com/security/cve/CVE-2025-37903.html * https://www.suse.com/security/cve/CVE-2025-37905.html * https://www.suse.com/security/cve/CVE-2025-37911.html * https://www.suse.com/security/cve/CVE-2025-37912.html * https://www.suse.com/security/cve/CVE-2025-37913.html * https://www.suse.com/security/cve/CVE-2025-37914.html * https://www.suse.com/security/cve/CVE-2025-37915.html * https://www.suse.com/security/cve/CVE-2025-37918.html * https://www.suse.com/security/cve/CVE-2025-37925.html * https://www.suse.com/security/cve/CVE-2025-37928.html * https://www.suse.com/security/cve/CVE-2025-37929.html * https://www.suse.com/security/cve/CVE-2025-37930.html * https://www.suse.com/security/cve/CVE-2025-37931.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37937.html * https://www.suse.com/security/cve/CVE-2025-37943.html * https://www.suse.com/security/cve/CVE-2025-37944.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37949.html * https://www.suse.com/security/cve/CVE-2025-37951.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37954.html * https://www.suse.com/security/cve/CVE-2025-37957.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-37959.html * https://www.suse.com/security/cve/CVE-2025-37960.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37969.html * https://www.suse.com/security/cve/CVE-2025-37970.html * https://www.suse.com/security/cve/CVE-2025-37972.html * https://www.suse.com/security/cve/CVE-2025-37974.html * https://www.suse.com/security/cve/CVE-2025-37978.html * https://www.suse.com/security/cve/CVE-2025-37979.html * https://www.suse.com/security/cve/CVE-2025-37980.html * https://www.suse.com/security/cve/CVE-2025-37982.html * https://www.suse.com/security/cve/CVE-2025-37983.html * https://www.suse.com/security/cve/CVE-2025-37985.html * https://www.suse.com/security/cve/CVE-2025-37986.html * https://www.suse.com/security/cve/CVE-2025-37989.html * https://www.suse.com/security/cve/CVE-2025-37990.html * https://www.suse.com/security/cve/CVE-2025-38104.html * https://www.suse.com/security/cve/CVE-2025-38152.html * https://www.suse.com/security/cve/CVE-2025-38240.html * https://www.suse.com/security/cve/CVE-2025-38637.html * https://www.suse.com/security/cve/CVE-2025-39735.html * https://www.suse.com/security/cve/CVE-2025-40014.html * https://www.suse.com/security/cve/CVE-2025-40325.html * https://bugzilla.suse.com/show_bug.cgi?id=1220112 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1228557 * https://bugzilla.suse.com/show_bug.cgi?id=1228854 * https://bugzilla.suse.com/show_bug.cgi?id=1229491 * https://bugzilla.suse.com/show_bug.cgi?id=1230581 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1232882 * https://bugzilla.suse.com/show_bug.cgi?id=1233192 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1235149 * https://bugzilla.suse.com/show_bug.cgi?id=1235968 * https://bugzilla.suse.com/show_bug.cgi?id=1236142 * https://bugzilla.suse.com/show_bug.cgi?id=1236208 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238473 * https://bugzilla.suse.com/show_bug.cgi?id=1238774 * https://bugzilla.suse.com/show_bug.cgi?id=1238992 * https://bugzilla.suse.com/show_bug.cgi?id=1239691 * https://bugzilla.suse.com/show_bug.cgi?id=1239925 * https://bugzilla.suse.com/show_bug.cgi?id=1240593 * https://bugzilla.suse.com/show_bug.cgi?id=1240823 * https://bugzilla.suse.com/show_bug.cgi?id=1240866 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1241148 * https://bugzilla.suse.com/show_bug.cgi?id=1241282 * https://bugzilla.suse.com/show_bug.cgi?id=1241305 * https://bugzilla.suse.com/show_bug.cgi?id=1241340 * https://bugzilla.suse.com/show_bug.cgi?id=1241351 * https://bugzilla.suse.com/show_bug.cgi?id=1241376 * https://bugzilla.suse.com/show_bug.cgi?id=1241448 * https://bugzilla.suse.com/show_bug.cgi?id=1241457 * https://bugzilla.suse.com/show_bug.cgi?id=1241492 * https://bugzilla.suse.com/show_bug.cgi?id=1241519 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241533 * https://bugzilla.suse.com/show_bug.cgi?id=1241538 * https://bugzilla.suse.com/show_bug.cgi?id=1241576 * https://bugzilla.suse.com/show_bug.cgi?id=1241590 * https://bugzilla.suse.com/show_bug.cgi?id=1241595 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1241597 * https://bugzilla.suse.com/show_bug.cgi?id=1241625 * https://bugzilla.suse.com/show_bug.cgi?id=1241627 * https://bugzilla.suse.com/show_bug.cgi?id=1241635 * https://bugzilla.suse.com/show_bug.cgi?id=1241638 * https://bugzilla.suse.com/show_bug.cgi?id=1241644 * https://bugzilla.suse.com/show_bug.cgi?id=1241654 * https://bugzilla.suse.com/show_bug.cgi?id=1241657 * https://bugzilla.suse.com/show_bug.cgi?id=1242012 * https://bugzilla.suse.com/show_bug.cgi?id=1242035 * https://bugzilla.suse.com/show_bug.cgi?id=1242044 * https://bugzilla.suse.com/show_bug.cgi?id=1242163 * https://bugzilla.suse.com/show_bug.cgi?id=1242203 * https://bugzilla.suse.com/show_bug.cgi?id=1242343 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242501 * https://bugzilla.suse.com/show_bug.cgi?id=1242502 * https://bugzilla.suse.com/show_bug.cgi?id=1242506 * https://bugzilla.suse.com/show_bug.cgi?id=1242507 * https://bugzilla.suse.com/show_bug.cgi?id=1242509 * https://bugzilla.suse.com/show_bug.cgi?id=1242510 * https://bugzilla.suse.com/show_bug.cgi?id=1242512 * https://bugzilla.suse.com/show_bug.cgi?id=1242513 * https://bugzilla.suse.com/show_bug.cgi?id=1242514 * https://bugzilla.suse.com/show_bug.cgi?id=1242520 * https://bugzilla.suse.com/show_bug.cgi?id=1242523 * https://bugzilla.suse.com/show_bug.cgi?id=1242524 * https://bugzilla.suse.com/show_bug.cgi?id=1242529 * https://bugzilla.suse.com/show_bug.cgi?id=1242530 * https://bugzilla.suse.com/show_bug.cgi?id=1242531 * https://bugzilla.suse.com/show_bug.cgi?id=1242532 * https://bugzilla.suse.com/show_bug.cgi?id=1242559 * https://bugzilla.suse.com/show_bug.cgi?id=1242563 * https://bugzilla.suse.com/show_bug.cgi?id=1242564 * https://bugzilla.suse.com/show_bug.cgi?id=1242565 * https://bugzilla.suse.com/show_bug.cgi?id=1242566 * https://bugzilla.suse.com/show_bug.cgi?id=1242567 * https://bugzilla.suse.com/show_bug.cgi?id=1242568 * https://bugzilla.suse.com/show_bug.cgi?id=1242569 * https://bugzilla.suse.com/show_bug.cgi?id=1242574 * https://bugzilla.suse.com/show_bug.cgi?id=1242575 * https://bugzilla.suse.com/show_bug.cgi?id=1242578 * https://bugzilla.suse.com/show_bug.cgi?id=1242584 * https://bugzilla.suse.com/show_bug.cgi?id=1242585 * https://bugzilla.suse.com/show_bug.cgi?id=1242587 * https://bugzilla.suse.com/show_bug.cgi?id=1242591 * https://bugzilla.suse.com/show_bug.cgi?id=1242709 * https://bugzilla.suse.com/show_bug.cgi?id=1242727 * https://bugzilla.suse.com/show_bug.cgi?id=1242758 * https://bugzilla.suse.com/show_bug.cgi?id=1242760 * https://bugzilla.suse.com/show_bug.cgi?id=1242761 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242763 * https://bugzilla.suse.com/show_bug.cgi?id=1242764 * https://bugzilla.suse.com/show_bug.cgi?id=1242766 * https://bugzilla.suse.com/show_bug.cgi?id=1242770 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242781 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242785 * https://bugzilla.suse.com/show_bug.cgi?id=1242786 * https://bugzilla.suse.com/show_bug.cgi?id=1242792 * https://bugzilla.suse.com/show_bug.cgi?id=1242849 * https://bugzilla.suse.com/show_bug.cgi?id=1242852 * https://bugzilla.suse.com/show_bug.cgi?id=1242854 * https://bugzilla.suse.com/show_bug.cgi?id=1242856 * https://bugzilla.suse.com/show_bug.cgi?id=1242859 * https://bugzilla.suse.com/show_bug.cgi?id=1242860 * https://bugzilla.suse.com/show_bug.cgi?id=1242861 * https://bugzilla.suse.com/show_bug.cgi?id=1242866 * https://bugzilla.suse.com/show_bug.cgi?id=1242867 * https://bugzilla.suse.com/show_bug.cgi?id=1242868 * https://bugzilla.suse.com/show_bug.cgi?id=1242871 * https://bugzilla.suse.com/show_bug.cgi?id=1242873 * https://bugzilla.suse.com/show_bug.cgi?id=1242875 * https://bugzilla.suse.com/show_bug.cgi?id=1242906 * https://bugzilla.suse.com/show_bug.cgi?id=1242908 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1242930 * https://bugzilla.suse.com/show_bug.cgi?id=1242944 * https://bugzilla.suse.com/show_bug.cgi?id=1242945 * https://bugzilla.suse.com/show_bug.cgi?id=1242948 * https://bugzilla.suse.com/show_bug.cgi?id=1242949 * https://bugzilla.suse.com/show_bug.cgi?id=1242951 * https://bugzilla.suse.com/show_bug.cgi?id=1242953 * https://bugzilla.suse.com/show_bug.cgi?id=1242955 * https://bugzilla.suse.com/show_bug.cgi?id=1242957 * https://bugzilla.suse.com/show_bug.cgi?id=1242959 * https://bugzilla.suse.com/show_bug.cgi?id=1242961 * https://bugzilla.suse.com/show_bug.cgi?id=1242962 * https://bugzilla.suse.com/show_bug.cgi?id=1242973 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242977 * https://bugzilla.suse.com/show_bug.cgi?id=1242990 * https://bugzilla.suse.com/show_bug.cgi?id=1242993 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243006 * https://bugzilla.suse.com/show_bug.cgi?id=1243011 * https://bugzilla.suse.com/show_bug.cgi?id=1243015 * https://bugzilla.suse.com/show_bug.cgi?id=1243044 * https://bugzilla.suse.com/show_bug.cgi?id=1243049 * https://bugzilla.suse.com/show_bug.cgi?id=1243056 * https://bugzilla.suse.com/show_bug.cgi?id=1243074 * https://bugzilla.suse.com/show_bug.cgi?id=1243076 * https://bugzilla.suse.com/show_bug.cgi?id=1243077 * https://bugzilla.suse.com/show_bug.cgi?id=1243082 * https://bugzilla.suse.com/show_bug.cgi?id=1243090 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243342 * https://bugzilla.suse.com/show_bug.cgi?id=1243456 * https://bugzilla.suse.com/show_bug.cgi?id=1243469 * https://bugzilla.suse.com/show_bug.cgi?id=1243470 * https://bugzilla.suse.com/show_bug.cgi?id=1243471 * https://bugzilla.suse.com/show_bug.cgi?id=1243472 * https://bugzilla.suse.com/show_bug.cgi?id=1243473 * https://bugzilla.suse.com/show_bug.cgi?id=1243476 * https://bugzilla.suse.com/show_bug.cgi?id=1243509 * https://bugzilla.suse.com/show_bug.cgi?id=1243511 * https://bugzilla.suse.com/show_bug.cgi?id=1243513 * https://bugzilla.suse.com/show_bug.cgi?id=1243515 * https://bugzilla.suse.com/show_bug.cgi?id=1243516 * https://bugzilla.suse.com/show_bug.cgi?id=1243517 * https://bugzilla.suse.com/show_bug.cgi?id=1243519 * https://bugzilla.suse.com/show_bug.cgi?id=1243522 * https://bugzilla.suse.com/show_bug.cgi?id=1243524 * https://bugzilla.suse.com/show_bug.cgi?id=1243528 * https://bugzilla.suse.com/show_bug.cgi?id=1243529 * https://bugzilla.suse.com/show_bug.cgi?id=1243530 * https://bugzilla.suse.com/show_bug.cgi?id=1243534 * https://bugzilla.suse.com/show_bug.cgi?id=1243536 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1243540 * https://bugzilla.suse.com/show_bug.cgi?id=1243541 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243545 * https://bugzilla.suse.com/show_bug.cgi?id=1243547 * https://bugzilla.suse.com/show_bug.cgi?id=1243559 * https://bugzilla.suse.com/show_bug.cgi?id=1243560 * https://bugzilla.suse.com/show_bug.cgi?id=1243562 * https://bugzilla.suse.com/show_bug.cgi?id=1243567 * https://bugzilla.suse.com/show_bug.cgi?id=1243573 * https://bugzilla.suse.com/show_bug.cgi?id=1243574 * https://bugzilla.suse.com/show_bug.cgi?id=1243575 * https://bugzilla.suse.com/show_bug.cgi?id=1243589 * https://bugzilla.suse.com/show_bug.cgi?id=1243621 * https://bugzilla.suse.com/show_bug.cgi?id=1243624 * https://bugzilla.suse.com/show_bug.cgi?id=1243625 * https://bugzilla.suse.com/show_bug.cgi?id=1243626 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243657 * https://bugzilla.suse.com/show_bug.cgi?id=1243658 * https://bugzilla.suse.com/show_bug.cgi?id=1243659 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243664 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243782 * https://bugzilla.suse.com/show_bug.cgi?id=1243805 * https://bugzilla.suse.com/show_bug.cgi?id=1243963 * https://bugzilla.suse.com/show_bug.cgi?id=1244145 * https://bugzilla.suse.com/show_bug.cgi?id=1244261 * https://jira.suse.com/browse/PED-10253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:35:43 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:35:43 -0000 Subject: SUSE-SU-2025:20418-1: important: Security update for libxml2 Message-ID: <175040854353.11022.1438735594397777764@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:20418-1 Release Date: 2025-06-13T10:50:10Z Rating: important References: * bsc#1234812 Cross-References: * CVE-2024-40896 CVSS scores: * CVE-2024-40896 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-40896 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2024-40896 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-40896: Fixed XXE vulnerability (bsc#1234812) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-147=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libxml2-2-debuginfo-2.11.6-slfo.1.1_5.1 * libxml2-tools-debuginfo-2.11.6-slfo.1.1_5.1 * libxml2-debugsource-2.11.6-slfo.1.1_5.1 * libxml2-tools-2.11.6-slfo.1.1_5.1 * libxml2-2-2.11.6-slfo.1.1_5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40896.html * https://bugzilla.suse.com/show_bug.cgi?id=1234812 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:35:46 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:35:46 -0000 Subject: SUSE-SU-2025:20417-1: moderate: Security update for openssl-3 Message-ID: <175040854673.11022.9601517280287374789@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:20417-1 Release Date: 2025-06-13T10:48:33Z Rating: moderate References: * bsc#1240366 Cross-References: * CVE-2025-27587 CVSS scores: * CVE-2025-27587 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-27587 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2025-27587: Fixed Minerva side channel vulnerability in P-384 (bsc#1240366) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-146=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libopenssl3-3.1.4-slfo.1.1_5.1 * libopenssl-3-devel-3.1.4-slfo.1.1_5.1 * libopenssl-3-fips-provider-debuginfo-3.1.4-slfo.1.1_5.1 * openssl-3-debuginfo-3.1.4-slfo.1.1_5.1 * openssl-3-debugsource-3.1.4-slfo.1.1_5.1 * openssl-3-3.1.4-slfo.1.1_5.1 * libopenssl-3-fips-provider-3.1.4-slfo.1.1_5.1 * libopenssl3-debuginfo-3.1.4-slfo.1.1_5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27587.html * https://bugzilla.suse.com/show_bug.cgi?id=1240366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:35:52 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:35:52 -0000 Subject: SUSE-SU-2025:20416-1: moderate: Security update for systemd Message-ID: <175040855269.11022.8440018130074004814@smelt2.prg2.suse.org> # Security update for systemd Announcement ID: SUSE-SU-2025:20416-1 Release Date: 2025-06-12T07:37:25Z Rating: moderate References: * bsc#1236177 * bsc#1237496 * bsc#1241190 * bsc#1242938 Cross-References: * CVE-2025-4598 CVSS scores: * CVE-2025-4598 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4598 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for systemd fixes the following issues: * coredump: use %d in kernel core pattern (CVE-2025-4598) * Revert "macro: terminate the temporary VA_ARGS_FOREACH() array with a sentinel" (SUSE specific) * umount: do not move busy network mounts (bsc#1236177) * man/pstore.conf: pstore.conf template is not always installed in /etc * man: coredump.conf template is not always installed in /etc (bsc#1237496) * Don't write messages sent from users with UID falling into the container UID range to the system journal. Daemons in the container don't talk to the outside journald as they talk to the inner one directly, which does its journal splitting based on shifted uids. (bsc#1242938) * This re-adds back the support for the persistent net name rules as well as their generator since predictable naming scheme is still disabled by default on Micro (via the `net.ifnames=0` boot option). (bsc#1241190) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-145=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-145=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * systemd-254.25-slfo.1.1_1.1 * libudev1-254.25-slfo.1.1_1.1 * systemd-experimental-254.25-slfo.1.1_1.1 * systemd-experimental-debuginfo-254.25-slfo.1.1_1.1 * systemd-journal-remote-debuginfo-254.25-slfo.1.1_1.1 * systemd-coredump-debuginfo-254.25-slfo.1.1_1.1 * systemd-portable-254.25-slfo.1.1_1.1 * systemd-debugsource-254.25-slfo.1.1_1.1 * libudev1-debuginfo-254.25-slfo.1.1_1.1 * systemd-debuginfo-254.25-slfo.1.1_1.1 * systemd-container-debuginfo-254.25-slfo.1.1_1.1 * systemd-portable-debuginfo-254.25-slfo.1.1_1.1 * udev-debuginfo-254.25-slfo.1.1_1.1 * systemd-container-254.25-slfo.1.1_1.1 * systemd-journal-remote-254.25-slfo.1.1_1.1 * libsystemd0-debuginfo-254.25-slfo.1.1_1.1 * libsystemd0-254.25-slfo.1.1_1.1 * udev-254.25-slfo.1.1_1.1 * systemd-coredump-254.25-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (ppc64le) * systemd-sysvcompat-debuginfo-254.25-slfo.1.1_1.1 * systemd-sysvcompat-254.25-slfo.1.1_1.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * systemd-devel-254.25-slfo.1.1_1.1 * systemd-debugsource-254.25-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4598.html * https://bugzilla.suse.com/show_bug.cgi?id=1236177 * https://bugzilla.suse.com/show_bug.cgi?id=1237496 * https://bugzilla.suse.com/show_bug.cgi?id=1241190 * https://bugzilla.suse.com/show_bug.cgi?id=1242938 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 08:35:54 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 08:35:54 -0000 Subject: SUSE-SU-2025:20415-1: moderate: Security update for augeas Message-ID: <175040855497.11022.14664129095865520581@smelt2.prg2.suse.org> # Security update for augeas Announcement ID: SUSE-SU-2025:20415-1 Release Date: 2025-06-11T10:00:25Z Rating: moderate References: * bsc#1239909 Cross-References: * CVE-2025-2588 CVSS scores: * CVE-2025-2588 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-2588 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-2588 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-2588 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-2588 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for augeas fixes the following issues: * CVE-2025-2588: Fixed NULL pointer dereference when calling re_case_expand in function fa_expand_nocase (bsc#1239909) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-143=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libfa1-debuginfo-1.14.1-slfo.1.1_2.1 * augeas-debuginfo-1.14.1-slfo.1.1_2.1 * libfa1-1.14.1-slfo.1.1_2.1 * augeas-debugsource-1.14.1-slfo.1.1_2.1 * libaugeas0-1.14.1-slfo.1.1_2.1 * libaugeas0-debuginfo-1.14.1-slfo.1.1_2.1 * augeas-1.14.1-slfo.1.1_2.1 * augeas-lenses-1.14.1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2588.html * https://bugzilla.suse.com/show_bug.cgi?id=1239909 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:07 -0000 Subject: SUSE-SU-2025:02045-1: important: Security update for nodejs20 Message-ID: <175042260741.11257.14948455020409779328@smelt2.prg2.suse.org> # Security update for nodejs20 Announcement ID: SUSE-SU-2025:02045-1 Release Date: 2025-06-20T11:04:12Z Rating: important References: * bsc#1239949 * bsc#1243217 * bsc#1243218 * bsc#1243220 Cross-References: * CVE-2025-23165 * CVE-2025-23166 * CVE-2025-23167 CVSS scores: * CVE-2025-23165 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-23165 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23165 ( NVD ): 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23166 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23166 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23166 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23167 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-23167 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-23167 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for nodejs20 fixes the following issues: Update to 20.19.2: * CVE-2025-23166: improper error handling in async cryptographic operations crashes process (bsc#1243218). * CVE-2025-23167: improper HTTP header block termination in llhttp (bsc#1243220). * CVE-2025-23165: add missing call to uv_fs_req_cleanup (bsc#1243217). Other bugfixes: * Build with PIE (bsc#1239949) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2045=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2045=1 openSUSE-SLE-15.6-2025-2045=1 ## Package List: * Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64) * nodejs20-20.19.2-150600.3.12.1 * npm20-20.19.2-150600.3.12.1 * nodejs20-debugsource-20.19.2-150600.3.12.1 * nodejs20-devel-20.19.2-150600.3.12.1 * nodejs20-debuginfo-20.19.2-150600.3.12.1 * Web and Scripting Module 15-SP6 (noarch) * nodejs20-docs-20.19.2-150600.3.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * corepack20-20.19.2-150600.3.12.1 * nodejs20-20.19.2-150600.3.12.1 * npm20-20.19.2-150600.3.12.1 * nodejs20-debugsource-20.19.2-150600.3.12.1 * nodejs20-devel-20.19.2-150600.3.12.1 * nodejs20-debuginfo-20.19.2-150600.3.12.1 * openSUSE Leap 15.6 (noarch) * nodejs20-docs-20.19.2-150600.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23165.html * https://www.suse.com/security/cve/CVE-2025-23166.html * https://www.suse.com/security/cve/CVE-2025-23167.html * https://bugzilla.suse.com/show_bug.cgi?id=1239949 * https://bugzilla.suse.com/show_bug.cgi?id=1243217 * https://bugzilla.suse.com/show_bug.cgi?id=1243218 * https://bugzilla.suse.com/show_bug.cgi?id=1243220 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:11 -0000 Subject: SUSE-SU-2025:02044-1: important: Security update for libblockdev Message-ID: <175042261115.11257.11007444433380158938@smelt2.prg2.suse.org> # Security update for libblockdev Announcement ID: SUSE-SU-2025:02044-1 Release Date: 2025-06-20T10:44:54Z Rating: important References: * bsc#1243285 Cross-References: * CVE-2025-6019 CVSS scores: * CVE-2025-6019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-6019 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libblockdev fixes the following issues: * CVE-2025-6019: Suppress privilege escalation during xfs fs resize (bsc#1243285). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2044=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2044=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2044=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2044=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2044=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2044=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2044=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2044=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2044=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2044=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2044=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2044=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2044=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2044=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2044=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2044=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2044=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2044=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2044=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2044=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2044=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2044=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libblockdev-debugsource-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libblockdev-debugsource-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Manager Proxy 4.3 (x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libbd_utils2-2.26-150400.3.5.1 * libbd_lvm-dbus2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_kbd2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_vdo2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libbd_mdraid-devel-2.26-150400.3.5.1 * libblockdev-devel-2.26-150400.3.5.1 * libbd_vdo-devel-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_utils-devel-2.26-150400.3.5.1 * typelib-1_0-BlockDev-2_0-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libbd_crypto-devel-2.26-150400.3.5.1 * libbd_dm-devel-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_vdo2-debuginfo-2.26-150400.3.5.1 * libbd_dm2-2.26-150400.3.5.1 * libbd_lvm-devel-2.26-150400.3.5.1 * libbd_btrfs-devel-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_dm2-debuginfo-2.26-150400.3.5.1 * libbd_kbd2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_fs-devel-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_kbd-devel-2.26-150400.3.5.1 * libbd_lvm-dbus-devel-2.26-150400.3.5.1 * libbd_mpath2-2.26-150400.3.5.1 * libbd_mpath2-debuginfo-2.26-150400.3.5.1 * python3-libblockdev-2.26-150400.3.5.1 * libbd_swap-devel-2.26-150400.3.5.1 * libbd_part-devel-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libbd_lvm-dbus2-debuginfo-2.26-150400.3.5.1 * libbd_loop-devel-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * libbd_mpath-devel-2.26-150400.3.5.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_lvm-dbus2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_kbd2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_vdo2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libbd_mdraid-devel-2.26-150400.3.5.1 * libblockdev-devel-2.26-150400.3.5.1 * libbd_vdo-devel-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_utils-devel-2.26-150400.3.5.1 * typelib-1_0-BlockDev-2_0-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libbd_crypto-devel-2.26-150400.3.5.1 * libbd_dm-devel-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_vdo2-debuginfo-2.26-150400.3.5.1 * libbd_dm2-2.26-150400.3.5.1 * libbd_lvm-devel-2.26-150400.3.5.1 * libbd_btrfs-devel-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_dm2-debuginfo-2.26-150400.3.5.1 * libbd_kbd2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_fs-devel-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_kbd-devel-2.26-150400.3.5.1 * libbd_lvm-dbus-devel-2.26-150400.3.5.1 * libbd_mpath2-2.26-150400.3.5.1 * libbd_mpath2-debuginfo-2.26-150400.3.5.1 * python3-libblockdev-2.26-150400.3.5.1 * libbd_swap-devel-2.26-150400.3.5.1 * libbd_part-devel-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libbd_lvm-dbus2-debuginfo-2.26-150400.3.5.1 * libbd_loop-devel-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * libbd_mpath-devel-2.26-150400.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_btrfs2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_btrfs2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libbd_utils2-2.26-150400.3.5.1 * libbd_fs2-debuginfo-2.26-150400.3.5.1 * libbd_part2-2.26-150400.3.5.1 * libbd_mdraid2-2.26-150400.3.5.1 * libbd_lvm2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-debuginfo-2.26-150400.3.5.1 * libblockdev-2.26-150400.3.5.1 * libbd_crypto2-2.26-150400.3.5.1 * libblockdev-debuginfo-2.26-150400.3.5.1 * libbd_swap2-debuginfo-2.26-150400.3.5.1 * libbd_fs2-2.26-150400.3.5.1 * libbd_lvm2-2.26-150400.3.5.1 * libblockdev-debugsource-2.26-150400.3.5.1 * libblockdev2-2.26-150400.3.5.1 * libbd_part2-debuginfo-2.26-150400.3.5.1 * libbd_crypto2-debuginfo-2.26-150400.3.5.1 * libbd_swap2-2.26-150400.3.5.1 * libbd_utils2-debuginfo-2.26-150400.3.5.1 * libbd_loop2-2.26-150400.3.5.1 * libbd_mdraid2-debuginfo-2.26-150400.3.5.1 * libblockdev2-debuginfo-2.26-150400.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6019.html * https://bugzilla.suse.com/show_bug.cgi?id=1243285 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:14 -0000 Subject: SUSE-SU-2025:02043-1: important: Security update for libblockdev Message-ID: <175042261449.11257.15114939588597594635@smelt2.prg2.suse.org> # Security update for libblockdev Announcement ID: SUSE-SU-2025:02043-1 Release Date: 2025-06-20T10:41:41Z Rating: important References: * bsc#1243285 Cross-References: * CVE-2025-6019 CVSS scores: * CVE-2025-6019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-6019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-6019 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for libblockdev fixes the following issues: * CVE-2025-6019: Suppress privilege escalation during xfs fs resize (bsc#1243285). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2043=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2043=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2043=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2043=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libbd_crypto2-debuginfo-2.22-150200.3.3.1 * libbd_fs2-debuginfo-2.22-150200.3.3.1 * libblockdev-debuginfo-2.22-150200.3.3.1 * libbd_part2-2.22-150200.3.3.1 * libbd_fs2-2.22-150200.3.3.1 * libbd_utils2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-2.22-150200.3.3.1 * libbd_mdraid2-debuginfo-2.22-150200.3.3.1 * libbd_loop2-2.22-150200.3.3.1 * libblockdev-2.22-150200.3.3.1 * libbd_loop2-debuginfo-2.22-150200.3.3.1 * libblockdev2-2.22-150200.3.3.1 * libbd_mdraid2-2.22-150200.3.3.1 * libbd_crypto2-2.22-150200.3.3.1 * libbd_part2-debuginfo-2.22-150200.3.3.1 * libblockdev2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-debuginfo-2.22-150200.3.3.1 * libbd_utils2-2.22-150200.3.3.1 * libblockdev-debugsource-2.22-150200.3.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libbd_crypto2-debuginfo-2.22-150200.3.3.1 * libbd_fs2-debuginfo-2.22-150200.3.3.1 * libblockdev-debuginfo-2.22-150200.3.3.1 * libbd_part2-2.22-150200.3.3.1 * libbd_fs2-2.22-150200.3.3.1 * libbd_utils2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-2.22-150200.3.3.1 * libbd_mdraid2-debuginfo-2.22-150200.3.3.1 * libbd_loop2-2.22-150200.3.3.1 * libblockdev-2.22-150200.3.3.1 * libbd_loop2-debuginfo-2.22-150200.3.3.1 * libblockdev2-2.22-150200.3.3.1 * libbd_mdraid2-2.22-150200.3.3.1 * libbd_crypto2-2.22-150200.3.3.1 * libbd_part2-debuginfo-2.22-150200.3.3.1 * libblockdev2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-debuginfo-2.22-150200.3.3.1 * libbd_utils2-2.22-150200.3.3.1 * libblockdev-debugsource-2.22-150200.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libbd_crypto2-debuginfo-2.22-150200.3.3.1 * libbd_fs2-debuginfo-2.22-150200.3.3.1 * libblockdev-debuginfo-2.22-150200.3.3.1 * libbd_part2-2.22-150200.3.3.1 * libbd_fs2-2.22-150200.3.3.1 * libbd_utils2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-2.22-150200.3.3.1 * libbd_mdraid2-debuginfo-2.22-150200.3.3.1 * libbd_loop2-2.22-150200.3.3.1 * libblockdev-2.22-150200.3.3.1 * libbd_loop2-debuginfo-2.22-150200.3.3.1 * libblockdev2-2.22-150200.3.3.1 * libbd_mdraid2-2.22-150200.3.3.1 * libbd_crypto2-2.22-150200.3.3.1 * libbd_part2-debuginfo-2.22-150200.3.3.1 * libblockdev2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-debuginfo-2.22-150200.3.3.1 * libbd_utils2-2.22-150200.3.3.1 * libblockdev-debugsource-2.22-150200.3.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libbd_crypto2-debuginfo-2.22-150200.3.3.1 * libbd_fs2-debuginfo-2.22-150200.3.3.1 * libblockdev-debuginfo-2.22-150200.3.3.1 * libbd_part2-2.22-150200.3.3.1 * libbd_fs2-2.22-150200.3.3.1 * libbd_utils2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-2.22-150200.3.3.1 * libbd_mdraid2-debuginfo-2.22-150200.3.3.1 * libbd_loop2-2.22-150200.3.3.1 * libblockdev-2.22-150200.3.3.1 * libbd_loop2-debuginfo-2.22-150200.3.3.1 * libblockdev2-2.22-150200.3.3.1 * libbd_mdraid2-2.22-150200.3.3.1 * libbd_crypto2-2.22-150200.3.3.1 * libbd_part2-debuginfo-2.22-150200.3.3.1 * libblockdev2-debuginfo-2.22-150200.3.3.1 * libbd_swap2-debuginfo-2.22-150200.3.3.1 * libbd_utils2-2.22-150200.3.3.1 * libblockdev-debugsource-2.22-150200.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6019.html * https://bugzilla.suse.com/show_bug.cgi?id=1243285 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:19 -0000 Subject: SUSE-SU-2025:02042-1: important: Security update for openssl-3 Message-ID: <175042261944.11257.10779154841461905888@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:02042-1 Release Date: 2025-06-20T10:38:50Z Rating: important References: * bsc#1236136 * bsc#1236599 * bsc#1243459 Cross-References: * CVE-2024-12797 * CVE-2024-13176 * CVE-2025-27587 CVSS scores: * CVE-2024-12797 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-12797 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12797 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-13176 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-13176 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-13176 ( NVD ): 4.1 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-27587 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-27587 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2025-27587: timing side-channel vulnerability in the P-384 implementation when used with ECDSA (bsc#1243459). * CVE-2024-12797: Fixed that RFC7250 handshakes with unauthenticated servers don't abort as expected. (bsc#1236599) * CVE-2024-13176: Fixed timing side-channel in ECDSA signature computation (bsc#1236136) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2042=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libopenssl3-3.2.3-150700.5.5.1 * libopenssl-3-fips-provider-3.2.3-150700.5.5.1 * libopenssl-3-devel-3.2.3-150700.5.5.1 * libopenssl-3-fips-provider-debuginfo-3.2.3-150700.5.5.1 * openssl-3-debugsource-3.2.3-150700.5.5.1 * openssl-3-debuginfo-3.2.3-150700.5.5.1 * libopenssl3-debuginfo-3.2.3-150700.5.5.1 * openssl-3-3.2.3-150700.5.5.1 * Basesystem Module 15-SP7 (x86_64) * libopenssl-3-fips-provider-32bit-3.2.3-150700.5.5.1 * libopenssl3-32bit-3.2.3-150700.5.5.1 * libopenssl3-32bit-debuginfo-3.2.3-150700.5.5.1 * libopenssl-3-fips-provider-32bit-debuginfo-3.2.3-150700.5.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12797.html * https://www.suse.com/security/cve/CVE-2024-13176.html * https://www.suse.com/security/cve/CVE-2025-27587.html * https://bugzilla.suse.com/show_bug.cgi?id=1236136 * https://bugzilla.suse.com/show_bug.cgi?id=1236599 * https://bugzilla.suse.com/show_bug.cgi?id=1243459 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:21 -0000 Subject: SUSE-SU-2025:02041-1: important: Security update for ignition Message-ID: <175042262166.11257.14339198597696121028@smelt2.prg2.suse.org> # Security update for ignition Announcement ID: SUSE-SU-2025:02041-1 Release Date: 2025-06-20T10:04:07Z Rating: important References: * bsc#1239192 Cross-References: * CVE-2025-22868 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for ignition fixes the following issues: * CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239192). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2041=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2041=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * ignition-2.15.0-150400.4.11.1 * ignition-dracut-grub2-2.15.0-150400.4.11.1 * ignition-debuginfo-2.15.0-150400.4.11.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * ignition-2.15.0-150400.4.11.1 * ignition-dracut-grub2-2.15.0-150400.4.11.1 * ignition-debuginfo-2.15.0-150400.4.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://bugzilla.suse.com/show_bug.cgi?id=1239192 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:24 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:24 -0000 Subject: SUSE-SU-2025:02040-1: important: Security update for ignition Message-ID: <175042262411.11257.6102206038555834578@smelt2.prg2.suse.org> # Security update for ignition Announcement ID: SUSE-SU-2025:02040-1 Release Date: 2025-06-20T09:41:00Z Rating: important References: * bsc#1239192 Cross-References: * CVE-2025-22868 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for ignition fixes the following issues: * CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239192). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2040=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2040=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * ignition-debuginfo-2.14.0-150300.6.13.1 * ignition-dracut-grub2-2.14.0-150300.6.13.1 * ignition-2.14.0-150300.6.13.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * ignition-debuginfo-2.14.0-150300.6.13.1 * ignition-dracut-grub2-2.14.0-150300.6.13.1 * ignition-2.14.0-150300.6.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://bugzilla.suse.com/show_bug.cgi?id=1239192 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:28 -0000 Subject: SUSE-SU-2025:02039-1: important: Security update for nodejs20 Message-ID: <175042262839.11257.2871681860627899157@smelt2.prg2.suse.org> # Security update for nodejs20 Announcement ID: SUSE-SU-2025:02039-1 Release Date: 2025-06-20T09:40:53Z Rating: important References: * bsc#1239949 * bsc#1243217 * bsc#1243218 * bsc#1243220 Cross-References: * CVE-2025-23165 * CVE-2025-23166 * CVE-2025-23167 CVSS scores: * CVE-2025-23165 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-23165 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23165 ( NVD ): 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23166 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23166 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23166 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23167 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-23167 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-23167 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for nodejs20 fixes the following issues: Update to 20.19.2: * CVE-2025-23166: improper error handling in async cryptographic operations crashes process (bsc#1243218). * CVE-2025-23167: improper HTTP header block termination in llhttp (bsc#1243220). * CVE-2025-23165: add missing call to uv_fs_req_cleanup (bsc#1243217). Other bugfixes: * Build with PIE (bsc#1239949) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2039=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2039=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2039=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2039=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2039=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * nodejs20-debuginfo-20.19.2-150500.11.21.1 * corepack20-20.19.2-150500.11.21.1 * nodejs20-devel-20.19.2-150500.11.21.1 * nodejs20-debugsource-20.19.2-150500.11.21.1 * nodejs20-20.19.2-150500.11.21.1 * npm20-20.19.2-150500.11.21.1 * openSUSE Leap 15.5 (noarch) * nodejs20-docs-20.19.2-150500.11.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * nodejs20-debuginfo-20.19.2-150500.11.21.1 * nodejs20-devel-20.19.2-150500.11.21.1 * nodejs20-debugsource-20.19.2-150500.11.21.1 * nodejs20-20.19.2-150500.11.21.1 * npm20-20.19.2-150500.11.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * nodejs20-docs-20.19.2-150500.11.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * nodejs20-debuginfo-20.19.2-150500.11.21.1 * nodejs20-devel-20.19.2-150500.11.21.1 * nodejs20-debugsource-20.19.2-150500.11.21.1 * nodejs20-20.19.2-150500.11.21.1 * npm20-20.19.2-150500.11.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * nodejs20-docs-20.19.2-150500.11.21.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * nodejs20-debuginfo-20.19.2-150500.11.21.1 * nodejs20-devel-20.19.2-150500.11.21.1 * nodejs20-debugsource-20.19.2-150500.11.21.1 * nodejs20-20.19.2-150500.11.21.1 * npm20-20.19.2-150500.11.21.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * nodejs20-docs-20.19.2-150500.11.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * nodejs20-debuginfo-20.19.2-150500.11.21.1 * nodejs20-devel-20.19.2-150500.11.21.1 * nodejs20-debugsource-20.19.2-150500.11.21.1 * nodejs20-20.19.2-150500.11.21.1 * npm20-20.19.2-150500.11.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * nodejs20-docs-20.19.2-150500.11.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23165.html * https://www.suse.com/security/cve/CVE-2025-23166.html * https://www.suse.com/security/cve/CVE-2025-23167.html * https://bugzilla.suse.com/show_bug.cgi?id=1239949 * https://bugzilla.suse.com/show_bug.cgi?id=1243217 * https://bugzilla.suse.com/show_bug.cgi?id=1243218 * https://bugzilla.suse.com/show_bug.cgi?id=1243220 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:33 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:33 -0000 Subject: SUSE-SU-2025:02038-1: moderate: Security update for python3 Message-ID: <175042263351.11257.5468800676970548495@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2025:02038-1 Release Date: 2025-06-20T09:40:38Z Rating: moderate References: * bsc#1233012 * bsc#1243273 * bsc#1244401 Cross-References: * CVE-2025-4516 CVSS scores: * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2025-4516: CPython DecodeError Handling Vulnerability (bsc#1243273) Other fixes: \- Add python36-* provides/obsoletes to enable SLE-12 -> SLE-15 migration (bsc#1233012) \- Update vendored ipaddress module to 3.8 equivalent \- Limit buffer size for IPv6 address parsing (bsc#1244401). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2038=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libpython3_6m1_0-3.6.15-150000.3.179.1 * python3-debugsource-3.6.15-150000.3.179.1 * python3-base-debuginfo-3.6.15-150000.3.179.1 * python3-3.6.15-150000.3.179.1 * libpython3_6m1_0-debuginfo-3.6.15-150000.3.179.1 * python3-base-3.6.15-150000.3.179.1 * python3-core-debugsource-3.6.15-150000.3.179.1 * python3-debuginfo-3.6.15-150000.3.179.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4516.html * https://bugzilla.suse.com/show_bug.cgi?id=1233012 * https://bugzilla.suse.com/show_bug.cgi?id=1243273 * https://bugzilla.suse.com/show_bug.cgi?id=1244401 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:36 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:36 -0000 Subject: SUSE-SU-2025:02037-1: important: Security update for ghc-pandoc Message-ID: <175042263631.11257.13808113071621927215@smelt2.prg2.suse.org> # Security update for ghc-pandoc Announcement ID: SUSE-SU-2025:02037-1 Release Date: 2025-06-20T09:40:29Z Rating: important References: * bsc#1227690 Cross-References: * CVE-2024-38526 CVSS scores: * CVE-2024-38526 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ghc-pandoc fixes the following issues: * CVE-2024-38526: Fixed Polyfill Supply Chain Attack (bsc#1227690). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2037=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2037=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2037=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2037=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ghc-pandoc-3.1.11.1-150500.11.6.1 * ghc-pandoc-devel-3.1.11.1-150500.11.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ghc-pandoc-3.1.11.1-150500.11.6.1 * ghc-pandoc-devel-3.1.11.1-150500.11.6.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * ghc-pandoc-3.1.11.1-150500.11.6.1 * ghc-pandoc-devel-3.1.11.1-150500.11.6.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * ghc-pandoc-3.1.11.1-150500.11.6.1 * ghc-pandoc-devel-3.1.11.1-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-38526.html * https://bugzilla.suse.com/show_bug.cgi?id=1227690 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:38 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:38 -0000 Subject: SUSE-RU-2025:02036-1: important: Recommended update for google-guest-configs Message-ID: <175042263886.11257.13484472591244112875@smelt2.prg2.suse.org> # Recommended update for google-guest-configs Announcement ID: SUSE-RU-2025:02036-1 Release Date: 2025-06-20T09:28:41Z Rating: important References: * bsc#1241112 Affected Products: * Public Cloud Module 15-SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has one fix can now be installed. ## Description: This update for google-guest-configs fixes the following issues: * Check that %{_sysconfdir}/sysconfig/network/ifcfg-eth0 actually exists before making any modifications to it (bsc#1241112) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-2036=1 ## Package List: * Public Cloud Module 15-SP3 (noarch) * google-guest-configs-20241205.00-150000.1.45.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1241112 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:41 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:41 -0000 Subject: SUSE-SU-2025:02035-1: important: Security update for ignition Message-ID: <175042264110.11257.13927061108216667346@smelt2.prg2.suse.org> # Security update for ignition Announcement ID: SUSE-SU-2025:02035-1 Release Date: 2025-06-20T09:03:57Z Rating: important References: * bsc#1239192 Cross-References: * CVE-2025-22868 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that solves one vulnerability can now be installed. ## Description: This update for ignition fixes the following issues: * CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239192). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2035=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * ignition-2.14.0-150300.4.13.1 * ignition-dracut-grub2-2.14.0-150300.4.13.1 * ignition-debuginfo-2.14.0-150300.4.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://bugzilla.suse.com/show_bug.cgi?id=1239192 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:44 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:44 -0000 Subject: SUSE-SU-2025:02034-1: important: Security update for gstreamer Message-ID: <175042264459.11257.5458018137078721428@smelt2.prg2.suse.org> # Security update for gstreamer Announcement ID: SUSE-SU-2025:02034-1 Release Date: 2025-06-20T08:04:54Z Rating: important References: * bsc#1234449 Cross-References: * CVE-2024-47606 CVSS scores: * CVE-2024-47606 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47606 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47606 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer fixes the following issues: * CVE-2024-47606: Fixed integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (bsc#1234449) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2034=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2034=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2034=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2034=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2034=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2034=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * gstreamer-utils-debuginfo-1.16.3-150200.3.6.1 * typelib-1_0-Gst-1_0-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-debuginfo-1.16.3-150200.3.6.1 * gstreamer-1.16.3-150200.3.6.1 * gstreamer-debuginfo-1.16.3-150200.3.6.1 * gstreamer-utils-1.16.3-150200.3.6.1 * gstreamer-devel-1.16.3-150200.3.6.1 * gstreamer-debugsource-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-1.16.3-150200.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gstreamer-lang-1.16.3-150200.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * gstreamer-utils-debuginfo-1.16.3-150200.3.6.1 * typelib-1_0-Gst-1_0-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-debuginfo-1.16.3-150200.3.6.1 * gstreamer-1.16.3-150200.3.6.1 * gstreamer-debuginfo-1.16.3-150200.3.6.1 * gstreamer-utils-1.16.3-150200.3.6.1 * gstreamer-devel-1.16.3-150200.3.6.1 * gstreamer-debugsource-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-1.16.3-150200.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * gstreamer-lang-1.16.3-150200.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * gstreamer-utils-debuginfo-1.16.3-150200.3.6.1 * typelib-1_0-Gst-1_0-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-debuginfo-1.16.3-150200.3.6.1 * gstreamer-1.16.3-150200.3.6.1 * gstreamer-debuginfo-1.16.3-150200.3.6.1 * gstreamer-utils-1.16.3-150200.3.6.1 * gstreamer-devel-1.16.3-150200.3.6.1 * gstreamer-debugsource-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-1.16.3-150200.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gstreamer-lang-1.16.3-150200.3.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * gstreamer-utils-debuginfo-1.16.3-150200.3.6.1 * typelib-1_0-Gst-1_0-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-debuginfo-1.16.3-150200.3.6.1 * gstreamer-1.16.3-150200.3.6.1 * gstreamer-debuginfo-1.16.3-150200.3.6.1 * gstreamer-utils-1.16.3-150200.3.6.1 * gstreamer-devel-1.16.3-150200.3.6.1 * gstreamer-debugsource-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-1.16.3-150200.3.6.1 * SUSE Enterprise Storage 7.1 (noarch) * gstreamer-lang-1.16.3-150200.3.6.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libgstreamer-1_0-0-debuginfo-1.16.3-150200.3.6.1 * gstreamer-1.16.3-150200.3.6.1 * gstreamer-debuginfo-1.16.3-150200.3.6.1 * gstreamer-debugsource-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-1.16.3-150200.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libgstreamer-1_0-0-debuginfo-1.16.3-150200.3.6.1 * gstreamer-1.16.3-150200.3.6.1 * gstreamer-debuginfo-1.16.3-150200.3.6.1 * gstreamer-debugsource-1.16.3-150200.3.6.1 * libgstreamer-1_0-0-1.16.3-150200.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47606.html * https://bugzilla.suse.com/show_bug.cgi?id=1234449 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 12:30:51 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 12:30:51 -0000 Subject: SUSE-SU-2025:02033-1: important: Security update for webkit2gtk3 Message-ID: <175042265141.11257.11437954128491741211@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:02033-1 Release Date: 2025-06-20T08:04:18Z Rating: important References: * bsc#1241158 * bsc#1241160 * bsc#1243282 * bsc#1243286 * bsc#1243288 * bsc#1243289 * bsc#1243424 * bsc#1243596 Cross-References: * CVE-2023-42875 * CVE-2023-42970 * CVE-2025-24223 * CVE-2025-31204 * CVE-2025-31205 * CVE-2025-31206 * CVE-2025-31215 * CVE-2025-31257 CVSS scores: * CVE-2023-42875 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-42875 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-42875 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-42970 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-42970 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42970 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24223 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24223 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24223 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31204 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31204 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31205 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-31205 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-31206 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-31206 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-31215 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-31215 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-31257 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-31257 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-31257 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves eight vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.48.2: * CVE-2025-24223: Processing maliciously crafted web content may lead to memory corruption (bsc#1243424). * CVE-2025-31204: Processing maliciously crafted web content may lead to memory corruption (bsc#1243286). * CVE-2025-31205: A malicious website may exfiltrate data cross-origin (bsc#1243282). * CVE-2025-31206: Processing maliciously crafted web content may lead to an unexpected crash (bsc#1243288). * CVE-2025-31215: Processing maliciously crafted web content may lead to an unexpected process crash (bsc#1243289). * CVE-2025-31257: Improper memory handling when processing certain web content may lead to an unexpected crash (bsc#1243596). * CVE-2023-42875: Improper memory handling may lead to arbitrary code execution when processing certain web content (bsc#1241158). * CVE-2023-42970: Improper memory management may lead to use-after-free when processing certain web content (bsc#1241160). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2033=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2033=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2033=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2033=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150200.147.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150200.147.1 * webkit2gtk3-debugsource-2.48.2-150200.147.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150200.147.1 * libwebkit2gtk-4_0-37-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-2.48.2-150200.147.1 * typelib-1_0-WebKit2-4_0-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150200.147.1 * webkit2gtk3-devel-2.48.2-150200.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.48.2-150200.147.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150200.147.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150200.147.1 * webkit2gtk3-debugsource-2.48.2-150200.147.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150200.147.1 * libwebkit2gtk-4_0-37-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-2.48.2-150200.147.1 * typelib-1_0-WebKit2-4_0-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150200.147.1 * webkit2gtk3-devel-2.48.2-150200.147.1 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.48.2-150200.147.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150200.147.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150200.147.1 * webkit2gtk3-debugsource-2.48.2-150200.147.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150200.147.1 * libwebkit2gtk-4_0-37-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-2.48.2-150200.147.1 * typelib-1_0-WebKit2-4_0-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150200.147.1 * webkit2gtk3-devel-2.48.2-150200.147.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.48.2-150200.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.2-150200.147.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.2-150200.147.1 * webkit2gtk3-debugsource-2.48.2-150200.147.1 * typelib-1_0-JavaScriptCore-4_0-2.48.2-150200.147.1 * libwebkit2gtk-4_0-37-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-2.48.2-150200.147.1 * typelib-1_0-WebKit2-4_0-2.48.2-150200.147.1 * webkit2gtk-4_0-injected-bundles-2.48.2-150200.147.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.2-150200.147.1 * webkit2gtk3-devel-2.48.2-150200.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * libwebkit2gtk3-lang-2.48.2-150200.147.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42875.html * https://www.suse.com/security/cve/CVE-2023-42970.html * https://www.suse.com/security/cve/CVE-2025-24223.html * https://www.suse.com/security/cve/CVE-2025-31204.html * https://www.suse.com/security/cve/CVE-2025-31205.html * https://www.suse.com/security/cve/CVE-2025-31206.html * https://www.suse.com/security/cve/CVE-2025-31215.html * https://www.suse.com/security/cve/CVE-2025-31257.html * https://bugzilla.suse.com/show_bug.cgi?id=1241158 * https://bugzilla.suse.com/show_bug.cgi?id=1241160 * https://bugzilla.suse.com/show_bug.cgi?id=1243282 * https://bugzilla.suse.com/show_bug.cgi?id=1243286 * https://bugzilla.suse.com/show_bug.cgi?id=1243288 * https://bugzilla.suse.com/show_bug.cgi?id=1243289 * https://bugzilla.suse.com/show_bug.cgi?id=1243424 * https://bugzilla.suse.com/show_bug.cgi?id=1243596 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:21 -0000 Subject: SUSE-SU-2025:02055-1: important: Security update for gstreamer-plugins-good Message-ID: <175043702137.4922.6304033207251368617@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-good Announcement ID: SUSE-SU-2025:02055-1 Release Date: 2025-06-20T15:35:12Z Rating: important References: * bsc#1234414 * bsc#1234417 * bsc#1234421 * bsc#1234424 * bsc#1234425 * bsc#1234427 * bsc#1234428 * bsc#1234432 * bsc#1234433 * bsc#1234434 * bsc#1234435 * bsc#1234436 * bsc#1234439 * bsc#1234440 * bsc#1234446 * bsc#1234447 * bsc#1234449 * bsc#1234462 * bsc#1234473 * bsc#1234476 * bsc#1234477 Cross-References: * CVE-2024-47530 * CVE-2024-47537 * CVE-2024-47539 * CVE-2024-47543 * CVE-2024-47544 * CVE-2024-47545 * CVE-2024-47546 * CVE-2024-47596 * CVE-2024-47597 * CVE-2024-47599 * CVE-2024-47601 * CVE-2024-47602 * CVE-2024-47603 * CVE-2024-47606 * CVE-2024-47613 * CVE-2024-47774 * CVE-2024-47775 * CVE-2024-47776 * CVE-2024-47777 * CVE-2024-47778 * CVE-2024-47834 CVSS scores: * CVE-2024-47530 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-47530 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-47537 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47537 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47537 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47539 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47539 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47539 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47543 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47543 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47543 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47544 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47544 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47544 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47545 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47545 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47545 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47546 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47546 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47546 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47596 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47596 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47597 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47597 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47599 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47599 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47601 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47601 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47602 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47602 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47603 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47603 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47606 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47606 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47606 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47613 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47613 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47774 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47774 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47775 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47775 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47776 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47776 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47777 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47777 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47778 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47778 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47834 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47834 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 21 vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-good fixes the following issues: * CVE-2024-47537: Fixed OOB-write in isomp4/qtdemux.c (bsc#1234414) * CVE-2024-47539: Fixed OOB-write in convert_to_s334_1a (bsc#1234417) * CVE-2024-47540: Fixed uninitialized stack memory in Matroska/WebM demuxer (bsc#1234421) * CVE-2024-47543: Fixed OOB-read in qtdemux_parse_container (bsc#1234462) * CVE-2024-47544: Fixed NULL-pointer dereferences in MP4/MOV demuxer CENC handling (bsc#1234473) * CVE-2024-47545: Fixed integer underflow in FOURCC_strf parsing leading to OOB-read (bsc#1234476) * CVE-2024-47546: Fixed integer underflow in extract_cc_from_data leading to OOB-read (bsc#1234477) * CVE-2024-47596: Fixed integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads (bsc#1234424) * CVE-2024-47597: Fixed OOB-reads in MP4/MOV demuxer sample table parser (bsc#1234425) * CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (bsc#1234427) * CVE-2024-47601: Fixed NULL-pointer dereference in Matroska/WebM demuxer (bsc#1234428) * CVE-2024-47602: Fixed NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (bsc#1234432) * CVE-2024-47603: Fixed NULL-pointer dereference in Matroska/WebM demuxer (bsc#1234433) * CVE-2024-47606: Fixed integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (bsc#1234449) * CVE-2024-47613: Fixed NULL-pointer dereference in gdk-pixbuf decoder (bsc#1234447) * CVE-2024-47774: Fixed integer overflow in AVI subtitle parser that leads to out-of-bounds reads (bsc#1234446) * CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser (bsc#1234434) * CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser (bsc#1234435) * CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser (bsc#1234436) * CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser (bsc#1234439) * CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files (bsc#1234440) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2055=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2055=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2055=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2055=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * gstreamer-plugins-good-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debugsource-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debuginfo-1.16.3-150200.3.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gstreamer-plugins-good-lang-1.16.3-150200.3.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-good-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debugsource-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debuginfo-1.16.3-150200.3.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * gstreamer-plugins-good-lang-1.16.3-150200.3.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * gstreamer-plugins-good-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debugsource-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debuginfo-1.16.3-150200.3.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gstreamer-plugins-good-lang-1.16.3-150200.3.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * gstreamer-plugins-good-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debugsource-1.16.3-150200.3.17.1 * gstreamer-plugins-good-debuginfo-1.16.3-150200.3.17.1 * SUSE Enterprise Storage 7.1 (noarch) * gstreamer-plugins-good-lang-1.16.3-150200.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47530.html * https://www.suse.com/security/cve/CVE-2024-47537.html * https://www.suse.com/security/cve/CVE-2024-47539.html * https://www.suse.com/security/cve/CVE-2024-47543.html * https://www.suse.com/security/cve/CVE-2024-47544.html * https://www.suse.com/security/cve/CVE-2024-47545.html * https://www.suse.com/security/cve/CVE-2024-47546.html * https://www.suse.com/security/cve/CVE-2024-47596.html * https://www.suse.com/security/cve/CVE-2024-47597.html * https://www.suse.com/security/cve/CVE-2024-47599.html * https://www.suse.com/security/cve/CVE-2024-47601.html * https://www.suse.com/security/cve/CVE-2024-47602.html * https://www.suse.com/security/cve/CVE-2024-47603.html * https://www.suse.com/security/cve/CVE-2024-47606.html * https://www.suse.com/security/cve/CVE-2024-47613.html * https://www.suse.com/security/cve/CVE-2024-47774.html * https://www.suse.com/security/cve/CVE-2024-47775.html * https://www.suse.com/security/cve/CVE-2024-47776.html * https://www.suse.com/security/cve/CVE-2024-47777.html * https://www.suse.com/security/cve/CVE-2024-47778.html * https://www.suse.com/security/cve/CVE-2024-47834.html * https://bugzilla.suse.com/show_bug.cgi?id=1234414 * https://bugzilla.suse.com/show_bug.cgi?id=1234417 * https://bugzilla.suse.com/show_bug.cgi?id=1234421 * https://bugzilla.suse.com/show_bug.cgi?id=1234424 * https://bugzilla.suse.com/show_bug.cgi?id=1234425 * https://bugzilla.suse.com/show_bug.cgi?id=1234427 * https://bugzilla.suse.com/show_bug.cgi?id=1234428 * https://bugzilla.suse.com/show_bug.cgi?id=1234432 * https://bugzilla.suse.com/show_bug.cgi?id=1234433 * https://bugzilla.suse.com/show_bug.cgi?id=1234434 * https://bugzilla.suse.com/show_bug.cgi?id=1234435 * https://bugzilla.suse.com/show_bug.cgi?id=1234436 * https://bugzilla.suse.com/show_bug.cgi?id=1234439 * https://bugzilla.suse.com/show_bug.cgi?id=1234440 * https://bugzilla.suse.com/show_bug.cgi?id=1234446 * https://bugzilla.suse.com/show_bug.cgi?id=1234447 * https://bugzilla.suse.com/show_bug.cgi?id=1234449 * https://bugzilla.suse.com/show_bug.cgi?id=1234462 * https://bugzilla.suse.com/show_bug.cgi?id=1234473 * https://bugzilla.suse.com/show_bug.cgi?id=1234476 * https://bugzilla.suse.com/show_bug.cgi?id=1234477 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:26 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:26 -0000 Subject: SUSE-RU-2025:02054-1: moderate: Recommended update for google-cloud-sap-agent Message-ID: <175043702608.4922.7216997730527911345@smelt2.prg2.suse.org> # Recommended update for google-cloud-sap-agent Announcement ID: SUSE-RU-2025:02054-1 Release Date: 2025-06-20T15:27:31Z Rating: moderate References: * bsc#1239946 * bsc#1244295 * bsc#1244324 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has three fixes can now be installed. ## Description: This update for google-cloud-sap-agent fixes the following issues: * Update to version 3.8 (bsc#1244324, bsc#1244295) * Remove parsing of Pacemaker attribute is_ccm * Update spec file to remove GCBDR packages * Internal cleanup * Send agent status to WLM DW with WriteInsight() * Adds upcoming maintenance events chart and table to the maintenance system events dashboard * Fix Backint log_to_cloud configuration parameter * Update list of process metrics and hanamonitoring * Added Usage metrics to support bundle tool. * Enhance Support bundle collection * Updates to the maintenance dashboard with instructions on setup in the README.md * Update metric override file with new metrics marked for v3.8. * Dashboard updates * Add unit tests for gcealpha.go * Add unit tests for restore.go, remove unreachable code * Add unit tests for versionhandler * Outputting the agent status as a JSON string so it can be queried and parsed Log Analytics * Add usagemetrics for remaining OTEs * Increase coverage to > 90% in processmetrics/networkstats test * Increase coverage to > 90% in processmetrics/hanavolume test * Add unit tests for hanabackup * Added Test Case for GCE Service Creation Failure in Remote Validation Onetime Execution. * Internal change * Update below parameters in google-x4.conf file * Add Hana Monitoring metrics: * Add Hana log disk utilisation metric (in Kb) * Add Linux os metrics as part of process metrics * Make the bare metal metric resource type non-generic * Update TODO * Check the status of the WLM Data Warehouse API before starting metric collection. * Fix data race in status test * Make the bare metal metric resource type non-generic * Add WLM metric collection for SELinux config settings. * Adding the kernel version to the SAP System discovery data. * Collect SAP events in support bundle. * Adding support to collect hana monitoring metrics. * Auto updated compiled protocol buffers * Add Pacemaker WLM metrics: ASCS_IP, ERS_IP, ASCS_VIRTUAL_IP, ERS_VIRTUAL_IP * Add WLM metric collection for kernel version. * Fix github build failures. * Update Go version in build to 1.24.2. * Collect Status in daemon mode * Status OTE agent changes to use artifact registry list version * Add support for /var/log/messages collection including rolled over messages * Added timezone handling logic for querying process metrics * Add WLM metric: CLUSTER_HEALTHY for pacemaker * Collection definition test improvements. * Added support to collect pacemaker log files * Default Pacemaker PCMK fields to empty string. * Use correct destination folder in collectProcessMetrics * Ignore timestamps in test * Update process metrics query to use timestamp, before and after duration. * Add functionality to collect process metrics * Update SAP guest actions to utilize shared library * Update SAP Agent logusage command help message * Changes to the github action if commit/push of generated protos fails * Fix a couple of comments. * Adding support for collecting SapDiscovery logs from cloud logging. * Cleanup agentmetrics_test.go * Proto change * Adjust upstream source paths in spec file * Bump Go ABI version to 1.24 in BuildRequires * Add -buildmode=pie to go build command line (bsc#1239946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2054=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-2054=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2054=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-2054=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-2054=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-2054=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.8-150100.3.50.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.8-150100.3.50.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.8-150100.3.50.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.8-150100.3.50.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.8-150100.3.50.1 * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * google-cloud-sap-agent-3.8-150100.3.50.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239946 * https://bugzilla.suse.com/show_bug.cgi?id=1244295 * https://bugzilla.suse.com/show_bug.cgi?id=1244324 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:31 -0000 Subject: SUSE-SU-2025:02053-1: important: Security update for gstreamer-plugins-good Message-ID: <175043703196.4922.6753888499377930425@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-good Announcement ID: SUSE-SU-2025:02053-1 Release Date: 2025-06-20T13:05:43Z Rating: important References: * bsc#1234421 * bsc#1244405 * bsc#1244406 Cross-References: * CVE-2024-47540 * CVE-2025-47183 * CVE-2025-47219 CVSS scores: * CVE-2024-47540 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47540 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47540 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47183 ( SUSE ): 5.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47183 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H * CVE-2025-47219 ( SUSE ): 5.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-good fixes the following issues: * CVE-2025-47183: Fixed out-of-bounds read in MOV/MP4 demuxer (bsc#1244406). * CVE-2025-47219: Fixed out-of-bounds read in MOV/MP4 demuxer (bsc#1244405). * CVE-2024-47540: Fixed uninitialized stack memory in Matroska/WebM demuxer (bsc#1234421). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2053=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2053=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2053=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2053=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2053=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-good-gtk-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-gtk-1.22.0-150500.4.10.1 * gstreamer-plugins-good-debugsource-1.22.0-150500.4.10.1 * gstreamer-plugins-good-qtqml-1.22.0-150500.4.10.1 * gstreamer-plugins-good-extra-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-1.22.0-150500.4.10.1 * gstreamer-plugins-good-extra-1.22.0-150500.4.10.1 * gstreamer-plugins-good-jack-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-jack-1.22.0-150500.4.10.1 * gstreamer-plugins-good-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-qtqml-debuginfo-1.22.0-150500.4.10.1 * openSUSE Leap 15.5 (x86_64) * gstreamer-plugins-good-extra-32bit-1.22.0-150500.4.10.1 * gstreamer-plugins-good-jack-32bit-1.22.0-150500.4.10.1 * gstreamer-plugins-good-extra-32bit-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-jack-32bit-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-32bit-1.22.0-150500.4.10.1 * gstreamer-plugins-good-32bit-debuginfo-1.22.0-150500.4.10.1 * openSUSE Leap 15.5 (noarch) * gstreamer-plugins-good-lang-1.22.0-150500.4.10.1 * openSUSE Leap 15.5 (aarch64_ilp32) * gstreamer-plugins-good-64bit-1.22.0-150500.4.10.1 * gstreamer-plugins-good-jack-64bit-1.22.0-150500.4.10.1 * gstreamer-plugins-good-extra-64bit-1.22.0-150500.4.10.1 * gstreamer-plugins-good-extra-64bit-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-64bit-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-jack-64bit-debuginfo-1.22.0-150500.4.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * gstreamer-plugins-good-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-debugsource-1.22.0-150500.4.10.1 * gstreamer-plugins-good-1.22.0-150500.4.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * gstreamer-plugins-good-lang-1.22.0-150500.4.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * gstreamer-plugins-good-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-debugsource-1.22.0-150500.4.10.1 * gstreamer-plugins-good-1.22.0-150500.4.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * gstreamer-plugins-good-lang-1.22.0-150500.4.10.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-good-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-debugsource-1.22.0-150500.4.10.1 * gstreamer-plugins-good-1.22.0-150500.4.10.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * gstreamer-plugins-good-lang-1.22.0-150500.4.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * gstreamer-plugins-good-debuginfo-1.22.0-150500.4.10.1 * gstreamer-plugins-good-debugsource-1.22.0-150500.4.10.1 * gstreamer-plugins-good-1.22.0-150500.4.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * gstreamer-plugins-good-lang-1.22.0-150500.4.10.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47540.html * https://www.suse.com/security/cve/CVE-2025-47183.html * https://www.suse.com/security/cve/CVE-2025-47219.html * https://bugzilla.suse.com/show_bug.cgi?id=1234421 * https://bugzilla.suse.com/show_bug.cgi?id=1244405 * https://bugzilla.suse.com/show_bug.cgi?id=1244406 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:35 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:35 -0000 Subject: SUSE-SU-2025:02052-1: important: Security update for apache2-mod_security2 Message-ID: <175043703542.4922.17724561835960207564@smelt2.prg2.suse.org> # Security update for apache2-mod_security2 Announcement ID: SUSE-SU-2025:02052-1 Release Date: 2025-06-20T13:05:01Z Rating: important References: * bsc#1243976 * bsc#1243978 Cross-References: * CVE-2025-47947 * CVE-2025-48866 CVSS scores: * CVE-2025-47947 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47947 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47947 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48866 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-48866 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48866 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for apache2-mod_security2 fixes the following issues: * CVE-2025-47947: Fixed denial of service through sanitiseMatchedBytes (bsc#1243978). * CVE-2025-48866: Fixed denial of service via excessive number of arguments in sanitiseArg (bsc#1243976). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2052=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2052=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_security2-debugsource-2.8.0-7.9.1 * apache2-mod_security2-debuginfo-2.8.0-7.9.1 * apache2-mod_security2-2.8.0-7.9.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * apache2-mod_security2-debugsource-2.8.0-7.9.1 * apache2-mod_security2-debuginfo-2.8.0-7.9.1 * apache2-mod_security2-2.8.0-7.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47947.html * https://www.suse.com/security/cve/CVE-2025-48866.html * https://bugzilla.suse.com/show_bug.cgi?id=1243976 * https://bugzilla.suse.com/show_bug.cgi?id=1243978 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:37 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:37 -0000 Subject: SUSE-SU-2025:02051-1: moderate: Security update for perl Message-ID: <175043703746.4922.12486465613216357798@smelt2.prg2.suse.org> # Security update for perl Announcement ID: SUSE-SU-2025:02051-1 Release Date: 2025-06-20T12:42:29Z Rating: moderate References: * bsc#1244079 Cross-References: * CVE-2025-40909 CVSS scores: * CVE-2025-40909 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2025-40909 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for perl fixes the following issues: * CVE-2025-40909: do not change the current directory when cloning an open directory handle (bsc#1244079) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2051=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * perl-base-debuginfo-5.18.2-12.29.1 * perl-debuginfo-32bit-5.18.2-12.29.1 * perl-debugsource-5.18.2-12.29.1 * perl-debuginfo-5.18.2-12.29.1 * perl-base-5.18.2-12.29.1 * perl-5.18.2-12.29.1 * perl-32bit-5.18.2-12.29.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * perl-doc-5.18.2-12.29.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40909.html * https://bugzilla.suse.com/show_bug.cgi?id=1244079 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:45 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:45 -0000 Subject: SUSE-SU-2025:02050-1: important: Security update for python39 Message-ID: <175043704525.4922.11370432433157698662@smelt2.prg2.suse.org> # Security update for python39 Announcement ID: SUSE-SU-2025:02050-1 Release Date: 2025-06-20T12:42:19Z Rating: important References: * bsc#1239210 * bsc#1241067 * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 Cross-References: * CVE-2024-12718 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4516 * CVE-2025-4517 CVSS scores: * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities and has two security fixes can now be installed. ## Description: This update for python39 fixes the following issues: python39 was updated from version 3.9.21 to version 3.9.23: * Security issues fixed: * CVE-2025-4516: Fixed blocking DecodeError handling vulnerability, which could lead to DoS (bsc#1243273) * CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517: Fixed multiple issues that allowed tarfile extraction filters to be bypassed using crafted symlinks and hard links (bsc#1244056, bsc#1244059, bsc#1244060, bsc#1244032) * Other changes and bugs fixed: * Fixed issue with reproducible builds (bsc#1239210) * Fixed a potential denial of service vulnerability in the imaplib module. * Fixed bugs in the in the folding of rfc2047 encoded-words and in the folding of quoted strings when flattening an email message using a modern email policy. * Fixed parsing long IPv6 addresses with embedded IPv4 address. * Fixed ipaddress.IPv6Address.reverse_pointer output according to RFC 3596, ?2.5. * Improved the textual representation of IPv4-mapped IPv6 addresses in ipaddress. * ipaddress: fixed hash collisions for IPv4Network and IPv6Network objects * os.path.realpath() now accepts a strict keyword-only argument. * Stop the processing of long IPv6 addresses early in ipaddress to prevent excessive memory consumption and a minor denial-of-service. * Updated bundled libexpat to 2.7.1 * Writers of CPython?s documentation can now use next as the version for the versionchanged, versionadded, deprecated directives. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-2050=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2050=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2050=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2050=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2050=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2050=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2050=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2050=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python39-tk-3.9.23-150300.4.75.1 * python39-dbm-3.9.23-150300.4.75.1 * python39-idle-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-testsuite-3.9.23-150300.4.75.1 * python39-testsuite-debuginfo-3.9.23-150300.4.75.1 * python39-debuginfo-3.9.23-150300.4.75.1 * python39-debugsource-3.9.23-150300.4.75.1 * python39-curses-debuginfo-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * libpython3_9-1_0-debuginfo-3.9.23-150300.4.75.1 * python39-doc-3.9.23-150300.4.75.1 * python39-dbm-debuginfo-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * python39-tk-debuginfo-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-tools-3.9.23-150300.4.75.1 * python39-doc-devhelp-3.9.23-150300.4.75.1 * python39-base-debuginfo-3.9.23-150300.4.75.1 * python39-devel-3.9.23-150300.4.75.1 * python39-core-debugsource-3.9.23-150300.4.75.1 * openSUSE Leap 15.3 (x86_64) * python39-32bit-3.9.23-150300.4.75.1 * libpython3_9-1_0-32bit-debuginfo-3.9.23-150300.4.75.1 * python39-32bit-debuginfo-3.9.23-150300.4.75.1 * python39-base-32bit-3.9.23-150300.4.75.1 * python39-base-32bit-debuginfo-3.9.23-150300.4.75.1 * libpython3_9-1_0-32bit-3.9.23-150300.4.75.1 * openSUSE Leap 15.3 (aarch64_ilp32) * python39-base-64bit-3.9.23-150300.4.75.1 * python39-64bit-debuginfo-3.9.23-150300.4.75.1 * libpython3_9-1_0-64bit-3.9.23-150300.4.75.1 * python39-64bit-3.9.23-150300.4.75.1 * libpython3_9-1_0-64bit-debuginfo-3.9.23-150300.4.75.1 * python39-base-64bit-debuginfo-3.9.23-150300.4.75.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python39-tk-3.9.23-150300.4.75.1 * python39-dbm-3.9.23-150300.4.75.1 * python39-idle-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-testsuite-3.9.23-150300.4.75.1 * python39-testsuite-debuginfo-3.9.23-150300.4.75.1 * python39-debuginfo-3.9.23-150300.4.75.1 * python39-debugsource-3.9.23-150300.4.75.1 * python39-curses-debuginfo-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * libpython3_9-1_0-debuginfo-3.9.23-150300.4.75.1 * python39-doc-3.9.23-150300.4.75.1 * python39-dbm-debuginfo-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * python39-tk-debuginfo-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-tools-3.9.23-150300.4.75.1 * python39-doc-devhelp-3.9.23-150300.4.75.1 * python39-base-debuginfo-3.9.23-150300.4.75.1 * python39-devel-3.9.23-150300.4.75.1 * python39-core-debugsource-3.9.23-150300.4.75.1 * openSUSE Leap 15.6 (x86_64) * python39-32bit-3.9.23-150300.4.75.1 * libpython3_9-1_0-32bit-debuginfo-3.9.23-150300.4.75.1 * python39-32bit-debuginfo-3.9.23-150300.4.75.1 * python39-base-32bit-3.9.23-150300.4.75.1 * python39-base-32bit-debuginfo-3.9.23-150300.4.75.1 * libpython3_9-1_0-32bit-3.9.23-150300.4.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python39-curses-debuginfo-3.9.23-150300.4.75.1 * python39-dbm-debuginfo-3.9.23-150300.4.75.1 * python39-tk-3.9.23-150300.4.75.1 * python39-debugsource-3.9.23-150300.4.75.1 * python39-dbm-3.9.23-150300.4.75.1 * python39-tools-3.9.23-150300.4.75.1 * python39-idle-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-tk-debuginfo-3.9.23-150300.4.75.1 * python39-base-debuginfo-3.9.23-150300.4.75.1 * python39-devel-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-debuginfo-3.9.23-150300.4.75.1 * python39-core-debugsource-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * libpython3_9-1_0-debuginfo-3.9.23-150300.4.75.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * python39-curses-debuginfo-3.9.23-150300.4.75.1 * python39-dbm-debuginfo-3.9.23-150300.4.75.1 * python39-tk-3.9.23-150300.4.75.1 * python39-debugsource-3.9.23-150300.4.75.1 * python39-dbm-3.9.23-150300.4.75.1 * python39-tools-3.9.23-150300.4.75.1 * python39-idle-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-tk-debuginfo-3.9.23-150300.4.75.1 * python39-base-debuginfo-3.9.23-150300.4.75.1 * python39-devel-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-debuginfo-3.9.23-150300.4.75.1 * python39-core-debugsource-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * libpython3_9-1_0-debuginfo-3.9.23-150300.4.75.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python39-dbm-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python39-curses-debuginfo-3.9.23-150300.4.75.1 * python39-dbm-debuginfo-3.9.23-150300.4.75.1 * python39-tk-3.9.23-150300.4.75.1 * python39-debugsource-3.9.23-150300.4.75.1 * python39-dbm-3.9.23-150300.4.75.1 * python39-tools-3.9.23-150300.4.75.1 * python39-idle-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-tk-debuginfo-3.9.23-150300.4.75.1 * python39-base-debuginfo-3.9.23-150300.4.75.1 * python39-devel-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-debuginfo-3.9.23-150300.4.75.1 * python39-core-debugsource-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * libpython3_9-1_0-debuginfo-3.9.23-150300.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python39-dbm-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python39-curses-debuginfo-3.9.23-150300.4.75.1 * python39-dbm-debuginfo-3.9.23-150300.4.75.1 * python39-tk-3.9.23-150300.4.75.1 * python39-debugsource-3.9.23-150300.4.75.1 * python39-dbm-3.9.23-150300.4.75.1 * python39-tools-3.9.23-150300.4.75.1 * python39-idle-3.9.23-150300.4.75.1 * python39-3.9.23-150300.4.75.1 * libpython3_9-1_0-3.9.23-150300.4.75.1 * python39-tk-debuginfo-3.9.23-150300.4.75.1 * python39-base-debuginfo-3.9.23-150300.4.75.1 * python39-devel-3.9.23-150300.4.75.1 * python39-curses-3.9.23-150300.4.75.1 * python39-debuginfo-3.9.23-150300.4.75.1 * python39-core-debugsource-3.9.23-150300.4.75.1 * python39-base-3.9.23-150300.4.75.1 * libpython3_9-1_0-debuginfo-3.9.23-150300.4.75.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12718.html * https://www.suse.com/security/cve/CVE-2025-4138.html * https://www.suse.com/security/cve/CVE-2025-4330.html * https://www.suse.com/security/cve/CVE-2025-4516.html * https://www.suse.com/security/cve/CVE-2025-4517.html * https://bugzilla.suse.com/show_bug.cgi?id=1239210 * https://bugzilla.suse.com/show_bug.cgi?id=1241067 * https://bugzilla.suse.com/show_bug.cgi?id=1243273 * https://bugzilla.suse.com/show_bug.cgi?id=1244032 * https://bugzilla.suse.com/show_bug.cgi?id=1244056 * https://bugzilla.suse.com/show_bug.cgi?id=1244059 * https://bugzilla.suse.com/show_bug.cgi?id=1244060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:51 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:51 -0000 Subject: SUSE-SU-2025:02049-1: important: Security update for python311 Message-ID: <175043705196.4922.6878053313017706974@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:02049-1 Release Date: 2025-06-20T12:41:36Z Rating: important References: * bsc#1241067 * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 Cross-References: * CVE-2024-12718 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4516 * CVE-2025-4517 CVSS scores: * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for python311 fixes the following issues: python311 was updated from version 3.11.10 to 3.11.13: * Security issues fixed: * CVE-2025-4516: Fixed blocking DecodeError handling vulnerability, which could lead to DoS (bsc#1243273). * CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517: Fixed multiple issues that allowed tarfile extraction filters to be bypassed using crafted symlinks and hard links (bsc#1244056, bsc#1244059, bsc#1244060, bsc#1244032) * Other bugs fixed: * Improved handling of system call failures that OpenSSL reports (bsc#1241067) * Disable GC during thread operations to prevent deadlocks. * Fixed a potential denial of service vulnerability in the imaplib module. * Fixed bugs in the in the folding of rfc2047 encoded-words and in the folding of quoted strings when flattening an email message using a modern email policy. * Fixed parsing long IPv6 addresses with embedded IPv4 address. * Fixed ipaddress.IPv6Address.reverse_pointer output according to RFC 3596. * Improved the textual representation of IPv4-mapped IPv6 addresses in ipaddress. * ipaddress: fixed hash collisions for IPv4Network and IPv6Network objects * os.path.realpath() now accepts a strict keyword-only argument. * Stop the processing of long IPv6 addresses early in ipaddress to prevent excessive memory consumption and a minor denial-of-service. * Updated bundled libexpat to 2.7.1 * Writers of CPython documentation can now use next as the version for the versionchanged, versionadded, deprecated directives. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2049=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2049=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2049=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2049=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2049=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2049=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2049=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2049=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2049=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2049=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-debuginfo-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-testsuite-debuginfo-3.11.13-150400.9.60.1 * python311-testsuite-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * openSUSE Leap 15.4 (x86_64) * python311-32bit-debuginfo-3.11.13-150400.9.60.1 * libpython3_11-1_0-32bit-debuginfo-3.11.13-150400.9.60.1 * python311-32bit-3.11.13-150400.9.60.1 * python311-base-32bit-debuginfo-3.11.13-150400.9.60.1 * python311-base-32bit-3.11.13-150400.9.60.1 * libpython3_11-1_0-32bit-3.11.13-150400.9.60.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python311-64bit-debuginfo-3.11.13-150400.9.60.1 * python311-base-64bit-debuginfo-3.11.13-150400.9.60.1 * libpython3_11-1_0-64bit-debuginfo-3.11.13-150400.9.60.1 * python311-64bit-3.11.13-150400.9.60.1 * python311-base-64bit-3.11.13-150400.9.60.1 * libpython3_11-1_0-64bit-3.11.13-150400.9.60.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * python311-core-debugsource-3.11.13-150400.9.60.1 * python311-3.11.13-150400.9.60.1 * libpython3_11-1_0-3.11.13-150400.9.60.1 * python311-debuginfo-3.11.13-150400.9.60.1 * python311-tools-3.11.13-150400.9.60.1 * python311-devel-3.11.13-150400.9.60.1 * python311-dbm-debuginfo-3.11.13-150400.9.60.1 * python311-curses-3.11.13-150400.9.60.1 * python311-curses-debuginfo-3.11.13-150400.9.60.1 * python311-base-3.11.13-150400.9.60.1 * python311-dbm-3.11.13-150400.9.60.1 * python311-debugsource-3.11.13-150400.9.60.1 * python311-doc-devhelp-3.11.13-150400.9.60.1 * python311-base-debuginfo-3.11.13-150400.9.60.1 * python311-idle-3.11.13-150400.9.60.1 * python311-doc-3.11.13-150400.9.60.1 * python311-tk-debuginfo-3.11.13-150400.9.60.1 * python311-tk-3.11.13-150400.9.60.1 * libpython3_11-1_0-debuginfo-3.11.13-150400.9.60.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12718.html * https://www.suse.com/security/cve/CVE-2025-4138.html * https://www.suse.com/security/cve/CVE-2025-4330.html * https://www.suse.com/security/cve/CVE-2025-4516.html * https://www.suse.com/security/cve/CVE-2025-4517.html * https://bugzilla.suse.com/show_bug.cgi?id=1241067 * https://bugzilla.suse.com/show_bug.cgi?id=1243273 * https://bugzilla.suse.com/show_bug.cgi?id=1244032 * https://bugzilla.suse.com/show_bug.cgi?id=1244056 * https://bugzilla.suse.com/show_bug.cgi?id=1244059 * https://bugzilla.suse.com/show_bug.cgi?id=1244060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:30:58 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:30:58 -0000 Subject: SUSE-SU-2025:02048-1: important: Security update for python312 Message-ID: <175043705842.4922.8176911279085544326@smelt2.prg2.suse.org> # Security update for python312 Announcement ID: SUSE-SU-2025:02048-1 Release Date: 2025-06-20T12:40:50Z Rating: important References: * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 Cross-References: * CVE-2024-12718 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4516 * CVE-2025-4517 CVSS scores: * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for python312 fixes the following issues: python312 was updated from version 3.12.9 to 3.12.11: * Security issues fixed: * CVE-2025-4516: Fixed blocking DecodeError handling vulnerability, which could lead to DoS (bsc#1243273) * CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517: Fixed multiple issues that allowed tarfile extraction filters to be bypassed using crafted symlinks and hard links (bsc#1244056, bsc#1244059, bsc#1244060, bsc#1244032) * Other changes and bugs fixed: * Added --single-process option to the Python test runner (regrtest). * Added support for text/x-rst MIME type. * Corrected issues in various modules. * Fixed bugs in the in the folding of rfc2047 encoded-words and in the folding of quoted strings when flattening an email message using a modern email policy. * Fixed f-string handling of lambda expressions with non-ASCII characters. * Fixed ipaddress.IPv6Address.reverse_pointer output according to RFC 3596. * Fixed parsing long IPv6 addresses with embedded IPv4 address. * Fixed resource leaks in gzip and multiprocessing Resource Tracker. * Improved IDLE's documentation display. * Improved the textual representation of IPv4-mapped IPv6 addresses in ipaddress. * ipaddress: fixed hash collisions for IPv4Network and IPv6Network objects * Made from **future** import barry_as_FLUFL work in more contexts. * Resolved potential crashes in contextvars, xml.etree.ElementTree, sqlite3, and the sys module. * Scheduled deprecation of the check_home argument in sysconfig.is_python_build() for Python 3.15. * Stop the processing of long IPv6 addresses early in ipaddress to prevent excessive memory consumption and a minor denial-of-service. * Undeprecated functional API for importlib.resources and added Anchor. * Updated bundled libexpat to 2.7.1 * Updated bundled pip to version 25.0.1. * Updated documentation for generic classes, wheel tags, and the C API. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2048=1 openSUSE-SLE-15.6-2025-2048=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-2048=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python312-devel-3.12.11-150600.3.30.1 * python312-base-3.12.11-150600.3.30.1 * python312-tk-3.12.11-150600.3.30.1 * libpython3_12-1_0-debuginfo-3.12.11-150600.3.30.1 * python312-idle-3.12.11-150600.3.30.1 * python312-dbm-debuginfo-3.12.11-150600.3.30.1 * python312-debuginfo-3.12.11-150600.3.30.1 * python312-3.12.11-150600.3.30.1 * python312-curses-debuginfo-3.12.11-150600.3.30.1 * libpython3_12-1_0-3.12.11-150600.3.30.1 * python312-testsuite-3.12.11-150600.3.30.1 * python312-base-debuginfo-3.12.11-150600.3.30.1 * python312-debugsource-3.12.11-150600.3.30.1 * python312-doc-devhelp-3.12.11-150600.3.30.1 * python312-tk-debuginfo-3.12.11-150600.3.30.1 * python312-testsuite-debuginfo-3.12.11-150600.3.30.1 * python312-curses-3.12.11-150600.3.30.1 * python312-tools-3.12.11-150600.3.30.1 * python312-doc-3.12.11-150600.3.30.1 * python312-core-debugsource-3.12.11-150600.3.30.1 * python312-dbm-3.12.11-150600.3.30.1 * openSUSE Leap 15.6 (x86_64) * libpython3_12-1_0-32bit-debuginfo-3.12.11-150600.3.30.1 * python312-base-32bit-debuginfo-3.12.11-150600.3.30.1 * libpython3_12-1_0-32bit-3.12.11-150600.3.30.1 * python312-base-32bit-3.12.11-150600.3.30.1 * python312-32bit-debuginfo-3.12.11-150600.3.30.1 * python312-32bit-3.12.11-150600.3.30.1 * openSUSE Leap 15.6 (aarch64_ilp32) * python312-64bit-3.12.11-150600.3.30.1 * python312-base-64bit-3.12.11-150600.3.30.1 * python312-64bit-debuginfo-3.12.11-150600.3.30.1 * libpython3_12-1_0-64bit-3.12.11-150600.3.30.1 * libpython3_12-1_0-64bit-debuginfo-3.12.11-150600.3.30.1 * python312-base-64bit-debuginfo-3.12.11-150600.3.30.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python312-tools-3.12.11-150600.3.30.1 * python312-curses-debuginfo-3.12.11-150600.3.30.1 * libpython3_12-1_0-3.12.11-150600.3.30.1 * python312-debugsource-3.12.11-150600.3.30.1 * python312-devel-3.12.11-150600.3.30.1 * python312-base-3.12.11-150600.3.30.1 * python312-core-debugsource-3.12.11-150600.3.30.1 * python312-tk-debuginfo-3.12.11-150600.3.30.1 * python312-tk-3.12.11-150600.3.30.1 * libpython3_12-1_0-debuginfo-3.12.11-150600.3.30.1 * python312-debuginfo-3.12.11-150600.3.30.1 * python312-idle-3.12.11-150600.3.30.1 * python312-dbm-debuginfo-3.12.11-150600.3.30.1 * python312-base-debuginfo-3.12.11-150600.3.30.1 * python312-curses-3.12.11-150600.3.30.1 * python312-dbm-3.12.11-150600.3.30.1 * python312-3.12.11-150600.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12718.html * https://www.suse.com/security/cve/CVE-2025-4138.html * https://www.suse.com/security/cve/CVE-2025-4330.html * https://www.suse.com/security/cve/CVE-2025-4516.html * https://www.suse.com/security/cve/CVE-2025-4517.html * https://bugzilla.suse.com/show_bug.cgi?id=1243273 * https://bugzilla.suse.com/show_bug.cgi?id=1244032 * https://bugzilla.suse.com/show_bug.cgi?id=1244056 * https://bugzilla.suse.com/show_bug.cgi?id=1244059 * https://bugzilla.suse.com/show_bug.cgi?id=1244060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:31:04 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:31:04 -0000 Subject: SUSE-SU-2025:02047-1: important: Security update for python310 Message-ID: <175043706468.4922.17280306508202042168@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2025:02047-1 Release Date: 2025-06-20T12:40:26Z Rating: important References: * bsc#1239210 * bsc#1241067 * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 Cross-References: * CVE-2024-12718 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4516 * CVE-2025-4517 CVSS scores: * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves five vulnerabilities and has two security fixes can now be installed. ## Description: This update for python310 fixes the following issues: python310 was updated from version 3.10.16 to 3.10.18: * Security issues fixed: * CVE-2025-4516: Fixed blocking DecodeError handling vulnerability, which could lead to DoS (bsc#1243273) * CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517: Fixed multiple issues that allowed tarfile extraction filters to be bypassed using crafted symlinks and hard links (bsc#1244056, bsc#1244059, bsc#1244060, bsc#1244032) * Other changes and bugs fixed: * Improved handling of system call failures that OpenSSL reports (bsc#1241067) * Fixed issue with test_ssl pass with OpenSSL 3.5 (bsc#1241067) * Fixed issue with reproducible builds (bsc#1239210) * Fixed a potential denial of service vulnerability in the imaplib module. * Fixed bugs in the in the folding of rfc2047 encoded-words and in the folding of quoted strings when flattening an email message using a modern email policy. * Fixed parsing long IPv6 addresses with embedded IPv4 address. * Fixed ipaddress.IPv6Address.reverse_pointer output according to RFC 3596 * Improved handling of system call failures that OpenSSL reports * Improved the textual representation of IPv4-mapped IPv6 addresses in ipaddress. * ipaddress: fixed hash collisions for IPv4Network and IPv6Network objects * os.path.realpath() now accepts a strict keyword-only argument. * Stop the processing of long IPv6 addresses early in ipaddress to prevent excessive memory consumption and a minor denial-of-service. * Updated bundled libexpat to 2.7.1 * Writers of documentation can now use next as the version for the versionchanged, versionadded, deprecated directives. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2047=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2047=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2047=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2047=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2047=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2047=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-devel-3.10.18-150400.4.82.1 * libpython3_10-1_0-debuginfo-3.10.18-150400.4.82.1 * python310-doc-3.10.18-150400.4.82.1 * libpython3_10-1_0-3.10.18-150400.4.82.1 * python310-base-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-debuginfo-3.10.18-150400.4.82.1 * python310-tk-3.10.18-150400.4.82.1 * python310-doc-devhelp-3.10.18-150400.4.82.1 * python310-tools-3.10.18-150400.4.82.1 * python310-debugsource-3.10.18-150400.4.82.1 * python310-base-3.10.18-150400.4.82.1 * python310-testsuite-debuginfo-3.10.18-150400.4.82.1 * python310-curses-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-3.10.18-150400.4.82.1 * python310-idle-3.10.18-150400.4.82.1 * python310-testsuite-3.10.18-150400.4.82.1 * python310-tk-debuginfo-3.10.18-150400.4.82.1 * python310-curses-3.10.18-150400.4.82.1 * python310-debuginfo-3.10.18-150400.4.82.1 * python310-core-debugsource-3.10.18-150400.4.82.1 * python310-3.10.18-150400.4.82.1 * openSUSE Leap 15.4 (x86_64) * python310-base-32bit-debuginfo-3.10.18-150400.4.82.1 * python310-32bit-debuginfo-3.10.18-150400.4.82.1 * python310-32bit-3.10.18-150400.4.82.1 * libpython3_10-1_0-32bit-debuginfo-3.10.18-150400.4.82.1 * libpython3_10-1_0-32bit-3.10.18-150400.4.82.1 * python310-base-32bit-3.10.18-150400.4.82.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-base-64bit-debuginfo-3.10.18-150400.4.82.1 * python310-64bit-3.10.18-150400.4.82.1 * python310-64bit-debuginfo-3.10.18-150400.4.82.1 * python310-base-64bit-3.10.18-150400.4.82.1 * libpython3_10-1_0-64bit-3.10.18-150400.4.82.1 * libpython3_10-1_0-64bit-debuginfo-3.10.18-150400.4.82.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python310-devel-3.10.18-150400.4.82.1 * libpython3_10-1_0-debuginfo-3.10.18-150400.4.82.1 * python310-doc-3.10.18-150400.4.82.1 * libpython3_10-1_0-3.10.18-150400.4.82.1 * python310-base-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-debuginfo-3.10.18-150400.4.82.1 * python310-tk-3.10.18-150400.4.82.1 * python310-doc-devhelp-3.10.18-150400.4.82.1 * python310-tools-3.10.18-150400.4.82.1 * python310-debugsource-3.10.18-150400.4.82.1 * python310-curses-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-3.10.18-150400.4.82.1 * python310-testsuite-debuginfo-3.10.18-150400.4.82.1 * python310-base-3.10.18-150400.4.82.1 * python310-idle-3.10.18-150400.4.82.1 * python310-testsuite-3.10.18-150400.4.82.1 * python310-tk-debuginfo-3.10.18-150400.4.82.1 * python310-curses-3.10.18-150400.4.82.1 * python310-debuginfo-3.10.18-150400.4.82.1 * python310-core-debugsource-3.10.18-150400.4.82.1 * python310-3.10.18-150400.4.82.1 * openSUSE Leap 15.6 (x86_64) * python310-base-32bit-debuginfo-3.10.18-150400.4.82.1 * python310-32bit-debuginfo-3.10.18-150400.4.82.1 * python310-32bit-3.10.18-150400.4.82.1 * libpython3_10-1_0-32bit-debuginfo-3.10.18-150400.4.82.1 * libpython3_10-1_0-32bit-3.10.18-150400.4.82.1 * python310-base-32bit-3.10.18-150400.4.82.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpython3_10-1_0-3.10.18-150400.4.82.1 * python310-dbm-3.10.18-150400.4.82.1 * python310-devel-3.10.18-150400.4.82.1 * python310-base-debuginfo-3.10.18-150400.4.82.1 * python310-idle-3.10.18-150400.4.82.1 * python310-tools-3.10.18-150400.4.82.1 * libpython3_10-1_0-debuginfo-3.10.18-150400.4.82.1 * python310-tk-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-debuginfo-3.10.18-150400.4.82.1 * python310-curses-debuginfo-3.10.18-150400.4.82.1 * python310-debugsource-3.10.18-150400.4.82.1 * python310-curses-3.10.18-150400.4.82.1 * python310-debuginfo-3.10.18-150400.4.82.1 * python310-base-3.10.18-150400.4.82.1 * python310-core-debugsource-3.10.18-150400.4.82.1 * python310-3.10.18-150400.4.82.1 * python310-tk-3.10.18-150400.4.82.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpython3_10-1_0-3.10.18-150400.4.82.1 * python310-dbm-3.10.18-150400.4.82.1 * python310-devel-3.10.18-150400.4.82.1 * python310-base-debuginfo-3.10.18-150400.4.82.1 * python310-idle-3.10.18-150400.4.82.1 * python310-tools-3.10.18-150400.4.82.1 * libpython3_10-1_0-debuginfo-3.10.18-150400.4.82.1 * python310-tk-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-debuginfo-3.10.18-150400.4.82.1 * python310-curses-debuginfo-3.10.18-150400.4.82.1 * python310-debugsource-3.10.18-150400.4.82.1 * python310-curses-3.10.18-150400.4.82.1 * python310-debuginfo-3.10.18-150400.4.82.1 * python310-base-3.10.18-150400.4.82.1 * python310-core-debugsource-3.10.18-150400.4.82.1 * python310-3.10.18-150400.4.82.1 * python310-tk-3.10.18-150400.4.82.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpython3_10-1_0-3.10.18-150400.4.82.1 * python310-dbm-3.10.18-150400.4.82.1 * python310-devel-3.10.18-150400.4.82.1 * python310-base-debuginfo-3.10.18-150400.4.82.1 * python310-idle-3.10.18-150400.4.82.1 * python310-tools-3.10.18-150400.4.82.1 * libpython3_10-1_0-debuginfo-3.10.18-150400.4.82.1 * python310-tk-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-debuginfo-3.10.18-150400.4.82.1 * python310-curses-debuginfo-3.10.18-150400.4.82.1 * python310-debugsource-3.10.18-150400.4.82.1 * python310-curses-3.10.18-150400.4.82.1 * python310-debuginfo-3.10.18-150400.4.82.1 * python310-base-3.10.18-150400.4.82.1 * python310-core-debugsource-3.10.18-150400.4.82.1 * python310-3.10.18-150400.4.82.1 * python310-tk-3.10.18-150400.4.82.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpython3_10-1_0-3.10.18-150400.4.82.1 * python310-dbm-3.10.18-150400.4.82.1 * python310-devel-3.10.18-150400.4.82.1 * python310-base-debuginfo-3.10.18-150400.4.82.1 * python310-idle-3.10.18-150400.4.82.1 * python310-tools-3.10.18-150400.4.82.1 * libpython3_10-1_0-debuginfo-3.10.18-150400.4.82.1 * python310-tk-debuginfo-3.10.18-150400.4.82.1 * python310-dbm-debuginfo-3.10.18-150400.4.82.1 * python310-curses-debuginfo-3.10.18-150400.4.82.1 * python310-debugsource-3.10.18-150400.4.82.1 * python310-curses-3.10.18-150400.4.82.1 * python310-debuginfo-3.10.18-150400.4.82.1 * python310-base-3.10.18-150400.4.82.1 * python310-core-debugsource-3.10.18-150400.4.82.1 * python310-3.10.18-150400.4.82.1 * python310-tk-3.10.18-150400.4.82.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12718.html * https://www.suse.com/security/cve/CVE-2025-4138.html * https://www.suse.com/security/cve/CVE-2025-4330.html * https://www.suse.com/security/cve/CVE-2025-4516.html * https://www.suse.com/security/cve/CVE-2025-4517.html * https://bugzilla.suse.com/show_bug.cgi?id=1239210 * https://bugzilla.suse.com/show_bug.cgi?id=1241067 * https://bugzilla.suse.com/show_bug.cgi?id=1243273 * https://bugzilla.suse.com/show_bug.cgi?id=1244032 * https://bugzilla.suse.com/show_bug.cgi?id=1244056 * https://bugzilla.suse.com/show_bug.cgi?id=1244059 * https://bugzilla.suse.com/show_bug.cgi?id=1244060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 16:31:09 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 16:31:09 -0000 Subject: SUSE-SU-2025:02046-1: important: Security update for ignition Message-ID: <175043706948.4922.14975132047277874270@smelt2.prg2.suse.org> # Security update for ignition Announcement ID: SUSE-SU-2025:02046-1 Release Date: 2025-06-20T12:33:39Z Rating: important References: * bsc#1239192 Cross-References: * CVE-2025-22868 CVSS scores: * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro for Rancher 5.3 An update that solves one vulnerability can now be installed. ## Description: This update for ignition fixes the following issues: * CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239192). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2046=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2046=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * ignition-2.14.0-150400.4.9.1 * ignition-dracut-grub2-2.14.0-150400.4.9.1 * ignition-debuginfo-2.14.0-150400.4.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * ignition-2.14.0-150400.4.9.1 * ignition-dracut-grub2-2.14.0-150400.4.9.1 * ignition-debuginfo-2.14.0-150400.4.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22868.html * https://bugzilla.suse.com/show_bug.cgi?id=1239192 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jun 20 20:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 20 Jun 2025 20:30:04 -0000 Subject: SUSE-SU-2025:02056-1: important: Security update for apache-commons-beanutils Message-ID: <175045140421.11267.7200276485539560392@smelt2.prg2.suse.org> # Security update for apache-commons-beanutils Announcement ID: SUSE-SU-2025:02056-1 Release Date: 2025-06-20T16:17:25Z Rating: important References: * bsc#1243793 Cross-References: * CVE-2014-0114 * CVE-2015-4852 * CVE-2025-48734 CVSS scores: * CVE-2015-4852 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2015-4852 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-48734 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-48734 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for apache-commons-beanutils fixes the following issues: Update to 1.11.0: * Fixed Bugs: * BeanComparator.compare(T, T) now throws IllegalArgumentException instead of RuntimeException to wrap all cases of ReflectiveOperationException. * MappedMethodReference.get() now throws IllegalStateException instead of RuntimeException to wrap cases of NoSuchMethodException. * ResultSetIterator.get(String) now throws IllegalArgumentException instead of RuntimeException to wrap cases of SQLException. * ResultSetIterator.hasNext() now throws IllegalStateException instead of RuntimeException to wrap cases of SQLException. * ResultSetIterator.next() now throws IllegalStateException instead of RuntimeException to wrap cases of SQLException. * ResultSetIterator.set(String, Object) now throws IllegalArgumentException instead of RuntimeException to wrap cases of SQLException. * ResultSetIterator.set(String, String, Object) now throws IllegalArgumentException instead of RuntimeException to wrap cases of SQLException. * Changes: * Add org.apache.commons.beanutils .SuppressPropertiesBeanIntrospector.SUPPRESS_DECLARING_CLASS. Fixes bsc#1243793, CVE-2025-48734 * Bump org.apache.commons:commons-parent from 81 to 84. * Bump commons-logging:commons-logging from 1.3.4 to 1.3.5. Update to 1.10.1: * Fixed Bugs: * BEANUTILS-541: FluentPropertyBeanIntrospector concurrency issue (backport to 1.X) #325. * Javadoc is missing its Overview page. * Remove -nouses directive from maven-bundle-plugin. OSGi package imports now state 'uses' definitions for package imports, this doesn't affect JPMS (from org.apache.commons:commons-parent:80). * Deprecate BeanUtils.BeanUtils(). * Deprecate ConstructorUtils.ConstructorUtils(). * Deprecate LocaleBeanUtils.LocaleBeanUtils(). * Deprecate LocaleConvertUtils.LocaleConvertUtils(). * Deprecate ConvertUtils.ConvertUtils(). * Deprecate MethodUtils.MethodUtils(). * Deprecate PropertyUtils.PropertyUtils(). * Changes: * Bump org.apache.commons:commons-parent from 78 to 81. Includes changes from 1.10.0: * Fixed Bugs: * BEANUTILS-541: FluentPropertyBeanIntrospector caches corrupted writeMethod (1.x backport) #69. * Replace internal use of Locale.ENGLISH with Locale.ROOT. * Replace Maven CLIRR plugin with JApiCmp. * Port to Java 1.4 Throwable APIs (!). * Fix Javadoc generation on Java 8, 17, and 21. * AbstractArrayConverter.parseElements(String) now returns a List instead of a raw List. * Changes: * Bump org.apache.commons:commons-parent from 47 to 78. * Bump Java requirement from Java 6 to 8. * Bump junit:junit from 4.12 to 4.13.2. * Bump JUnit from 4.x to 5.x "vintage". * Bump commons-logging:commons-logging from 1.2 to 1.3.4. * Deprecate BeanUtilsBean.initCause(Throwable, Throwable) for removal, use Throwable.initCause(Throwable). * Deprecate BeanUtils.initCause(Throwable, Throwable) for removal, use Throwable.initCause(Throwable). Update to 1.9.4: * BEANUTILS-520: BeanUtils mitigate CVE-2014-0114 Updated to 1.9.3: * This is a bug fix release, which also improves the tests for building on Java 8. * Note that Java 8 and later no longer support indexed bean properties on java.util.List, only on arrays like String[]. (BEANUTILS-492). This affects PropertyUtils.getPropertyType() and PropertyUtils.getPropertyDescriptor(); their javadoc have therefore been updated to reflect this change in the JDK. * Changes in this version include: * Fixed Bugs: * BEANUTILS-477: Changed log level in FluentPropertyBeanIntrospector * BEANUTILS-492: Fixed exception when setting indexed properties on DynaBeans. * BEANUTILS-470: Precision lost when converting BigDecimal. * BEANUTILS-465: Indexed List Setters fixed. * Changes: * BEANUTILS-433: Update dependency from JUnit 3.8.1 to 4.12. * BEANUTILS-469: Update commons-logging from 1.1.1 to 1.2. * BEANUTILS-474: FluentPropertyBeanIntrospector does not use the same naming algorithm as DefaultBeanIntrospector. * BEANUTILS-490: Update Java requirement from Java 5 to 6. * BEANUTILS-482: Update commons-collections from 3.2.1 to 3.2.2 (CVE-2015-4852). * BEANUTILS-490: Update java requirement to Java 6. * BEANUTILS-492: IndexedPropertyDescriptor tests now pass on Java 8. * BEANUTILS-495: DateConverterTestBase fails on M/d/yy in Java 9. * BEANUTILS-496: testGetDescriptorInvalidBoolean fails on Java 9. * Historical list of changes: http://commons.apache.org/proper/commons-beanutils/changes-report.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2056=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2056=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * apache-commons-beanutils-1.11.0-7.3.1 * apache-commons-beanutils-javadoc-1.11.0-7.3.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * apache-commons-beanutils-1.11.0-7.3.1 * apache-commons-beanutils-javadoc-1.11.0-7.3.1 ## References: * https://www.suse.com/security/cve/CVE-2014-0114.html * https://www.suse.com/security/cve/CVE-2015-4852.html * https://www.suse.com/security/cve/CVE-2025-48734.html * https://bugzilla.suse.com/show_bug.cgi?id=1243793 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 08:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 08:30:08 -0000 Subject: SUSE-SU-2025:02059-1: important: Security update for icu Message-ID: <175066740836.11267.12127723483242819888@smelt2.prg2.suse.org> # Security update for icu Announcement ID: SUSE-SU-2025:02059-1 Release Date: 2025-06-23T01:38:23Z Rating: important References: * bsc#1243721 Cross-References: * CVE-2025-5222 CVSS scores: * CVE-2025-5222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-5222 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for icu fixes the following issues: * CVE-2025-5222: Stack buffer overflow in the SRBRoot:addTag function (bsc#1243721). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2059=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2059=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2059=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2059=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2059=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2059=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2059=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2059=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2059=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2059=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2059=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2059=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * Basesystem Module 15-SP6 (noarch) * libicu60_2-bedata-60.2-150000.3.18.1 * libicu60_2-ledata-60.2-150000.3.18.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * Basesystem Module 15-SP7 (noarch) * libicu60_2-bedata-60.2-150000.3.18.1 * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * libicu60_2-bedata-60.2-150000.3.18.1 * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libicu60_2-bedata-60.2-150000.3.18.1 * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libicu60_2-bedata-60.2-150000.3.18.1 * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * icu-debuginfo-60.2-150000.3.18.1 * icu-debugsource-60.2-150000.3.18.1 * libicu60_2-60.2-150000.3.18.1 * libicu60_2-debuginfo-60.2-150000.3.18.1 * SUSE Enterprise Storage 7.1 (noarch) * libicu60_2-ledata-60.2-150000.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5222.html * https://bugzilla.suse.com/show_bug.cgi?id=1243721 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 08:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 08:30:14 -0000 Subject: SUSE-SU-2025:02058-1: important: Security update for gstreamer-plugins-good Message-ID: <175066741421.11267.8928461453335738687@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-good Announcement ID: SUSE-SU-2025:02058-1 Release Date: 2025-06-21T09:05:12Z Rating: important References: * bsc#1234421 * bsc#1244405 * bsc#1244406 Cross-References: * CVE-2024-47540 * CVE-2025-47183 * CVE-2025-47219 CVSS scores: * CVE-2024-47540 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47540 ( NVD ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-47540 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47183 ( SUSE ): 5.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47183 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H * CVE-2025-47219 ( SUSE ): 5.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-good fixes the following issues: * CVE-2025-47183: Fixed out-of-bounds read in MOV/MP4 demuxer (bsc#1244406). * CVE-2025-47219: Fixed out-of-bounds read in MOV/MP4 demuxer (bsc#1244405). * CVE-2024-47540: Fixed uninitialized stack memory in Matroska/WebM demuxer (bsc#1234421). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2058=1 SUSE-2025-2058=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2058=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2058=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-2058=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-2058=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-good-extra-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-gtk-1.24.0-150600.3.7.1 * gstreamer-plugins-good-gtk-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-1.24.0-150600.3.7.1 * gstreamer-plugins-good-qtqml-1.24.0-150600.3.7.1 * gstreamer-plugins-good-jack-1.24.0-150600.3.7.1 * gstreamer-plugins-good-jack-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-qtqml-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-extra-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debugsource-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debuginfo-1.24.0-150600.3.7.1 * openSUSE Leap 15.6 (x86_64) * gstreamer-plugins-good-32bit-1.24.0-150600.3.7.1 * gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.7.1 * gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.7.1 * gstreamer-plugins-good-32bit-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-extra-32bit-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-jack-32bit-debuginfo-1.24.0-150600.3.7.1 * openSUSE Leap 15.6 (noarch) * gstreamer-plugins-good-lang-1.24.0-150600.3.7.1 * openSUSE Leap 15.6 (aarch64_ilp32) * gstreamer-plugins-good-64bit-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-64bit-1.24.0-150600.3.7.1 * gstreamer-plugins-good-jack-64bit-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-extra-64bit-1.24.0-150600.3.7.1 * gstreamer-plugins-good-jack-64bit-1.24.0-150600.3.7.1 * gstreamer-plugins-good-extra-64bit-debuginfo-1.24.0-150600.3.7.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-good-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debugsource-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debuginfo-1.24.0-150600.3.7.1 * Basesystem Module 15-SP6 (noarch) * gstreamer-plugins-good-lang-1.24.0-150600.3.7.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-good-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debugsource-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debuginfo-1.24.0-150600.3.7.1 * Basesystem Module 15-SP7 (noarch) * gstreamer-plugins-good-lang-1.24.0-150600.3.7.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * gstreamer-plugins-good-debugsource-1.24.0-150600.3.7.1 * gstreamer-plugins-good-gtk-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-gtk-debuginfo-1.24.0-150600.3.7.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * gstreamer-plugins-good-debugsource-1.24.0-150600.3.7.1 * gstreamer-plugins-good-gtk-1.24.0-150600.3.7.1 * gstreamer-plugins-good-debuginfo-1.24.0-150600.3.7.1 * gstreamer-plugins-good-gtk-debuginfo-1.24.0-150600.3.7.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47540.html * https://www.suse.com/security/cve/CVE-2025-47183.html * https://www.suse.com/security/cve/CVE-2025-47219.html * https://bugzilla.suse.com/show_bug.cgi?id=1234421 * https://bugzilla.suse.com/show_bug.cgi?id=1244405 * https://bugzilla.suse.com/show_bug.cgi?id=1244406 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 08:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 08:30:23 -0000 Subject: SUSE-SU-2025:02057-1: important: Security update for python311 Message-ID: <175066742312.11267.15823412547314786409@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2025:02057-1 Release Date: 2025-06-21T09:04:47Z Rating: important References: * bsc#1241067 * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 Cross-References: * CVE-2024-12718 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4516 * CVE-2025-4517 CVSS scores: * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for python311 fixes the following issues: python311 was updated from version 3.11.10 to 3.11.13: * Security issues fixed: * CVE-2025-4516: Fixed blocking DecodeError handling vulnerability, which could lead to DoS (bsc#1243273). * CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, CVE-2025-4517: Fixed multiple issues that allowed tarfile extraction filters to be bypassed using crafted symlinks and hard links (bsc#1244056, bsc#1244059, bsc#1244060, bsc#1244032) * Other changes and bugs fixed: * Improved handling of system call failures that OpenSSL reports (bsc#1241067) * Disable GC during thread operations to prevent deadlocks. * Fixed a potential denial of service vulnerability in the imaplib module. * Fixed bugs in the in the folding of rfc2047 encoded-words and in the folding of quoted strings when flattening an email message using a modern email policy. * Fixed parsing long IPv6 addresses with embedded IPv4 address. * Fixed ipaddress.IPv6Address.reverse_pointer output according to RFC 3596 * Improved the textual representation of IPv4-mapped IPv6 addresses in ipaddress. * ipaddress: fixed hash collisions for IPv4Network and IPv6Network objects * os.path.realpath() now accepts a strict keyword-only argument. * Stop the processing of long IPv6 addresses early in ipaddress to prevent excessive memory consumption and a minor denial-of-service. * Updated bundled libexpat to 2.7.1 * Writers of CPython documentation can now use next as the version for the versionchanged, versionadded, deprecated directives. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2057=1 openSUSE-SLE-15.6-2025-2057=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2057=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2057=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-2057=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-2057=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-tk-3.11.13-150600.3.30.1 * python311-3.11.13-150600.3.30.1 * python311-idle-3.11.13-150600.3.30.1 * python311-curses-debuginfo-3.11.13-150600.3.30.1 * python311-testsuite-3.11.13-150600.3.30.1 * python311-doc-3.11.13-150600.3.30.1 * python311-base-3.11.13-150600.3.30.1 * python311-devel-3.11.13-150600.3.30.1 * python311-tools-3.11.13-150600.3.30.1 * python311-testsuite-debuginfo-3.11.13-150600.3.30.1 * python311-debugsource-3.11.13-150600.3.30.1 * libpython3_11-1_0-3.11.13-150600.3.30.1 * libpython3_11-1_0-debuginfo-3.11.13-150600.3.30.1 * python311-base-debuginfo-3.11.13-150600.3.30.1 * python311-core-debugsource-3.11.13-150600.3.30.1 * python311-doc-devhelp-3.11.13-150600.3.30.1 * python311-dbm-debuginfo-3.11.13-150600.3.30.1 * python311-tk-debuginfo-3.11.13-150600.3.30.1 * python311-debuginfo-3.11.13-150600.3.30.1 * python311-dbm-3.11.13-150600.3.30.1 * python311-curses-3.11.13-150600.3.30.1 * openSUSE Leap 15.6 (x86_64) * python311-32bit-debuginfo-3.11.13-150600.3.30.1 * python311-base-32bit-debuginfo-3.11.13-150600.3.30.1 * python311-32bit-3.11.13-150600.3.30.1 * libpython3_11-1_0-32bit-debuginfo-3.11.13-150600.3.30.1 * python311-base-32bit-3.11.13-150600.3.30.1 * libpython3_11-1_0-32bit-3.11.13-150600.3.30.1 * openSUSE Leap 15.6 (aarch64_ilp32) * python311-base-64bit-debuginfo-3.11.13-150600.3.30.1 * libpython3_11-1_0-64bit-3.11.13-150600.3.30.1 * python311-64bit-debuginfo-3.11.13-150600.3.30.1 * python311-64bit-3.11.13-150600.3.30.1 * python311-base-64bit-3.11.13-150600.3.30.1 * libpython3_11-1_0-64bit-debuginfo-3.11.13-150600.3.30.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-base-debuginfo-3.11.13-150600.3.30.1 * python311-core-debugsource-3.11.13-150600.3.30.1 * python311-base-3.11.13-150600.3.30.1 * libpython3_11-1_0-3.11.13-150600.3.30.1 * libpython3_11-1_0-debuginfo-3.11.13-150600.3.30.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-base-debuginfo-3.11.13-150600.3.30.1 * python311-core-debugsource-3.11.13-150600.3.30.1 * python311-base-3.11.13-150600.3.30.1 * libpython3_11-1_0-3.11.13-150600.3.30.1 * libpython3_11-1_0-debuginfo-3.11.13-150600.3.30.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-core-debugsource-3.11.13-150600.3.30.1 * python311-curses-debuginfo-3.11.13-150600.3.30.1 * python311-tk-3.11.13-150600.3.30.1 * python311-dbm-debuginfo-3.11.13-150600.3.30.1 * python311-tk-debuginfo-3.11.13-150600.3.30.1 * python311-debuginfo-3.11.13-150600.3.30.1 * python311-dbm-3.11.13-150600.3.30.1 * python311-3.11.13-150600.3.30.1 * python311-tools-3.11.13-150600.3.30.1 * python311-debugsource-3.11.13-150600.3.30.1 * python311-curses-3.11.13-150600.3.30.1 * python311-devel-3.11.13-150600.3.30.1 * python311-idle-3.11.13-150600.3.30.1 * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-core-debugsource-3.11.13-150600.3.30.1 * python311-curses-debuginfo-3.11.13-150600.3.30.1 * python311-tk-3.11.13-150600.3.30.1 * python311-dbm-debuginfo-3.11.13-150600.3.30.1 * python311-tk-debuginfo-3.11.13-150600.3.30.1 * python311-debuginfo-3.11.13-150600.3.30.1 * python311-dbm-3.11.13-150600.3.30.1 * python311-3.11.13-150600.3.30.1 * python311-tools-3.11.13-150600.3.30.1 * python311-debugsource-3.11.13-150600.3.30.1 * python311-curses-3.11.13-150600.3.30.1 * python311-devel-3.11.13-150600.3.30.1 * python311-idle-3.11.13-150600.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12718.html * https://www.suse.com/security/cve/CVE-2025-4138.html * https://www.suse.com/security/cve/CVE-2025-4330.html * https://www.suse.com/security/cve/CVE-2025-4516.html * https://www.suse.com/security/cve/CVE-2025-4517.html * https://bugzilla.suse.com/show_bug.cgi?id=1241067 * https://bugzilla.suse.com/show_bug.cgi?id=1243273 * https://bugzilla.suse.com/show_bug.cgi?id=1244032 * https://bugzilla.suse.com/show_bug.cgi?id=1244056 * https://bugzilla.suse.com/show_bug.cgi?id=1244059 * https://bugzilla.suse.com/show_bug.cgi?id=1244060 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:06 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:06 -0000 Subject: SUSE-RU-2025:02067-1: important: Recommended update for vsftpd Message-ID: <175068180648.11399.8557858342223676233@smelt2.prg2.suse.org> # Recommended update for vsftpd Announcement ID: SUSE-RU-2025:02067-1 Release Date: 2025-06-23T10:51:43Z Rating: important References: * bsc#1199250 * bsc#1211301 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has two fixes can now be installed. ## Description: This update for vsftpd fixes the following issues: * Apply a patch to introduce the new internal PRIV_SOCK_QUIT command which vsftpd sends to privileged parent processes to properly shut down the TLS connection in case we've received QUIT from the session client. This change avoids misleading error messages in the servers log file. (bsc#1199250) * Enable crypto-policies support: (bsc#1211301) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-2067=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-2067=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2067=1 openSUSE-SLE-15.6-2025-2067=1 ## Package List: * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * vsftpd-debuginfo-3.0.5-150600.10.3.1 * vsftpd-3.0.5-150600.10.3.1 * vsftpd-debugsource-3.0.5-150600.10.3.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * vsftpd-debuginfo-3.0.5-150600.10.3.1 * vsftpd-3.0.5-150600.10.3.1 * vsftpd-debugsource-3.0.5-150600.10.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * vsftpd-debuginfo-3.0.5-150600.10.3.1 * vsftpd-3.0.5-150600.10.3.1 * vsftpd-debugsource-3.0.5-150600.10.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199250 * https://bugzilla.suse.com/show_bug.cgi?id=1211301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:12 -0000 Subject: SUSE-SU-2025:02066-1: important: Security update for distribution Message-ID: <175068181234.11399.14582534131882894@smelt2.prg2.suse.org> # Security update for distribution Announcement ID: SUSE-SU-2025:02066-1 Release Date: 2025-06-23T10:49:03Z Rating: important References: * bsc#1244471 Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one security fix can now be installed. ## Description: This update for distribution fixes the following issues: The package is rebuild with more recent go go1.24, fixing respective security issues (bsc#1244471) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2066=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2066=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-2066=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-2066=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2066=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2066=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2066=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2066=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2066=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2066=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2066=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2066=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * distribution-registry-2.8.3-150400.9.27.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * distribution-registry-2.8.3-150400.9.27.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * distribution-registry-2.8.3-150400.9.27.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * distribution-registry-2.8.3-150400.9.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * distribution-registry-2.8.3-150400.9.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1244471 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:16 -0000 Subject: SUSE-RU-2025:02064-1: moderate: Recommended update for qemu Message-ID: <175068181608.11399.16193820413256264658@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2025:02064-1 Release Date: 2025-06-23T10:03:57Z Rating: moderate References: * bsc#1243013 Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that has one fix can now be installed. ## Description: This update for qemu fixes the following issues: * [openSUSE] rpm: disable LTO for userspace emulation on 15.6 (bsc#1243013) * Update version to 8.2.10 * Some backports: hw/misc/aspeed_hace: Fix buffer overflow in has_padding function target/ppc: Fix e200 duplicate SPRs linux-user/riscv: Fix handling of cpu mask in riscv_hwprobe syscall docs/about/emulation: Fix broken link vdpa: Allow vDPA to work on big-endian machine vdpa: Fix endian bugs in shadow virtqueue target/loongarch: Fix vldi inst target/arm: Simplify pstate_sm check in sve_access_check target/arm: Make DisasContext.{fp, sve}_access_checked tristate util/cacheflush: Make first DSB unconditional on aarch64 ui/cocoa: Temporarily ignore annoying deprecated declaration warnings docs: Rename default-configs to configs block: Zero block driver state before reopening hw/xen/hvm: Fix Aarch64 typo hw/net/smc91c111: Don't allow data register access to overrun buffer hw/net/smc91c111: Sanitize packet length on tx hw/net/smc91c111: Sanitize packet numbers hw/net/smc91c111: Ignore attempt to pop from empty RX fifo ppc/pnv/occ: Fix common area sensor offsets net: move backend cleanup to NIC cleanup net: parameterize the removing client from nc list util/qemu-timer.c: Don't warp timer from timerlist_rearm() target/arm: Correct STRD atomicity target/arm: Correct LDRD atomicity and fault behaviour ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2064=1 openSUSE-SLE-15.6-2025-2064=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2064=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2064=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-2064=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * qemu-ui-opengl-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-pa-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-8.2.10-150600.3.34.1 * qemu-audio-dbus-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-jack-8.2.10-150600.3.34.1 * qemu-ui-curses-debuginfo-8.2.10-150600.3.34.1 * qemu-ksm-8.2.10-150600.3.34.1 * qemu-chardev-baum-debuginfo-8.2.10-150600.3.34.1 * qemu-ppc-8.2.10-150600.3.34.1 * qemu-extra-debuginfo-8.2.10-150600.3.34.1 * qemu-chardev-baum-8.2.10-150600.3.34.1 * qemu-block-iscsi-debuginfo-8.2.10-150600.3.34.1 * qemu-headless-8.2.10-150600.3.34.1 * qemu-linux-user-8.2.10-150600.3.34.1 * qemu-debuginfo-8.2.10-150600.3.34.1 * qemu-tools-debuginfo-8.2.10-150600.3.34.1 * qemu-ivshmem-tools-debuginfo-8.2.10-150600.3.34.1 * qemu-guest-agent-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-spice-core-debuginfo-8.2.10-150600.3.34.1 * qemu-debugsource-8.2.10-150600.3.34.1 * qemu-block-iscsi-8.2.10-150600.3.34.1 * qemu-x86-8.2.10-150600.3.34.1 * qemu-block-gluster-debuginfo-8.2.10-150600.3.34.1 * qemu-tools-8.2.10-150600.3.34.1 * qemu-guest-agent-8.2.10-150600.3.34.1 * qemu-audio-oss-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-redirect-8.2.10-150600.3.34.1 * qemu-linux-user-debugsource-8.2.10-150600.3.34.1 * qemu-pr-helper-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-host-debuginfo-8.2.10-150600.3.34.1 * qemu-vhost-user-gpu-8.2.10-150600.3.34.1 * qemu-accel-tcg-x86-8.2.10-150600.3.34.1 * qemu-audio-pipewire-debuginfo-8.2.10-150600.3.34.1 * qemu-arm-8.2.10-150600.3.34.1 * qemu-ui-spice-app-8.2.10-150600.3.34.1 * qemu-chardev-spice-8.2.10-150600.3.34.1 * qemu-x86-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-curses-8.2.10-150600.3.34.1 * qemu-block-curl-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-spice-debuginfo-8.2.10-150600.3.34.1 * qemu-block-dmg-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-gtk-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.34.1 * qemu-ppc-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-dbus-8.2.10-150600.3.34.1 * qemu-block-gluster-8.2.10-150600.3.34.1 * qemu-ui-spice-core-8.2.10-150600.3.34.1 * qemu-hw-s390x-virtio-gpu-ccw-8.2.10-150600.3.34.1 * qemu-ivshmem-tools-8.2.10-150600.3.34.1 * qemu-pr-helper-8.2.10-150600.3.34.1 * qemu-block-nfs-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-dbus-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-opengl-8.2.10-150600.3.34.1 * qemu-accel-qtest-debuginfo-8.2.10-150600.3.34.1 * qemu-accel-qtest-8.2.10-150600.3.34.1 * qemu-ui-dbus-8.2.10-150600.3.34.1 * qemu-hw-display-qxl-8.2.10-150600.3.34.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-smartcard-8.2.10-150600.3.34.1 * qemu-arm-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-pa-8.2.10-150600.3.34.1 * qemu-hw-usb-smartcard-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-oss-8.2.10-150600.3.34.1 * qemu-block-dmg-8.2.10-150600.3.34.1 * qemu-img-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-alsa-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-pipewire-8.2.10-150600.3.34.1 * qemu-vhost-user-gpu-debuginfo-8.2.10-150600.3.34.1 * qemu-block-ssh-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.34.1 * qemu-audio-spice-8.2.10-150600.3.34.1 * qemu-ui-spice-app-debuginfo-8.2.10-150600.3.34.1 * qemu-linux-user-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.34.1 * qemu-spice-8.2.10-150600.3.34.1 * qemu-block-curl-8.2.10-150600.3.34.1 * qemu-s390x-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-host-8.2.10-150600.3.34.1 * qemu-chardev-spice-debuginfo-8.2.10-150600.3.34.1 * qemu-8.2.10-150600.3.34.1 * qemu-audio-jack-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-gtk-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-8.2.10-150600.3.34.1 * qemu-img-8.2.10-150600.3.34.1 * qemu-block-ssh-8.2.10-150600.3.34.1 * qemu-extra-8.2.10-150600.3.34.1 * qemu-s390x-8.2.10-150600.3.34.1 * qemu-block-nfs-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-vga-8.2.10-150600.3.34.1 * qemu-audio-alsa-8.2.10-150600.3.34.1 * openSUSE Leap 15.6 (noarch) * qemu-SLOF-8.2.10-150600.3.34.1 * qemu-lang-8.2.10-150600.3.34.1 * qemu-microvm-8.2.10-150600.3.34.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.34.1 * qemu-skiboot-8.2.10-150600.3.34.1 * qemu-doc-8.2.10-150600.3.34.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.34.1 * qemu-ipxe-8.2.10-150600.3.34.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * qemu-block-rbd-8.2.10-150600.3.34.1 * qemu-block-rbd-debuginfo-8.2.10-150600.3.34.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * qemu-tools-8.2.10-150600.3.34.1 * qemu-debuginfo-8.2.10-150600.3.34.1 * qemu-img-8.2.10-150600.3.34.1 * qemu-pr-helper-debuginfo-8.2.10-150600.3.34.1 * qemu-pr-helper-8.2.10-150600.3.34.1 * qemu-img-debuginfo-8.2.10-150600.3.34.1 * qemu-tools-debuginfo-8.2.10-150600.3.34.1 * qemu-debugsource-8.2.10-150600.3.34.1 * SUSE Package Hub 15 15-SP6 (noarch) * qemu-SLOF-8.2.10-150600.3.34.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.34.1 * qemu-microvm-8.2.10-150600.3.34.1 * qemu-skiboot-8.2.10-150600.3.34.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.34.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * qemu-x86-8.2.10-150600.3.34.1 * qemu-block-gluster-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-redirect-8.2.10-150600.3.34.1 * qemu-audio-oss-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-opengl-debuginfo-8.2.10-150600.3.34.1 * qemu-linux-user-debugsource-8.2.10-150600.3.34.1 * qemu-audio-pa-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-8.2.10-150600.3.34.1 * qemu-ivshmem-tools-8.2.10-150600.3.34.1 * qemu-audio-jack-8.2.10-150600.3.34.1 * qemu-accel-tcg-x86-8.2.10-150600.3.34.1 * qemu-vhost-user-gpu-8.2.10-150600.3.34.1 * qemu-audio-spice-8.2.10-150600.3.34.1 * qemu-block-nfs-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-spice-app-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-opengl-8.2.10-150600.3.34.1 * qemu-accel-qtest-debuginfo-8.2.10-150600.3.34.1 * qemu-linux-user-debuginfo-8.2.10-150600.3.34.1 * qemu-ppc-8.2.10-150600.3.34.1 * qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.34.1 * qemu-arm-8.2.10-150600.3.34.1 * qemu-accel-qtest-8.2.10-150600.3.34.1 * qemu-ui-spice-app-8.2.10-150600.3.34.1 * qemu-extra-debuginfo-8.2.10-150600.3.34.1 * qemu-s390x-debuginfo-8.2.10-150600.3.34.1 * qemu-chardev-spice-8.2.10-150600.3.34.1 * qemu-chardev-spice-debuginfo-8.2.10-150600.3.34.1 * qemu-x86-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-jack-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-gtk-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-qxl-8.2.10-150600.3.34.1 * qemu-linux-user-8.2.10-150600.3.34.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.34.1 * qemu-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-spice-debuginfo-8.2.10-150600.3.34.1 * qemu-block-dmg-debuginfo-8.2.10-150600.3.34.1 * qemu-extra-8.2.10-150600.3.34.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.34.1 * qemu-block-nfs-8.2.10-150600.3.34.1 * qemu-hw-usb-smartcard-8.2.10-150600.3.34.1 * qemu-s390x-8.2.10-150600.3.34.1 * qemu-arm-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-pa-8.2.10-150600.3.34.1 * qemu-hw-usb-smartcard-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-vga-8.2.10-150600.3.34.1 * qemu-ivshmem-tools-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-gtk-8.2.10-150600.3.34.1 * qemu-audio-oss-8.2.10-150600.3.34.1 * qemu-block-dmg-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.34.1 * qemu-ppc-debuginfo-8.2.10-150600.3.34.1 * qemu-vhost-user-gpu-debuginfo-8.2.10-150600.3.34.1 * qemu-block-gluster-8.2.10-150600.3.34.1 * qemu-audio-alsa-8.2.10-150600.3.34.1 * qemu-ui-spice-core-8.2.10-150600.3.34.1 * qemu-ui-spice-core-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-s390x-virtio-gpu-ccw-8.2.10-150600.3.34.1 * qemu-audio-alsa-debuginfo-8.2.10-150600.3.34.1 * qemu-debugsource-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * qemu-guest-agent-8.2.10-150600.3.34.1 * qemu-hw-usb-redirect-8.2.10-150600.3.34.1 * qemu-ui-opengl-debuginfo-8.2.10-150600.3.34.1 * qemu-block-ssh-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-dbus-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-usb-host-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-curses-debuginfo-8.2.10-150600.3.34.1 * qemu-block-nfs-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-spice-8.2.10-150600.3.34.1 * qemu-ui-dbus-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-opengl-8.2.10-150600.3.34.1 * qemu-ksm-8.2.10-150600.3.34.1 * qemu-audio-pipewire-debuginfo-8.2.10-150600.3.34.1 * qemu-chardev-baum-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.34.1 * qemu-spice-8.2.10-150600.3.34.1 * qemu-block-curl-8.2.10-150600.3.34.1 * qemu-chardev-spice-8.2.10-150600.3.34.1 * qemu-chardev-spice-debuginfo-8.2.10-150600.3.34.1 * qemu-8.2.10-150600.3.34.1 * qemu-hw-usb-host-8.2.10-150600.3.34.1 * qemu-chardev-baum-8.2.10-150600.3.34.1 * qemu-block-iscsi-debuginfo-8.2.10-150600.3.34.1 * qemu-headless-8.2.10-150600.3.34.1 * qemu-block-rbd-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-dbus-8.2.10-150600.3.34.1 * qemu-ui-curses-8.2.10-150600.3.34.1 * qemu-hw-display-qxl-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.34.1 * qemu-debuginfo-8.2.10-150600.3.34.1 * qemu-block-curl-debuginfo-8.2.10-150600.3.34.1 * qemu-block-ssh-8.2.10-150600.3.34.1 * qemu-audio-spice-debuginfo-8.2.10-150600.3.34.1 * qemu-block-rbd-8.2.10-150600.3.34.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.34.1 * qemu-block-nfs-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-vga-8.2.10-150600.3.34.1 * qemu-guest-agent-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-dbus-8.2.10-150600.3.34.1 * qemu-ui-spice-core-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-spice-core-8.2.10-150600.3.34.1 * qemu-audio-pipewire-8.2.10-150600.3.34.1 * qemu-debugsource-8.2.10-150600.3.34.1 * qemu-block-iscsi-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (aarch64) * qemu-arm-8.2.10-150600.3.34.1 * qemu-arm-debuginfo-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (noarch) * qemu-SLOF-8.2.10-150600.3.34.1 * qemu-lang-8.2.10-150600.3.34.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.34.1 * qemu-skiboot-8.2.10-150600.3.34.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.34.1 * qemu-ipxe-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (aarch64 ppc64le x86_64) * qemu-ui-gtk-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-spice-app-debuginfo-8.2.10-150600.3.34.1 * qemu-ui-gtk-8.2.10-150600.3.34.1 * qemu-ui-spice-app-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (ppc64le) * qemu-ppc-8.2.10-150600.3.34.1 * qemu-ppc-debuginfo-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (s390x x86_64) * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.34.1 * qemu-hw-display-virtio-gpu-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (s390x) * qemu-s390x-8.2.10-150600.3.34.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-8.2.10-150600.3.34.1 * qemu-hw-s390x-virtio-gpu-ccw-8.2.10-150600.3.34.1 * qemu-s390x-debuginfo-8.2.10-150600.3.34.1 * Server Applications Module 15-SP6 (x86_64) * qemu-x86-8.2.10-150600.3.34.1 * qemu-audio-pa-8.2.10-150600.3.34.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-pa-debuginfo-8.2.10-150600.3.34.1 * qemu-audio-alsa-8.2.10-150600.3.34.1 * qemu-accel-tcg-x86-8.2.10-150600.3.34.1 * qemu-audio-alsa-debuginfo-8.2.10-150600.3.34.1 * qemu-x86-debuginfo-8.2.10-150600.3.34.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243013 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:20 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:20 -0000 Subject: SUSE-RU-2025:02063-1: moderate: Recommended update for qemu Message-ID: <175068182064.11399.6542542397242035363@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2025:02063-1 Release Date: 2025-06-23T10:02:21Z Rating: moderate References: * bsc#1236329 * bsc#1240157 Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has two fixes can now be installed. ## Description: This update for qemu fixes the following issues: * Fix the *-video-gpu-ccw package not being present in products: * [openSUSE] rpm/spec: go back to only Recommending -video-gpu-ccw for s390x * Update to version 9.2.4: * target/hppa: Fix FPE exceptions * linux-user/hppa: Send proper si_code on SIGFPE exception * target/hppa: Copy instruction code into fr1 on FPU assist fault * migration: Allow caps to be set when preempt or multifd cap enabled * qapi/misc-target: Fix the doc to distinguish query-sgx and query-sgx- capabilities * hw/pci-host: Remove unused pci_host_data_be_ops * hw/pci-host/gt64120: Fix endianness handling * target/riscv/kvm: add kvm_csr_cfgs[] * target/riscv/kvm: turn kvm_riscv_reg_id_ulong() into a macro * target/riscv/kvm: turn u32/u64 reg functions into macros * target/riscv/kvm: fix leak in kvm_riscv_init_multiext_cfg() * target/riscv: Fix vslidedown with rvv_ta_all_1s * target/riscv: Fix the rvv reserved encoding of unmasked instructions * target/riscv: rvv: Apply vext_check_input_eew to vector indexed load/store instructions * target/riscv: rvv: Apply vext_check_input_eew to vector narrow/widen instructions * target/riscv: rvv: Apply vext_check_input_eew to vector integer extension instructions(OPMVV) * target/riscv: rvv: Apply vext_check_input_eew to vector slide instructions(OPIVI/OPIVX) * target/riscv: rvv: Apply vext_check_input_eew to OPIVV/OPFVV(vext_check_sss) instructions * target/riscv: rvv: Apply vext_check_input_eew to OPIVI/OPIVX/OPFVF(vext_check_ss) instructions * target/riscv: rvv: Apply vext_check_input_eew to vrgather instructions to check mismatched input EEWs encoding constraint * target/riscv: rvv: Add CHECK arg to GEN_OPFVF_WIDEN_TRANS * target/riscv: rvv: Source vector registers cannot overlap mask register * common-user/host/riscv: use tail pseudoinstruction for calling tail * target/riscv: fix endless translation loop on big endian systems * target/riscv: pmp: move Smepmp operation conversion into a function * virtio: Call set_features during reset * s390x: Fix leak in machine_set_loadparm * 9pfs: fix FD leak and reduce latency of v9fs_reclaim_fd() * 9pfs: fix concurrent v9fs_reclaim_fd() calls * all glib2 versions are recent enough to use pcre2: * qemu-linux-user: drop pcre (by Andreas Stieger) * Correct wrong bug mentioned in changelog (bsc#1236329) * Update to latest stable release (9.2.3) Fixes: bsc#1236329 * hw/intc/aspeed: Fix IRQ handler mask check * hw/misc/aspeed_hace: Fix buffer overflow in has_padding function * target/riscv: fix handling of nop for vstart >= vl in some vector instruction * target/riscv: refactor VSTART_CHECK_EARLY_EXIT() to accept vl as a parameter * Makefile: "make dist" generates a .xz, not .bz2 * target/ppc: Fix e200 duplicate SPRs * target/ppc: Fix facility interrupt checks for VSX * ppc/spapr: fix default cpu for pre-9.0 machines. * host/include/loongarch64: Fix inline assembly compatibility with Clang * linux-user/riscv: Fix handling of cpu mask in riscv_hwprobe syscall * target/riscv: fixes a bug against `ssamoswap` behavior in M-mode * target/riscv: fix access permission checks for CSR_SSP * docs/about/emulation: Fix broken link * vdpa: Allow vDPA to work on big-endian machine * vdpa: Fix endian bugs in shadow virtqueue * target/loongarch: Fix vldi inst * target/arm: Simplify pstate_sm check in sve_access_check * target/arm: Make DisasContext.{fp, sve}_access_checked tristate * util/cacheflush: Make first DSB unconditional on aarch64 * docs: Rename default-configs to configs * block: Zero block driver state before reopening * hw/xen/hvm: Fix Aarch64 typo * hw/net/smc91c111: Don't allow data register access to overrun buffer * hw/net/smc91c111: Sanitize packet length on tx * hw/net/smc91c111: Sanitize packet numbers * ppc/pnv/occ: Fix common area sensor offsets * xen: No need to flush the mapcache for grants (bsc#1236329) * net: move backend cleanup to NIC cleanup * net: parameterize the removing client from nc list * util/qemu-timer.c: Don't warp timer from timerlist_rearm() * target/arm: Correct STRD atomicity * target/arm: Correct LDRD atomicity and fault behaviour * hw/arm: enable secure EL2 timers for sbsa machine * hw/arm: enable secure EL2 timers for virt machine * target/arm: Implement SEL2 physical and virtual timers * [openSUSE][RPM] spec: Require ipxe and virtio-gpu packages for more arch-es (bsc#1240157) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2063=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2063=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-2063=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * qemu-img-debuginfo-9.2.4-150700.3.5.1 * qemu-tools-9.2.4-150700.3.5.1 * qemu-tools-debuginfo-9.2.4-150700.3.5.1 * qemu-debugsource-9.2.4-150700.3.5.1 * qemu-pr-helper-debuginfo-9.2.4-150700.3.5.1 * qemu-img-9.2.4-150700.3.5.1 * qemu-debuginfo-9.2.4-150700.3.5.1 * qemu-pr-helper-9.2.4-150700.3.5.1 * Basesystem Module 15-SP7 (x86_64) * qemu-vmsr-helper-debuginfo-9.2.4-150700.3.5.1 * qemu-vmsr-helper-9.2.4-150700.3.5.1 * SUSE Package Hub 15 15-SP7 (noarch) * qemu-microvm-9.2.4-150700.3.5.1 * qemu-SLOF-9.2.4-150700.3.5.1 * qemu-skiboot-9.2.4-150700.3.5.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * qemu-extra-9.2.4-150700.3.5.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-9.2.4-150700.3.5.1 * qemu-extra-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-jack-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-oss-debuginfo-9.2.4-150700.3.5.1 * qemu-debuginfo-9.2.4-150700.3.5.1 * qemu-ppc-9.2.4-150700.3.5.1 * qemu-ppc-debuginfo-9.2.4-150700.3.5.1 * qemu-arm-debuginfo-9.2.4-150700.3.5.1 * qemu-block-dmg-debuginfo-9.2.4-150700.3.5.1 * qemu-linux-user-9.2.4-150700.3.5.1 * qemu-block-gluster-9.2.4-150700.3.5.1 * qemu-linux-user-debugsource-9.2.4-150700.3.5.1 * qemu-accel-qtest-9.2.4-150700.3.5.1 * qemu-hw-s390x-virtio-gpu-ccw-9.2.4-150700.3.5.1 * qemu-linux-user-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-oss-9.2.4-150700.3.5.1 * qemu-vhost-user-gpu-debuginfo-9.2.4-150700.3.5.1 * qemu-vhost-user-gpu-9.2.4-150700.3.5.1 * qemu-hw-usb-smartcard-9.2.4-150700.3.5.1 * qemu-block-dmg-9.2.4-150700.3.5.1 * qemu-hw-usb-smartcard-debuginfo-9.2.4-150700.3.5.1 * qemu-s390x-9.2.4-150700.3.5.1 * qemu-ivshmem-tools-debuginfo-9.2.4-150700.3.5.1 * qemu-arm-9.2.4-150700.3.5.1 * qemu-accel-qtest-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-jack-9.2.4-150700.3.5.1 * qemu-ivshmem-tools-9.2.4-150700.3.5.1 * qemu-debugsource-9.2.4-150700.3.5.1 * qemu-s390x-debuginfo-9.2.4-150700.3.5.1 * qemu-block-gluster-debuginfo-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * qemu-block-ssh-debuginfo-9.2.4-150700.3.5.1 * qemu-headless-9.2.4-150700.3.5.1 * qemu-block-nfs-9.2.4-150700.3.5.1 * qemu-block-nfs-debuginfo-9.2.4-150700.3.5.1 * qemu-chardev-spice-debuginfo-9.2.4-150700.3.5.1 * qemu-ui-spice-core-9.2.4-150700.3.5.1 * qemu-ui-dbus-debuginfo-9.2.4-150700.3.5.1 * qemu-block-iscsi-debuginfo-9.2.4-150700.3.5.1 * qemu-debuginfo-9.2.4-150700.3.5.1 * qemu-block-rbd-debuginfo-9.2.4-150700.3.5.1 * qemu-block-curl-9.2.4-150700.3.5.1 * qemu-hw-display-qxl-9.2.4-150700.3.5.1 * qemu-guest-agent-debuginfo-9.2.4-150700.3.5.1 * qemu-hw-usb-host-debuginfo-9.2.4-150700.3.5.1 * qemu-chardev-baum-debuginfo-9.2.4-150700.3.5.1 * qemu-ui-dbus-9.2.4-150700.3.5.1 * qemu-audio-pipewire-9.2.4-150700.3.5.1 * qemu-audio-dbus-9.2.4-150700.3.5.1 * qemu-spice-9.2.4-150700.3.5.1 * qemu-hw-usb-redirect-9.2.4-150700.3.5.1 * qemu-ui-curses-9.2.4-150700.3.5.1 * qemu-audio-spice-9.2.4-150700.3.5.1 * qemu-hw-usb-host-9.2.4-150700.3.5.1 * qemu-audio-pipewire-debuginfo-9.2.4-150700.3.5.1 * qemu-9.2.4-150700.3.5.1 * qemu-ui-opengl-debuginfo-9.2.4-150700.3.5.1 * qemu-hw-display-virtio-vga-9.2.4-150700.3.5.1 * qemu-hw-display-virtio-vga-debuginfo-9.2.4-150700.3.5.1 * qemu-ui-curses-debuginfo-9.2.4-150700.3.5.1 * qemu-block-ssh-9.2.4-150700.3.5.1 * qemu-chardev-spice-9.2.4-150700.3.5.1 * qemu-block-curl-debuginfo-9.2.4-150700.3.5.1 * qemu-hw-usb-redirect-debuginfo-9.2.4-150700.3.5.1 * qemu-block-iscsi-9.2.4-150700.3.5.1 * qemu-guest-agent-9.2.4-150700.3.5.1 * qemu-chardev-baum-9.2.4-150700.3.5.1 * qemu-ksm-9.2.4-150700.3.5.1 * qemu-ui-opengl-9.2.4-150700.3.5.1 * qemu-block-rbd-9.2.4-150700.3.5.1 * qemu-debugsource-9.2.4-150700.3.5.1 * qemu-ui-spice-core-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-dbus-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-spice-debuginfo-9.2.4-150700.3.5.1 * qemu-hw-display-qxl-debuginfo-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (aarch64) * qemu-arm-debuginfo-9.2.4-150700.3.5.1 * qemu-arm-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (aarch64 s390x x86_64) * qemu-hw-display-virtio-gpu-9.2.4-150700.3.5.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-9.2.4-150700.3.5.1 * qemu-hw-display-virtio-gpu-debuginfo-9.2.4-150700.3.5.1 * qemu-hw-display-virtio-gpu-pci-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (noarch) * qemu-lang-9.2.4-150700.3.5.1 * qemu-seabios-9.2.41.16.3_3_g3d33c746-150700.3.5.1 * qemu-vgabios-9.2.41.16.3_3_g3d33c746-150700.3.5.1 * qemu-skiboot-9.2.4-150700.3.5.1 * qemu-ipxe-9.2.4-150700.3.5.1 * qemu-SLOF-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (aarch64 ppc64le x86_64) * qemu-ui-gtk-9.2.4-150700.3.5.1 * qemu-ui-gtk-debuginfo-9.2.4-150700.3.5.1 * qemu-ui-spice-app-9.2.4-150700.3.5.1 * qemu-ui-spice-app-debuginfo-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (ppc64le) * qemu-ppc-debuginfo-9.2.4-150700.3.5.1 * qemu-ppc-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (s390x) * qemu-s390x-9.2.4-150700.3.5.1 * qemu-hw-s390x-virtio-gpu-ccw-9.2.4-150700.3.5.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-9.2.4-150700.3.5.1 * qemu-s390x-debuginfo-9.2.4-150700.3.5.1 * Server Applications Module 15-SP7 (x86_64) * qemu-audio-alsa-9.2.4-150700.3.5.1 * qemu-accel-tcg-x86-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-pa-9.2.4-150700.3.5.1 * qemu-x86-9.2.4-150700.3.5.1 * qemu-audio-pa-debuginfo-9.2.4-150700.3.5.1 * qemu-x86-debuginfo-9.2.4-150700.3.5.1 * qemu-audio-alsa-debuginfo-9.2.4-150700.3.5.1 * qemu-accel-tcg-x86-9.2.4-150700.3.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1236329 * https://bugzilla.suse.com/show_bug.cgi?id=1240157 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:22 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:22 -0000 Subject: SUSE-RU-2025:02062-1: moderate: Maintenance update for Multi-Linux Manager 5.0: Server, Proxy and Retail Branch Server Message-ID: <175068182238.11399.14540619356916980631@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 5.0: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2025:02062-1 Release Date: 2025-06-23T09:26:30Z Rating: moderate References: * jsc#MSQA-992 Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that contains one feature can now be installed. ## Recommended update 5.0.4.1 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.14: * Image rebuilt to the newest version proxy-httpd-image: * Version 5.0.12: * Image rebuilt to the newest version proxy-salt-broker-image: * Version 5.0.12: * Image rebuilt to the newest version proxy-squid-image: * Version 5.0.12: * Image rebuilt to the newest version proxy-ssh-image: * version 5.0.12: * Image rebuilt to the newest version proxy-tftpd-image: * Version 5.0.12: * Image rebuilt to the newest version ## Recommended update 5.0.4.1 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.14: * Image rebuilt to the newest version proxy-httpd-image: * Version 5.0.12: * Image rebuilt to the newest version proxy-salt-broker-image: * Version 5.0.12: * Image rebuilt to the newest version proxy-squid-image: * Version 5.0.12: * Image rebuilt to the newest version proxy-ssh-image: * version 5.0.12: * Image rebuilt to the newest version proxy-tftpd-image: * Version 5.0.12: * Image rebuilt to the newest version ## Recommended update 5.0.4.1 for Multi-Linux Manager Server ### Description: This update fixes the following issues: server-attestation-image: * Version 5.0.10: * Image rebuilt to the newest version server-hub-xmlrpc-api-image: * Version 5.0.12: * Image rebuilt to the newest version server-image: * Version 5.0.15: * Image rebuilt to the newest version with updated dependencies server-migration-14-16-image: * Version 5.0.13: * Image rebuilt to the newest version ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-2062=1 * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-2062=1 * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-2062=1 ## Package List: * SUSE Manager Retail Branch Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4.1-7.18.5 * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4.1-7.20.5 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4.1-7.18.5 * SUSE Manager Retail Branch Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4.1-7.20.5 * SUSE Manager Retail Branch Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4.1-7.18.5 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4.1-7.20.5 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-s390x-proxy-squid-image-5.0.4.1-7.18.5 * SUSE Manager Retail Branch Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4.1-7.18.5 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4.1-7.20.5 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4.1-7.18.5 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4.1-7.18.5 * SUSE Manager Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.4.1-7.18.7 * suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.4.1-6.18.5 * suse-manager-5.0-aarch64-server-attestation-image-5.0.4.1-6.18.5 * suse-manager-5.0-aarch64-server-image-5.0.4.1-7.25.9 * SUSE Manager Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.4.1-6.18.5 * suse-manager-5.0-ppc64le-server-image-5.0.4.1-7.25.9 * suse-manager-5.0-ppc64le-server-attestation-image-5.0.4.1-6.18.5 * suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.4.1-7.18.7 * SUSE Manager Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.4.1-6.18.5 * suse-manager-5.0-s390x-server-image-5.0.4.1-7.25.9 * suse-manager-5.0-s390x-server-migration-14-16-image-5.0.4.1-7.18.7 * suse-manager-5.0-s390x-server-attestation-image-5.0.4.1-6.18.5 * SUSE Manager Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-server-attestation-image-5.0.4.1-6.18.5 * suse-manager-5.0-x86_64-server-image-5.0.4.1-7.25.9 * suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.4.1-7.18.7 * suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.4.1-6.18.5 * SUSE Manager Proxy 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4.1-7.18.5 * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4.1-7.20.5 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4.1-7.18.5 * SUSE Manager Proxy 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4.1-7.20.5 * SUSE Manager Proxy 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4.1-7.18.5 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4.1-7.20.5 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-s390x-proxy-squid-image-5.0.4.1-7.18.5 * SUSE Manager Proxy 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4.1-7.18.5 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4.1-7.20.5 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4.1-7.18.5 * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4.1-7.18.5 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4.1-7.18.5 ## References: * https://jira.suse.com/browse/MSQA-992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:25 -0000 Subject: SUSE-RU-2025:02061-1: moderate: Recommended update for sap-installation-wizard Message-ID: <175068182559.11399.6943293105606964040@smelt2.prg2.suse.org> # Recommended update for sap-installation-wizard Announcement ID: SUSE-RU-2025:02061-1 Release Date: 2025-06-23T08:32:21Z Rating: moderate References: * bsc#1226752 * bsc#1233822 * bsc#1239627 Affected Products: * openSUSE Leap 15.6 * SAP Applications Module 15-SP6 * SAP Business One Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has three fixes can now be installed. ## Description: This update for sap-installation-wizard fixes the following issues: * Version update 4.6.18 * Missing landscape server address for bone-installation-wizard (bsc#1239627). * SAP Business One 2411: failure to install due to self signed certificate Set CONNECTION_SSL_CERTIFICATE_VERIFICATION=false (bsc#1233822). * Fixes in bsc#1226752. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2061=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2025-2061=1 * SAP Business One Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Business-One-15-SP6-2025-2061=1 ## Package List: * openSUSE Leap 15.6 (ppc64le x86_64) * bone-installation-wizard-4.6.18-150600.3.13.3 * sap-installation-wizard-4.6.18-150600.3.13.3 * SAP Applications Module 15-SP6 (ppc64le x86_64) * sap-installation-wizard-4.6.18-150600.3.13.3 * SAP Business One Module 15-SP6 (x86_64) * bone-installation-wizard-4.6.18-150600.3.13.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226752 * https://bugzilla.suse.com/show_bug.cgi?id=1233822 * https://bugzilla.suse.com/show_bug.cgi?id=1239627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 12:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 12:30:28 -0000 Subject: SUSE-RU-2025:02060-1: moderate: Recommended update for sap-installation-wizard Message-ID: <175068182811.11399.1692446715605138449@smelt2.prg2.suse.org> # Recommended update for sap-installation-wizard Announcement ID: SUSE-RU-2025:02060-1 Release Date: 2025-06-23T08:28:12Z Rating: moderate References: * bsc#1233822 * bsc#1239627 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for sap-installation-wizard fixes the following issues: * Version update 4.5.18 * SAP Business One 2411: failure to install due to self signed certificate Set CONNECTION_SSL_CERTIFICATE_VERIFICATION=false (bsc#1233822). * bone-installation-wizard: missing landscape server address, adding SLD_SERVER_ADDR=${HOSTNAME} parameter (bsc#1239627). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2060=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2025-2060=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2060=1 ## Package List: * openSUSE Leap 15.5 (ppc64le x86_64) * sap-installation-wizard-4.5.18-150500.5.28.4 * bone-installation-wizard-4.5.18-150500.5.28.4 * SAP Applications Module 15-SP5 (ppc64le x86_64) * sap-installation-wizard-4.5.18-150500.5.28.4 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * bone-installation-wizard-4.5.18-150500.5.28.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233822 * https://bugzilla.suse.com/show_bug.cgi?id=1239627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jun 23 20:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Mon, 23 Jun 2025 20:30:16 -0000 Subject: SUSE-SU-2025:02069-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) Message-ID: <175071061601.6013.12639521790927424313@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:02069-1 Release Date: 2025-06-23T16:04:03Z Rating: important References: * bsc#1227903 * bsc#1232908 * bsc#1232927 * bsc#1232929 * bsc#1233245 * bsc#1233680 * bsc#1233708 * bsc#1235062 * bsc#1235129 * bsc#1235231 * bsc#1236244 Cross-References: * CVE-2024-40937 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50257 * CVE-2024-50279 * CVE-2024-50301 * CVE-2024-53208 * CVE-2024-56582 * CVE-2024-56601 * CVE-2024-56605 CVSS scores: * CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_8 fixes several issues. The following security issues were fixed: * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235129). * CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (bsc#1236244). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232908). * CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227903). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2069=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_8-rt-debuginfo-17-150600.3.1 * kernel-livepatch-SLE15-SP6-RT_Update_0-debugsource-17-150600.3.1 * kernel-livepatch-6_4_0-150600_8-rt-17-150600.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40937.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://bugzilla.suse.com/show_bug.cgi?id=1227903 * https://bugzilla.suse.com/show_bug.cgi?id=1232908 * https://bugzilla.suse.com/show_bug.cgi?id=1232927 * https://bugzilla.suse.com/show_bug.cgi?id=1232929 * https://bugzilla.suse.com/show_bug.cgi?id=1233245 * https://bugzilla.suse.com/show_bug.cgi?id=1233680 * https://bugzilla.suse.com/show_bug.cgi?id=1233708 * https://bugzilla.suse.com/show_bug.cgi?id=1235062 * https://bugzilla.suse.com/show_bug.cgi?id=1235129 * https://bugzilla.suse.com/show_bug.cgi?id=1235231 * https://bugzilla.suse.com/show_bug.cgi?id=1236244 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 24 08:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 24 Jun 2025 08:30:04 -0000 Subject: SUSE-SU-2025:02073-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) Message-ID: <175075380483.11560.1951721153130724085@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:02073-1 Release Date: 2025-06-23T21:20:30Z Rating: important References: * bsc#1235231 Cross-References: * CVE-2024-56601 CVSS scores: * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_23 fixes one issue. The following security issue was fixed: * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2073=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_7-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-debuginfo-7-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56601.html * https://bugzilla.suse.com/show_bug.cgi?id=1235231 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 24 08:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 24 Jun 2025 08:30:11 -0000 Subject: SUSE-SU-2025:02072-1: important: Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6) Message-ID: <175075381173.11560.12978996400341067795@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:02072-1 Release Date: 2025-06-23T20:03:58Z Rating: important References: * bsc#1235062 * bsc#1235129 * bsc#1235231 Cross-References: * CVE-2024-56582 * CVE-2024-56601 * CVE-2024-56605 CVSS scores: * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_20 fixes several issues. The following security issues were fixed: * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235129). * CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2072=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-7-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://bugzilla.suse.com/show_bug.cgi?id=1235062 * https://bugzilla.suse.com/show_bug.cgi?id=1235129 * https://bugzilla.suse.com/show_bug.cgi?id=1235231 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 24 08:30:22 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 24 Jun 2025 08:30:22 -0000 Subject: SUSE-SU-2025:02071-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) Message-ID: <175075382214.11560.6960520622387415144@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:02071-1 Release Date: 2025-06-23T20:03:55Z Rating: important References: * bsc#1232908 * bsc#1232927 * bsc#1232929 * bsc#1233245 * bsc#1233680 * bsc#1233708 * bsc#1235062 * bsc#1235129 * bsc#1235231 * bsc#1236244 Cross-References: * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50257 * CVE-2024-50279 * CVE-2024-50301 * CVE-2024-53208 * CVE-2024-56582 * CVE-2024-56601 * CVE-2024-56605 CVSS scores: * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_17 fixes several issues. The following security issues were fixed: * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235129). * CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (bsc#1236244). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232908). * CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2071=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_17-rt-10-150600.2.1 * kernel-livepatch-6_4_0-150600_10_17-rt-debuginfo-10-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_5-debugsource-10-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://bugzilla.suse.com/show_bug.cgi?id=1232908 * https://bugzilla.suse.com/show_bug.cgi?id=1232927 * https://bugzilla.suse.com/show_bug.cgi?id=1232929 * https://bugzilla.suse.com/show_bug.cgi?id=1233245 * https://bugzilla.suse.com/show_bug.cgi?id=1233680 * https://bugzilla.suse.com/show_bug.cgi?id=1233708 * https://bugzilla.suse.com/show_bug.cgi?id=1235062 * https://bugzilla.suse.com/show_bug.cgi?id=1235129 * https://bugzilla.suse.com/show_bug.cgi?id=1235231 * https://bugzilla.suse.com/show_bug.cgi?id=1236244 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 24 08:30:31 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 24 Jun 2025 08:30:31 -0000 Subject: SUSE-SU-2025:02070-1: important: Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) Message-ID: <175075383178.11560.5060576856847080061@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:02070-1 Release Date: 2025-06-23T20:03:52Z Rating: important References: * bsc#1232908 * bsc#1232927 * bsc#1232929 * bsc#1233245 * bsc#1233680 * bsc#1233708 * bsc#1235062 * bsc#1235086 * bsc#1235129 * bsc#1235231 * bsc#1236244 Cross-References: * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50257 * CVE-2024-50279 * CVE-2024-50301 * CVE-2024-53074 * CVE-2024-53208 * CVE-2024-56582 * CVE-2024-56601 * CVE-2024-56605 CVSS scores: * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_8 fixes several issues. The following security issues were fixed: * CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680). * CVE-2024-53074: wifi: iwlwifi: mvm: do not leak a link on AP removal (bsc#1235086). * CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235129). * CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (bsc#1236244). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232908). * CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2070=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-12-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53208.html * https://www.suse.com/security/cve/CVE-2024-56582.html * https://www.suse.com/security/cve/CVE-2024-56601.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://bugzilla.suse.com/show_bug.cgi?id=1232908 * https://bugzilla.suse.com/show_bug.cgi?id=1232927 * https://bugzilla.suse.com/show_bug.cgi?id=1232929 * https://bugzilla.suse.com/show_bug.cgi?id=1233245 * https://bugzilla.suse.com/show_bug.cgi?id=1233680 * https://bugzilla.suse.com/show_bug.cgi?id=1233708 * https://bugzilla.suse.com/show_bug.cgi?id=1235062 * https://bugzilla.suse.com/show_bug.cgi?id=1235086 * https://bugzilla.suse.com/show_bug.cgi?id=1235129 * https://bugzilla.suse.com/show_bug.cgi?id=1235231 * https://bugzilla.suse.com/show_bug.cgi?id=1236244 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jun 24 08:30:44 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 24 Jun 2025 08:30:44 -0000 Subject: SUSE-SU-2025:02074-1: important: Security update for python313 Message-ID: <175075384421.11560.4518504665117723955@smelt2.prg2.suse.org> # Security update for python313 Announcement ID: SUSE-SU-2025:02074-1 Release Date: 2025-06-24T07:26:36Z Rating: important References: * bsc#1228165 * bsc#1232241 * bsc#1234290 * bsc#1236705 * bsc#1238450 * bsc#1239210 * bsc#1243273 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 Cross-References: * CVE-2024-12254 * CVE-2024-12718 * CVE-2024-9287 * CVE-2025-0938 * CVE-2025-1795 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4516 * CVE-2025-4517 CVSS scores: * CVE-2024-12254 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12254 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12254 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-9287 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2024-9287 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green * CVE-2024-9287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0938 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-0938 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-0938 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1795 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-1795 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4516 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4516 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4516 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves nine vulnerabilities and has two security fixes can now be installed. ## Description: This update for python313 fixes the following issues: Update to version 3.13.5. Security issues fixed: * CVE-2025-4517: arbitrary filesystem writes outside the extraction directory during extraction with filter="data" (bsc#1244032) * CVE-2025-4516: use-after-free in the unicode-escape decoder when using the error handler (bsc#1243273). * CVE-2025-4330: extraction filter bypass for linking outside extraction directory (bsc#1244060) * CVE-2025-4138: may allow symlink targets to point outside the destination directory, and the modification of some file metadata. (bsc#1244059) * CVE-2025-0938: domain names containing square brackets are not identified as incorrect by urlparse (bsc#1236705). * CVE-2024-12718: bypass extraction filter to modify file metadata outside extraction directory (bsc#1244056) * CVE-2024-12254: memory exhaustion due to unbounded memory buffering in `SelectorSocketTransport.writelines()` (bsc#1234290). Other changes and issues fixed: Changes from 3.13.5: * Tests * gh-135120: Add test.support.subTests(). * Library * gh-133967: Do not normalize locale name ?C.UTF-8? to ?en_US.UTF-8?. * gh-135326: Restore support of integer-like objects with **index** () in random.getrandbits(). * gh-135321: Raise a correct exception for values greater than 0x7fffffff for the BINSTRING opcode in the C implementation of pickle. * gh-135276: Backported bugfixes in zipfile.Path from zipp 3.23. Fixed .name, .stem and other basename-based properties on Windows when working with a zipfile on disk. * gh-134151: email: Fix TypeError in email.utils.decode_params() when sorting RFC 2231 continuations that contain an unnumbered section. * gh-134152: email: Fix parsing of email message ID with invalid domain. * gh-127081: Fix libc thread safety issues with os by replacing getlogin with getlogin_r re-entrant version. * gh-131884: Fix formatting issues in json.dump() when both indent and skipkeys are used. * Core and Builtins * gh-135171: Roll back changes to generator and list comprehensions that went into 3.13.4 to fix gh-127682, but which involved semantic and bytecode changes not appropriate for a bugfix release. * C API * gh-134989: Fix Py_RETURN_NONE, Py_RETURN_TRUE and Py_RETURN_FALSE macros in the limited C API 3.11 and older: don?t treat Py_None, Py_True and Py_False as immortal. Patch by Victor Stinner. * gh-134989: Implement PyObject_DelAttr() and PyObject_DelAttrString() as macros in the limited C API 3.12 and older. Patch by Victor Stinner. Changes from 3.13.4: * Security * gh-135034: Fixes multiple issues that allowed tarfile extraction filters (filter="data" and filter="tar") to be bypassed using crafted symlinks and hard links. Addresses CVE-2024-12718 (bsc#1244056), CVE-2025-4138 (bsc#1244059), CVE-2025-4330 (bsc#1244060), and CVE-2025-4517 (bsc#1244032). * gh-133767: Fix use-after-free in the ?unicode-escape? decoder with a non-?strict? error handler (CVE-2025-4516, bsc#1243273). * gh-128840: Short-circuit the processing of long IPv6 addresses early in ipaddress to prevent excessive memory consumption and a minor denial-of-service. * Library * gh-134718: ast.dump() now only omits None and [] values if they are default values. * gh-128840: Fix parsing long IPv6 addresses with embedded IPv4 address. * gh-134696: Built-in HACL* and OpenSSL implementations of hash function constructors now correctly accept the same documented named arguments. For instance, md5() could be previously invoked as md5(data=data) or md5(string=string) depending on the underlying implementation but these calls were not compatible. Patch by B?n?dikt Tran. * gh-134210: curses.window.getch() now correctly handles signals. Patch by B?n?dikt Tran. * gh-80334: multiprocessing.freeze_support() now checks for work on any ?spawn? start method platform rather than only on Windows. * gh-114177: Fix asyncio to not close subprocess pipes which would otherwise error out when the event loop is already closed. * gh-134152: Fixed UnboundLocalError that could occur during email header parsing if an expected trailing delimiter is missing in some contexts. * gh-62184: Remove import of C implementation of io.FileIO from Python implementation which has its own implementation * gh-133982: Emit RuntimeWarning in the Python implementation of io when the file-like object is not closed explicitly in the presence of multiple I/O layers. * gh-133890: The tarfile module now handles UnicodeEncodeError in the same way as OSError when cannot extract a member. * gh-134097: Fix interaction of the new REPL and -X showrefcount command line option. * gh-133889: The generated directory listing page in http.server.SimpleHTTPRequestHandler now only shows the decoded path component of the requested URL, and not the query and fragment. * gh-134098: Fix handling paths that end with a percent-encoded slash (%2f or %2F) in http.server.SimpleHTTPRequestHandler. * gh-134062: ipaddress: fix collisions in **hash** () for IPv4Network and IPv6Network objects. * gh-133745: In 3.13.3 we accidentally changed the signature of the asyncio create_task() family of methods and how it calls a custom task factory in a backwards incompatible way. Since some 3rd party libraries have already made changes to work around the issue that might break if we simply reverted the changes, we?re instead changing things to be backwards compatible with 3.13.2 while still supporting those workarounds for 3.13.3. In particular, the special-casing of name and context is back (until 3.14) and consequently eager tasks may still find that their name hasn?t been set before they execute their first yielding await. * gh-71253: Raise ValueError in open() if opener returns a negative file-descriptor in the Python implementation of io to match the C implementation. * gh-77057: Fix handling of invalid markup declarations in html.parser.HTMLParser. * gh-133489: random.getrandbits() can now generate more that 231 bits. random.randbytes() can now generate more that 256 MiB. * gh-133290: Fix attribute caching issue when setting ctypes. _Pointer._type_ in the undocumented and deprecated ctypes.SetPointerType() function and the undocumented set_type() method. * gh-132876: ldexp() on Windows doesn?t round subnormal results before Windows 11, but should. Python?s math.ldexp() wrapper now does round them, so results may change slightly, in rare cases of very small results, on Windows versions before 11. * gh-133089: Use original timeout value for subprocess.TimeoutExpired when the func subprocess.run() is called with a timeout instead of sometimes a confusing partial remaining time out value used internally on the final wait(). * gh-133009: xml.etree.ElementTree: Fix a crash in Element. **deepcopy** when the element is concurrently mutated. Patch by B?n?dikt Tran. * gh-132995: Bump the version of pip bundled in ensurepip to version 25.1.1 * gh-132017: Fix error when pyrepl is suspended, then resumed and terminated. * gh-132673: Fix a crash when using _align_ = 0 and _fields_ = [] in a ctypes.Structure. * gh-132527: Include the valid typecode ?w? in the error message when an invalid typecode is passed to array.array. * gh-132439: Fix PyREPL on Windows: characters entered via AltGr are swallowed. Patch by Chris Eibl. * gh-132429: Fix support of Bluetooth sockets on NetBSD and DragonFly BSD. * gh-132106: QueueListener.start now raises a RuntimeError if the listener is already started. * gh-132417: Fix a NULL pointer dereference when a C function called using ctypes with restype py_object returns NULL. * gh-132385: Fix instance error suggestions trigger potential exceptions in object. **getattr** () in traceback. * gh-132308: A traceback.TracebackException now correctly renders the **context** and **cause** attributes from falsey Exception, and the exceptions attribute from falsey ExceptionGroup. * gh-132250: Fixed the SystemError in cProfile when locating the actual C function of a method raises an exception. * gh-132063: Prevent exceptions that evaluate as falsey (namely, when their **bool** method returns False or their **len** method returns 0) from being ignored by concurrent.futures.ProcessPoolExecutor and concurrent.futures.ThreadPoolExecutor. * gh-119605: Respect follow_wrapped for **init** () and **new** () methods when getting the class signature for a class with inspect.signature(). Preserve class signature after wrapping with warnings.deprecated(). Patch by Xuehai Pan. * gh-91555: Ignore log messages generated during handling of log messages, to avoid deadlock or infinite recursion. * gh-131434: Improve error reporting for incorrect format in time.strptime(). * gh-131127: Systems using LibreSSL now successfully build. * gh-130999: Avoid exiting the new REPL and offer suggestions even if there are non-string candidates when errors occur. * gh-130941: Fix configparser.ConfigParser parsing empty interpolation with allow_no_value set to True. * gh-129098: Fix REPL traceback reporting when using compile() with an inexisting file. Patch by B?n?dikt Tran. * gh-130631: http.cookiejar.join_header_words() is now more similar to the original Perl version. It now quotes the same set of characters and always quote values that end with "\n". * gh-129719: Fix missing socket.CAN_RAW_ERR_FILTER constant in the socket module on Linux systems. It was missing since Python 3.11. * gh-124096: Turn on virtual terminal mode and enable bracketed paste in REPL on Windows console. (If the terminal does not support bracketed paste, enabling it does nothing.) * gh-122559: Remove **reduce** () and **reduce_ex** () methods that always raise TypeError in the C implementation of io.FileIO, io.BufferedReader, io.BufferedWriter and io.BufferedRandom and replace them with default **getstate** () methods that raise TypeError. This restores fine details of behavior of Python 3.11 and older versions. * gh-122179: hashlib.file_digest() now raises BlockingIOError when no data is available during non-blocking I/O. Before, it added spurious null bytes to the digest. * gh-86155: html.parser.HTMLParser.close() no longer loses data when the